Mi Concepts Limited

Mi Contract Portal

Expert contract management and procurement software, streamlined for simplicity. Mi Contract Portal is used to administrate procurement frameworks, enabling mini competitions, tenders and spend tracking. Raise jobs and receive tender submissions from hundreds of contractors. Contracts management, procurement, tenders, and supply-chain management in one. Includes customisable user roles and permissions.


  • Contracts Management of High Volume Of Suppliers And Purchasing Parties
  • Full Mini Competitions With Graded Evaluation System
  • Multiple User Levels and Permissions
  • Clarification Questions and FAQ Boards
  • Site Meetings System
  • Collaborative Working Enabled With Third Party Project Managers Etc.
  • Intuitive User Dashboard
  • Statistical Analysis Recording and Graphic Display
  • Deadline of Submissions Recording and 'Seal' Feature
  • In-Built Customisable Notification System.


  • Raise mini-compeititions or tenders for multiple suppliers.
  • Monitor the spending for multiple users and total value.
  • Easily notify designated users of changes / call to actions.
  • Designate users to manage set tasks and spending.
  • Admin users able to see all tasks and users.
  • Easy to view information relating to multiple contracts or tasks.
  • Organise suppliers and contracts by framework or other categories.
  • Search feature to browse suppliers and contracts.
  • Customisable elements to suit client requirements and processes.
  • Simple, clear user interface with tutorial videos.


£600.00 per licence

Service documents


G-Cloud 11

Service ID

4 6 4 6 8 4 0 3 9 3 5 5 3 4 2


Mi Concepts Limited

Gareth Wilson



Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
'Mi Procurement' facilitates the whole procurement process. It enables buyers to conduct multiple tenders at once, given a choice of procedures. 'Mi Contract Portal' was originally designed to administrate Framework contracts once awarded to multiple suppliers, and to manage and monitor the award of call-off contracts and mini tenders.
Cloud deployment model
Hybrid cloud
Service constraints
There are no constraints currently. The software works through a web browser, and updates are conducted on a private server before being pushed to the client. However, clients will also be notified of any forthcoming changes in a reasonable time, and any data will be backed up and protected.
System requirements
  • Requires an up-to-date web browser.
  • Designed to be responsive, but larger screens preferable.

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Normally within a couple of working hours, and within a working day during busy times. We do not provide support at weekends, but this can be arranged if necessary.
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Yes, at an extra cost
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Web chat is not accessible through a keyboard shortcut feature currently. However, it is writing based and does not use time-based media (audio or video), and does not depend on colour or symbols. Text to speech and zooming / text enlargement can be used depending on the user's operating system and browser.
Web chat accessibility testing
None to date, but we are happy to accommodate this requirement.
Onsite support
Yes, at extra cost
Support levels
We provide email, telephone, and onsite support. This is fully detailed, along with pricing in the attached pricing schedule. We have full online video tutorials, and can provide onsite training as well as a dedicated contracts manager if required.
Support available to third parties

Onboarding and offboarding

Getting started
This is completely flexible according to the Buyer's requirements. Mi Contract Portal is available 'off-the-shelf', but can be integrated and adapted to suite specific Buyer requirements, including certain organisational processes or safeguarding policies for example. We can provide site visits and organise a structured on boarding process, which includes moving over previous data, and introducing customisations.

We can provide onsite training if required. Alternatively we provide online video courses to be accessed at any time, and can provide a brief overview in a short manual, which is normally customised to the buyer. Following from this we are available for support and questions on the phone, via email, live chat or support ticketing. The software is largely designed to be self-explanatory, and most tasks can be easily learned through experimentation.
Service documentation
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
  • Word
  • Wiki
End-of-contract data extraction
Data extraction can be customised to suit the customer requirements, so long as this does not compromise the IP of the software. It can be provided in raw database form, or provided as an overall report, or PDF files. Any file uploads can be provided in their original file type.
End-of-contract process
When the contract ends, the client will be given notice that provision will shortly be drawing to a close. There will be a 28 day period for the client to continue with access in order to download any information required, although the service will no longer be available for its other intended purposes i.e. communications with suppliers, running competitions etc.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Whilst the software is designed to be responsive to mobile devices, it is not well suited to smaller screens as the very nature of the forms and information is quite large. It is possible but not really recommended to conduct activities with this software on smaller mobile devices.
Service interface
Description of service interface
The user dashboard is a clear, simple design with text based menus to enable the user to make the most of the software. It is simple to navigate with advanced functions and tutorials available for experienced users.
Accessibility standards
None or don’t know
Description of accessibility
Information and menus are text based, and do not rely on colours, symbols or time-based media. It is possible to zoom in and enlarge text. There are tutorial videos, but which do not rely on sound. Written tutorials also available.
Accessibility testing
None to date, although we are happy to accommodate testing and deliver appropriate changes to software.
Customisation available
Description of customisation
Users can customise elements of the dashboard layout of the software, including navigation panels, as well as what notifications they receive, and what information is shown on the home overview table.

Users can request customised statistics, which can be produced by our development team. Admin users can customise other user privileges, and designate users according to specific tasks, which makes the software very flexible for different uses.

We are also able to adapt to client requests where there are specific processes that need to be implemented, and can customise the user experience, software and databases where necessary.


Independence of resources
Servers are load tested to ensure maximum uptime and resource allocation. Statistics are monitored to ensure servers are robust enough to maintain good performance levels.


Service usage metrics


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Data export is not currently supported. File attachments required as part of the service can be uploaded and downloaded in their original format.
Data export formats
Other data export formats
File attachments can be uploaded in their original format.
Data import formats
Other data import formats
File attachments can be uploaded in their original format.

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We will use commercially reasonable efforts to make our service available with a Monthly Uptime Percentage of at least 99.95%, in each case during any monthly cycle. In the event our service does not meet the Service Commitment, users will be eligible to receive a Service Credit.
Approach to resilience
Available on request.
Outage reporting
MiConcepts will report any outages via user email alerts as necessary.

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Management accounts and support channels use two factor authentication to ensure secure access.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password
  • Other
Description of management access authentication
Management accounts are manually approved or invited by admin.

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
Other security governance standards
Compliance with HM Government Cyber Essentials
Information security policies and processes
Servers - Maintain server security with regular updates, SSL checks, security checks. Server security tests and maintenance carried out monthly and reports kept of any findings.
Computers - enforce high strength passwords on computers. Firewall's set up and configured. Disk Encryption used for personal computers. Regular software updates applied. Latest software versions used. Monthly security checks and password resets, reports kept on any findings.
Online accounts and email - enforce high strength passwords and password vaults for any online accounts/email.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Current configuration details are kept in records. Any potential changes are first considered and calculated for optimal security and data integrity. Change implementation is carried out precisely with overlaps to ensure consistent service.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Resources are tested with vulnerability scanners to find any potential weaknesses, then any potential problems are fixed.
Antivirus and malware software is run to protect against potential threats, with regular updates to ensure new threats are covered.
Services are protected via firewall and security systems, which monitor resources and alert our company to potential threats and suspect activity.
Resource vendors and news sites are monitored for new threats to lower system level resources, with fixes/patches implemented as needed.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
MiConcepts uses firewall and intrusion detection systems to monitor user activities and report suspected threats or unusual behaviours. Log files are checked regularly to help identify potential threats.
Any potential compromises found or incidents which take place will be dealt with immediately.
Incident management type
Supplier-defined controls
Incident management approach
Users report incidents to us either by telephone or email. We then adhere to the following process:
Incident identification.
Incident logging.
Incident categorisation.
Incident prioritisation.
Incident response.
Initial diagnosis.
Incident escalation.
Investigation and diagnosis.
Resolution and recovery.
Incident closure.

We provide incident reports on request.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£600.00 per licence
Discount for educational organisations
Free trial available
Description of free trial
Mi Contract Portal is available for public sector organisations to sign up and raise job on existing Frameworks. There are necessary access terms, but no commission for public sector users.
Link to free trial

Service documents

Return to top ↑