Insight

eSAFETY (Genohsis)

Health & Safety Management software to assist organisations manage Incident/Accident/Event/Near Miss reporting.RIDDOR reporting.Investigations of Incidents/Accidents/Events/Near Misses. Action raising, allocating and tracking to completion. Mange Audit and Inspections, on a schedhiled or ad hoc basis including the raising of corrective and preventive actions which can be allocated and tracked to completion.

Features

  • Online Health & Safety management solution
  • Online forms to complete on laptop, desktop & mobile
  • GDPR features to support record retention, SARs, processing restrictions etc
  • Reports securely delivered within online portal
  • RIDDOR reporting
  • Automated letters, emails and reports
  • Realtime reports & dashboards
  • configurable by WICS and client
  • All data reportable & ability to create own reports simply
  • Inbuilt document module

Benefits

  • Access anywhere with web connectivity, mobile working, business continuity
  • Accessible reduces reliance on paper available 24/7
  • Demonstrate compliance with GDPR & HSE RIDDOR reporting etc.
  • Securely delivered sensitive information 24/7 on self serve basis
  • treamlined process to report RIDDORs without leaving the application
  • Reduces administration & streamlines processes in consistant manner
  • Evidence compliance, status of activity & visibility of risk
  • Manage costs,ensure system reflects change in process,requiremnts etc.
  • owerful MI, track, trend, manage costs, react quickly
  • Keep all documents relating to health & safety within application

Pricing

£1470 per unit

Service documents

Framework

G-Cloud 11

Service ID

5 3 7 6 6 7 9 1 1 1 5 5 8 3 0

Contact

Insight

Guy Beaudin

+44 (0)844 692 8639

insightcloud@uk.insight.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
No
System requirements
  • Internet access
  • Main application (used by the core Health & Safety team)
  • IE versions 8, 9, 10 and 11
  • Portal used to report and investigate incidents, assign&complete actions,
  • View&review risk assessments, carry out audits&inspections is cross browser
  • (no reliance on IE)

User support

Email or online ticketing support
Email or online ticketing
Support response times
Our SLAs state between 1 - 4 hours depending upon severity however we aim to respond to all questions immediately they enter the support department
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Onsite support
Support levels
Unlimited phone, email, Zendesk support Monday - Friday 08:30 - 17:30 for issues and 'how to' type queries+ 20 hours of report writing time. Dedicated Account Manager
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Training is delivered as part of the implementation project, training documentation is supplied and accessible at any time
Service documentation
Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
MS Word & Videos
End-of-contract data extraction
Data can be provided to our clients at the end of their contract
End-of-contract process
Data provided in format required, system decommissioned

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
  • Windows Phone
  • Other
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
N/A
Service interface
No
API
Yes
What users can and can't do using the API
Interfaces to upload Personnel and Demographic data.  Data can also be extracted for use in external systems in CSV or XML format.
API documentation
Yes
API documentation formats
  • PDF
  • Other
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Field names can be changed, new forms can be created, existing forms changed, triggers and actions can be set i.e. automated emails. Automated Letter templates can be created and amended, new processes created etc.

Scaling

Independence of resources
The support and project departments have the largeset teams of any at WICS. IBM Cloud easily scalable.

Analytics

Service usage metrics
No

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
ESAFETY

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
By using advanced searches/queries
Data export formats
Other
Other data export formats
Data can be exported by users in Excel,PD XML&XPS
Data import formats
  • CSV
  • Other
Other data import formats
Excel

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
The availability of the application is monitored from a remote location to ensure the system is available over the Internet. We strive for 99.5% uptime and regularly achieve 100% uptime during the month.
Approach to resilience
"eSAFETY is deployed using Microsoft Internet Information Services (IIS) and utilises Microsoft SQL Server for data storage. The application is accessed using a JavaScript enabled web browse and has a zero client footprint. Remote monitoring tools are used to monitor capacity:
• The Corporate and hosted infrastructures are monitored with PRTG & Spiceworks
• WAN links are monitored with PRTG
• Bandwidth is monitored by PRTG.
Thresholds have been set up and automated alerts are in place. The dashboard alerts page in the IT Helpdesk is also checked daily for warnings and any problems are recorded on the IT Help Desk.
Planning is a management function and capacity requirements are established prior to the introduction of any systems, taking into consideration requirements for future growth etc.
Testing and Development facilities are made available for the sole purpose of providing an isolated environment in which new application roll out, upgrades or modifications (changes) can be evaluated prior to implementation.
Warwick International test and development environments are physically and logically separated from the production systems.
Warwick International data, software and system images are backed up regularly, using schedules designed to provide minimum loss information to Warwick International & it’s hosted customers.
Outage reporting
All services are monitored for uptime by WICS IT Team.  They will be notified as soon as there is any outage and remedial action taken as soon as possible.  Customers will be notified by WICS Support Desk if they are affected by any outage.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
  • Other
Other user authentication
"Since the eSAFETY application is hosted within IIS, authentication to the application can make use of all the security elements IIS provides, i.e.: IP and Domain Filtering, file and folder permissions etc.
eSAFETY supports any authentication method that provides access to a domain and username. Typically, this is Windows Integrated Authentication for on-premise and Basic Authentication for Hosted deployments .
As previously mentioned, only the Genohsis_Start.aspx page is secured, with all other resources being granted anonymous access. Internal control measures prevent dynamic resources being accessible if not logged in.
Access restrictions in management interfaces and support channels
Since the eSAFETY application is hosted within IIS, authentication to the application can make use of all the security elements IIS provides, i.e.: IP and Domain Filtering, file and folder permissions etc.
eSAFETY supports any authentication method that provides access to a domain and username. Typically, this is Windows Integrated Authentication for on-premise and Basic Authentication for Hosted deployments .
As previously mentioned, only the Genohsis_Start.aspx page is secured, with all other resources being granted anonymous access. Internal control measures prevent dynamic resources being accessible if not logged in.
Access restriction testing frequency
At least every 6 months
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
23/08/2016
What the ISO/IEC 27001 doesn’t cover
N/A Certification covers - All activities performed by Warwick International Computing Systems staff in relation to the delivery of management of internal and hosted IT systems, whether physical or cloud basedand the provision of Occupational Health and Health and Safety Management Software Solutions
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
Cyber Essentials Plus

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Warwick International is committed to ensuring the fulfilment of customer needs and continuity of its business in the face of security breaches and unwanted events and has implemented an Information Security Management System (ISMS). This ISMS is compliant with ISO/IEC 27001 the international standard for information security.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
"·       Systems will have antivirus deployed as per the Hosted Servers Policy / Internal Systems Policy. • Systems will be patched in accordance with the Internal Systems Policy / Hosted Servers Policy• Penetration testing will be performed by an agreed third party as part of the application development process (Development Procedures) or as the need arises as part of application or infrastructure improvement.Warwick International maintains an ongoing risk analysis of its information security assets in order to assess:
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
"·       Systems will have antivirus deployed as per the Hosted Servers Policy / Internal Systems Policy. • Systems will be patched in accordance with the Internal Systems Policy / Hosted Servers Policy• Penetration testing will be performed by an agreed third party as part of the application development process (Development Procedures) or as the need arises as part of application or infrastructure improvement.Warwick International maintains an ongoing risk analysis of its information security assets in order to assess:
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
"Remote monitoring tools are used to monitor capacityThe Corporate and hosted infrastructures are monitored with PRTG & SpiceworksWAN links are monitored with PRTG Bandwidth is monitored by PRTGAll Warwick International event logs are protected and shall be maintained until the laptop or server’s event log repository exceeds 10MB. Following this, the oldest logs will be overwritten, as per Internal Systems Policy.
For hosted environment additional log files are retained for the purposes of tracing activity on a customer’s system as per the Hosted Server Policies and Procedures.The software installed on the Cloud Systems are entered into WICS asset management system.
Incident management type
Supplier-defined controls
Incident management approach
"At the point an Information Security Incident occurs the employee should notify the Information Security Forum of this at the earliest possible opportunity. For this purpose, a form named ‘Information Security Incident’ form has been created on the company’s internal, Information Security SharePoint Site. This form should be used as the primary method for an employee to report all Information Security Incidents. Upon completion of the form, this facility will immediately alert the Information Security Forum by email when an incident has taken place.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Pricing

Price
£1470 per unit
Discount for educational organisations
No
Free trial available
No

Service documents

Return to top ↑