CampusConnect is app based E-solution connecting universities and colleges with their incoming prospective students. Applicants can connect with fellow prospects, student ambassadors, and staff, as well as accessing critical pre-enrolment information. The service provides institutions with higher rates of applicant conversion, and better prepared, happier students.
- Fully branded, tailored app-based E-solution.
- Cloud based service.
- Convert prospects from offer - enrolment.
- Real-time data reporting and analytics.
- Easily connect prospects with fellow applicants.
- Provide a platform for prospects to ask student ambassadors questions.
- Pubilsh, personalise, filter and schedule critical content in real-time.
- Give prospects key dates for their personal device calendar.
- Add provision for students on outbound mobility/exchange programmes.
- Gain key pre-enrolment insights via real-time analytics reporting.
- Connect outgoing mobility students with those from the previous year.
£10000 to £20000 per instance per year
- Education pricing available
|Software add-on or extension||No|
|Cloud deployment model||Private cloud|
|System requirements||Buyers purchase a licence based on time/volume.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||1 working day.|
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Onsite support|
|Support levels||We provide a technical account manager. The cost for this support is incorporated into the licence fee for the software.|
|Support available to third parties||No|
Onboarding and offboarding
|Getting started||We provide onsite training and a series of best practice articles are available via our website.|
|End-of-contract data extraction||In our relationship with our university and college clients, we are the data processor and they remain the data controller. All data is accessible to clients at all times. We can supply archived data on request.|
|End-of-contract process||At the end of a contract, the specific app deployment is permanently deleted/destroyed, and any user data is archived and sent to the data controller.|
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||The mobile service is user facing, the desktop service provides access to an admin portal for university/college staff to manage the deployment and access key analytics.|
|Accessibility standards||None or don’t know|
|Description of accessibility||N/a|
|Description of customisation||The whole system can be while labelled to reflect a particular institution's branding and brand guidelines.|
|Independence of resources||We have carried out a series of load testing on our app service, and for each new client we create a new instance of the app. Each new app, threefore has no effect on the existing instances of the app. We monitor all systems continuously for issues that could affect service.|
|Service usage metrics||Yes|
|Metrics types||User activity reports available though service and we provide service usage reports on request.|
|Supplier type||Not a reseller|
|Staff security clearance||Staff screening not performed|
|Government security clearance||None|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least every 6 months|
|Penetration testing approach||In-house|
|Protecting data at rest||Other|
|Other data at rest protection approach||We don't have any data at rest.|
|Data sanitisation process||No|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||Clients are able to export data via an 'export to CSV' option in the admin portal of our service.|
|Data export formats||CSV|
|Data import formats||Other|
|Other data import formats||Manually|
|Data protection between buyer and supplier networks||Legacy SSL and TLS (under version 1.2)|
|Data protection within supplier network||Legacy SSL and TLS (under version 1.2)|
Availability and resilience
Technical support is included in the fee. Phone support is provided from 9am to 5pm GMT, Monday to Friday, excluding Irish and UK national and Bank Holidays
We accept email support requests 24 hours per day, 7 days a week at email@example.com. We attempt to respond to e-mail support requests within one business day. (By respond, it means we will attend to the matters raised and deploy resources to begin resolving your issue. It does not mean the issues will necessarily be resolved within one business day).
|Approach to resilience||Available on request|
|Outage reporting||This is currently done manually, via email/call to clients.|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||Users log in to the administration console with unique ID and password. If required, front-end content not intended for the general public can also be hidden behind a password login.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||You control when users can access audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||We use superior encryption protocols and proper implementation processes to avoid mistakes and perform encryption to the highest industry standard.|
|Information security policies and processes||GDPR and the Irish data information commissioner policies.|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||All maintenance activity is compliant with contractual SLA's, and any changes require discussion and customer approval before proceeding|
|Vulnerability management type||Undisclosed|
|Vulnerability management approach||Vulnerabilities are identified via code review, penetration testing and by network architecture review.|
|Protective monitoring type||Undisclosed|
|Protective monitoring approach||We regularly monitor service and code, and would release an update patch to address the breach promptly and appropriately to address the incident.|
|Incident management type||Undisclosed|
|Incident management approach||We keep a log for all data breaches for use internally which we use to report incidents via email and phone to clients.|
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||No|
|Price||£10000 to £20000 per instance per year|
|Discount for educational organisations||Yes|
|Free trial available||No|
|Pricing document||View uploaded document|
|Service definition document||View uploaded document|
|Terms and conditions document||View uploaded document|