StreetBuilder is cloud service that helps citizens and local authorities co-develop viable urban realm and planning proposals.
Through a simple process based on clear choices, it promotes positive early stage participation and empowers citizens to generate realistic local solution.
- Easy to use platform that promotes community participation
- Configurable topics and polls
- Geofenced interactive map
- Geotagging to capture locations for proposals and hyperlocal data
- Pre-loaded content for configuration for quick set-up
- Library of user-friendly planning content
- Gamification, blog, social sharing and e-newsletters to amplify activity
- Dashboard with data export, content editor and real time activity
- Fully responsive, 100% functionality for mobile
- Promotes positive and focused participation to support policy outcomes
- Quickly turns citizens’ concerns into data-driven solutions
- Manages expectations and inspires users
- Reach under-represented groups: younger, time-poor, diverse ethnic groups
- Deep insight into community preferences and feasibility of scheme options
- Report on key metrics eg engagement, diversity in real time
- Expert, multidisciplinary team available to support project success
£7995 to £29995 per instance per year
- Education pricing available
3 9 8 2 0 4 3 2 4 6 1 6 6 6 6
The Future Fox Ltd
020 8058 2510
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
|Email or online ticketing support||Email or online ticketing|
|Support response times||Within 2 working days|
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
|Support levels||The subscription includes a kick-off meeting, dedicated account manager, with regular review meetings by phone to ensure project goals are met. Requests for assistance are logged and initiated within 4 business hours. 9-5 technical product and project support from our expert team, and training materials are provided.|
|Support available to third parties||No|
Onboarding and offboarding
We provide an inception meeting, onsite or online training, online user guides, and a sample set-up plan.
A dedicated account manager leads the onboarding process and is available 9-5 to provide support as needed.
The account manager will arrange further support from the technical team if required by the project.
|End-of-contract data extraction||
All data (proposals, general comments, geotagged comments, anonymised user data and simple analytics) will be made available to the client through a simple report and can also be exported to CSV format.
Detailed data analysis and Infographics can be supplied on request at a supplementary cost
At the end of the contract the customers will have the option to request an extension of the service (for a supplementary fee) with a minimum 30 days notice.
Should the contract not be extended, the microsite will stay active and externally visible for 12 months (with limited functionality) after which it will be disabled.
A phone interview will be organised with the client to asses the quality of the service provided and to identify areas of improvement as well as potential new features for development.
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||No difference in functionality. Layout is optimised for screen size.|
|Description of customisation||
Logo, content and imagery are customisable. Administrators can customise these through the easy-to-use dashboard.
Training to use the dashboard is included as part of the onboarding, and regular support is provided by the account manager.
|Independence of resources||The app is designed to be distributed across multiple machines if needed. Static content is served up through a Content Delivery Network to speed up loading times.|
|Service usage metrics||Yes|
|Metrics types||We provide user engagement rates and user interactions with the app.|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Baseline Personnel Security Standard (BPSS)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||In-house|
|Protecting data at rest||Encryption of all physical media|
|Data sanitisation process||Yes|
|Data sanitisation type||Deleted data can’t be directly accessed|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||Downloadable as csv|
|Data export formats||CSV|
|Data import formats||Other|
|Other data import formats||
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
|Guaranteed availability||99.9% uptime|
|Approach to resilience||Available on request|
|Outage reporting||Email alerts|
Identity and authentication
|User authentication needed||No|
|Access restrictions in management interfaces and support channels||The management interface is password protected and all passwords are stored in encrypted form.|
|Access restriction testing frequency||At least once a year|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||A Data Breach Policy and a Security Policy are in place and reported on quarterly by the Chief Operating Officer and Data Protection Officer. Governance covers implementation of the policy in product design, operations and HR.|
|Information security policies and processes||
Passwords are stored in a password manager and are regularly rotated.
The Chief Operating Officer oversees security compliance across the organisation and reports quarterly.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||We use source control (git) to track changes to the system. We use units tests and a staging server to test the system before making any changes live.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||We have automated vulnerability testing for basic threats, and all software packages are kept up to date. We can deploy hotfixes quickly in response to any identified potential threat.|
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||Our system has built-in alerts for common compromise indicators which alert our staff who then assess and attempt to remedy the situation using information in the log files and other sources. Incidents are prioritised within hours and high priority incidents are dealt with immediately.|
|Incident management type||Supplier-defined controls|
|Incident management approach||
Our incident management process is overseen by the Chief Operating Officer. Administrators can report incidents to us at any time through their account manager or the Helpdesk, by email, phone or in person. These are logged and initiated within 4 working hours. Administrators are informed regularly of progress, according to severity. Once the incident is dealt with, an incident report is filed and provided to the relevant parties by email.
Data breach incidents are managed by our Data Protection officers following our Data Breach policy. Every care is taken to protect personal data from incidents (either accidentally or deliberately).
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£7995 to £29995 per instance per year|
|Discount for educational organisations||Yes|
|Free trial available||No|