Assure Risk Management Software Module: Fire Risk Assessment

As part of the Assure health and safety software management system, the risk module contains the tools required to easily complete, track and report fire risk assessments across your organisation.


  • Project risk assessment
  • Activity risk assessment
  • COSHH assessment
  • DSE assessment
  • Manual handling risk assessment
  • Fire risk assessment
  • Noise risk assessment
  • Hazard spotting
  • Inspections (multiple configurable templates)


  • Employs HSE 5-step approach to controlling workplace risks
  • Accepted format for general/activity based risk assessments
  • Engage staff. Create risk assessments using templates/configured risk matrix
  • Eliminate duplication. Ensure risk assessments are consistent across your organisation
  • Share assessments with staff/contractors online and via mobile apps
  • Reduce administration with embedded approval, review and action management tools
  • Automatically notify users and escalate if actions not completed on-time
  • Comprehensive reports and live dashboards configurable for each user
  • Captures information in real time across the organisation
  • Prove compliance. Automatically record changes by user, date and time


£9,495 an instance

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at CHLOE.BLAY@EVOTIX.COM. Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

1 6 0 3 2 1 9 5 8 4 2 3 7 8 7


Telephone: +443003033657

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
The Assure health and safety management solution from SHE Software is modular. This means each Assure module works standalone, but integrates powerfully with others to provide you with a complete solution.
Cloud deployment model
Public cloud
Service constraints
99.98% service availability, assured by independent validation of assertion
System requirements

User support

Email or online ticketing support
Email or online ticketing
Support response times
Severity: Critical
Impact: Severe business disruption, unable to operate.
Response time: 30 minutes
Target resolution time: 1 hour during business hours

Severity: Major
Impact: Serious degradation of service resulting in a significant reduction in operability.
Response time: 2 hours
Target resolution time: 1 business day

Severity: Medium
Impact: Minor reduction in operability
Response Time: 4 hours
Target resolution time: 3 business days

Severity: Low
Impact: Single user/user group experiencing problems with no direct impact on business
Response time: 1 day
Target resolution time: 10 business days
User can manage status and priority of support tickets
Online ticketing support accessibility
WCAG 2.1 A
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Yes, at an extra cost
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 A
Web chat accessibility testing
Onsite support
Onsite support
Support levels
Our customers prize our expert and friendly support both during implementation and ongoing. 95% of our customers renew every year.

Our UK based customer services team answer all calls promptly (100% within 15 seconds) and resolve problems quickly whether they relate to training or configuration. We follow a 6 stage case management process.

All cases, issues, or requests for change are, in the first instance, reported to the Help Desk as the central point of contact. As first line support, the Help Desk can be contacted by phone or email Monday to Friday 8:30-17:30. Requests are recorded and monitored in our case management system which ties the request to your customer account to provide a complete history.

Where first line support is unable to solve the customer issue, the case is escalated to second line support. Here, our system experts will work to understand the customer issue and diagnose the problem. Once derived, the solution is communicated, by phone and/or email, to the customer within the defined SLA's in the T&Cs.

If second line support cannot resolve the customer issue, the case is escalated to third line support for root cause analysis and/or data fix.
Support available to third parties

Onboarding and offboarding

Getting started
Assure has been designed with the user in mind, combining an intuitive consumer style interface with a corporate strength backbone. As a result, it meets business requirements while being straightforward and intuitive to use - not just by experts but by your organisation at large.

We provide users with three training delivery options: onsite at our training facility near Glasgow, onsite at your organisation or online via webinar.

Although influenced by the number of, and the level to which, users are to be trained, the number of training days required is always at your discretion. We will discuss with you a suitable number of days and which delivery method is best suited to your individual requirements.

All licensed users of Assure have access to our Knowledge Base, which contains a variety of help videos and articles.
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
The Customer should, no later than ten days after the effective date of the contract end, submit a written request for the delivery of the then most recent back-up of the Customer Data and any attachments that have been uploaded to the system.
End-of-contract process
If the customer is not renewing they can extract their data via the tools provided or the data extraction can be provided by SHE Software at an additional cost.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
AssureGO+ is our next generation Progressive Web Application (PWA) which is ‘mobile first’ but eliminates app installation. The user interface reacts to the device using it so forms and content change to utilize the available screen – tablet, mobile or desktop.

Employees/contractors can easily capture hazards, near misses or incidents as well as completing audits, inspections or assessments 24/7, online or offline. If no internet is available, information is stored on the device until it can be synced.

AssureGO+ provides access to Assure Portal forms anytime, anywhere on any device with a compatible Chrome, Safari or Internet Explorer browser.
Service interface
Description of service interface
Our Service Manager has been developed to provide a consumer level experience for logging Incidents and other Request Types by following a process of Progressive Capture. Progressive Capture is a graphical workflow tool that provides a new and simple way to define the capturing of information. Progressive Capture includes a number of small forms for collecting information related to the Incident. These forms are automatically configured depending on the information being captured.
Accessibility standards
WCAG 2.1 A
Accessibility testing
What users can and can't do using the API
Data insert using RESTful API.
API documentation
API documentation formats
  • PDF
  • Other
API sandbox or test environment
Customisation available
Description of customisation
Assure combines complete out of the box health and safety functionality (allowing you to be up and running immediately) with an exceptional level of configurability - of forms, organisation, permissions, reports, dashboards, etc. The configurability is controlled by permission settings by user type. This meets all but the most specialist / bespoke requirements and satisfies 99% of customers.


Independence of resources
Real-time monitoring of server load with alerts on critical components EG. CPU load, memory load, throughput. Application servers are load balanced.


Service usage metrics
Metrics types
All system fields
Reporting types
Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Report and download (templates and bespoke) into Excel
Reports in JSON format
Active data connections to Excel
Data export formats
  • CSV
  • Other
Other data export formats
  • JSON
  • Microsoft Word
  • Microsoft Excel
  • PDF
Data import formats
  • CSV
  • Other
Other data import formats
  • API
  • Initial data import by SHE Software as an implementation service

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
IP restricted access

Availability and resilience

Guaranteed availability
99.98% uptime, scheduled and notified maintenance schedules, clawback in contract
Approach to resilience
Available on request.
Outage reporting
Dedicated 24/7 monitoring at service centre. Real-time dashboard and email alerts.

Identity and authentication

User authentication needed
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Permissions based by role and organisation unit.
Access restriction testing frequency
At least every 6 months
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO Quality Services Limited
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
Assured by independent validation of assertion.
Information security policies and processes
Registered data controllers under DPA

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Our hosting provider maintains documented operational procedures for both infrastructure operations and customer-facing support functions. Newly provisioned infrastructure undergoes appropriate testing procedures to limit exposure to any hardware failure. Documented procedures and configuration version controls provide protection from errors during configuration. Changes to an existing infrastructure are controlled by a technical change management policy, which enforces best practice change management controls including impact/risk assessment, customer sign off, and back-out planning.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Patches to solution every 2 weeks unless critical, then immediate.
Penetration testing and internal code testing (peer reviewed and deployment testing services)
Employ best practice to mitigate against known issues (e.g. SQL Injection)
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
The Alert Logic Threat Management™ system monitors our hosting provider's environment, detecting external and internal threats. When it detects an incident, Alert Logic's ActiveWatch service provides expert guidance from its security operations centre (SOC), staffed round the clock by Alert Logic security analysts. Integrated vulnerability scanning identifies possible points of entry and corrects them.
Incident management type
Supplier-defined controls
Incident management approach
The Alert Logic Log Manager™ automatically aggregates, normalizes, and stores log data simplifying log searches, forensic analysis, and report creation through real-time or scheduled analysis. LogReview provides daily event log monitoring and review by a team of Alert Logic security professionals.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£9,495 an instance
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at CHLOE.BLAY@EVOTIX.COM. Tell them what format you need. It will help if you say what assistive technology you use.