Frog Systems Ltd

Frog Hyperlocal

Frog HyperLocal is a health and wellbeing platform that signposts citizens to care, support and activities that are local to them. It assists Local Authorities & Health Care providers in the adoption of self-directed support and social prescribing models by delivering rich, reliable content at the point of need.


  • Champions Cinema - real lived experiences in 60 second videos
  • Location driven – all results based on ‘near me’
  • Pre-configured indexing of resources by Local Authority area
  • Moderated content to ensure safe and appropriate results returned
  • Enables service providers to self-manage feature rich microsites
  • Manage events, activities, organisations, groups, volunteering opportunities
  • Mobile responsive, available across all devices and browsers
  • Content, search and directory aggregated into single view
  • Fully redundant, secure, managed public UK based cloud hosting


  • Fully-featured health and well being CMS system
  • Helps meet obligations to provide information at point of need
  • Data checking system ensures relevant and current content
  • Digital solution to underpin social prescribing and SDS models
  • Enhanced productivity and cost saving process for all local authorities
  • Bespoke video content to promote key local wellbeing messages
  • Customisable templated architecture to meet specific local requirements
  • Cost effective – single annual fee, unlimited users per License
  • Devolved content authoring with full publishing control and assignation
  • High scalability and efficiency of public cloud architecture


£8500 to £29000 per licence per year

Service documents

G-Cloud 11


Frog Systems Ltd

Sales & Services Team

0300 124 6868

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints End Users will not be able to access the service during planned maintenance windows. Advance notice will be provided in line with industry practice with work scheduled for minimum disruption.
System requirements
  • Windows OS
  • Mac OS
  • Linux OS

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Within one working day. Working day defined as Monday to Friday 08.30 am - 17.00 pm. Out of hours & Weekends response within next working day.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard WCAG 2.1 A
Web chat accessibility testing None to date. A Frog development UAT group is being founded which will include assistive technology users.
Onsite support Yes, at extra cost
Support levels 1st and 2nd line Customer & Technical support is included within the license fee during normal working hours/days and includes the services of a dedicated technical and account manager. Emergency or technical issues can be reported and are handled 24 x 7. All clients are offered first class support in line with industry best practise for managed services. Full details of the service levels offered including response times, response targets, fault severity classifications, notifications, maintenance windows and platform updates are contained with the Service Level Agreement (SLA) schedule contained within the overall client agreement. Bespoke onsite support is offered as a Professional Service and is charged to the client at a rate of £600.00 per day.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Frog and the client will agree a mutually beneficial operational service date, within 5 working days of completion of the agreement. Once agreed a series of service establishment meetings are conducted to determine an agreed project plan capturing statement of requirements and milestones etc. Milestones will typically include: account creation, account management, customisation, capacity planning, change control process, data handling, onsite training plan, key contacts, anticipated Go Live etc. When the project plan is complete, and formally accepted by the client, Frog will provide a written confirmation to this effect and the client may then commence use of the service.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction A request is made to the technical account team by the client for data extract and is provided in CSV format.
End-of-contract process Frog will immediately stop providing the client with the service.

Payments due or payable by the client under this Agreement will become due and payable immediately, including any unpaid charges due for the remainder of the Initial Term or any Renewal Term.

Within 30 days after this Agreement ends, both parties will return all confidential information of the other in its possession at the time this Agreement ends and agrees not to make or keep any copies of that confidential information except as required to comply with any applicable legal or accounting record keeping requirement. For the avoidance of doubt, all further rights on the part of the client to use the platform or to sublicense the Front End IPR or the software shall be cancelled.

Further professional charges may apply if data is to be returned in a non standard format.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service None
Service interface No
Customisation available Yes
Description of customisation Style and content of the Local Authority Area Landing pages - to reflect relevant local information. Third party APIs containing relevant local information e.g. events can be integrated within the platform.
Custom created and curated video content. Customisation is managed by Frog Systems based upon client requirements determined during the on-boarding stage


Independence of resources Frog Hyperlocal is built using leading public cloud technologies for high availability and redundancy. The entire platform is load balanced across multiple UK data centres. Additional resources are automatically provisioned to ensure continued access and performance.


Service usage metrics Yes
Metrics types A number of metrics can be provided based upon usage and demographic data. These are agreed during on boarding process.
Reporting types
  • Real-time dashboards
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach This is not a standard feature of the platform but if a client requires data export it can be arranged through a request with the technical services team. The request will only be considered once security protocols are completed.
Data export formats CSV
Data import formats Other
Other data import formats
  • Custom API agreed with client
  • Custom data import from flat file

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability A full SLA is included within the agreement. Multiple MS Azure instances guarantees connectivity of at least 99.95% uptime. Failure for Frog to meet its contractual performance targets will result in the company paying an agreed penalty fee for each complete day/target missed or deemed late.
Approach to resilience Data is replicated across multiple UK Microsoft Azure data centre sites.
Outage reporting Email alerts and social media.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Role based security. Access to the platform is restricted via best practice methods including IP whitelisting, user defined control, authentication and access control.
Access restriction testing frequency At least once a year
Management access authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification Yes
Who accredited the PCI DSS certification Stripe
PCI DSS accreditation date 19/10/2018
What the PCI DSS doesn’t cover Transactions by telephone.
Other security certifications Yes
Any other security certifications Cyber Essentials

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Each Company board meeting involves a formal security review as an agenda item. The board considers the strategic alignment of security in context to the overall business strategy, reviews and updates risks vs. the risk register, considers the company resources - people, skills and infrastructure, evaluates performance and overall effectiveness based upon operational data and executes the appropriate actions.
Information security policies and processes Frog has implemented information security policies based upon the ISO 27002 framework of best practices. These are reviewed at each Board meeting and are owned operationally by the Head of HR, Head of Systems and Head of Operations. Policies include: Physical Security, Information Security, Acceptable Use, Access Control, Incident Response, Remote Access, Disaster Recovery, Data Management, Business Continuity, Change Management & Communications (external and internal).

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Change management process is in line with the criteria determined by recognised standards e.g CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management type Supplier-defined controls
Vulnerability management approach Frog's VM approach is in line with the standards defined by ISO27001:2013 and is reliant on a number of sources e.g subscription to vendor notifications and alerts plus media. Regular risk assessment and testing determines likelihood and severity of threat. Patches are deployed in accordance with vendor advice and notification. For patching of Windows operating systems, the patch cycle of Microsoft’s "Patch Tuesday” is followed. Clients are advised of any issues determined as 'notifiable.'
Protective monitoring type Supplier-defined controls
Protective monitoring approach Frog utilises industry-leading applications for monitoring, analyzing alerting and reporting of all platform data. The NOC continually monitor, vulnerability scan and assess the platform 24x7. Response times are determined by the Severity Classification of the incident as detailed in the SLA.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Frog operates a severity classification framework which is in line with the current guidance from ITIL v.3 and ISO27001 standards. Incidents are reported to clients via an agreed contact strategy. All incidents are recorded and an Incident Report made available to clients which records: Identification, Action Taken, Recovery & Review/Lessons learned. The incident report is discussed in person with the designated account manager.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £8500 to £29000 per licence per year
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Terms and conditions
Service documents
Return to top ↑