Target Information Systems Limited

Accord: Register of Contracts & Contract Manager

Accord is a Register of Supplier Expenditure Contracts & Contract Manager giving you One-Version-of-the-Truth and ensures Nothing-Gets-Missed.

Accord flags up when a contract is due for renewal together with all the contract’s details. Information about suppliers and contracts is shared amongst teams at the click of a button.

Features

  • Register of Supplier Expenditure Contracts
  • Day to Day Contract Manager with Individual Work Plans
  • Supplier Database with Supplier Login if required
  • Supplier/Vendor Management
  • Your complete organisational hierachy
  • All Procurement Projects with compliant OJEU Tracking
  • Digital Dash Boarding
  • Automated Reporting
  • Automated Work Flows, Alerts & Escalations
  • Contracts Information Management & Reporting in one place

Benefits

  • Significantly reduce supplier contract information management time
  • Through closer contract management Accord delivers savings
  • Collaborative working with stakeholders & suppliers
  • One Version of The Truth around your contracts
  • Nothing gets missed
  • Evidence for Regulatory Compliance
  • History of activites, projects and outcomes
  • Reduce hand-cranking of reports in spreadsheets
  • Digital Approval Process to save time and reduce paper
  • Gain control with centralised data with clearly defined access permissions

Pricing

£14750 per instance per year

  • Education pricing available

Service documents

G-Cloud 9

496288638708656

Target Information Systems Limited

Phil Atkinson

07702 248 948

psa@targetis.co.uk

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints Accord comes with Unlimited User Licences and 50GB of initial data footprint.
System requirements
  • Any modern browser
  • An internet connection

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Monday to Friday 9.00am to 17.30pm our response time is typically within one hour.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels All support matters are to be first raised to the support email: support@targetis.co.uk.

Target provides application support between the hours of 9.00am and 5.30pm Monday to Friday excluding Bank Holidays.

A support matter emailed to the support email can be followed up with a call in office hours to: 01226 212 056.

Support incidents are split into three priorities:

1 Priority One
This is where an application is unavailable and users are unable to access the system. This will be responded to in one hour in business hours and have a resource dedicated to the problem until it is resolved. Target will work 24/7 on this problem until it is resolved.

2 Priority Two
This is for intermittent, non-critical support matters where the application is available and an
error is occurring which does not affect normal usage of the system. Priority two matters will be responded to within four business hours, and typically resolved within 72 hours.

3 Priority Three
For minor matters such as layout issues, spelling mistakes in graphical text or minor amends; these will either be resolved within seven working days or scheduled for an agreed date/time.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Accord is delivered fit for purpose with the Mobilisation Fee. This includes all configuration, installation and onsite training.

Accord has a detailed user manual and Target offers free, on going training over GoToMeeting. Always get the best out of your Accord database.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Exports are available within the application. Documents uploaded are provided in a zip file which is securely transmitted to a preferred location.
End-of-contract process At the end of a contract with Accord Target is committed to making the step away as painless as possible. Target will provide exports from the database and prepare the files for hand over.

Where the data is going into a new database and there is a third party involved, there may be a fee for delivering the data in a preferred format.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10+
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service None. Accord is responsively designed to fit desktop, tablet or smartphone.
Accessibility standards None or don’t know
Description of accessibility Accord can be accessed using any modern browser connected to the internet.
Accessibility testing None to day. We would be happy to look at any requirements a customer may have.
API No
Customisation available Yes
Description of customisation Accord is a well established and utilised database.

Accord, within the project fee, offers the ability to manage all your information and produce all required reporting.

Customisation is carried out by engineers at Target to meet the information management and reporting needs a client has.

Where additional configuration is required this can be made available to users through the comprehensive user permissions capability of Accord.

Scaling

Scaling
Independence of resources Accord is hosted on enterprise standard infrastructure with high bandwidth availability

Analytics

Analytics
Service usage metrics Yes
Metrics types There are a number of existing usage reports. These can be configured on a per case basis.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process No
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach There are existing export tools.
Data export formats CSV
Data import formats Other
Other data import formats
  • There is no data uploading in a standard deployment
  • Data can be uploaded as required
  • There may be an additional fee to support data uploading

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Legacy SSL and TLS (under version 1.2)
Data protection within supplier network Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability Guaranteed 99.9% uptime. Currently (99.96% at 27/03/17)

Target has a hosting environment that sits in a PCIDSS compliant location with ISO27001 Accreditation in central Manchester.

The site is a leading server hosting provider with many built in power, back-up and internet connectivity continuity services.

The hosting environment is highly available and scalable to meet client’s requirements both in server footprint (hard disk space) and bandwidth (data transfer).
Approach to resilience Target has a hosting environment that sits in a PCIDSS compliant location with ISO27001 Accreditation in central Manchester.

The site is a leading server hosting provider with many built in power, back-up and internet connectivity continuity services.

The hosting environment is highly available and scalable to meet client’s requirements both in server footprint (hard disk space) and bandwidth (data transfer).
Outage reporting Planned outages are notified in advance.

Unplanned outages are communicated via email with a follow up phone call in office hours.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels All functions are protected by different access levels based on user groups and individual user permissionsn.

Support is open to all system users.
Access restriction testing frequency At least once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation No
Security governance approach We are a ISO9001 accredited software company working towards ISO27001.

Target has an Information Security Policy which is communicated to all staff and reviewed annually.
Information security policies and processes Target is working towards ISO27001. Target is in final stages of self accredited Cyber Essentials.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Target is a software company which provides Software as a Service products to public and private sector clients.

The hosting of these services and security surrounding the provision of the services is sitting in PCIDSS and ISO:27001 accredited systems.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Target is a software company which provides Software as a Service products to public and private sector clients.

The hosting of these services and security surrounding the provision of the services is sitting in PCIDSS and ISO:27001 accredited systems.

Vulnerabilities notifications come from our Hosting Partner and our Cyber Security Partners.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Target maintains a close watch on potential compromises from a variety or resources including our hosting partner.

We respond quickly to potential compromises, typically the same working day.

Other resources include dedicated websites such as https://www.ncsc.gov.uk/index/alerts-and-advisories. Target follows the latest vulnerability news and updates on the Internet.
Incident management type Supplier-defined controls
Incident management approach Incident Management for clients typically happens seemlessly in the background.

When a potential compromise is notified to us we act quickly to put in place remedial actions to ensure secure continuation of service.

Target is currently exploring a web-based customer notification service.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £14750 per instance per year
Discount for educational organisations Yes
Free trial available No

Documents

Documents
Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑