Riskex Ltd

AssessNET Risk Assessment Module

AssessNET's Risk Assessment Module will empower you to manage risk effectively, in real-time, giving you visibility across your organisation. Create standardised templates that can be shared and tailored as required by your users, identify hazards, control risks and prompt action.


  • Simple to use step-by-step process
  • Identify and control risks, with real-time reporting
  • Configurable templates, with Control Measures prompt
  • Private and one-off Risk Assessments
  • Integrated task management - Reviews, escalations and remedial actions
  • Custom API services
  • Federation services (single sign-on)
  • Riskex Health and Safety Consultancy and Training services available
  • UKAS Accredited ISO 27001, ISO 9001 and BS OHSAS 18001


  • Complete, view and manage Risk Assessments
  • Identify and control risks
  • Generate statistical analysis of recorded data
  • Produce graphical representations of recorded data
  • Automatic archiving
  • Automated action tracking and prompts
  • Instant reporting and search capabilities
  • Attach photographs and other associated documents
  • Free Upgrades


£3899 per instance per year

  • Education pricing available
  • Free trial available

Service documents


G-Cloud 11

Service ID

4 7 1 9 4 4 1 9 6 9 3 0 3 3 7


Riskex Ltd

Linda Kemp

+44 1908 915272


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints Not Applicable
System requirements
  • IE9 or above
  • Internet Connectivity

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Next business working day
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels We have a standard support level for all clients, regardless of business or contract size. A dedicated support team are on hand during normal business hours to answer and resolve any queries users may have.

Our service can be configured to restrict support requests to a clients dedicated support desk, if required.

All clients are allocated an account manager who is available to assist with any resolutions required.

Our service guarantees a 99.9% uptime per calendar month, allowing for scheduled maintenance to take place. All maintenance takes place outside of normal office hours, with appropriate notice given.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started All on-boarding clients are allocated an account manager and implementation manager who will ensure the smooth transition onto the service. An initial implementation meeting will be scheduled to ensure that our team understand your requirements.

Our team will work with you to capture the core data required by the system. A standard administrative training session will take place to educate the key stakeholders in the management of the service.

Training provision can be either onsite or online, or a combination of both. Our team will work with you to tailor training sessions to your requirements, covering train-the-trainer sessions; specific modules; or more general system overviews. As peoples diaries can be busy, we can re-run sessions to different teams, or for a small fee produce a dedicated training video based on your specific system configuration and content.

Fully featured manuals are available throughout the service for each module, and can be accessed at any time through the system interface.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction If clients require data extraction at the end of their contract, they may request this from their account manager or via the support desk. The team will extract all data from the service, including any uploaded document attachments and provide them to the client in an agreed format via an agreed delivery method. A fee of £3995+VAT is charged for data extraction.
End-of-contract process At the end of a contract access is automatically revoked from the system.

Clients may request their data, as previously described. All data is held in our systems for a maximum of 12 months following the termination of a contract, unless requested otherwise. This ensures that the data remains available (by request) whilst a replacement service is implemented.

After 12 months, any data or attachments are deleted from our databases.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service A suite of mobile apps are available for Android and iOS, offering offline capabilities that complement the service of the main online system. The apps allow users to take the features of the system, such as task management or auditing to areas where internet connectivity isn't available and still record the necessary details in a familiar interface.

Our online service is built to work on mobile devices through the devices browser; automatically configuring itself for the devices screen size. The full capabilities of the service are available through this method.
Service interface No
What users can and can't do using the API API's are available for the service to perform specific requirements, such as extracting task lists, or importing user details. access to API's are available upon request.

Typically, our dedicated UK based development team will write an API to meet specific client requirements where they are not meet by our existing library.
API documentation Yes
API documentation formats PDF
API sandbox or test environment No
Customisation available Yes
Description of customisation AssessNET has several hundred options that can be used to alter terminology, enable or disable functionality, or present content in different ways. A large number of these changes can be altered by clients through the system interface. Where this isn't possible, our support team are on hand to offer details about the customisable options available and configure them accordingly.

Clients can adjust menu, chart and other interface colours to assist with branding the service to their corporate image. This is in addition to being able to upload a company logo into the system and make it available on all printouts.

Details of all available customisable options will be discussed by an implementation manager during the on-boarding process.


Independence of resources Our services are load balanced across multiple servers to ensure resource levels are not impacted.


Service usage metrics Yes
Metrics types A number of service metrics are available from within the service itself, including, but not limited to:

login tracking
record counts
incident statistics
audit statistics
task statistics
Reporting types
  • Real-time dashboards
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency At least every 6 months
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Tools are available for core modules that allows the extract of data at scheduled intervals. Extracted data is held within a secure sFTP file store to be retrieved by the client as necessary. Our team control the passwords and access to sFTP file stores.

For larger, full system extracts, clients may request their data, to include uploaded files, via their account manager or our support team. A fee is applicable for data extraction requests.
Data export formats
  • CSV
  • Other
Other data export formats
  • Xlsx
  • Xls
  • Xml
  • Json
Data import formats
  • CSV
  • Other
Other data import formats
  • Xlsx
  • Xls
  • Xml
  • Json

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability AssessNET has a guaranteed availability of 99.9% per calendar month. Any scheduled maintenance, which may or may not cause downtime, is conducted outside of normal office hours in order to minimise disruption to users.

Our actual service uptime is approximately 99.98% per calendar month, including any scheduled maintenance periods.
Approach to resilience This information is available upon request.
Outage reporting Our service does not actively notify of outages. Any planned outages are reported through the inbuilt news feed with an appropriate notice period.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Username or password
  • Other
Other user authentication Identity Federation with clients internal ADFS service
Access restrictions in management interfaces and support channels Access is restricted throughout the system by granular user privileges.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 UKAS accredited by BSI
ISO/IEC 27001 accreditation date January 2014
What the ISO/IEC 27001 doesn’t cover Our full service is covered by our accreditation. There are no areas not covered.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes We have a suite of in-house policies and procedures which have been audited by BSI in accordance with our ISO27001:2013 accreditation.

Our polices and procedures restrict access to infrastructure and client data to key members of our team. Access is granted on a sliding scale, depending on the level of access required for a particular role.

All employees are aware of our security policies and refresher training takes place at least every 12 months. Our board of directors are responsible for ensuring polices are followed. Our systems have appropriate controls in place to assist them in ensuring they are followed correctly.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach All change requests are tracked throughout their lifecycle until they are incorporated into the main systems, where they are then tracked for support purposes.

All developments are tested against the OWASP top 10 and other controls to ensure potential security impacts are eliminated. Developments are tested across multiple browsers to ensure full compatibility.
Vulnerability management type Undisclosed
Vulnerability management approach Undisclosed
Protective monitoring type Undisclosed
Protective monitoring approach Undisclosed
Incident management type Undisclosed
Incident management approach Undisclosed

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No


Price £3899 per instance per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Please contact a member of our team.

Service documents

Return to top ↑