entitledto

Discretionary Housing Payment (DHP) form

The Discretionary Housing Payment (DHP) form is an online form designed to manage your Discretionary Housing Payment applications. The form is easily customised to your application process and includes budgeting functionality so that you allocate your DHP funds where they are needed most.

Features

  • Labelled to your organisational branding
  • Configurable to your DHP requirements
  • Inclusive of customisable budgeting functionality
  • Comprehensive Management Information suite

Benefits

  • PDFs sent as email for indexing into document management system
  • Ability to check part completed forms to help claimants
  • 24/7 service availability

Pricing

£2000 to £25000 per licence

  • Free trial available

Service documents

G-Cloud 10

438466894507506

entitledto

Phil Agulnik

0161 980 1439

phil@entitledto.co.uk

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints No
System requirements
  • Internet access
  • Internet enabled device

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Software support response times are:

• Immediate - target response time 1 hour, target resolution 2 hours
• High - target response time 1 hours, target resolution 1 day
• Normal - target response time 4 hours, target resolution 2 days
• Low - target response time 1 day, target resolution 5 days
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support No
Support levels Support hours are 9.00am to 6:00pm during office hours (excluding public holidays). If support is required outside of normal hours this can be arranged in advance. Support is included in all subscriptions at no extra cost.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started Clients receive an on-boarding call as part of their subscription. The inclusive support service offered to clients includes user guides and a dedicated support site for clients containing full documentation.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Clients extract their data through the admin interface while using their administrator log in details. We can also export data as a .csv file if required.
End-of-contract process Clients are required to notify entitledto in writing (either by email or by letter) that they would like to end their contract. Notifications are acknowledged and appropriate arrangements made to cancel the contract at the end of current licence year.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Products are responsive, to enhance UX experience according to the device used by the user.
Accessibility standards WCAG 2.0 A
Accessibility testing All software has been tested and all linked documents are supported and can be opened on platforms,
API Yes
What users can and can't do using the API The API can be used for integrating entitledto's software with other software solutions.
API documentation Yes
API documentation formats PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The products are highly configurable and can be customised in terms of content and design. Clients log in using the admin interface to customise products, including amending text, setting budgeting categories and configuring results.

Scaling

Scaling
Independence of resources We monitor service loads to ensure CPU usage is low and service speeds are high. Additional servers are added as required to ensure there are always sufficient resources available for all clients.

Analytics

Analytics
Service usage metrics Yes
Metrics types Products are supported with an admin area that contains usage and reporting functionality.
Reporting types Real-time dashboards

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Clients export their data through the admin interface that supports the online tools. This interface is password protected and clients should use their administrator level log in details to gain entry.
Data export formats
  • CSV
  • Other
Other data export formats Excel
Data import formats
  • CSV
  • Other
Other data import formats Excel

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Other
Other protection between networks In most instances there is no connection between the buyer's network and the entitledto network as the tools are freestanding. Where there is integration with another service we protect data using SSL and locked-down IP addresses.
Data protection within supplier network Other
Other protection within supplier network All our databases are co-located in one data centre.

Availability and resilience

Availability and resilience
Guaranteed availability Service is available all year around, 24 hours per day. We have a record of 99.9% up-time.
Approach to resilience Systems are hosted at Melbourne data centre in Manchester which has a range of failover, backup and disaster recovery mechanisms in place.
Outage reporting Unscheduled downtime is extremely rare, but is reported within 24 hours to clients (by email) should there be any downtime.

Identity and authentication

Identity and authentication
User authentication needed No
Access restrictions in management interfaces and support channels Management interfaces and support channels are accessed via a log in. Each log in supplied is associated with a role (e.g. adviser, administrator etc.) which is then used to identify the data required for each user and each role. We ensure that the system defaults to providing only data required by the user (e.g. to calculations and budgets that they have created).
Access restriction testing frequency At least once a year
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach We have an established framework that ensures our information security strategy meets applicable laws and regulations through adherence to policies and internal controls,
Information security policies and processes We have an internal framework that ensures that leaders are accountable and where roles, responsibilities and segregation of duties are defined.
Staff are aware and trained and it is reviewed and audited.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We have an on-going process of identifying and managing changes to deliverables and products. These are managed through a third party tracking system.
Vulnerability management type Supplier-defined controls
Vulnerability management approach A clearly defined cyclical practice exists where we identify, classify, remediate and mitigate vulnerabilities. This is managed through third party software.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Third party software is used to detect and alert in relation to operational and security issues. Response times depend on the category of the issue:
• Immediate - target response time 1 hour, target resolution 2 hours
• High - target response time 1 hours, target resolution 1 day
• Normal - target response time 4 hours, target resolution 2 days
• Low - target response time 1 day, target resolution 5 days
Incident management type Supplier-defined controls
Incident management approach Third party software is used to track and manage incidents. Users report incidents through their preferred communication method or from within the support area of online tools.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £2000 to £25000 per licence
Discount for educational organisations No
Free trial available Yes
Description of free trial Free trials of products range from 14 to 30 days (or more on request).

Service documents

pdf document: Pricing document pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑