Target Information Systems Limited

Accord Contracts Management System

Accord is a Register of Supplier Expenditure and/or Customer Income Contracts.

Accord is a day to day contract management database with individual user homepages to ensure your procurement or finance team are able to work as productively as possible.

Accord makes contract management easy, efficient and compliant.


  • Secure Software as a Service Contracts Management
  • Reports on Procurement Projects
  • Contracts Compliance Database
  • Collaborative working environment for teams
  • Clear visibility on Expiries, Renewals and End Dates
  • Contracts owned by Users under the organisational hierarchy
  • Individual team member homepages of tasks and contract status
  • Integrated Procurement Projects Tracker OJEU Compliant
  • Integrated Spend Analytics tool
  • Integrated Facilities Equipment Register & Compliance Database


  • Automated Alerts and Escalations to ensure nothing gets missed
  • Automated task emails to augment your work flow processes
  • One version of the truth around your contracts
  • A secure, central place with controlled access via permissions
  • Peace of mind that all dates are controlled
  • Reduce chase up times and generate longer supplier negotiations
  • Gain full visibility of everything to do with your contract
  • A CRM tool that provides you with auditable compliance
  • Upload specifications, quotations, softcopy contract, SLA etc.
  • A smarter way to look at data through Digital Dashboards


£14,750 an instance

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

4 5 3 3 9 1 4 6 2 7 6 6 0 2 4


Target Information Systems Limited Phil Atkinson
Telephone: 07702 248 948

Service scope

Software add-on or extension
Cloud deployment model
Private cloud
Service constraints
Each deployment of Accord comes with Unlimited Users, Suppliers and Contracts.

The only limit is the initial data storage of 50GB. Additional storage is available on request.
System requirements
  • A desktop or table computer
  • A modern Internet browser
  • A connection to the Internet

User support

Email or online ticketing support
Email or online ticketing
Support response times

We replied to 97.7% of support emails with the first hour of fiscal year 2019.

Please see client testimonials:
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
All support matters are to be first raised to the support email:

Target provides application support between the hours of 9.00am and 5.30pm Monday to Friday excluding Bank Holidays.

A support matter emailed to the support email can be followed up with a call in office hours to: 01226 212 056.

Support incidents are split into three priorities:

Priority One
This is where an application is unavailable and users are unable to access the system. This will be responded to in one hour in business hours and have a resource dedicated to the problem until it is resolved. Target will work 24/7 on this problem until it is resolved.

Priority Two
This is for intermittent, non-critical support matters where the application is available and an error is occurring which does not affect normal usage of the system. Priority two matters will be responded to within four business hours, and typically resolved within 72 hours.

Priority Three
For minor matters such as layout issues, spelling mistakes in graphical text or minor amends; these will either be resolved within seven working days or scheduled for an agreed date/time.
Support available to third parties

Onboarding and offboarding

Getting started
Accord is configured to follow the established policies, procedures and processes of our clients.

Accord is capable of having data imported from existing databases or spreadsheets.

We also offer Intelligent Hands services, either on-site or off-site, to make the step to Accord as easy as possible for our clients.
Service documentation
Documentation formats
End-of-contract data extraction
Data can be exported at anytime into CSV or TXT files.
End-of-contract process
At the end of the contract the client may export any or all data into CSV or Text files.

Exporting into formats for posting to a new database may incurr additional cost.

We make it as easy as possible for our clients when On-Boarding and Off-Boarding.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Views on tablets and Smart phones may be limited due to screen size
Service interface
Customisation available
Description of customisation
Accord has been developed to be readily configured to meet any customisation needs of its users.

This customisation is scoped at Project Mobilisation and, where required, charged for as a Change Request.


Independence of resources
Accord is delivered software as a service on high-end hosting with access to powerful CPUs, scaleable server memory and storage.


Service usage metrics
Metrics types
Any as required by the client
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
There is a tool for searching the database and exporting 1 or many records into CSV or TXT.
Data export formats
Data import formats
Other data import formats
Data imports are managed by Accord at time of mobilisation

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99.9% uptime
Approach to resilience
Available on request.
Outage reporting
Planned and unplanned outages are communicated to clients via email and followed up with phone calls where appropriate.

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Available on request.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
1 July 2020
What the ISO/IEC 27001 doesn’t cover
We were assessed on all the control measures in the standard.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Accord is a product of Target Information Systems Limited who operate policies and procedures under ISO27001

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Configuration of Accord is documented at the time of mobilisation, shared with software engineers and then accepted/rejected by the client under our ISO9001 processes.

Changes are managed through our Change Management Process through requirements gathering, documentation, accept/reject by the client then passed to software engineers who pass changes to the Project Account Manager for testing then back to client for accept/reject under our ISO9001 processes.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Available upon request.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Available on request.
Incident management type
Supplier-defined controls
Incident management approach
Available on request.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£14,750 an instance
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.