The Future Fox Ltd


StreetBuilder is cloud service that helps citizens and local authorities co-develop viable urban realm and planning proposals.

Through a simple process based on clear choices, it promotes positive early stage participation and empowers citizens to generate realistic local solution.


  • Easy to use platform that promotes community participation
  • Configurable topics and polls
  • Geofenced interactive map
  • Geotagging to capture locations for proposals and hyperlocal data
  • Pre-loaded content for configuration for quick set-up
  • Library of user-friendly planning content
  • Gamification, blog, social sharing and e-newsletters to amplify activity
  • Dashboard with data export, content editor and real time activity
  • Fully responsive, 100% functionality for mobile


  • Promotes positive and focused participation to support policy outcomes
  • Quickly turns citizens’ concerns into data-driven solutions
  • Manages expectations and inspires users
  • Reach under-represented groups: younger, time-poor, diverse ethnic groups
  • Deep insight into community preferences and feasibility of scheme options
  • Report on key metrics eg engagement, diversity in real time
  • Expert, multidisciplinary team available to support project success


£7995 to £29995 per instance per year

  • Education pricing available

Service documents


G-Cloud 11

Service ID

3 9 8 2 0 4 3 2 4 6 1 6 6 6 6


The Future Fox Ltd

Annette Jezierska

020 8058 2510

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints No
System requirements
  • Internet connection
  • Web browser

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Within 2 working days
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels The subscription includes a kick-off meeting, dedicated account manager, with regular review meetings by phone to ensure project goals are met. Requests for assistance are logged and initiated within 4 business hours. 9-5 technical product and project support from our expert team, and training materials are provided.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide an inception meeting, onsite or online training, online user guides, and a sample set-up plan.

A dedicated account manager leads the onboarding process and is available 9-5 to provide support as needed.

The account manager will arrange further support from the technical team if required by the project.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction All data (proposals, general comments, geotagged comments, anonymised user data and simple analytics) will be made available to the client through a simple report and can also be exported to CSV format.

Detailed data analysis and Infographics can be supplied on request at a supplementary cost
End-of-contract process At the end of the contract the customers will have the option to request an extension of the service (for a supplementary fee) with a minimum 30 days notice.

Should the contract not be extended, the microsite will stay active and externally visible for 12 months (with limited functionality) after which it will be disabled.

A phone interview will be organised with the client to asses the quality of the service provided and to identify areas of improvement as well as potential new features for development.

All data stored by StreetBuilder is pseudo-anonymised. No personal data is shared with third parties. After 12 month all personal and pseudo-anonymised data will be deleted in line with our Privacy Policy.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service No difference in functionality. Layout is optimised for screen size.
Service interface No
Customisation available Yes
Description of customisation Logo, content and imagery are customisable. Administrators can customise these through the easy-to-use dashboard.

Training to use the dashboard is included as part of the onboarding, and regular support is provided by the account manager.


Independence of resources The app is designed to be distributed across multiple machines if needed. Static content is served up through a Content Delivery Network to speed up loading times.


Service usage metrics Yes
Metrics types We provide user engagement rates and user interactions with the app.
Reporting types
  • Real-time dashboards
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Downloadable as csv
Data export formats CSV
Data import formats Other
Other data import formats
  • JPEG
  • PNG

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability 99.9% uptime
Approach to resilience Available on request
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication needed No
Access restrictions in management interfaces and support channels The management interface is password protected and all passwords are stored in encrypted form.
Access restriction testing frequency At least once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach A Data Breach Policy and a Security Policy are in place and reported on quarterly by the Chief Operating Officer and Data Protection Officer. Governance covers implementation of the policy in product design, operations and HR.
Information security policies and processes Passwords are stored in a password manager and are regularly rotated.
The Chief Operating Officer oversees security compliance across the organisation and reports quarterly.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We use source control (git) to track changes to the system. We use units tests and a staging server to test the system before making any changes live.
Vulnerability management type Supplier-defined controls
Vulnerability management approach We have automated vulnerability testing for basic threats, and all software packages are kept up to date. We can deploy hotfixes quickly in response to any identified potential threat.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Our system has built-in alerts for common compromise indicators which alert our staff who then assess and attempt to remedy the situation using information in the log files and other sources. Incidents are prioritised within hours and high priority incidents are dealt with immediately.
Incident management type Supplier-defined controls
Incident management approach Our incident management process is overseen by the Chief Operating Officer. Administrators can report incidents to us at any time through their account manager or the Helpdesk, by email, phone or in person. These are logged and initiated within 4 working hours. Administrators are informed regularly of progress, according to severity. Once the incident is dealt with, an incident report is filed and provided to the relevant parties by email.

Data breach incidents are managed by our Data Protection officers following our Data Breach policy. Every care is taken to protect personal data from incidents (either accidentally or deliberately).

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £7995 to £29995 per instance per year
Discount for educational organisations Yes
Free trial available No

Service documents

Return to top ↑