Discretionary Housing Payment (DHP) form
The Discretionary Housing Payment (DHP) form is an online form designed to manage your Discretionary Housing Payment applications. The form is easily customised to your application process and includes budgeting functionality so that you allocate your DHP funds where they are needed most.
Features
- Labelled to your organisational branding
- Configurable to your DHP requirements
- Inclusive of customisable budgeting functionality
- Comprehensive Management Information suite
Benefits
- PDFs sent as email for indexing into document management system
- Ability to check part completed forms to help claimants
- 24/7 service availability
Pricing
£2,000 to £25,000 a licence
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at phil@entitledto.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 10
Service ID
4 3 8 4 6 6 8 9 4 5 0 7 5 0 6
Contact
entitledto
Phil Agulnik
Telephone: 0161 980 1439
Email: phil@entitledto.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- No
- System requirements
-
- Internet access
- Internet enabled device
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Software support response times are:
• Immediate - target response time 1 hour, target resolution 2 hours
• High - target response time 1 hours, target resolution 1 day
• Normal - target response time 4 hours, target resolution 2 days
• Low - target response time 1 day, target resolution 5 days - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
- Support hours are 9.00am to 6:00pm during office hours (excluding public holidays). If support is required outside of normal hours this can be arranged in advance. Support is included in all subscriptions at no extra cost.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Clients receive an on-boarding call as part of their subscription. The inclusive support service offered to clients includes user guides and a dedicated support site for clients containing full documentation.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Clients extract their data through the admin interface while using their administrator log in details. We can also export data as a .csv file if required.
- End-of-contract process
- Clients are required to notify entitledto in writing (either by email or by letter) that they would like to end their contract. Notifications are acknowledged and appropriate arrangements made to cancel the contract at the end of current licence year.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 8
- Internet Explorer 9
- Internet Explorer 10
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Products are responsive, to enhance UX experience according to the device used by the user.
- Accessibility standards
- WCAG 2.0 A
- Accessibility testing
- All software has been tested and all linked documents are supported and can be opened on platforms,
- API
- Yes
- What users can and can't do using the API
- The API can be used for integrating entitledto's software with other software solutions.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- The products are highly configurable and can be customised in terms of content and design. Clients log in using the admin interface to customise products, including amending text, setting budgeting categories and configuring results.
Scaling
- Independence of resources
- We monitor service loads to ensure CPU usage is low and service speeds are high. Additional servers are added as required to ensure there are always sufficient resources available for all clients.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Products are supported with an admin area that contains usage and reporting functionality.
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Clients export their data through the admin interface that supports the online tools. This interface is password protected and clients should use their administrator level log in details to gain entry.
- Data export formats
-
- CSV
- Other
- Other data export formats
- Excel
- Data import formats
-
- CSV
- Other
- Other data import formats
- Excel
Data-in-transit protection
- Data protection between buyer and supplier networks
- Other
- Other protection between networks
- In most instances there is no connection between the buyer's network and the entitledto network as the tools are freestanding. Where there is integration with another service we protect data using SSL and locked-down IP addresses.
- Data protection within supplier network
- Other
- Other protection within supplier network
- All our databases are co-located in one data centre.
Availability and resilience
- Guaranteed availability
- Service is available all year around, 24 hours per day. We have a record of 99.9% up-time.
- Approach to resilience
- Systems are hosted at Melbourne data centre in Manchester which has a range of failover, backup and disaster recovery mechanisms in place.
- Outage reporting
- Unscheduled downtime is extremely rare, but is reported within 24 hours to clients (by email) should there be any downtime.
Identity and authentication
- User authentication needed
- No
- Access restrictions in management interfaces and support channels
- Management interfaces and support channels are accessed via a log in. Each log in supplied is associated with a role (e.g. adviser, administrator etc.) which is then used to identify the data required for each user and each role. We ensure that the system defaults to providing only data required by the user (e.g. to calculations and budgets that they have created).
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We have an established framework that ensures our information security strategy meets applicable laws and regulations through adherence to policies and internal controls,
- Information security policies and processes
-
We have an internal framework that ensures that leaders are accountable and where roles, responsibilities and segregation of duties are defined.
Staff are aware and trained and it is reviewed and audited.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We have an on-going process of identifying and managing changes to deliverables and products. These are managed through a third party tracking system.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- A clearly defined cyclical practice exists where we identify, classify, remediate and mitigate vulnerabilities. This is managed through third party software.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Third party software is used to detect and alert in relation to operational and security issues. Response times depend on the category of the issue:
• Immediate - target response time 1 hour, target resolution 2 hours
• High - target response time 1 hours, target resolution 1 day
• Normal - target response time 4 hours, target resolution 2 days
• Low - target response time 1 day, target resolution 5 days - Incident management type
- Supplier-defined controls
- Incident management approach
- Third party software is used to track and manage incidents. Users report incidents through their preferred communication method or from within the support area of online tools.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £2,000 to £25,000 a licence
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Free trials of products range from 14 to 30 days (or more on request).
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at phil@entitledto.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.