Chambury Learning Solutions [Chambury Consulting Ltd]

eLearning Catalogue - Health and Social Care

Our eLearning content catalogue is written in line with the current UK legislation, targeted at Health and Social sectors.

All courses are designed by professional and highly experienced content developers specialising in user engagement and interaction.

All courses are accessible on any device, in a modular and deep scrolling format.

Features

  • Learning Management, delivery and reporting
  • eLearning Management, delivery and reporting
  • Deployment, design and consultancy services
  • Training, support and coaching services
  • Transition from existing LMS to Moodle
  • Growing list of titles to meet Health /Social Care standards
  • Editable content that you can tailor to local use
  • Multi Language Support
  • SCORM compliant
  • Responsive bespoke theme

Benefits

  • Bespoke content design to meet legislation
  • Complement classroom training or stand alone
  • Compliance training delivery
  • Easy access and great staff user experience
  • Reduce costs with interactive and easy to manage online learning
  • Realise the full potential of rolling out self service.
  • Content designed for public sector and healthcare organisations

Pricing

£2250 to £20000 per instance per year

Service documents

G-Cloud 10

149641623973427

Chambury Learning Solutions [Chambury Consulting Ltd]

Richard Chambury

07803125075

info@chamburylearningsolutions.co.uk

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints Courses are developed using the Adapt authoring Tool delivering access on any device, in a modular and deep scrolling format. All courses are SCORM format and will require an LMS to deliver to your users.
System requirements
  • PC or Mac
  • Mac OS X 10.5 (Leopard) or higher
  • Android or IOS
  • Microsoft Internet Explorer 8 or higher
  • Firefox 3 or higher
  • Safari 4 or higher
  • Minimum bandwidth 256 kbps
  • Smartphone and Tablet compatible
  • HTML5 format

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Tickets are prioritised on status;

Urgent respond with 2 hours
High respond within 4 hours
Medium respond within 24 hours
Low respond within 72 hours

Urgent is where the system is confirmed as unavailable for everyone.

High is where the application failure causes all users to be unable to perform some portion of their job.

Medium is where the application failure causes a small number of users are unable to perform all or some portion of their job.

Low is where there is a request for service /general user queries /customisations etc.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.0 AA or EN 301 549
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Onsite support
Support levels Our SLA is;

Urgent; Response within 1 hour resolve within 4 hours
High; Response within 2 hours resolve within 8 hours
Medium; Response within 8 hours resolve within 4 days
Low; Response within 8 hours resolve within 15 days

Unlimited access to online /telephone helpdesk operates Monday to Friday, 8.30am to 5.30pm

All customers have a dedicated learning consultant, access to customer conferences and workshops /focus groups at no additional cost.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started Upon agreement the content can be delivered within a few days to the customer. We bundle all content with Adapt the open source authoring tool which allows you to edit and customise the content to local requirements, or it can be used as 'off the shelf' eLearning.

A bespoke theme is agreed with you so the content can go-live with local branding.

Full training is available on the use of Adapt which you can take advantage of.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Our services are open source meaning that you can transfer to another supplier simply and easily. If you end your contract we will deactivate your Adapt account and provide any user and completion data to you in CSV format. You can of course run local reports to download data as required.
End-of-contract process Upon termination of the contract a process will be agreed to provide access to data from within the system. The customer can extract any data they require through front end reports and we will supply a full copy of the database. The system code including code for any customisations /plugins will not be provided; any efforts to restore the system by the customer will be by use of a local Adapt installation. If required there will be a single cost of £1,500 (ex VAT) to provide a full copy of the DB. Upon expiry of the agreement any specific reports that the customer requests from the supplier and does not run locally will be charged at the standard day rate.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
  • Other
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Our eLearning content is designed to be fully responsive – meaning the user interface will adjust seamlessly depending on what device you are using; desktops, laptops, tablets or smartphones.

All features available on the desktop site are available on the mobile site. The site responds to the screen size and distributes content appropriately to be displayed on desktop, smartphone and tablet devices.
Accessibility standards WCAG 2.0 A
Accessibility testing Our platforms are open source and this provides subscribers the freedom to make changes to the system to meet business needs and apply radically different themes. Additional themes or changes can be made to follow published accessibility guidelines in order to meet local requirements.

This freedom also allows for changes to be made to specific workflows and screens to provide an enhanced experience for users of assistive technologies (eg if your organisation uses specific screen reader technology for learners who need it as they each have their own inconsistencies).

The system meets WCAG standards.
API No
Customisation available Yes
Description of customisation All content can be tailored to meet the customer organisation requirements including content, branding and design.

Where a customisation is required we work with the customer(s) to define the process, wireframes to meet specification. This can be with a single customer, or within our customer user groups where collaboration is required /desired.

Content is developed by our in-house developers and launched on staging for local testing, and on production once agreement is confirmed.

Scaling

Scaling
Independence of resources All services include uptime performance monitoring, server updates, and SSL/TLS security. This can be scaled up if required to accommodate large usage or content needs (costs may increase if more capacity is required).

Our developers have access to dashboards that inform of CPU, RAM and SDD use and any limitations on the service. High level risks are automatically sent to developers by email and SMS for necessary action(s).

All sites are optimised for local usage and monitored for improvement ongoing to ensure all sites operate at optimal efficiency.

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Report results can be exported to a file or automatically emailed as a file attachment in the following formats.

Export in Excel format
Export in text format (CSV)
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • Excel
  • PDF Landscape
  • PDF Portrait
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability We work to make your System available for use over the internet 24 hours per day, 7 days per week. We provide a hardware infrastructure that we calculate, using reasonable estimations and based usage figures that you have provided us, will allow us to provide the service that you need. If the usage patterns of your users increases or changes in profile dramatically, we will inform you of this and suggest a revised hardware infrastructure.

99.5% uptime guarantee.

Backups are kept on and off server so a system can be restored timely.

Planned maintenance is excluded from the calculation. At least 5 working days of notice will be provided for any maintenance taking place between 5pm and 8am. At least 10 working days of notice will be provided, for any maintenance taking place between 8am and 5pm.

If a dispute arises out of or in connection with the contract or performance, validity or enforceability of it (Dispute) then the parties shall follow an agreed procedure.

NB; Changes or enhancements to the infrastructure are subject to agreement and may not be covered by our original contract and fees.
Approach to resilience This information can be made available on request.
Outage reporting Hosting and Maintenance includes uptime performance monitoring, server updates, security that can be scaled up if required to accommodate large usage or content needs (costs may increase if more capacity is required).

Our developers are alerted to potential risks via server dashboards that show CPU, RAM and SDD capacity /usage /spikes. Email alerts to our developers are also in use to alert them of issues before they arise.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Other user authentication Authentication methods (also known as authentication plugins) include:

Manual accounts: Username and password
No login: Suspends user account.
Email-based self-registration: Enables users to create their own accounts.

// The following methods rely on authentication with an external server /DB.
CAS server (SSO):
External database:
FirstClass server:
IMAP server:
LDAP server:
SAML server:
Moodle Network authentication:
NNTP server:
POP3 server:
RADIUS server:
Shibboleth:
NTLM/Integrated Authentication.

PAM (Pluggable Authentication Modules): Account details come from the operating system Moodle is running on, via PAM (can only be used Linux/Unix).
Access restrictions in management interfaces and support channels Access to management interfaces are through system defined and user defined URPs. Full access to define permissions can be granted as appropriate.

Support channel access is determined in agreement with the customer. A user can view their own tickets, or all tickets for their organisation.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards Other
Other security governance standards Cyber Essentials
Information security policies and processes We have policies in place for;

- Business continuity;
- Confidentiality and Data Sharing;
- Information Governance and security;
- Hosted services SLA;

We have standard operating procedures for all employees for core processes to ensure that information security is adhered to, All staff are required to agree to and sign the above mentioned policies, and are monitored via quarterly reviews.

The reporting structure is as below;

- Learning System Consultants report to the Managing Director;
- Senior Developer reports to the Managing Director;
- Helpdesk Support Technicians report to the Senior Developer;
- Junior Developers report to the Senior Developer;

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach If either party requests a change to the scope or execution of the Services including patch updates /upgrades, the Supplier shall provide a written estimate of the likely time required to implement the change including any necessary variations to the Supplier’s charges, the likely effect of the change and any other impact of the change on this Agreement.

Once agreed the changes, any addition costs, the Services, Project Plan and any other terms of this Agreement will be updated. All changes are tested in a staging environment for local testing prior to installation to the production environment.
Vulnerability management type Supplier-defined controls
Vulnerability management approach We have intrusion detector service for each server that monitors all servers and ports combining port scanning with regular vulnerability assessments of the configuration and software to highlight potential areas of exploit.

We monitor changes to configuration and binaries, maintaining a change audit trail.

Alerts are sent to an email address whenever a significant event occurs on the server allowing us to react where necessary. We then take any necessary actions to fix the vulnerability (even if the alert is a false positive). This include DDOS attacks or brutal force attacks and monitors all changes in the system.
Protective monitoring type Supplier-defined controls
Protective monitoring approach We combine port scanning with regular protective assessments of the server configuration and software in order to highlight potential areas of exploit. We actively monitor all connections to our servers controlling access only to approved users /machines on dedicated IP addresses.

Where a penetration attack takes place automated emails alert technical staff to the attack so actions can be taken. Following any vulnerability we check if any data was compromised /taken. Access credentials for all users /servers are changed following any vulnerability regardless of status.

Any attacks are managed as the alert is raised with actions immediately taken.
Incident management type Supplier-defined controls
Incident management approach User can report incidents within our online Helpdesk by raising a ticket. A complaint /Incident would be allocated to the appropriate team member(s) for investigation. Incidents are dealt with by senior team members.

• Reply acknowledges incident within 5 days
• Record incident in our central register (SharePoint) within 1 day.
• Acknowledge customer reply within 3 days.
• Investigate commences.
• Team member contributions within 5 days
• Examination of replies within 4 days
• Meeting to discuss outcome within 5 days
• Letter to confirm outcome within 2 days

We retain the right to amend process and timescales.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £2250 to £20000 per instance per year
Discount for educational organisations No
Free trial available Yes
Description of free trial Access to a dedicated demo zone in order to trial and pilot Moodle with a group of users.This may be to try out various features. Trial services are time limited and in a shared environment.
Link to free trial A dedicated URL will be provided following initial meeting

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑