MIME Consulting

DataPix for School Improvement

DataPix is an interactive tool designed for school improvement managers to compare school performance across a wide range of indicators. It allows managers to access key performance metrics and pupil characteristics data visually using bar charts, line charts, maps and tables. It can also provide summary dashboards or detailed profiles.

Features

  • Accessible on the web
  • Interactive analysis
  • Extensive data sources
  • Drill-down function
  • Export and PDF function for images or underlying data
  • Everything accessed through one menu
  • Trends over time
  • Comparison against other schools, LA, National, statistical neighbour
  • Pupil insight grids
  • Ranking of performance

Benefits

  • Easy comparison of performance
  • Choose from a range of indicators
  • Custom report builder
  • Interrogate data to get beneath headline messages
  • Simple visually engaging style for ease of identifying key messages
  • Understand performance over time
  • Monitor progress of individual pupils
  • Support the identification of best practice

Pricing

£3000 to £25000 per unit per year

Service documents

G-Cloud 9

155322429432537

MIME Consulting

Steve Preston

0208 099 4240

steve.preston@mimeconsulting.co.uk

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints None
System requirements Internet enabled device

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Usually within 24 hours, Monday to Friday
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Onsite support
Support levels As part of the annual licence, we will provide one training session on using DataPix for school improvement staff.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We will provide one session of on-site training to help users get the most out of the tool.
Service documentation No
End-of-contract data extraction Contact us to extract data.
End-of-contract process At the end of the contact if the service isn't continued then the buyer will have ongoing access to the existing data for the years bought but we will no longer update their DataPix with the most recent years data.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10+
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service All functionality is the same the only difference is presentation to fit on smaller screen.
Accessibility standards WCAG 2.0 A
Accessibility testing None
API No
Customisation available Yes
Description of customisation Buyers can customise the data sources - using their own data sets and/or our processed datasets (based on standard datasets), as well as customise the presentation of data.
The buyer can also customise the extent to which they want to have PDF reporting from the tool for example a Primary School Profile, or Post 16 Profile. These are comprehensive analysis reports on all aspects of individual schools or colleges and are available to download through DataPix if desired.

Scaling

Scaling
Independence of resources We use a virtual server with load balancing.

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency Never
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Contact us to export data.
Data export formats
  • CSV
  • Other
Other data export formats
  • Excel
  • PDF reports
Data import formats
  • CSV
  • Other
Other data import formats Excel

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Legacy SSL and TLS (under version 1.2)
Data protection within supplier network Other
Other protection within supplier network We don't have a network.

Availability and resilience

Availability and resilience
Guaranteed availability The Website will normally be available 24 hours a day. However, we make no guarantees that the Website will be available for 100% of the time, as there may be periods of site maintenance or server outages that necessitate some downtime.
Approach to resilience Available on request.
Outage reporting We would use an email alert to affected users. We have not needed to use this to date.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels There is no restricted access.
Access restriction testing frequency Less than once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation No
Security governance approach Our processes are compliant with ISO 27001. Our procedures and policies are regularly reviewed by DfE in order to access NPD data. Our Information Security and Data Protection Policy outlines our strict procedures to secure and protect the confidentiality of the data we use. All our staff are required to read and sign this to acknowledge their understanding of the policy. We always abide by the provisions of the Data Protection Act in processing data.
Information security policies and processes Our Information Security and Data Protection Policy includes protocols about secure access, deletion, transfer, processing and presentation of data.
We have a named Data Protection Officer with responsibility for ensuring policies are up to date, staff awareness, recording and reporting breaches, controlling access and approving disclosures.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We use a change management process tied to source code control which is linked to a ticketing system. All changes are reviewed by our IT Director for potential security impacts.
Vulnerability management type Supplier-defined controls
Vulnerability management approach All systems are kept up to date with latest patches and critical updates are applied immediately. Non-OS updates are provided by subscriptions to providers and assessed for exploitation severity, with subsequent roll-out process for systems affected.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Systems are monitored and logged continually, with notifications for high importance events. Logs are audited for suspicious activity.
Incident management type Supplier-defined controls
Incident management approach Incident management processes are defined for common events, with escalation routes to senior staff as appropriate. Users can report issues by telephone or email and will be kept informed on progress to resolution.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £3000 to £25000 per unit per year
Discount for educational organisations No
Free trial available No

Documents

Documents
Pricing document View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑