Leisure Centre Contract Monitoring Software

Online solution for council officers to monitor the 3rd party contracts issued in the management of their leisure centres. Inspections, audits, reports, tasks and performance monitoring can all be achieved from one system. Mobile use, collaborative working for distributed teams and officers.


  • Remote access on any mobile device
  • Bespoke online forms for digital data capture
  • Automated tasks that are generated by form responses
  • Real-time reporting across all forms and facilities
  • Document sharing via online collaboration
  • Digital attachments for keeping all information in one place
  • Tamper-proof notes and audit trail
  • Privacy settings to show/hide data
  • Role-based Access Control (RBAC)


  • Time-saving by not having to duplicate/type up pen-to-paper inspections
  • Single source of truth which all parties reference
  • Your team has full visibility of pending actions
  • Your data is remotely accessible at all times via mobile/tablet
  • Real-time analytics of your Facilities operational performance
  • Notifications and escalations of all urgent outstanding remediations
  • Full audit trail of all identified issues and actions taken
  • End-to-end solution to all your Facilities Management needs


£495 to £995 per user per year

  • Education pricing available

Service documents

G-Cloud 9



Paul Romer-Ormiston

0207 993 5858


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints N/A
System requirements Web browser: IE10 or above, Chrome, Firefox, Safari

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Support available 09:00 to 17:30 Monday to Friday. Standard support response times within 24 hours.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Onsite support
Support levels The Customer Success team will provide UK office hours support via email and telephone for any query related to the product and/or its performance, and this service is included in the licence fee (no hidden cost). The team are trained in both technical and functional query handling.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We are proud of the fact none of our existing customers have requested training. We have designed tillr to be intuitive and easy to use. We do, of course, offer onsite visits to give users a quick demo of the system. Though we do say, if you use a smartphone you'll be able to use tillr.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction We would provide their data in whatever format they desired
End-of-contract process At termination or expiry of contract, the data held by tillr can be delivered to the former customer in an agreed export format. As there is no on-premise or on-device footprint, user access will simply be blocked outside of contract, and data made available for future reference.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10+
  • Firefox
  • Chrome
  • Safari 9+
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service We have taken a mobile first approach to the design of the software meaning it can be used and is easy to use on any device.
Accessibility standards None or don’t know
Description of accessibility Alternative text labelling applied to all images/icons across the product. As it is web-hosted, all browser accessibility controls such as text resizing and and hover states are available. Responsive design means that the product will also render in the most appropriate format for the screen size reducing the need for scrolling and split content.
Accessibility testing We have passed the product through professional User Experience testing including laboratory tests.
Customisation available Yes
Description of customisation Users with admin rights are able to set up roles for their organisation to grant or limit access to certain parts of the system. Users are also able to define which task notifications they do or do not receive.

All form and report templates required can be published to the customer account by the vendor, allowing customisation of the data capture and reporting features of the product.

In some scenarios, organisations are also able to procure a branded version of tillr at cost.


Independence of resources We use Microsoft Azure as our cloud hosting provider, and by using an elastic architecture, the data set and number of processors supporting the traffic are scaled to meet demand, and pared back when demand is lower. We have also built the product to be very light on the front-end in the browser, so the bandwidth required is significantly lower than many enterprise solutions.


Service usage metrics No


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency Less than once a year
Penetration testing approach In-house
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Users can export reports in pdf format or into excel
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Private network or public sector network
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability 99.9, assured by contractual commitment
Approach to resilience Available on request
Outage reporting Email alerts and social media posts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels We have a master account that can access the customer's interface with the customer's permission. A designated person or persons in the customer organisation will have 'Admin' privileges which is where any management configuration can be carried out. Any user can request support via email or telephone, and a record of these requests is available to the customer on request.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information You control when users can access audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation No
Security governance approach Available on request
Information security policies and processes Available on request

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Available on request
Vulnerability management type Supplier-defined controls
Vulnerability management approach Available on request
Protective monitoring type Undisclosed
Protective monitoring approach Available on request
Incident management type Supplier-defined controls
Incident management approach Available on request

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £495 to £995 per user per year
Discount for educational organisations Yes
Free trial available No


Pricing document View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑