LoGov: Local Digital Service Platform

Find My Child a School Place

Find My Child a School Place is an online service that makes relevant and up-to-date school information available so that parents can properly prepare for the school application process.


  • Clearly presented information
  • Comprehensive schools directory
  • Schools mapped by distance from child’s address
  • Clear visual guides to school catchment areas
  • Indication of free school transport entitlement
  • Easy access to school performance data
  • Clear guidance on admissions policies
  • Collates data from multiple sources


  • Reduced anxiety and uncertainty amongst parents
  • Fewer phone calls and emails to support parents
  • Data and information automatically published
  • Lower cost of school admissions process
  • Increased customer satisfaction


£25000 per licence per year

Service documents


G-Cloud 11

Service ID

2 0 9 8 8 7 4 7 7 7 3 8 0 5 9


LoGov: Local Digital Service Platform

Martyn Evans



Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
Purchasing organisation need to have their own ArcGIS server (or similar) to provide map data to the service.
System requirements
ArcGIS server (or similar) to provide map data

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Response times vary between support agreements.
User can manage status and priority of support tickets
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Support levels
We provide Priority 1 (P1), Priority 2 (P2) and Priority 3 (P3) support levels. Our managed support services costs are £5,000 per month for 24/7 support or £2,000 per month for office-hours support.
Support available to third parties

Onboarding and offboarding

Getting started
We provide a mixture of onsite training and documentation, which can be tailored to each client.
Service documentation
Documentation formats
End-of-contract data extraction
Exports can be done via open standards such as CSV, XML and SQL.
End-of-contract process
If required, there may be additional costs in closing down the service.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Service interface
Customisation available
Description of customisation
Aspects such as the look and feel plus tweaks to features can be made at an additional cost by our developers.


Independence of resources
Each installation is independent of other installations and they do not share resources.


Service usage metrics
Metrics types
Real-time management information.
Reporting types
Real-time dashboards


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Exports can be done via open standards such as CSV, XML and SQL.
Data export formats
  • CSV
  • Other
Other data export formats
  • SQL
  • XML
  • JSON
Data import formats
  • CSV
  • Other
Other data import formats
  • XML
  • SQL
  • JSON

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99.97, assured by contractual commitment.
Approach to resilience
Service is deployed behind an AWS Load Balancer distributed across multiple availability zones with AWS RDS providing automatic failover on the database.
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Access restrictions in management interfaces and support channels
Required authentication through a username and password to gain access to the admin interface.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
We generally follow the approach of ISO 27001 and adapt it to our working patterns and needs.
Information security policies and processes
We ensure the incorporation of security features and measures (both technical and organisational) to reflect the requirements of good industry practice.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We implement functional changes in small packages, called user stories. Our team is highly experienced and as part of implementing each story, the details, security impacts and broader system impacts are considered as part of our standard development process. All components (including configuration, code and data changes) are checked into the code repository for review before being committed. Changes are deployed to staging for testing/QA before production. Each deployment includes a back-out plan to restore the state of the environment in the event that this fails. User profiles are limited and SaaS configuration management responsibilities are well-defined.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Our development team are constantly aware of the latest trends and issues. If we are aware of a serious problem, this will be patched as soon as possible.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We have systems in place which constantly report on any issues.
Incident management type
Supplier-defined controls
Incident management approach
We have a second line support agreement as part of the contract.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£25000 per licence per year
Discount for educational organisations
Free trial available

Service documents

Return to top ↑