Creeda Ltd

Sports Facilities Booking System & App

Creeda provides sports venues with facility, coach, workshop booking and payment. Users can check availability, book and pay from their smartphones. Venues receive booking confirmations and a management dashboard enabling them to manage bookings, cancellations, workshops, etc. and track memberships and payments. Promotions and announcements can be sent to users.


  • Venue/facility profile/homepage, description of facilities and amenities, location, map
  • Venue/ Facility/ Sport/ Coach availability search, booking and payment
  • Smartphone App for availability search, booking and payment
  • Booking and payment of single or multiple players’ places
  • Workshop and coach availability management, booking and payment
  • Automated cancellation process, not requiring staff input
  • Attendance confirmation and monitoring
  • Analysis and reporting module
  • Consultancy: specification, adaptation of Creeda software to your system
  • Installation, testing and commissioning consultancy


  • Increase facility utilisation and revenue
  • Improve efficiency
  • Reduce admin effort & staff time
  • Free staff time from time-consuming email and phone booking
  • For the App generation
  • Take bookings 24/7 (not limited to opening hours/ staff availability)
  • Convenient and easy booking, payment process for end customers
  • Convenient and easy venue booking management system
  • Improve repeat bookings through analytics and promotions
  • Improve marketing of events, workshops; especially of last-minute availability


£50 to £3000 per licence per month

  • Education pricing available
  • Free trial available

Service documents


G-Cloud 11

Service ID

2 1 9 8 6 2 1 6 4 0 0 5 5 7 1


Creeda Ltd

Shashank Yadav


Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to Existing booking systems - either as a complement or as a smartphone App interface onto existing systems.
Cloud deployment model Public cloud
Service constraints None.
System requirements
  • IPhone
  • Android smartphone
  • Desktop or laptop
  • Chrome Browser

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Within 1 day
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels P1 Urgent requests: respond in 1 hour, resolution within 4 hours.
P2 Support request: respond 1 hour, resolution 1 day
P3 Non-urgent: respond same day, resolution 5 days.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide online training and user documentation. We can also supply support with venue configuration and facility data entry at an additional cost.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction They will have to notify us and we will then extract it and transfer it to them by appropriate means.
End-of-contract process User data transfer is included in the contract. Remittances and payments due to the venue will be made within two months of the contract end date. There shouldn't be additional costs attached to the contract end.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Android
  • IOS
Designed for use on mobile devices Yes
Differences between the mobile and desktop service None. Venue screens are optimised for desktop/laptop screens, but are still accessible on mobile.
Service interface No
Customisation available No


Independence of resources The service is cloud based and scales naturally as extra users place service demands on the system.


Service usage metrics Yes
Metrics types Our reporting module can be used to display and print statistical reports by different time periods. Data types that can be analysed include: facility usage, user demographics, revenues, cancellation, etc.
Reporting types Real-time dashboards


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest Other
Other data at rest protection approach Our hosting service provider, Google Cloud, has Physical access control, complying with CSA CCM v3.0
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Currently, we can only do this. An option to export user or venue data may well be added within 1 year.
However, venues can scrape data from the dashboard screens.
Data export formats CSV
Data import formats Other
Other data import formats
  • Plain text
  • Photographs (PNG, JPEG, etc)

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability As per Google Cloud - 99.95% availability. Availability outside our service's control - the public internet, local WiFi/ mobile data, battery/electricity provision, etc is not quantifiable.
Approach to resilience As per Google Cloud:
Outage reporting Email alerts and/or notifications.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels The administrators group has defined users (as actual persons) which are the only ones able to access management and support interfaces.
Access restriction testing frequency At least once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for Between 1 month and 6 months
Access to supplier activity audit information No audit information available
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications
  • Our hosting , Google Cloud, has ISO27001:2013; CSA STAR Level2.
  • Our payment processor provider has PCI Compliance.

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards Other
Other security governance standards Our hosting service provider, Google Cloud, complies with CSA CCM v3.0; ISO 27001:2103
Information security policies and processes Data and security is managed by Google Cloud:
Only a few authorised managers have authorisation to access user data. The board oversees compliance.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Software revisions are tracked through our code repository, including test and live systems.
Vulnerability management type Supplier-defined controls
Vulnerability management approach We audit our services and carry out threat analysis. We aim to deploy patches within one day of identification.
Our service provider Google Cloud has extensive threat and vulnerability management processes:
Protective monitoring type Supplier-defined controls
Protective monitoring approach We carry out penetration testing and external auditing of our services and carry out potential compromise analysis. We aim to close any identified compromise within one day of identification. Our service provider Google Cloud has extensive security management processes:
Incident management type Supplier-defined controls
Incident management approach We have predefined incident management processes. Users can report incidents via our support mechanisms. Incidents will be reported to our service provider Google Cloud, as and when appropriate.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £50 to £3000 per licence per month
Discount for educational organisations Yes
Free trial available Yes
Description of free trial A free trial of the full system for a negotiable period of 1 to 3 months is available.

Service documents

Return to top ↑