PODFather electronic Proof of Delivery (ePOD)
PODFather provide a modular scheduling and mobile job management system for logistics, waste management and field service operations of all sizes. Features include job booking/API upload, scheduling and optimisation, vehicle checks, electronic proof of delivery/job completion, driver GPS tracking, accounts system integration, and much more.
- secure cloud-based backoffice
- backoffice integrates with existing job-booking systems
- secure Android/iOS/PDA app for drivers / field service staff
- drivers capture signatures, photos, text, GPS location
- drivers send real-time status updates - eg "started lone worker"
- FORS/CLOCS driver vehicle safety inspections
- driver app can operate off-line with no mobile coverage
- backoffice tracking, route-planning and ETA calculation
- "driver on the way" email or SMS to end customer
- remove paper-based processes and associated admin cost
- remove re-keying errors
- real-time information to logistics planning teams
- improve flow of information through your organisation
- provide even better service to your customers through better information
- cut carbon and fuel cost through better vehicle routing
- cut cost of FORS/CLOCS vehicle safety compliance checking
£60 to £100 per user per month
- Pricing document
- Skills Framework for the Information Age rate card
- Service definition document
- Terms and conditions
0131 553 0400
|Software add-on or extension||Yes, but can also be used as a standalone service|
|What software services is the service an extension to||Your existing ordering or accounts system - API access to PODFather|
|Cloud deployment model||Hybrid cloud|
|Service constraints||No constraints.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||Response within 4 business hours before escalation to management|
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
|Support levels||Business hours email and phone support to helpdesk, with 4-business-hour response and automatic escalation to technical account manager|
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||PODFather provides onsite training, shared-desktop sessions and video conferencing via Google hangouts for offsite training, and laminated training sheets for field staff.|
|End-of-contract data extraction||The Report module in the secure web portal provides options for downloading all data. Data can also be exported via our REST API.|
|End-of-contract process||Included: downloading all data that has been input into the service.|
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||
The desktop service is for planning staff to use to schedule jobs.
The mobile service is for drivers/field staff to complete job information and confirm ePOD.
|What users can and can't do using the API||
PODFather API provides SOAP-XML access to create and update jobs for field staff to complete.
API provides access to GPS tracking data, to completed job sheets (POD's), to photographs and to any captured signatures.
|API documentation formats||HTML|
|API sandbox or test environment||Yes|
|Description of customisation||
As part of the setup discussion, the service, job sheets and workflows will be customised to the buyers specification.
Users themselves can customise colour scheme and logo of web portal.
|Independence of resources||Real-time monitoring reacts to current load levels and auto-scale as appropriate.|
|Service usage metrics||Yes|
|Metrics types||Pingdom.com measures the availability of our services real-time, and can be viewed at podfather.com/service-levels|
|Reporting types||Real-time dashboards|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||None|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||
Backoffice Users view/download the data on the dashboard and reporting screens within the secure web portal.
CSV dumps are available from the Reports module.
API access gives XML and JSON data.
sftp and https access to upload.thepodfather.com gives formatted text and PDF output as required.
|Data export formats||
|Other data export formats||
|Data import formats||
|Other data import formats||
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||
Availability and resilience
99.9% minimum availability as measured over a monthly period, but generally better than 99.99% availability.
Service credits are provided for instances of availability below 99.9% per month. These take the form of development credits, provided at a rate of 1 hour of development credit for every 1% below the minimum availability per month. These can be spent on feature development or user training within a 6 month period.
|Approach to resilience||White paper available upon request. Real-time secure automated database replication. Multiple master servers.|
Twitter @thepodfathercom and blog at thepodfatherstatus.blogspot.co.uk
Live availability of services also displayed at www.podfather.com/service-levels
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||Role-base Access Control is defined at the top level of the secure web portal|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users have access to real-time audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||Yes|
|CSA STAR accreditation date||12/2013|
|CSA STAR certification level||Level 1: CSA STAR Self-Assessment|
|What the CSA STAR doesn’t cover||None|
|Other security certifications||Yes|
|Any other security certifications||Cyber Essentials|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||
Currently implementing ISO27001.
|Information security policies and processes||
Currently implementing ISO27001.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||Changes are testing development environment, QA'd by senior developers, tested in testing environment, then deployed to live. CTO has responsibility for assessing potential security impact.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
PODFather subscribes to several appropriate vulnerability mailing lists and newsgroups.
Server OS's are patched within the timescales recommended by suppliers.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
PODFather runs secure, locked-down servers, with automated compromise-testing tools as developed in-house.
PODFather responds immediately to potential compromise with staff on-call as appropriate.
|Incident management type||Supplier-defined controls|
|Incident management approach||
Users report incidents via phone or email.
Incident reports provided via twitter @thepodfather.com and technical blog at thepodfatherstatus.blogspot.co.uk
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£60 to £100 per user per month|
|Discount for educational organisations||No|
|Free trial available||No|