Mi Concepts Limited

Mi Site Booking - Access Requests & Site Calendar

This site-booking calendar allows visitors to book in advance for multiple sites, and to submit necessary access request forms set by you. Specify available times in advance, and what forms you require. Set the maximum attendees, and approve visits. Perfect for estates management, coordinating surveyors, clients, management etc.


  • Live Booking System For Multiple Sites
  • Clear & Effective Calendar UI
  • Customisable Time Slots
  • Site Specific Access Request Forms
  • Specify Number of Visitors
  • Manual or Automatic Approval for External Bookings
  • Customisable URL To Share With Clients
  • Multiple Levels of Access for Admin and Managers


  • Co-ordinate Site Access Requests With Ease
  • Manage Multiple Bookings Over Multiple Sites
  • Ensure Health & Safety Compliance For Visits
  • Efficient Estates Management
  • Set Up & Leave to Run
  • Perfect For Procurement Site Visits
  • Manage Surveyors, Contractors, Clients Etc.


£600.00 per licence per year

  • Free trial available

Service documents


G-Cloud 11

Service ID

1 7 3 8 8 2 4 0 6 0 5 7 5 6 9


Mi Concepts Limited

Gareth Wilson



Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to Mi Contract Portal is a contracts management software, coordinating mini competitions, jobs and spending for a high volume of suppliers and contracting authorities, with useful advanced features and simple interface. It also links with Mi Procurement to conduct the full tender process. Mi Site Booking integrates with these platforms.
Cloud deployment model Hybrid cloud
Service constraints There are no constraints currently. The software works through a web browser, and updates are conducted on a private server before being pushed to the client. However, clients will also be notified of any forthcoming changes in a reasonable time, and any data will be backed up and protected.
System requirements
  • Requires an up-to-date web browser.
  • Designed to be responsive, but larger screens preferable.

User support

User support
Email or online ticketing support Yes, at extra cost
Support response times Normally within a couple of working hours, and within a working day during busy times. We do not provide support at weekends, but this can be arranged if necessary.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Yes, at an extra cost
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard None or don’t know
How the web chat support is accessible Web chat is not accessible through a keyboard shortcut feature currently. However, it is writing based and does not use time-based media (audio or video), and does not depend on colour or symbols. Text to speech and zooming / text enlargement can be used depending on the user's operating system and browser.
Web chat accessibility testing None to date, but we are happy to accommodate this requirement.
Onsite support Yes, at extra cost
Support levels We provide email, telephone, and onsite support including full training and site visits if required. This is fully detailed, along with pricing in the attached pricing schedule. We have full online video tutorials, and can provide onsite training as well as a dedicated contracts manager if required.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started This is completely flexible according to the Buyer's requirements. Mi Site Booking works as standard 'off-the-shelf', but can be integrated and adapted to suite specific Buyer requirements, including certain organisational processes or safeguarding policies for example. We can provide site visits and organise a structured on boarding process, which includes moving over previous data, and introducing customisations.

We can provide onsite training if required. Alternatively we provide online video courses to be accessed at any time, and can provide a brief overview in a short manual, which is normally customised to the buyer. Following from this we are available for support and questions on the phone, via email, live chat or support ticketing. The software is largely designed to be self-explanatory, and most tasks can be easily learned through experimentation.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
  • Word
  • Wiki
End-of-contract data extraction Data extraction can be customised to suit the customer requirements, so long as this does not compromise the IP of the software. It can be provided in raw database form, or provided as an overall report, or PDF files. Any file uploads can be provided in their original file type.
End-of-contract process When the contract ends, the client will be given notice that provision will shortly be drawing to a close. There will be a 28 day period for the client to continue with access in order to download any information required, although the service will no longer be available for its other intended purposes i.e. communications with suppliers, running competitions etc.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Whilst the software is designed to be responsive to mobile devices, it is not well suited to smaller screens as the very nature of the forms and information is quite large. It is possible but not really recommended to conduct activities with this software on smaller mobile devices.
Service interface Yes
Description of service interface The homepage is a simple, clear calendar with drop down text menus and clearly laid out forms.
Accessibility standards None or don’t know
Description of accessibility Information and menus are text based, and do not rely on colours, symbols or time-based media. It is possible to zoom in and enlarge text. There are tutorial videos, but which do not rely on sound. Written tutorials also available.
Accessibility testing None to date, although we are happy to accommodate testing and deliver appropriate changes to software.
Customisation available Yes
Description of customisation Admin users can customise documents to be returned, applicable time slots, and user permissions.

The UI and functionality can otherwise be customised by our development team to accommodate client requirements. It is understood that different organisations will have policies and approaches, which will need to be adhered to for specific sites.


Independence of resources Servers are load tested to ensure maximum uptime and resource allocation. Statistics are monitored to ensure servers are robust enough to maintain good performance levels.


Service usage metrics No


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Data export is not currently supported. File attachments required as part of the service can be uploaded and downloaded in their original format.
Data export formats Other
Other data export formats File attachments can be uploaded in their original format.
Data import formats Other
Other data import formats File attachments can be uploaded in their original format.

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability We will use commercially reasonable efforts to make our service available with a Monthly Uptime Percentage of at least 99.95%, in each case during any monthly cycle. In the event our service does not meet the Service Commitment, users will be eligible to receive a Service Credit.
Approach to resilience Available on request.
Outage reporting MiConcepts will report any outages via user email alerts as necessary.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Management accounts and support channels use two factor authentication to ensure secure access.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password
  • Other
Description of management access authentication Management accounts are manually approved or invited by admin.

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for Between 1 month and 6 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for Between 1 month and 6 months
How long system logs are stored for Between 6 months and 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards Other
Other security governance standards Compliance with HM Government Cyber Essentials
Information security policies and processes Servers - Maintain server security with regular updates, SSL checks, security checks. Server security tests and maintenance carried out monthly and reports kept of any findings.
Computers - enforce high strength passwords on computers. Firewall's set up and configured. Disk Encryption used for personal computers. Regular software updates applied. Latest software versions used. Monthly security checks and password resets, reports kept on any findings.
Online accounts and email - enforce high strength passwords and password vaults for any online accounts/email.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Current configuration details are kept in records. Any potential changes are first considered and calculated for optimal security and data integrity. Change implementation is carried out precisely with overlaps to ensure consistent service.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Resources are tested with vulnerability scanners to find any potential weaknesses, then any potential problems are fixed.
Antivirus and malware software is run to protect against potential threats, with regular updates to ensure new threats are covered.
Services are protected via firewall and security systems, which monitor resources and alert our company to potential threats and suspect activity.
Resource vendors and news sites are monitored for new threats to lower system level resources, with fixes/patches implemented as needed.
Protective monitoring type Supplier-defined controls
Protective monitoring approach MiConcepts uses firewall and intrusion detection systems to monitor user activities and report suspected threats or unusual behaviours. Log files are checked regularly to help identify potential threats.
Any potential compromises found or incidents which take place will be dealt with immediately.
Incident management type Supplier-defined controls
Incident management approach Users report incidents to us either by telephone or email. We then adhere to the following process:
Incident identification.
Incident logging.
Incident categorisation.
Incident prioritisation.
Incident response.
Initial diagnosis.
Incident escalation.
Investigation and diagnosis.
Resolution and recovery.
Incident closure.

We provide incident reports on request.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £600.00 per licence per year
Discount for educational organisations No
Free trial available Yes
Description of free trial Trial version has limited number of users, sites, bookings and no bespoke URL.

Service documents

Return to top ↑