MPS Management Process Systems Limited

CCM Contract Change Management

CCM is an intuitive, easy to implement system that supports operation of any form of contract including NEC3/4 (All Options) JCT, FIDIC and other bespoke Contracts.

Features

  • Simple, easy to use
  • 100% availability
  • Fast contract setup and configuration
  • Configuration flexibility
  • Wide range of optional features with no additional charges

Benefits

  • Little training required
  • Comprehensive support of all aspects of the contract
  • Users must follow procedures
  • Full audit trail of who did what, when

Pricing

£40.00 a user a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at christianhubbard@mpsprocess.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

5 0 5 3 5 5 8 5 8 7 9 8 9 7 4

Contact

MPS Management Process Systems Limited Christian Hubbard
Telephone: 01223597933
Email: christianhubbard@mpsprocess.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
None
System requirements
  • Browser for access
  • Valid user registration, user name and password

User support

Email or online ticketing support
Email or online ticketing
Support response times
Support available during business hours.
Most issues will be resolved within 24 hours.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
No
Support levels
Full support is provided for registered users as a part of the service.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Face-to-face or on-line training is provided.
Due to the system's ease of use, most people who know the form of contract well can use CCM with little or no formal training.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
An additional service called DAS (Data Access and Storage) is available at end of contract.
This converts all database documents into PDF format. Common Office attachments, Word, Excel, etc. are also converted. The PDF documents are then assembled into a single PDF for delivery using a USB memory stick.
URL links in the application are converted into PDF links.
The resulting conversion looks, feels and behaves exactly as the on-line application.
End-of-contract process
DAS PDF conversion of contract data is an extra cost service.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
The mobile version provides a simplified user interface to suit a phone screen.
It is is a read-mostly service with limited editing capabilities.
Service interface
No
API
Yes
What users can and can't do using the API
CCM is capable of communicating in real-time with other applications using protocols such as SOAP.
These interfaces are bespoke and devepoped in participation with our customer.
A prototype environment would be provided in all cases.
API documentation
No
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Trained administrators may configure CCM.
All administrative functions operate in exactly the same way as CCM itself, through a browser.
A wide range of optional facilities are available.
Appearance may be changed.
Bespoke communications or workflows can be set up.

Scaling

Independence of resources
The platform used is designed to handle hundreds of thousands of concurrent users on applications like e-mail. Operation of the CCM service by users never impacts other users as a result.
All reporting functions are run as background operations. These get lower priority automatically to assure that end user performance is never compromised.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
Never
Protecting data at rest
Other
Other data at rest protection approach
This is managed by our Data Centre provider IBM.
Data sanitisation process
No
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
The main mechanism used for data import and export is using Microsoft Excel. Other formats such as CSV, JSON or XML are also available if required.
Data export formats
  • CSV
  • Other
Other data export formats
  • XML
  • JSON
  • Excel
Data import formats
  • CSV
  • Other
Other data import formats
  • Microsoft Excel
  • XML

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
24 hours 7 days per week
Approach to resilience
Information is available upon request.
Outage reporting
The CCM environment if designed to provide exceptionally high availability.
Any server can be taken out of service at any time for maintenance purposes with no loss of user service.
I fa server needs to be taken out of service for a long period where there might be a rick of loss of service users will be notified via a Message of the Day in CCM. Any such action would only be planned for a weekend to minimise risk.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
CCM facilities are all role based.
Only trained administrators have access to management functions,
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
All of our services are robust
Information security policies and processes
We have a rigid security policy which can be reviewed on request.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Professional Configuration and Change Management procedures are followed.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
This is managed by our Data Centre provider IBM.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
This is managed by our Data Centre provider IBM.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Our incidents are rare and usually comprise of lost user name or password resets. Access to incident support is through our software where an incident can be raised and tracked.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Pricing

Price
£40.00 a user a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Free trials are arranged where beneficial. The scope and duration are agreed with the potential customer.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at christianhubbard@mpsprocess.com. Tell them what format you need. It will help if you say what assistive technology you use.