TechnologyOne OneCouncil is a Council best practice business process, integrated ERP SaaS solution with accelerators, available on mobile devices/web browsers, including Financials, Accounting, General Ledger/Accounts Payable/Accounts Receivable (GL/AP/AR), Sundry Debtors, Budgeting, Forecasting, Supply Chain, Procurement, e-Procurement, Inventory Management, Spatial/Mapping, Performance Planning, Human Resources, Payroll, Asset Management, Content/Document Management, Business Analytics.
- Fully Integrated ERP solution for Local Government
- Local Government focus/commitment - 330 local council clients
- OneCouncil solution available on smart phones, tablets or laptop/desktop
- 100% browser based. No apps to download/maintain, no local data
- All functions available any device, running on any web browser
- Single version of truth - One Solution/Data Schema/Interface
- Pure Software as a Service, delivered in the AWS Cloud
- One vendor for developing, delivering, supporting and running the solution
- Business intelligence with transaction drill-down
- Solution accelerator for Local Authorities – faster, reduced risk implementation
- One Vendor; designs, develops, implements, runs and supports the solution
- Purpose built functionality designed to meet Local Government needs
- Commercial off the shelf, driven 100% by configuration not customisations
- UX is built according to consumer grade principles
- Secure Scalable and fully managed; allows focus on service delivery
- Single: workflow/forms engine, analytics/reporting tools, security & attachment/document management
- Consistent user experience. Looks/behaves the same across entire system
- End-to-end business processes in one system. Reduces/eliminates need for interfaces
- Portals allow external parties to engage on their own smartphones/tablets
- Easy/intuitive use, integrated to features like touch/pinch/zoom/location services and camera/video
£42750 per unit per year
- Education pricing available
- Pricing document
- Skills Framework for the Information Age rate card
- Service definition document
- Terms and conditions
Technology One UK Ltd
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
|Service constraints||Any planned maintenance will be as agreed between TechnologyOne and the Customer and performed in non-business hours.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||TechnologyOne Support is available 24x7 online and by telephone from 07:00 to 19:00 (local time). Target response and resolution times are based on agreed priority classifications; for Priority 1 (Critical) issues the target response time is 30 minutes.|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||WCAG 2.1 AA or EN 301 549|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
TechnologyOne’s standard ASM, included in the SaaS fee, includes the following features.
Access to the TechnologyOne Customer Community which includes a range of helpful online support resource tabs, including: Cases - create and manage your cases online: Groups - ask questions, share news and collaborate with other customers and TechnologyOne: Knowledge -access to extensive knowledge articles for helpful software information:
Ideas - suggest product enhancement requests or ideas: Profile - manage your individual profile.
Access to our dedicated Customer Support team.
New SaaS software releases, software updates, Ci Packages and Ci Anywhere Apps.
Fault / Issue reporting on shipped products.
Direct access to Customer Account Managers.
TechnologyOne University, which connects users with powerful and timely training resources that can be accessed when they are needed – on any device, anywhere, any time.
TechnologyOne can provide other options for support and service availability, based on the payment of a premium above the standard TechnologyOne SaaS fee.
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||TechnologyOne provides onsite training, Key User workshops, and Train-the-Trainer cabability. The TechnologyOne training method involves participants engaging in a combination of formal instruction and demonstrations followed by Trainer directed “hands on” activities.|
|End-of-contract data extraction||
On exit, TechnologyOne will provide the Council with a standard SQL backup of their database and a current file-based snapshot of their files (attachments etc.). At such a time, all data belonging to the Council will be deleted, the database instance destroyed, and any dedicated virtual servers terminated.
The steps taken to return data to the Council upon termination or expiry of the contract/service are:
1. Restrict access to the Council solution, to ensure that no further updates take place.
2. Take a final full backup of the production database and place the backup in the Council’s download area.
3. Take a final backup of all associated metadata files and place the backup in the Council’s download area.
4. Notify the Council that the backups are on the download area, and that they have 30 days to download the backup files.
5. Verify with the Council that they have completed the download.
6. After 30 days, remove the backup files from the Council’s download area.
7. Then delete the Council’s TechnologyOne Cloud environment, including all backups.
Verification of the disposal is part of TechnologyOne’s ISO27001 Information Security Policy.
Verification of the disposal is part of TechnologyOne’s ISO27001 Information Security Policy.
An exit strategy plan will be prepared and maintained and the services to implement the exit strategy plan will be charged to the Council on a time and materials basis at the then current daily consulting rates unless otherwise agreed between the parties.
As TechnologyOne is proposing Software as a Service, termination of the contract terminates the right to use the Software. Where the Customer wishes to continue to use the software after termination, the Customer will need to purchase a further license for the software. As TechnologyOne provides commercial off the shelf software, if the Customer requires support and maintenance services after termination, TechnologyOne will continue to provide these to the Customer on TechnologyOne standard terms and fees.
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||Ci Anywhere is a Software as a Service (SaaS) solution delivered from the TechnologyOne Cloud, a platform designed for a “cloud first, mobile first” world. Ci Anywhere has a pure HTML5 user interface that only requires a web browser to run, is designed for touch operation, and adapts to the device it is being viewed on – e.g., tablet, smart phone, Apple or Windows laptop or PC.|
|Description of service interface||
TechnologyOne's Ci Anywhere software is designed to be used anywhere, anytime from any device. It is a pure browser-based solution and has been optimised for performance across low-bandwidth connections and on mobile devices. Ci Anywhere communicates using the HTTP protocol, and all communications are encrypted using TLS. Access requirements are simply an HTML5 enabled Device and Internet connection.
TechnologyOne offers a good user experience via a standard web browser, with no requirement for RDS or Citrix client software.
|Accessibility standards||WCAG 2.1 AA or EN 301 549|
Our software engineers are trained by Vision Australia in Web Accessibility Guidelines, to the software is designed to meet the general requirements of accessibility as follows:
1. Sequence in source code order is meaningful
2. Text resizes when size (e.g. using zoom) is changed in the browser
3. Text is implemented as HTML text 4. Colour alone is not used to convey information or indicate an action
5. A visual focus indicator is provided
6. The tab order for controls, input fields and other objects is logical
A user is able to select "Accessibility" mode, which will enhance the current presentation functionality, as well as providing text tool tips that allow screen readers to read the page aloud and interpret the interface for the user. Our development team has focused on the screen reader technology built in to Mac OSX, and JAWS readers for Windows.
|What users can and can't do using the API||
The TechnologyOne solution has two Web Services Application Programming Interfaces (APIs) that provide a real-time interface to various functions that can read and update information.
A library of legacy, SOAP (Simple Object Access Protocol) web services that implement specific business processes as part of the TechnologyOne product suite. The available web services are pre-defined and a user can configure and update a call as required from any tool that can make SOAP calls. Each web service has a specific defined input and output syntax defined in the application.
A library of REST (REpresentational State Transfer) web services that form an integral part of our Service-Oriented Architecture. TechnologyOne’s strategy is to expose a generic web service endpoint to external systems and to allow the customer to configure the data requirements within the application itself. Customers can access the entire data set using this method, which effectively future-proofs the interface. REST services are self documenting and fully testable in the application as they are created.
Web Services offer a standardised way of validating and updating external data into the TechnologyOne solution. All Web Service activities are subject to the same authentication, authorisation and audit controls as an interactive user.
|API documentation formats||Open API (also known as Swagger)|
|API sandbox or test environment||Yes|
|Description of customisation||
TechnologyOne’s enterprise software operates from a standard code base and is specifically designed to enable organisations to configure their customer experience and business process requirements without the need for costly customised software development that requires highly technical resources. TechnologyOne has invested heavily in providing a very mature best practice configuration based approach not only for customer configurations, but also as the core architectural approach for the entire range of TechnologyOne market solutions.
The following areas can be customised:
Business Intelligence – to provide customised reporting and dashboards.
Workflow - ablity to define and customise workflow for approvals as per business needs.
BPM Forms provides a modern, intuitive web form interface for the end user, with a configurable forms designer. BPM Forms is connected to BPM Workflow, which provides the flexibility to implement a myriad of business processes. A process can be initiated with a form, then automated and managed with workflow.
Users can customise the above following training, dependent on role based access levels; users are assigned a role or profile which determines what modules and functions a user can access.
|Independence of resources||At the processing layer, TechnologyOne Cloud is a production line of servers with the same operating system, the same OS configuration and the same TechnologyOne code. All Cloud customers share this common "codeset" - there is no custom code in this layer. The business layer is truly elastic and scales dynamically to meet demands. This is only possible because all the servers are identical and do not host customer specific code or configuration. The TechnologyOne Cloud platform is based on an Active-Active-Active architecture which is underpinned by elastic provisioning of stateless, dynamic load balanced server processes.|
|Service usage metrics||Yes|
|Metrics types||The TechnologyOne SaaS Platform gathers a wide range of metrics including things like response time, error messages and SQL performance measurements. These metrics are being expanded upon regularly to help build a wider picture of a customers experience within the SaaS Platform. As part of this process . we are able to present to our customers a snapshot view of their users experience on demand as required.|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Baseline Personnel Security Standard (BPSS)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||European Economic Area (EEA)|
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||
|Other data at rest protection approach||All data volumes within the TechnologyOne SaaS Platform are encrypted at rest to ensure that in the event of any physical intrusion to the service, data would be unreadable.|
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||TechnologyOne’s Business ETL (Extract-Transform-Load) Capability for extracting and transforming data, or ‘ETL’ for short. Business ETL provides the mechanism for bringing data together from disparate sources, transforming that data to ensure it can be easily imported into the TechnologyOne products, organising and calculating it to create flattened, easy to access information for reporting, importing or exporting. The integration capability of ETL enables it to easily query information and extract it for the use of external applications as well as providing capability for importing information back into the TechnologyOne solution, either in a real-time or scheduled mode.|
|Data export formats||
|Other data export formats||
|Data import formats||
|Other data import formats||
|Data protection between buyer and supplier networks||
|Other protection between networks||All services delivered by the TechnologyOne SaaS Platform are delivered via HTTP/S with the latest modern secure cyphers.|
|Data protection within supplier network||
|Other protection within supplier network||All services delivered by the TechnologyOne SaaS Platform are delivered via HTTP/S with the latest modern secure cyphers.|
Availability and resilience
TechnologyOne aims to provide the Customer with 99.5% availability of the software each month of the cloud services term during business hours. Business hours are deemed 7am-7pm Monday to Friday unless otherwise agreed.
Any Service Credits are an "at risk" amount based on a percentage of the total Annual Hosting Services Fee (VAT exclusive) available to the Customer from Supplier that will be allocated and applied annually by the Customer in accordance with the contracted Hosting Service Level Commitment for failure to meet the Availability Service Level.
|Approach to resilience||
The TechnologyOne Cloud provides a highly resilient environment and architecture to promote the highest possible levels of availability and is summarised as follows:
• Highly resilient site design including dual power and communications services, power systems and strict security;
• Dual site redundancy between no less than two data centres located within the EEA;
• Highly available architecture that replicates all transactions in real time providing immediate continuity of the solution in the event of a catastrophic site failure.
• A robust backup regime that incremental backups of all solution data.
• Internet availability: users can log into the solution from any Internet-connected device.
Further information is available on request.
|Outage reporting||TechnologyOne uses a governance model defined under the ITIL Service Management Framework that predefines the steps that are taken to handle an incident impacting a customer’s environment. TechnologyOne uses an incident management tool to manage the incident process ensuring incidents are handled via a predefined path and within predefined timescales. The Incident model includes the steps that TechnologyOne takes to handle the Incident including the chronological order of the incident including any dependences. Responsibilities are outlined and detail the tasks that are required to resolve the incident including the associated escalation procedures and who should be contacted and at what stage.|
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||
Only the nominated key contact(s) can register incidents or cases in our TechnologyOne Customer Community, cases would need to be logged in order to provision new service elements or manage user accounts.
User security is divided into Authentication (the login process) and Authorisation (access to functions and data within the solution once a user has logged on). Once a user is authenticated, access control is implemented using a security matrix made up of a number of different configurable objects; only those with the appropriate access can perform management activities.
|Access restriction testing frequency||At least once a year|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||Between 1 month and 6 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||Between 1 month and 6 months|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||DAS Certification|
|ISO/IEC 27001 accreditation date||02/09/2018|
|What the ISO/IEC 27001 doesn’t cover||The certification is limited to the provision of software solutions within a cloud architecture.|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||
|Other security governance standards||
ISAE 3402 SOC 1
SSAE 18 SOC 1
AT-C 205 SOC 2, SOC 3
|Information security policies and processes||
TechnologyOne has a policy in place with regards to Information Security Management. TechnologyOne currently holds certification for the following standards with regards to Information Security Management:
• ISO/IEC 27001:2013
• ISO/IEC 27017
• ISO/IEC 27018
• ISAE 3402 SOC 1
• SSAE 18 SOC 1
• AT-C 205 SOC 2
• SOC 3
The assurance services examine internal controls related to Information Security (e.g. Network Security, Operating System and Database Configuration), Change and System Maintenance, Data Centre and Network Operations and Disaster Recovery for activities undertaken by the TechnologyOne Cloud Business Unit.
TechnologyOne undertakes annual awareness and training programs covering technology, security, policies, processes, incident management and DR, alongside regular audits of policies and processes. Information Security Training is incorporated as part of an induction process, is integrated as a module into our organisations overarching training programme and bespoke training is delivered to those performing specific roles.
|Configuration and change management standard||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Configuration and change management approach||All changes are initiated, authorised, developed, tested and approved with appropriate segregation of duties between development, test (ITQA) and production environments.|
|Vulnerability management type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Vulnerability management approach||TechnologyOne is subject to independent penetration testing as part of maintaining ISO 27001 certification. All infrastructure and platforms have been configured to ensure our software is protected against vulnerabilities such as SQL injection, cross site scripting, buffer overruns and man-in-the-middle attacks. It also extends to the Cloud platform, with a defence-in-depth architecture: each layer of infrastructure is segregated at multiple levels, including network, firewall and application. Industry standard perimeter security is supplied by Amazon Web Services (AWS), to protect against unauthorised access and Denial-of-Service (DOS) attacks.|
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||TechnologyOne is subject to independent penetration testing as part of maintaining ISO 27001 certification. All infrastructure and platforms have been configured to ensure our software is protected against vulnerabilities such as SQL injection, cross site scripting, buffer overruns and man-in-the-middleattacks. It also extends to the Cloud platform, with a defence-in-deptharchitecture: each layer of infrastructure is segregated at multiple levels, including network, firewall and application. Industry standard perimeter security is supplied by Amazon Web Services (AWS), to protect against unauthorised access and Denial-of-Service (DOS) attacks.|
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||TechnologyOne uses a governance model defined under the ITIL Service Management Framework that predefines the steps that are taken to handle an incident impacting a customer’s environment. TechnologyOne uses an incident management tool to manage the incident process ensuring incidents are handled via a predefined path and within predefined timescales. The Incident model includes the steps that TechnologyOne takes to handle the Incident including the chronological order of the incident including any dependences. Responsibilities are outlined and detail the tasks required to resolve the incident including the associated escalation procedures and who should be contacted and at what stage.|
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Public sector networks
|Connection to public sector networks||No|
|Price||£42750 per unit per year|
|Discount for educational organisations||Yes|
|Free trial available||No|