Mi Concepts Limited

Mi Site Booking - Access Requests & Site Calendar

This site-booking calendar allows visitors to book in advance for multiple sites, and to submit necessary access request forms set by you. Specify available times in advance, and what forms you require. Set the maximum attendees, and approve visits. Perfect for estates management, coordinating surveyors, clients, management etc.


  • Live Booking System For Multiple Sites
  • Clear & Effective Calendar UI
  • Customisable Time Slots
  • Site Specific Access Request Forms
  • Specify Number of Visitors
  • Manual or Automatic Approval for External Bookings
  • Customisable URL To Share With Clients
  • Multiple Levels of Access for Admin and Managers


  • Co-ordinate Site Access Requests With Ease
  • Manage Multiple Bookings Over Multiple Sites
  • Ensure Health & Safety Compliance For Visits
  • Efficient Estates Management
  • Set Up & Leave to Run
  • Perfect For Procurement Site Visits
  • Manage Surveyors, Contractors, Clients Etc.


£600.00 per licence per year

  • Free trial available

Service documents


G-Cloud 11

Service ID

1 7 3 8 8 2 4 0 6 0 5 7 5 6 9


Mi Concepts Limited

Gareth Wilson



Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Mi Contract Portal is a contracts management software, coordinating mini competitions, jobs and spending for a high volume of suppliers and contracting authorities, with useful advanced features and simple interface. It also links with Mi Procurement to conduct the full tender process. Mi Site Booking integrates with these platforms.
Cloud deployment model
Hybrid cloud
Service constraints
There are no constraints currently. The software works through a web browser, and updates are conducted on a private server before being pushed to the client. However, clients will also be notified of any forthcoming changes in a reasonable time, and any data will be backed up and protected.
System requirements
  • Requires an up-to-date web browser.
  • Designed to be responsive, but larger screens preferable.

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Normally within a couple of working hours, and within a working day during busy times. We do not provide support at weekends, but this can be arranged if necessary.
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Yes, at an extra cost
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Web chat is not accessible through a keyboard shortcut feature currently. However, it is writing based and does not use time-based media (audio or video), and does not depend on colour or symbols. Text to speech and zooming / text enlargement can be used depending on the user's operating system and browser.
Web chat accessibility testing
None to date, but we are happy to accommodate this requirement.
Onsite support
Yes, at extra cost
Support levels
We provide email, telephone, and onsite support including full training and site visits if required. This is fully detailed, along with pricing in the attached pricing schedule. We have full online video tutorials, and can provide onsite training as well as a dedicated contracts manager if required.
Support available to third parties

Onboarding and offboarding

Getting started
This is completely flexible according to the Buyer's requirements. Mi Site Booking works as standard 'off-the-shelf', but can be integrated and adapted to suite specific Buyer requirements, including certain organisational processes or safeguarding policies for example. We can provide site visits and organise a structured on boarding process, which includes moving over previous data, and introducing customisations.

We can provide onsite training if required. Alternatively we provide online video courses to be accessed at any time, and can provide a brief overview in a short manual, which is normally customised to the buyer. Following from this we are available for support and questions on the phone, via email, live chat or support ticketing. The software is largely designed to be self-explanatory, and most tasks can be easily learned through experimentation.
Service documentation
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
  • Word
  • Wiki
End-of-contract data extraction
Data extraction can be customised to suit the customer requirements, so long as this does not compromise the IP of the software. It can be provided in raw database form, or provided as an overall report, or PDF files. Any file uploads can be provided in their original file type.
End-of-contract process
When the contract ends, the client will be given notice that provision will shortly be drawing to a close. There will be a 28 day period for the client to continue with access in order to download any information required, although the service will no longer be available for its other intended purposes i.e. communications with suppliers, running competitions etc.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Whilst the software is designed to be responsive to mobile devices, it is not well suited to smaller screens as the very nature of the forms and information is quite large. It is possible but not really recommended to conduct activities with this software on smaller mobile devices.
Service interface
Description of service interface
The homepage is a simple, clear calendar with drop down text menus and clearly laid out forms.
Accessibility standards
None or don’t know
Description of accessibility
Information and menus are text based, and do not rely on colours, symbols or time-based media. It is possible to zoom in and enlarge text. There are tutorial videos, but which do not rely on sound. Written tutorials also available.
Accessibility testing
None to date, although we are happy to accommodate testing and deliver appropriate changes to software.
Customisation available
Description of customisation
Admin users can customise documents to be returned, applicable time slots, and user permissions.

The UI and functionality can otherwise be customised by our development team to accommodate client requirements. It is understood that different organisations will have policies and approaches, which will need to be adhered to for specific sites.


Independence of resources
Servers are load tested to ensure maximum uptime and resource allocation. Statistics are monitored to ensure servers are robust enough to maintain good performance levels.


Service usage metrics


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Data export is not currently supported. File attachments required as part of the service can be uploaded and downloaded in their original format.
Data export formats
Other data export formats
File attachments can be uploaded in their original format.
Data import formats
Other data import formats
File attachments can be uploaded in their original format.

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We will use commercially reasonable efforts to make our service available with a Monthly Uptime Percentage of at least 99.95%, in each case during any monthly cycle. In the event our service does not meet the Service Commitment, users will be eligible to receive a Service Credit.
Approach to resilience
Available on request.
Outage reporting
MiConcepts will report any outages via user email alerts as necessary.

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Management accounts and support channels use two factor authentication to ensure secure access.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password
  • Other
Description of management access authentication
Management accounts are manually approved or invited by admin.

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
Other security governance standards
Compliance with HM Government Cyber Essentials
Information security policies and processes
Servers - Maintain server security with regular updates, SSL checks, security checks. Server security tests and maintenance carried out monthly and reports kept of any findings.
Computers - enforce high strength passwords on computers. Firewall's set up and configured. Disk Encryption used for personal computers. Regular software updates applied. Latest software versions used. Monthly security checks and password resets, reports kept on any findings.
Online accounts and email - enforce high strength passwords and password vaults for any online accounts/email.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Current configuration details are kept in records. Any potential changes are first considered and calculated for optimal security and data integrity. Change implementation is carried out precisely with overlaps to ensure consistent service.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Resources are tested with vulnerability scanners to find any potential weaknesses, then any potential problems are fixed.
Antivirus and malware software is run to protect against potential threats, with regular updates to ensure new threats are covered.
Services are protected via firewall and security systems, which monitor resources and alert our company to potential threats and suspect activity.
Resource vendors and news sites are monitored for new threats to lower system level resources, with fixes/patches implemented as needed.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
MiConcepts uses firewall and intrusion detection systems to monitor user activities and report suspected threats or unusual behaviours. Log files are checked regularly to help identify potential threats.
Any potential compromises found or incidents which take place will be dealt with immediately.
Incident management type
Supplier-defined controls
Incident management approach
Users report incidents to us either by telephone or email. We then adhere to the following process:
Incident identification.
Incident logging.
Incident categorisation.
Incident prioritisation.
Incident response.
Initial diagnosis.
Incident escalation.
Investigation and diagnosis.
Resolution and recovery.
Incident closure.

We provide incident reports on request.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£600.00 per licence per year
Discount for educational organisations
Free trial available
Description of free trial
Trial version has limited number of users, sites, bookings and no bespoke URL.

Service documents

Return to top ↑