Built Intelligence Ltd

Academy Learning Management System LMS

Built Intelligence LMS is our easy to use Learning Management System, it provides you and your project team with access to a suite of eLearning, ePortfolio and knowledge management tools.

In addition it also contains tools to facilitate face-to-face training, monitoring, reporting and the development of role-based capability frameworks.

Features

  • Hosted/SaaS LMS
  • SCORM 1.2, SCORM 2004 and Tin Can xAPI compliant
  • Accessible via Mac, PC, iPhone, iPad, Android
  • Themes/brand customization
  • API - for integration with other systems
  • Ecommerce/self-signup
  • Certificates
  • Course library
  • Automatic and scheduled compliance reminders
  • Extensive reporting

Benefits

  • Save time and money on travel and venues for training
  • Increase workforce productivity
  • Access a wider global audience
  • Manage and build on your current training material
  • Create dialogue & discussion around training topics
  • Easy to Use
  • Mobile
  • Affordable and Cost Effective
  • UK based team
  • No downloaded or installation required

Pricing

£5 to £25 per user per year

  • Education pricing available
  • Free trial available

Service documents

Framework

G-Cloud 11

Service ID

4 1 1 2 1 7 4 4 9 4 7 3 2 0 5

Contact

Built Intelligence Ltd

Chris Corr

0117 214 0890

enquiries-gcloud@builtintelligence.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
All non-critical software updates occur outside normal office hours, usually between 9pm and 12am, all users will be warned on login about any impending updates. Critical maintenance may happen during office hours but this will happen if there is a functional issue with the system to all users. Online support is available via help pages, FAQ sections and training information.

For private/internal instances the client will need to supply details of the appropriate Private cloud service for hosting.
System requirements
  • Internet Access (minimum 128kbps)
  • Internet Browser (Latest version Internet Explorer/Edge, Firefox, Safari, Chrome etc)

User support

Email or online ticketing support
Email or online ticketing
Support response times
Support is email based and within UK office hours 9:00am to 5:00pm.

We aim to respond within 1 working hour.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Yes, at an extra cost
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
We have not currently carried out any testing of assistive technology solutions with our web chat system but are waiting for confirmation from our supplier that this has been carried out.
Onsite support
Yes, at extra cost
Support levels
We provide telephone and email support free of charge to all our customers, on-site support requirements are negotiated on a per customer basis and charged at our standard day rate.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide an initial consultancy service where we identify key stakeholders within your organisation, your training and content requirements.

We can then train appropriate individuals in the management and support of the learning process and also provide general support on an ongoing basis.

Our support staff and development team are all UK based and available during office hours (8:30am to 5:30pm).
Service documentation
Yes
Documentation formats
  • HTML
  • Other
Other documentation formats
System specific Wiki (Separate User and Admin documentation)
End-of-contract data extraction
System data is stored as a MySQL database and as such can be exported and manipulated very easily into any suitable format using any modern database administration tool.
End-of-contract process
We can provide a data export of the system as part of our service. Any further assistance with data migration is costed on a per project basis according to our standard day rate.

We retain customer data for 30 days as standard.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
For standard users, functionality on the mobile version of the service is largely the same as that of the desktop version. There may be alteration to the layout and behaviour of certainly elements of the system functionality.

Administrative users may require the use of a desktop to access all of the functionality available to them.
Service interface
Yes
Description of service interface
The service offers an API with CRUD access to key system data models.

Access to the API is provide through the use of an access token which needs to be issued to the service accessing the API externally.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
We have tested our system internally against the WCAG2.0 guidelines.
API
Yes
What users can and can't do using the API
The service offers an API with CRUD access to key system data models.

Access to the API is provide through the use of an access token which needs to be issued to the service accessing the API externally.
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
The system can be configured and customised to a limited extent via the backend administration system.

Further to this, the system is fully themeable and can be extended through the use of the modular plugin architecture.

Scaling

Independence of resources
Our choice of cloud hosting provider allows us to scale the hosting infrastructure according to site traffic with very little notice.

In addition, larger scale changes in system capacity can be provided for by moving to a load-balanced distributed architecture.

Analytics

Service usage metrics
Yes
Metrics types
The system provide basic back end usage metrics, there is also the option of integrating with 3rd party web metrics services.
Reporting types
Real-time dashboards

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
We can provide a data export of the system as part of our service. Any further assistance with data migration is costed on a per project basis according to our standard day rate.
Data export formats
  • CSV
  • Other
Other data export formats
MySQL
Data import formats
  • CSV
  • Other
Other data import formats
MySQL

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We contractually guarantee 99.5% availability apart from for scheduled maintenance downtime which are carried out outside normal working hours.

Any failures to meet this level of availability will result in service credits awarded to to the customer.
Approach to resilience
Available on request.
Outage reporting
We have a 3rd party monitoring service in place on top of the standard monitoring offered by our cloud hosting supplier. It provides a dashboard, API and alerts via SMS and email.

Clients will be made aware of any unplanned outages via email alerts, within one working hour (Mon-Fri, 9am to 5pm). Any planned maintenance will be alerted to users via their dashboard no later than 24 hours before the scheduled start.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels
Access to the management console of the application is managed through the application itself and can be further limited via a 3rd party authentication service to include limits such as IP, location and use of a hardware key or multi-factor authentication app.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
We take information security very seriously and understand how important it is to our clients. Our choice of infrastructure and software tools reflect this. We are accredited under the Cyber Essentials Scheme (http://www.cyberessentials.org).
Information security policies and processes
We are implementing GDPR best practice and training staff to ensure compliance.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All of our code is managed using a Version Control System and changes are tracked via a ticketing system where we prioritise and manage tickets.

Any updates to the production environment are tested prior to deployment to live using a dedicated test environment.

All hosting environments include incremental backups which supports both short term and long term roll back of the code and database.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We monitor 3rd party vendors of each of the system components for the latest software updates and security patches.

Our cloud hosting provider offers security monitoring of infrastructure and application behaviour as standard.

All account credentials are managed via an encrypted system access to which is limited to the appropriate staff.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
On top of the standard monitoring services offered buy our cloud hosting provider we also include a 3rd party monitoring service which reports on system level issues and events.

We also employ a distributed network availability monitoring tool which providers alerts on the availability of the various services from multiple locations across the internet.
Incident management type
Supplier-defined controls
Incident management approach
Any incidents are first tracked by our ticketing system and then if required, escalated to our technical team.

All progress and feedback is managed through our ticket system and followed up until the issue is confirmed resolved by the client.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
Yes
Connected networks
Public Services Network (PSN)

Pricing

Price
£5 to £25 per user per year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
We can offer a 'sandbox' version of the service containing dummy data should this be required for evaluation purposes.

It will contain a single working instance of the system but won't include any customer data or bespoke functionality.

Service documents

Return to top ↑