MyPlayService - magicbooking

magicbooking

magicbooking is multi-tenant platform for academies, schools & local authorities to manage school dinner, clubs, trips, breakfast, after-school & holiday clubs, and parents evenings. Parents can book and pay online. The platform helps :
o Reducing debts
o Saving hours on admin tasks
o Improving communication (Email & SMS)

Features

  • Online booking dinner, trips, extra-curricular clubs, wraparound, parents evenings
  • Online payment
  • Responsive platform
  • Integration with school's IMS
  • Automated daily register & invoice generation
  • Automated reminders
  • Email & SMS feature
  • Real time reporting
  • Multi-sites capability
  • Group-pricing (FSM, Pupil premium, Staff...)

Benefits

  • One single platform to manage all school service
  • Save up to 85% of time spent on admin
  • Reduce costs
  • Reduce debts

Pricing

£792 to £2534 per licence per year

  • Free trial available

Service documents

G-Cloud 11

433651600888184

MyPlayService - magicbooking

Workwiz

03339874717

carine@magicbooking.co.uk

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints None
System requirements None

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Support response times
Support is provided available Monday – Friday, 8:30am – 5.30pm (excluding weekends, bank holidays and annual shutdown period between Christmas and New Year) . Response time varies from 4 hours to 2 working days depending the issue severity.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Support level 1 to 3 is covered by SLA agreement. Our support team is responsible to respond to tickets of levels 1 to 2, tickets escalated to level 3 are dealt with by a technical account manager.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Once contracts have been exchanged, a dedicated implementation manager will outlined the onboarding timeframe in accordance with the project stakeholders and follow the process until completion.
The timeframe vary based on the project size and typically includes:
- Development phase when 3rd-party integration or customisation is required
- On-site hands-on training sessions
- Close support during the first few months following the implementation.
Users have access to an online user-guide, the online help desk and additional training sessions can be booked on an ad-hoc basis.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction A number of reports be exported from the platform on demand in CSV/XLS/PDF format.
End-of-contract process The end-of-contract service includes a meeting to agree on the service termination date, data extract and data disposal. The service is quoted individually based on the client's requirements.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Differences between the mobile and desktop service are layout only, all features are accessible from mobile devices
API Yes
What users can and can't do using the API User can use our API to display availability on their websites, integrate with their IMS, integrate with payment platforms
API documentation Yes
API documentation formats PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The look and feel for the parents site can be customised to match the school's website.
Clients' specific customisation can be considered.

Scaling

Scaling
Independence of resources Magicbooking is hosted on MS Azure Cloud. Azure provides hyper-scale cloud computing platforms allowing resilience throughout.

Analytics

Analytics
Service usage metrics Yes
Metrics types Number of bookings,
Income generated, per site, per activity, per session
Money overdue
Projected income
Children data (allergies, medical condition, medication, SEN & disabilities, consents...)
Parents data
Google analytics
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Data can be exported on demand in CSV/XLS/PDF format
Data export formats
  • CSV
  • Other
Other data export formats
  • Xlsx
  • PDF
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability MS azure guarantee 99.95% up time. Further literature is available on MS website https://azure.microsoft.com/en-gb/support/legal/sla/virtual-machines/v1_8/
Approach to resilience Build apps on Azure to take advantage of high availability, disaster recovery and backup on Azure’s global network. Build redundancies at the virtual machine (VM), data centre and regional levels based on your business needs. Also, stay compliant with your country or region’s legal and regulatory requirements respective of the location of your data. See MS documentation for further details Build apps on Azure to take advantage of high availability, disaster recovery and backup on Azure’s global network. Build redundancies at the virtual machine (VM), data centre and regional levels based on your business needs. Also, stay compliant with your country or region’s legal and regulatory requirements respective of the location of your data.
Outage reporting Via Azure Service alert (application in-sight)

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels User access is controlled by Windows Authentication
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Our Cloud environment is ISO/IEC 27001:2013, ISO/IEC 27018 compliant via MS Azure Cloud. We have implemented our security governance based on ISO/IEC 27001 standards and specifically tailored to our activities and clients base.
Information security policies and processes We follow security precepts outlined in the ISO/IEC 27001 standards.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Components are continuously monitored and any activity irregularities triggers alerts. These are analysed and where necessary steps are taken to ensure service continuity or pro-actively schedule changes. Our change control procedure driven by our QMS is designed to reduces risks while making changes.
It includes the following steps:
- Reviewing of the change request,
- Planning the implementation for the change,
- Getting approved,
- Implementing the change,
- Closing the change request
Vulnerability management type Supplier-defined controls
Vulnerability management approach One of the reasons we use the MS Azure Cloud is to benefit from their cutting-edge built-in security processes and continuous research programmes to prevent threat attacks. Relying on MS to assess threats and deploy patches is the guaranty to benefit from the best processes and response times in the industry on a worldwide scale.
Protective monitoring type Supplier-defined controls
Protective monitoring approach One of the reasons we use the MS Azure Cloud is to benefit from their expertise in measuring compromises and responding to incident in a timely and efficient manner.
In case of an incident, and where the incident has a direct impact on clients applications or data, clients are informed as soon as we become aware of the incident.
Incident management type Supplier-defined controls
Incident management approach If the incident affect clients, clients are notified as soon as we become aware of the incident.
Incidents are logged and a report is issued with details of the finding and resolution or fix implemented.
Clients report incident via our help-desk or via the DPO if it is data related.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £792 to £2534 per licence per year
Discount for educational organisations No
Free trial available Yes
Description of free trial Full version excluding the reports

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Terms and conditions
Service documents
Return to top ↑