The provision of Cadcorp SIS Notice Board as a fully hosted service on the Microsoft Azure Cloud platform. Notice Board provides a spatial dashboard of information as ‘notices’ pinned digitally on a single page of a website. Users can request more detailed information by clicking on hotlinks within a notice.
- Dash board
- Spatial Analysis
- Address Gazetteer
- Responsive Mobile Interface
- Local Knowledge
- GIS Spatial Queries
- Publish a wide range of based business data
- Intuitive easy to use interface
- Answer spatial map questions
- Access from multiple devices
£975 per virtual machine per month
|Software add-on or extension||No|
|Cloud deployment model||
|Service constraints||Performance of the service is related to the specification of the server. When considering the specification of the server, the number of proposed users and the types of data served should be taken into consideration. Running multiple sites and services will consume more resources. Additional disk space may be required to store data.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||Cadcorp will use its reasonable endeavors to respond within 8 Working Hours.|
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
|Support levels||Cadcorp provide a single tier support service that includes telephone support, email support and access to an interactive customer portal. All support costs are included within the service subscription fee. Customers are allocated a Cadcorp Account Manager.|
|Support available to third parties||Yes|
Onboarding and offboarding
A list of customer tasks that require completion in order to use the service are included within the service definition document.
Onsite training is provided as an option within the price schedule.
Online documentation is available at www.cadcorp.com
|End-of-contract data extraction||The application administrator will be able to directly extract their data from the hosted database when the contract ends. Options include taking a full database extract or export to shp or tab file formats.|
|End-of-contract process||At the end of the contract the service will be turned off. The customer should extract their data during the final 30 day period before the server is decommissioned.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||Mobile users are provided with an application interface and functionality suitable for a mobile device. Mobile users have the option to switch to the full desktop service if they prefer.|
|Description of customisation||The application administrator can customise a notices using a online admin page and data management application.|
|Independence of resources||Cadcorp provide dedicated resources for each customer.|
|Service usage metrics||Yes|
|Metrics types||Subject to the customer having a Google Analytics account, this tool can be integrated into Notice Board, allowing the administrator to see from where in the world users are accessing the site and more information on page requests, sessions, users, clients and session duration.|
|Reporting types||Real-time dashboards|
|Supplier type||Reseller providing extra features and support|
|Organisation whose services are being resold||Microsoft Azure Hosted Services|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Baseline Personnel Security Standard (BPSS)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider|
|Protecting data at rest||Physical access control, complying with another standard|
|Data sanitisation process||Yes|
|Data sanitisation type||Deleted data can’t be directly accessed|
|Equipment disposal approach||In-house destruction process|
Data importing and exporting
|Data export approach||The application administrator can directly export data from the hosted database using SIS Desktop. Additional automated data extracts can be managed using the database extraction service.|
|Data export formats||Other|
|Other data export formats||
|Data import formats||
|Other data import formats||
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
For all Virtual Machines that have two or more instances deployed in the same Availability Set, Microsoft Azure guarantee you will have Virtual Machine Connectivity to at least one instance at least 99.95% of the time.
For any Single Instance Virtual Machine using premium storage for all Operating System Disks and Data Disks, Microsoft Azure guarantee you will have Virtual Machine Connectivity of at least 99.9%.
If these Microsoft service levels are not met by Microsoft, Cadcorp will aim to pass on any refunds that we receive from Microsoft to the customer.
|Approach to resilience||
Two important aspects of resiliency are high availability and disaster recovery.
High availability is underpinned by the Microsoft Azure Guaranteed Availability SLA referenced in the previous question.
Disaster recovery is the ability to recover from rare but major incidents. This service provides options for geo redundancy including backup and load balancing.
|Outage reporting||Microsoft Azure provides a public notice page and email alerts can be set up to notify the application administrator of service outage.|
Identity and authentication
|User authentication needed||No|
|Access restrictions in management interfaces and support channels||Windows security on the server and Windows forms for the application administration.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||No audit information available|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||Less than 1 month|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||Lloyd's Register Quality Assurance Ltd|
|ISO/IEC 27001 accreditation date||22/03/2019|
|What the ISO/IEC 27001 doesn’t cover||
The scope of the approval is design, development, installation and distribution of software for Geographic Information Systems. Associated
project management, application development, hosted services, customer training and consultancy services. Management of information security in relation to IT infrastructure and data in support of all company activities.
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||Cyber Essentials|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||
Cadcorp information security policies and processes have achieved certification to ISO 27001. It is the Policy of the company to ensure that:
Information will be protected against unauthorised access.
Confidentiality of information will be assured and valuable or sensitive information protected from unauthorised disclosure or intelligible interruption.
Integrity of information will be maintained to safeguard the accuracy and completeness of information by protecting against unauthorised modification.
Regulatory and legislative requirements will be met.
Business Continuity plans will be produced, maintained and tested, this will ensure that information and vital services are available to users when they need them.
Information security training will be available to all staff.
All breaches of information security, actual or suspected, will be reported to, and investigated by the Information Security Manager.
The Information Security Manager has direct responsibility for maintaining the Policy and providing advice and guidance on its implementation.
All managers are directly responsible for implementing the Policy within their business areas, and for adherence by their staff.
It is the responsibility of each employee to adhere to the Policy.
|Configuration and change management standard||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Configuration and change management approach||
The Cadcorp Quality Management System in compliance with ISO 9001 fully describes the Cadcorp configuration and change management processes.
All components of the service are tracked through their lifetime. For example software components are part of a formal software release cycle and are tracked through their lifetime using version control. Similarly changes and configurations to a service implementation are tracked within the Cadcorp customer support database using a unique reference ID.
Changes are assessed for potential security impacts inline with Cadcorp ISO 27001 Security Manual and security forms part of the Cadcorp software quality assurance testing.
|Vulnerability management type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Vulnerability management approach||
The Cadcorp vulnerability management process requires anti virus software to be installed on all servers. This software provides the server administrator Status and Detection reports to allow Cadcorp to assess potential threats.
Patches will be deployed inline with the time periods described within the Cadcorp SLA.
Information about potential threats comes from a wide range of stakeholders including the antivirus Status and Detection reports.
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||
The anti virus software installed on all servers allows Cadcorp to identify potential compromises. This software provides the server administrator Status and Detection reports that detail potential compromises. In house and external penetration testing is also used to identify potential compromises.
When a potential compromise is identified it will be classified inline with the Cadcorp SLA response categories.
Depending on the category Cadcorp will use our reasonable endeavors to respond within 4 to 8 working hours.
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||All incidents should be reported to the Cadcorp support desk. The customer will receive a report ID number to use for subsequent enquires. If the incident is related to a common event the support desk will invoke a pre-defined process. Incident reports can be provided on request.|
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Public sector networks
|Connection to public sector networks||Yes|
|Connected networks||Public Services Network (PSN)|
|Price||£975 per virtual machine per month|
|Discount for educational organisations||No|
|Free trial available||Yes|
|Description of free trial||
The trial service includes the full extent of core application functionality using sample data.
The trial service does not provide administration access, allow users to upload their own data or customise the application.
There is no time limit on access to the trial service.
|Link to free trial||https://ws.cadcorp.com/noticeboard/embeddedsearchsample/|