Mi Contract Portal
Expert contract management and procurement software, streamlined for simplicity. Mi Contract Portal is used to administrate procurement frameworks, enabling mini competitions, tenders and spend tracking. Raise jobs and receive tender submissions from hundreds of contractors. Contracts management, procurement, tenders, and supply-chain management in one. Includes customisable user roles and permissions.
- Contracts Management of High Volume Of Suppliers And Purchasing Parties
- Full Mini Competitions With Graded Evaluation System
- Multiple User Levels and Permissions
- Clarification Questions and FAQ Boards
- Site Meetings System
- Collaborative Working Enabled With Third Party Project Managers Etc.
- Intuitive User Dashboard
- Statistical Analysis Recording and Graphic Display
- Deadline of Submissions Recording and 'Seal' Feature
- In-Built Customisable Notification System.
- Raise mini-compeititions or tenders for multiple suppliers.
- Monitor the spending for multiple users and total value.
- Easily notify designated users of changes / call to actions.
- Designate users to manage set tasks and spending.
- Admin users able to see all tasks and users.
- Easy to view information relating to multiple contracts or tasks.
- Organise suppliers and contracts by framework or other categories.
- Search feature to browse suppliers and contracts.
- Customisable elements to suit client requirements and processes.
- Simple, clear user interface with tutorial videos.
|Software add-on or extension||Yes, but can also be used as a standalone service|
|What software services is the service an extension to||'Mi Procurement' facilitates the whole procurement process. It enables buyers to conduct multiple tenders at once, given a choice of procedures. 'Mi Contract Portal' was originally designed to administrate Framework contracts once awarded to multiple suppliers, and to manage and monitor the award of call-off contracts and mini tenders.|
|Cloud deployment model||Hybrid cloud|
|Service constraints||There are no constraints currently. The software works through a web browser, and updates are conducted on a private server before being pushed to the client. However, clients will also be notified of any forthcoming changes in a reasonable time, and any data will be backed up and protected.|
|Email or online ticketing support||Yes, at extra cost|
|Support response times||Normally within a couple of working hours, and within a working day during busy times. We do not provide support at weekends, but this can be arranged if necessary.|
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||Yes, at an extra cost|
|Web chat support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support accessibility standard||None or don’t know|
|How the web chat support is accessible||Web chat is not accessible through a keyboard shortcut feature currently. However, it is writing based and does not use time-based media (audio or video), and does not depend on colour or symbols. Text to speech and zooming / text enlargement can be used depending on the user's operating system and browser.|
|Web chat accessibility testing||None to date, but we are happy to accommodate this requirement.|
|Onsite support||Yes, at extra cost|
|Support levels||We provide email, telephone, and onsite support. This is fully detailed, along with pricing in the attached pricing schedule. We have full online video tutorials, and can provide onsite training as well as a dedicated contracts manager if required.|
|Support available to third parties||Yes|
Onboarding and offboarding
This is completely flexible according to the Buyer's requirements. Mi Contract Portal is available 'off-the-shelf', but can be integrated and adapted to suite specific Buyer requirements, including certain organisational processes or safeguarding policies for example. We can provide site visits and organise a structured on boarding process, which includes moving over previous data, and introducing customisations.
We can provide onsite training if required. Alternatively we provide online video courses to be accessed at any time, and can provide a brief overview in a short manual, which is normally customised to the buyer. Following from this we are available for support and questions on the phone, via email, live chat or support ticketing. The software is largely designed to be self-explanatory, and most tasks can be easily learned through experimentation.
|Other documentation formats||
|End-of-contract data extraction||Data extraction can be customised to suit the customer requirements, so long as this does not compromise the IP of the software. It can be provided in raw database form, or provided as an overall report, or PDF files. Any file uploads can be provided in their original file type.|
|End-of-contract process||When the contract ends, the client will be given notice that provision will shortly be drawing to a close. There will be a 28 day period for the client to continue with access in order to download any information required, although the service will no longer be available for its other intended purposes i.e. communications with suppliers, running competitions etc.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||Whilst the software is designed to be responsive to mobile devices, it is not well suited to smaller screens as the very nature of the forms and information is quite large. It is possible but not really recommended to conduct activities with this software on smaller mobile devices.|
|Description of service interface||The user dashboard is a clear, simple design with text based menus to enable the user to make the most of the software. It is simple to navigate with advanced functions and tutorials available for experienced users.|
|Accessibility standards||None or don’t know|
|Description of accessibility||Information and menus are text based, and do not rely on colours, symbols or time-based media. It is possible to zoom in and enlarge text. There are tutorial videos, but which do not rely on sound. Written tutorials also available.|
|Accessibility testing||None to date, although we are happy to accommodate testing and deliver appropriate changes to software.|
|Description of customisation||
Users can customise elements of the dashboard layout of the software, including navigation panels, as well as what notifications they receive, and what information is shown on the home overview table.
Users can request customised statistics, which can be produced by our development team. Admin users can customise other user privileges, and designate users according to specific tasks, which makes the software very flexible for different uses.
We are also able to adapt to client requests where there are specific processes that need to be implemented, and can customise the user experience, software and databases where necessary.
|Independence of resources||Servers are load tested to ensure maximum uptime and resource allocation. Statistics are monitored to ensure servers are robust enough to maintain good performance levels.|
|Service usage metrics||No|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least every 6 months|
|Penetration testing approach||In-house|
|Protecting data at rest||Encryption of all physical media|
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||Data export is not currently supported. File attachments required as part of the service can be uploaded and downloaded in their original format.|
|Data export formats||Other|
|Other data export formats||File attachments can be uploaded in their original format.|
|Data import formats||Other|
|Other data import formats||File attachments can be uploaded in their original format.|
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
|Guaranteed availability||We will use commercially reasonable efforts to make our service available with a Monthly Uptime Percentage of at least 99.95%, in each case during any monthly cycle. In the event our service does not meet the Service Commitment, users will be eligible to receive a Service Credit.|
|Approach to resilience||Available on request.|
|Outage reporting||MiConcepts will report any outages via user email alerts as necessary.|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||Management accounts and support channels use two factor authentication to ensure secure access.|
|Access restriction testing frequency||At least once a year|
|Management access authentication||
|Description of management access authentication||Management accounts are manually approved or invited by admin.|
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||Between 1 month and 6 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||Between 1 month and 6 months|
|How long system logs are stored for||Between 6 months and 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||Other|
|Other security governance standards||Compliance with HM Government Cyber Essentials|
|Information security policies and processes||
Servers - Maintain server security with regular updates, SSL checks, security checks. Server security tests and maintenance carried out monthly and reports kept of any findings.
Computers - enforce high strength passwords on computers. Firewall's set up and configured. Disk Encryption used for personal computers. Regular software updates applied. Latest software versions used. Monthly security checks and password resets, reports kept on any findings.
Online accounts and email - enforce high strength passwords and password vaults for any online accounts/email.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||Current configuration details are kept in records. Any potential changes are first considered and calculated for optimal security and data integrity. Change implementation is carried out precisely with overlaps to ensure consistent service.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
Resources are tested with vulnerability scanners to find any potential weaknesses, then any potential problems are fixed.
Antivirus and malware software is run to protect against potential threats, with regular updates to ensure new threats are covered.
Services are protected via firewall and security systems, which monitor resources and alert our company to potential threats and suspect activity.
Resource vendors and news sites are monitored for new threats to lower system level resources, with fixes/patches implemented as needed.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
MiConcepts uses firewall and intrusion detection systems to monitor user activities and report suspected threats or unusual behaviours. Log files are checked regularly to help identify potential threats.
Any potential compromises found or incidents which take place will be dealt with immediately.
|Incident management type||Supplier-defined controls|
|Incident management approach||
Users report incidents to us either by telephone or email. We then adhere to the following process:
Investigation and diagnosis.
Resolution and recovery.
We provide incident reports on request.
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||No|
|Price||£600.00 per licence|
|Discount for educational organisations||No|
|Free trial available||Yes|
|Description of free trial||Mi Contract Portal is available for public sector organisations to sign up and raise job on existing Frameworks. There are necessary access terms, but no commission for public sector users.|
|Link to free trial||http://micontractportal.co.uk|