adappt

Regulatory Mobile Apps

White label regulatory apps to deliver real time legal and regulatory compliance data streams to mobile devices.

Features

  • Used for Airline Industry Regulation Monitoring
  • Used for Real-time Financial Services Monitoring
  • Mobile platform keeps you informed of changes affecting your organisation
  • Tagged extracted regulations available to clients
  • Tagging highly client driven, can be automated or with analysts
  • Data applied with static and/or dynamic tags using AI
  • Analysts further fine tune the tags for the AI engine
  • API Available to be consumed using Push and Pull API's
  • Customisable UI with PUSH notifications on the move
  • Mobile application delivers required data across all major platforms

Benefits

  • Highly scalable, monitors 1,000's sites for data from worldwide servers
  • Resilient, data served to clients AWS servers from different centres
  • Non-blocking architecture
  • Live Monitoring Visuals
  • Aggregated Feeds
  • Uses lightweight algorithms to crawl sites, avoids overloading parallel requests
  • Sentiment Analysis, Natural Language Processing, Artificial Intelligence
  • Authentication Traversal, Difference Monitoring, Charts/Analytics
  • White label regulatory app version available

Pricing

£35,000 a licence a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at david.l@adappt.ai. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

2 2 4 6 0 7 4 9 3 5 1 7 9 9 4

Contact

adappt David Larner, Chief Executive Officer
Telephone: 07855389009
Email: david.l@adappt.ai

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
RegsBase. Please see thehub.ai
Cloud deployment model
Private cloud
Service constraints
We are not aware of constraints that buyers should be aware of, however this will be discussed when a buyer approaches us
System requirements
We tailor our service to meet your system requirements

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Response rates based on SLA and 24/7 is available if requested
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Yes, at an extra cost
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Normally Zendesk style support is something we would integrate into the platform in question.
Web chat accessibility testing
We have setup Zendesk based web support for major clients. Details on request
Onsite support
Yes, at extra cost
Support levels
POA
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide consultation with the buyer to help them to start using our service. adappt also provides user documentation and online assistance. Remote training is available, and is part of the package. Many of our clients have worldwide locations and offices and our remote training has proved both effective and efficient.
Service documentation
No
End-of-contract data extraction
Adappt will assist the user in exporting any relevant data, it will be in a standard format
End-of-contract process
Post the minimum term, the contract can be cancelled with a months notice, payment must be made for the month in which the contract is cancelled, and the service will end at the end of that month.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
There are a variety of business solutions and services that are on offer, we would need to discuss which business application or solution is required by the client, and whether this particular solution is designed for mobile devices
Service interface
No
API
No
Customisation available
No

Scaling

Independence of resources
We have systems in place to ensure users are not affected by the demand made on our system by other users

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations
No
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Any data will exported in standard format e.g. csv
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
Other
Other protection between networks
PSN Protected Service
Data protection within supplier network
Other
Other protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Uptime is underpinned by the principle of reasonable endeavours. The service is dependent on external data and third party APIs. Pro rata refund applied to any downtown.
Approach to resilience
Available on request
Outage reporting
API and email alerts

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
User access is based on rigid pre-defined roles
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Dubai Accreditation Center, a member of the International Accreditation Center
ISO/IEC 27001 accreditation date
01/08/2017
What the ISO/IEC 27001 doesn’t cover
The certificate covers 'Offering Web and Mobile Cloud Application Development Services. It can be assumed that other services are not covered. If you require a service to be covered, please contact us and we will deal with it immediately and make an application.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
ISO/IEC 27002:2013

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
Internal security standards available on request
Information security policies and processes
Internal security standards available on request

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We run an Agile development approach managed by certified Agile Practitioners
Vulnerability management type
Undisclosed
Vulnerability management approach
We have a fulltime development team who assess the viability of all patches and apply as part of a two week sprint cycle. The core platform base is a popular open source stack and then vulnerabilities are monitored through Github and regular channels.
Protective monitoring type
Undisclosed
Protective monitoring approach
We have a fulltime development team who assess the viability of all patches and apply as part of a two week sprint cycle. The core platform base is a popular open source stack and then vulnerabilities are monitored through Github and regular channels. If we found a potential compromise, we would respond immediately.
Incident management type
Undisclosed
Incident management approach
ITIL based support model, users can report incidents directly to us

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Pricing

Price
£35,000 a licence a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at david.l@adappt.ai. Tell them what format you need. It will help if you say what assistive technology you use.