CEMAR (Contract Event Management and Reporting) is an online, web based system for NEC3, NEC4 and FIDIC contract management. It provides a secure, cloud based environment for contract administration and reporting. CEMAR assists in contractual compliance whilst providing a collaborative tool with a consistent audit trail and powerful reporting suite.
- Administering some of the UK's biggest infrastructure portfolios.
- Specifically tailored for use with NEC3 and FIDIC Contracts.
- Interactive party sensitive reminders with red, amber, green actions.
- Collaborative environment with shared registers of events for all parties.
- Compliant, consistent, auditable and easily accessible communications with PDF 'hardcopies'.
- Totally web-based with absolutely no installation required.
- Contract, programme and portfolio real-time reports, charts and dashboards.
- Extensive governance settings including approval workflow and delegated financial thresholds.
- Simple set up wizards, training videos and how to guides.
- Exceptional infrastructure, SSL encryption and hourly backups.
- Collaboratively manage contract events through shared registers and reports.
- Significantly increase contract administration efficiency.
- Improve contractual compliance and consistency of communications.
- Business intelligent analytics through global reporting across contracts.
- Superuser model for autonomous use, with extensive help and support.
- Developed and provided by leading construction industry experts.
- Significant experience and knowledge of strategic infrastructure portfolios.
- Dispense with spreadsheets - experience process brought to life.
- A simple to use, trusted, flexible tool.
£20 to £45 per user
- Education pricing available
01452 547 140
|Software add-on or extension||No|
|Cloud deployment model||Hybrid cloud|
|Service constraints||Planned maintenance is broadcast to all Users during login, occurring outside of office hours for period of 1-2 hours. In-built support is available 24/7 via CEMAR, including a help articles and video tutorials, while our dedicated Help and Support team respond to calls and tickets raised via CEMAR's in-built support system during our office hours of 08:00 to 17:30.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||We aim to answer all support tickets within 1 hour during office hours of 08:00 to 17:30, excluding weekends and bank holiday.|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Onsite support|
CEMAR is fully supported as standard. Our in-house help and support team provide expert responses to Users during business hours. Outside of these times our integrated support centre is accessible 24/7 and provides access to a range of help articles, video tutorials and our quick start guides. A practice contract is always available for Users to familiarise themselves with the system.
Clients benefit from regular floor-walking sessions with their key account manager, and CPD certified classroom training is available upon request. We also run a successful programme of webinar training.
|Support available to third parties||Yes|
Onboarding and offboarding
CEMAR is very intuitive to use and follows standard Windows conventions. As such we tend to train a small portion of Users, with most learning from colleagues or the materials provided online. We recommend a train the trainer approach whereby we provide expert CEMAR training for the core team and the system is then self-taught through the online support for the wider team.
CEMAR’s classroom training is CPD certified and usually doubles as a very effective and collaborative “kick off” meeting. We would setup ‘practice’ contracts that would be used during training and remain for the duration of the service for teams to explore the features in safety.
Together with the suite of online video tutorials and printable quick start guides makes CEMAR’s deployment fast, economical and efficient with as much or as little assistance from the team as you like.
We also run a successful programme of webinar training.
|Other documentation formats||Video Tutorials|
|End-of-contract data extraction||
Exporting to Excel, Word, PDF and other formats is simple and convenient. All reports and registers can be downloaded by Users.
Superusers can backup and download the communications archive for a contract at any time via the client administration module, this comprises a structured zip folder by event type containing every PDF hard copy communication and associated attachments.
|End-of-contract process||There are no additional costs, the Superusers can backup and download the communications archive for a contract at any time.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||We have designed CEMAR to be compatible on tablet devices.|
|Accessibility standards||None or don’t know|
|Description of accessibility||To help us make the CEMAR system a positive place for everyone, we've been using the Web Content Accessibility Guidelines (WCAG) 2.0 and are working hard to achieve our goal of Level AA accessibility.|
|Accessibility testing||CEMAR has not been tested against assistive technologies.|
|What users can and can't do using the API||
CEMAR currently employs a dedicated web service built around RESTFUL and JSON technologies utilising oAuth for authorisation and authentication. The web service and all APIs are designed, built, deployed, and maintained by our in-house development team. The web service accepts requests directly from third party applications, as
well as requests from client hubs. This gives the client a greater degree of flexibility and control over how various applications can make requests to CEMAR. Further control over frequency of requests and error handling may also be implemented.
The scope and development of this will of course greatly depend on the client’s requirements of what is expected of the system. In general, CEMAR will expect to work with the Client, through workshops and meetings, to assist with content schema that will be required by the web service, hub or third party application to perform certain functions. The CEMAR team will develop, test and deploy the API, host and make available test and UAT environments and assist with testing, monitoring and logging of test results. CEMAR will also assist in performing tests where APIs have bi-directional data transactions.
|API documentation formats|
|API sandbox or test environment||Yes|
|Description of customisation||The system is configurable by Superusers, this enables our clients to be completely autonomous in the management of the system. Through intuitive setup wizards Superusers can create new users, add or remove access across contracts and adjust the governance settings. In addition to this, the Superusers can also create and edit contracts, templates, governance settings, reporting structures, and much more via the client administration module.|
|Independence of resources||We perform regular performance testing and engage with specialist consultants to ensure that CEMAR is optimised at all times.|
|Service usage metrics||Yes|
|Metrics types||CEMAR Analytics provides aggregated action lists, reports, charts and dashboards over a broad range of data sets and behavioral metrics. Users are able to create reports that trend usage and compliance. The client administration module provides an audit log of User logins and access.|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Baseline Personnel Security Standard (BPSS)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||‘IT Health Check’ performed by a CHECK service provider|
|Protecting data at rest||Physical access control, complying with SSAE-16 / ISAE 3402|
|Data sanitisation process||Yes|
|Data sanitisation type||
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||Export options are available on all communications, registers and reports. Users can choose to print directly from CEMAR, or alternatively download and export by selecting the preferred file type.|
|Data export formats||
|Other data export formats||
|Data import formats||
|Other data import formats||Any (apart from .exe)|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
|Guaranteed availability||Operational 99.5% of the time except for planned downtime, assured by contractual commitment.|
|Approach to resilience||CEMAR is provided as Software as a Service (SaaS) on a secure hybrid cloud environment affording high availability with N+1 redundancy. CEMAR is hosted in geographically separate locations across the UK, our Primary Hosting site, our Backup site, and our Disaster Recovery site. Further information available on request.|
|Outage reporting||CEMAR shall post a message on the CEMAR System login page to warn Users, no later than one business day prior to any planned downtime.|
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||Only BPSS security cleared and authorised CEMAR personnel, authorised hosting provider support teams and authorised database administrators have access to client data.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security accreditations||Yes|
|Any other security accreditations||
|Named board-level person responsible for service security||Yes|
|Security governance accreditation||Yes|
|Security governance standards||Other|
|Other security governance standards||CE+ (Cyber Essentials Plus)|
|Information security policies and processes||All security policies and processes are managed under our QMS which is audited annually by BSI.|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
All development is in-house and carried out in accordance to our ISO9001 certified quality management system. Microsoft Team Services is utilised across the in-house development team.
CEMAR engages Info-Assure as external security consultants to penetration test the CEMAR application to CHECK standard. Accredited to CESG / CREST and ISO 27001 standards, Info-Assure are qualified
to carry out penetration testing and IT Health Check services for HMG and private sector organisations.
Penetration testing is carried out at least annually and additionally at any major upgrade release. Info-Assure also provide consultancy workshops for infrastructure security and architecture.
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
Cisco Adaptive Security Appliances (ASAs), FirePower subscription, Enterprise DDoS protection delivered through Arbor and Cloudflare DDoS, Web Application Firewall (WAF) and Content Delivery Network (CDN).
Infrastructure is protected by Sophos Cloud Endpoint Security and Control.
In addition to application and organisation testing & auditing we also carry vulnerability scans of CEMAR and the company networks. IOMART Group manage all infrastructure and deploy patches in accordance with our release schedule. Any application vulnerabilities would be managed under high priority through our Agile process.
The above systems provide real time dashboards and notify by email alerts.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||In addition to our hosting provider and our monitoring alerts CEMAR is protected by Cloudflare DDoS, Web Application Firewall (WAF) and Arbor which automatically manages any potential compromise.|
|Incident management type||Supplier-defined controls|
|Incident management approach||
We have an Incident Management procedure within our QMS ISO 9001.
Users can track and log events via 24/7 online support ticket service.
Incident reports are available at request.
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Public sector networks
|Connection to public sector networks||Yes|
|Price||£20 to £45 per user|
|Discount for educational organisations||Yes|
|Free trial available||No|
|Pricing document||View uploaded document|
|Skills Framework for the Information Age rate card||View uploaded document|
|Service definition document||View uploaded document|
|Terms and conditions document||View uploaded document|