Website Design & Development
Innovative, inspiring and interesting websites. Our website design services cover the whole process from UX planning through to testing and deployment, our sites are built on a CMS system that is right for you. The platforms and applications we use utilise the latest technologies and integrations.
- Website design
- Website development
- Website maintenance & support
- UX Design
- User testing
- Mobile development
- Online forms
- Plugin development
- Increase online presence
- Custom designed websites to stand out from the crowd
- Tools to measure success
- Thought out user experience to drive users to intended action
- Range of support options available
- Ability to manage site ongoing, and from anywhere
- Increase sales and marketing position
- Improve customer relationships
- Aid growth plans
- Improve user experience
£450 to £900 per person per day
- Education pricing available
|Software add-on or extension||Yes, but can also be used as a standalone service|
|What software services is the service an extension to||
|Cloud deployment model||Public cloud|
|Email or online ticketing support||Email or online ticketing|
|Support response times||Response time is dependent on severity of issue. For something affecting core functionality of your website we will respond within a minimum of 1 hour. All other issues will be responded to within 3 hours between 8am and 6pm. 7 days a week support.|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||9 to 5 (UK time), 7 days a week|
|Web chat support||Web chat|
|Web chat support availability||24 hours, 7 days a week|
|Web chat support accessibility standard||None or don’t know|
|How the web chat support is accessible||Web chat available through Yes Creative website, if web chat is not available then the support ticket will be sent via email.|
|Web chat accessibility testing||N/A|
|Onsite support||Yes, at extra cost|
We will provide support throughout the project and support is included for one month following sign off of the project.
Each project will have a dedicated account manager and have access to online ticketing system. Support available by phone Monday - Friday 9 - 5. More urgent support can be logged through online chat or support tickets and will be responded to no later than 3 hours after submitting (8am - 6pm 7 days a week).
|Support available to third parties||Yes|
Onboarding and offboarding
When starting a project we will hold an initial on-site meeting and brainstorming session to define client and project goals and values. The scope and deliverables of the project will be discussed and outlined. Follow up documentation of this process and timelines will be sent following this meeting to outlay the project process.
Yes Creative will guide you through the process.
|End-of-contract data extraction||When a contract is ended by written confirmation all data will be backed up and sent over directly. This service is available for one month after contract ended, after this point any data will be deleted.|
Included in the contract:
3 concepts will be presented either in person or via email, the format will be PDF and/or working prototype files.
These files are all accessible in their design file format and PDF for use by the client.
All website development will adhere to design concepts agreed with clients and follow best practise.
A detailed timeline will be presented with concepts. This will be updated and redistributed throughout the process.
Timelines will be adhered to and in the event of milestones being missed, a revised timing plan will be provided, and any changes to final delivery discussed.
All materials created are owned and copyrighted by the client not Yes Creative.
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||Service can be tailored for individual needs. Separate designs and builds can be completed for mobile and desktop sites to achieve best results when viewing on a mobile device.|
|Description of customisation||Any aspect of the project can be customised, from design to functionality. Each project will be approached individually and a solution suggested to match project brief.|
|Independence of resources||All our solutions are scaleable and the service offered tailored to each client.|
|Service usage metrics||No|
|Supplier type||Not a reseller|
|Staff security clearance||Staff screening not performed|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||In-house|
|Protecting data at rest||Encryption of all physical media|
|Data sanitisation process||Yes|
|Data sanitisation type||Deleted data can’t be directly accessed|
|Equipment disposal approach||In-house destruction process|
Data importing and exporting
|Data export approach||Any data that needs to be exported will be sent directly to the client, or can be downloaded from cloud based software. Instructions on how to export from website sent to client to complete.|
|Data export formats||CSV|
|Data import formats||CSV|
|Data protection between buyer and supplier networks||Private network or public sector network|
|Data protection within supplier network||Legacy SSL and TLS (under version 1.2)|
Availability and resilience
|Approach to resilience||Available upon request|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||Website CRM system and support ticketing system is protected by a username and password, which only the client and Yes Creative have access to. Passwords can be reset by Yes Creative.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||
Whilst we do not have a security governance certificate our services are delivered as follows:
Everything is customer focussed, for both current and future customers.
Each department has an individual appointed responsible for security and this is fed back regularly to the person responsible for security standards.
Processes are regularly reviewed to ensure inline with security objectives and continual improvement is always the aim to be prepared to react to future challenges.
|Information security policies and processes||
The following is managed through information security policies and processes;
Document Control, Revision History, Approvals, Document History,
Scope and Responsibilities.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||All changes are managed through an internal CRM or support ticketing system. Requested changes are reviewed prior to any work to design or build, and then once implemented fully tested. When required 'Scheduled Maintenance' windows are deployed and to limit disturbance large changes that will require down time can be actioned during unsociable hours.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||Penetration testing and monitoring of logs to provide an insight into the source of potential threats. If any threats are identified then any recommended updates or patches are actioned urgently.|
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||Spikes in traffic and other potential compromises are identified during the testing phase to provide solutions to protect against these. Should there be any incidents then these will be responded to within three hours.|
|Incident management type||Supplier-defined controls|
|Incident management approach||Incidents can be reported via online ticketing system, telephone or live chat. The severity of these can be marked on the ticketing system or discussed and then will be handled accordingly. Incident reports will be provided once incidents are dealt with.|
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||No|
|Price||£450 to £900 per person per day|
|Discount for educational organisations||Yes|
|Free trial available||No|