Mi Site Booking - Access Requests & Site Calendar
This site-booking calendar allows visitors to book in advance for multiple sites, and to submit necessary access request forms set by you. Specify available times in advance, and what forms you require. Set the maximum attendees, and approve visits. Perfect for estates management, coordinating surveyors, clients, management etc.
- Live Booking System For Multiple Sites
- Clear & Effective Calendar UI
- Customisable Time Slots
- Site Specific Access Request Forms
- Specify Number of Visitors
- Manual or Automatic Approval for External Bookings
- Customisable URL To Share With Clients
- Multiple Levels of Access for Admin and Managers
- Co-ordinate Site Access Requests With Ease
- Manage Multiple Bookings Over Multiple Sites
- Ensure Health & Safety Compliance For Visits
- Efficient Estates Management
- Set Up & Leave to Run
- Perfect For Procurement Site Visits
- Manage Surveyors, Contractors, Clients Etc.
£600.00 per licence per year
- Free trial available
Mi Concepts Limited
|Software add-on or extension||Yes, but can also be used as a standalone service|
|What software services is the service an extension to||Mi Contract Portal is a contracts management software, coordinating mini competitions, jobs and spending for a high volume of suppliers and contracting authorities, with useful advanced features and simple interface. It also links with Mi Procurement to conduct the full tender process. Mi Site Booking integrates with these platforms.|
|Cloud deployment model||Hybrid cloud|
|Service constraints||There are no constraints currently. The software works through a web browser, and updates are conducted on a private server before being pushed to the client. However, clients will also be notified of any forthcoming changes in a reasonable time, and any data will be backed up and protected.|
|Email or online ticketing support||Yes, at extra cost|
|Support response times||Normally within a couple of working hours, and within a working day during busy times. We do not provide support at weekends, but this can be arranged if necessary.|
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||Yes, at an extra cost|
|Web chat support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support accessibility standard||None or don’t know|
|How the web chat support is accessible||Web chat is not accessible through a keyboard shortcut feature currently. However, it is writing based and does not use time-based media (audio or video), and does not depend on colour or symbols. Text to speech and zooming / text enlargement can be used depending on the user's operating system and browser.|
|Web chat accessibility testing||None to date, but we are happy to accommodate this requirement.|
|Onsite support||Yes, at extra cost|
|Support levels||We provide email, telephone, and onsite support including full training and site visits if required. This is fully detailed, along with pricing in the attached pricing schedule. We have full online video tutorials, and can provide onsite training as well as a dedicated contracts manager if required.|
|Support available to third parties||Yes|
Onboarding and offboarding
This is completely flexible according to the Buyer's requirements. Mi Site Booking works as standard 'off-the-shelf', but can be integrated and adapted to suite specific Buyer requirements, including certain organisational processes or safeguarding policies for example. We can provide site visits and organise a structured on boarding process, which includes moving over previous data, and introducing customisations.
We can provide onsite training if required. Alternatively we provide online video courses to be accessed at any time, and can provide a brief overview in a short manual, which is normally customised to the buyer. Following from this we are available for support and questions on the phone, via email, live chat or support ticketing. The software is largely designed to be self-explanatory, and most tasks can be easily learned through experimentation.
|Other documentation formats||
|End-of-contract data extraction||Data extraction can be customised to suit the customer requirements, so long as this does not compromise the IP of the software. It can be provided in raw database form, or provided as an overall report, or PDF files. Any file uploads can be provided in their original file type.|
|End-of-contract process||When the contract ends, the client will be given notice that provision will shortly be drawing to a close. There will be a 28 day period for the client to continue with access in order to download any information required, although the service will no longer be available for its other intended purposes i.e. communications with suppliers, running competitions etc.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||Whilst the software is designed to be responsive to mobile devices, it is not well suited to smaller screens as the very nature of the forms and information is quite large. It is possible but not really recommended to conduct activities with this software on smaller mobile devices.|
|Accessibility standards||None or don’t know|
|Description of accessibility||Information and menus are text based, and do not rely on colours, symbols or time-based media. It is possible to zoom in and enlarge text. There are tutorial videos, but which do not rely on sound. Written tutorials also available.|
|Accessibility testing||None to date, although we are happy to accommodate testing and deliver appropriate changes to software.|
|Description of customisation||
Admin users can customise documents to be returned, applicable time slots, and user permissions.
The UI and functionality can otherwise be customised by our development team to accommodate client requirements. It is understood that different organisations will have policies and approaches, which will need to be adhered to for specific sites.
|Independence of resources||Servers are load tested to ensure maximum uptime and resource allocation. Statistics are monitored to ensure servers are robust enough to maintain good performance levels.|
|Service usage metrics||No|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least every 6 months|
|Penetration testing approach||In-house|
|Protecting data at rest||Encryption of all physical media|
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||Data export is not currently supported. File attachments required as part of the service can be uploaded and downloaded in their original format.|
|Data export formats||Other|
|Other data export formats||File attachments can be uploaded in their original format.|
|Data import formats||Other|
|Other data import formats||File attachments can be uploaded in their original format.|
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
|Guaranteed availability||We will use commercially reasonable efforts to make our service available with a Monthly Uptime Percentage of at least 99.95%, in each case during any monthly cycle. In the event our service does not meet the Service Commitment, users will be eligible to receive a Service Credit.|
|Approach to resilience||Available on request.|
|Outage reporting||MiConcepts will report any outages via user email alerts as necessary.|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||Management accounts and support channels use two factor authentication to ensure secure access.|
|Access restriction testing frequency||At least once a year|
|Management access authentication||
|Description of management access authentication||Management accounts are manually approved or invited by admin.|
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||Between 1 month and 6 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||Between 1 month and 6 months|
|How long system logs are stored for||Between 6 months and 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||Other|
|Other security governance standards||Compliance with HM Government Cyber Essentials|
|Information security policies and processes||
Servers - Maintain server security with regular updates, SSL checks, security checks. Server security tests and maintenance carried out monthly and reports kept of any findings.
Computers - enforce high strength passwords on computers. Firewall's set up and configured. Disk Encryption used for personal computers. Regular software updates applied. Latest software versions used. Monthly security checks and password resets, reports kept on any findings.
Online accounts and email - enforce high strength passwords and password vaults for any online accounts/email.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||Current configuration details are kept in records. Any potential changes are first considered and calculated for optimal security and data integrity. Change implementation is carried out precisely with overlaps to ensure consistent service.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
Resources are tested with vulnerability scanners to find any potential weaknesses, then any potential problems are fixed.
Antivirus and malware software is run to protect against potential threats, with regular updates to ensure new threats are covered.
Services are protected via firewall and security systems, which monitor resources and alert our company to potential threats and suspect activity.
Resource vendors and news sites are monitored for new threats to lower system level resources, with fixes/patches implemented as needed.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
MiConcepts uses firewall and intrusion detection systems to monitor user activities and report suspected threats or unusual behaviours. Log files are checked regularly to help identify potential threats.
Any potential compromises found or incidents which take place will be dealt with immediately.
|Incident management type||Supplier-defined controls|
|Incident management approach||
Users report incidents to us either by telephone or email. We then adhere to the following process:
Investigation and diagnosis.
Resolution and recovery.
We provide incident reports on request.
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||No|
|Price||£600.00 per licence per year|
|Discount for educational organisations||No|
|Free trial available||Yes|
|Description of free trial||Trial version has limited number of users, sites, bookings and no bespoke URL.|