Ordnance Survey Open Data map service. Ordnance Survey Premium Data map service. Customer Data map service. Available as Open Geospatial Consortium (OGC) Web Mapping Service (WMS) and Web Mapping Tile Service (WMTS).
- Ordnance Survey OpenData
- Ordnance Survey Premium Data
- Customer map data
- WMS or WMTS
- Ordnance Survey data load
- Ordnance Survey map updates
- Customer map data load
- Customer map data updates
- Guaranteed level of service
- OGC standards
£2000 per instance per year
- Free trial available
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
|Service constraints||The service is based on a typical Cadcorp customer that requires less than 2 million WMS transaction and/or 30 million WMTS tiles.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||Email support is available bewteen 9:00 and 17:30, Monday to Friday, excluding public holidays. Cadcorp will use its reasonable endeavours to respond within 8 Working Hours.|
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
|Support levels||Cadcorp provide a single tier support service that includes telephone support, email support and access to an interactive customer portal. All support costs are included within the service subscription fee. Customers are allocated a Cadcorp Account Manager.|
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||Users of the service are provided with a URL and authentication details to access the data service.|
|End-of-contract data extraction||On request Cadcorp will return any customer data at the end of the contract.|
|End-of-contract process||At the end of the contract the customer access to the service is revoked. The customer can request the return of their data within 30 days prior to the end of the contract.|
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||Dependent upon the client software the map data display will be the same on desktop and mobile devices.|
|Accessibility standards||None or don’t know|
|Description of accessibility||The data is served to Open Geospatial Consortium web service standards.|
|Accessibility testing||The service provides a data service which does not include an application interface.|
|Description of customisation||Customers can provide their own map data overlays for use within the Customer Data Map Service.|
|Independence of resources||Cadcorp actively monitors server resources and adjusts when required. The service users Azure virtual servers that can be easily upgraded based on increased service demand.|
|Service usage metrics||Yes|
|Metrics types||On request Cadcorp will provide the customer with a count of WMS transactions and /or WMTS tile count.|
|Reporting types||Reports on request|
|Supplier type||Reseller providing extra features and support|
|Organisation whose services are being resold||Microsoft Azure Hosted Services|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Baseline Personnel Security Standard (BPSS)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider|
|Protecting data at rest||Physical access control, complying with another standard|
|Data sanitisation process||Yes|
|Data sanitisation type||Deleted data can’t be directly accessed|
|Equipment disposal approach||In-house destruction process|
Data importing and exporting
|Data export approach||There is no facility for users to export their data. This is a view only service. No new data is created.|
|Data export formats||Other|
|Data import formats||Other|
|Other data import formats||
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
For all Virtual Machines that have two or more instances deployed in the same Availability Set, Microsoft Azure guarantee you will have Virtual Machine Connectivity to at least one instance at least 99.95% of the time.
For any Single Instance Virtual Machine using premium storage for all Operating System Disks and Data Disks, Microsoft Azure guarantee you will have Virtual Machine Connectivity of at least 99.9%.
If these Microsoft service levels are not met by Microsoft, Cadcorp will aim to pass on any refunds that we receive from Microsoft to the customer.
|Approach to resilience||
Two important aspects of resiliency are high availability and disaster recovery.
High availability is underpinned by the Microsoft Azure Guaranteed Availability SLA referenced in the previous question.
Disaster recovery is the ability to recover from rare but major incidents. This service provides options for geo redundancy including backup and load balancing.
|Outage reporting||Microsoft Azure provides a public notice page and email alerts can be set up to notify the application administrator of service outage.|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||Windows security on the server and Windows forms for the application administration.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||No audit information available|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||Less than 1 month|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||Lloyd's Register Quality Assurance Ltd|
|ISO/IEC 27001 accreditation date||19/10/2016|
|What the ISO/IEC 27001 doesn’t cover||
The scope of the approval is design, development, installation and distribution of software for Geographic Information Systems. Associated
project management, application development, customer training and consultancy services. Management of information security in relation to IT infrastructure and data in support of all company activities.
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||Cyber Essentials|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||
Cadcorp information security policies and processes have achieved certification to ISO 27001. It is the Policy of the company to ensure that:
Information will be protected against unauthorised access.
Confidentiality of information will be assured and valuable or sensitive information protected from unauthorised disclosure or intelligible interruption.
Integrity of information will be maintained to safeguard the accuracy and completeness of information by protecting against unauthorised modification.
Regulatory and legislative requirements will be met.
Business Continuity plans will be produced, maintained and tested, this will ensure that information and vital services are available to users when they need them.
Information security training will be available to all staff.
All breaches of information security, actual or suspected, will be reported to, and investigated by the Information Security Manager.
The Information Security Manager has direct responsibility for maintaining the Policy and providing advice and guidance on its implementation.
All managers are directly responsible for implementing the Policy within their business areas, and for adherence by their staff.
It is the responsibility of each employee to adhere to the Policy.
|Configuration and change management standard||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Configuration and change management approach||
The Cadcorp Quality Management System in compliance with ISO 9001 fully describes the Cadcorp configuration and change management processes.
All components of the service are tracked through their lifetime. For example software components are part of a formal software release cycle and are tracked through their lifetime using version control. Similarly changes and configurations to a service implementation are tracked within the Cadcorp customer support database using a unique reference ID.
Changes are assessed for potential security impacts inline with Cadcorp ISO 27001 Security Manual and security forms part of the Cadcorp software quality assurance testing.
|Vulnerability management type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Vulnerability management approach||
The Cadcorp vulnerability management process requires anti virus software to be installed on all servers. This software provides the server administrator Status and Detection reports to allow Cadcorp to assess potential threats.
Patches will be deployed inline with the time periods described within the Cadcorp SLA.
Information about potential threats comes from a wide range of stakeholders including the antivirus Status and Detection reports.
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||
The anti virus software installed on all servers allows Cadcorp to identify potential compromises. This software provides the server administrator Status and Detection reports that detail potential compromises. In house and external penetration testing is also used to identify potential compromises.
When a potential compromise is identified it will be classified inline with the Cadcorp SLA response categories.
Depending on the category Cadcorp will use our reasonable endeavors to respond within 4 to 8 working hours.
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||All incidents should be reported to the Cadcorp support desk. The customer will receive a report ID number to use for subsequent enquires. If the incident is related to a common event the support desk will invoke a pre-defined process. Incident reports can be provided on request.|
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Public sector networks
|Connection to public sector networks||Yes|
|Connected networks||Public Services Network (PSN)|
|Price||£2000 per instance per year|
|Discount for educational organisations||No|
|Free trial available||Yes|
|Description of free trial||Cadcorp can provide access to the Open Data Map Service for a 30 day trial period. Subject to usage restrictions.|
|Pricing document||View uploaded document|
|Service definition document||View uploaded document|
|Terms and conditions document||View uploaded document|