Insight

eSAFETY (Genohsis)

Health & Safety Management software to assist organisations manage Incident/Accident/Event/Near Miss reporting.RIDDOR reporting.Investigations of Incidents/Accidents/Events/Near Misses. Action raising, allocating and tracking to completion. Mange Audit and Inspections, on a schedhiled or ad hoc basis including the raising of corrective and preventive actions which can be allocated and tracked to completion.

Features

  • Online Health & Safety management solution
  • Online forms to complete on laptop, desktop & mobile
  • GDPR features to support record retention, SARs, processing restrictions etc
  • Reports securely delivered within online portal
  • RIDDOR reporting
  • Automated letters, emails and reports
  • Realtime reports & dashboards
  • configurable by WICS and client
  • All data reportable & ability to create own reports simply
  • Inbuilt document module

Benefits

  • Access anywhere with web connectivity, mobile working, business continuity
  • Accessible reduces reliance on paper available 24/7
  • Demonstrate compliance with GDPR & HSE RIDDOR reporting etc.
  • Securely delivered sensitive information 24/7 on self serve basis
  • treamlined process to report RIDDORs without leaving the application
  • Reduces administration & streamlines processes in consistant manner
  • Evidence compliance, status of activity & visibility of risk
  • Manage costs,ensure system reflects change in process,requiremnts etc.
  • owerful MI, track, trend, manage costs, react quickly
  • Keep all documents relating to health & safety within application

Pricing

£1470 per unit

Service documents

Framework

G-Cloud 11

Service ID

5 3 7 6 6 7 9 1 1 1 5 5 8 3 0

Contact

Insight

Guy Beaudin

+44 (0)844 692 8639

insightcloud@uk.insight.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints No
System requirements
  • Internet access
  • Main application (used by the core Health & Safety team)
  • IE versions 8, 9, 10 and 11
  • Portal used to report and investigate incidents, assign&complete actions,
  • View&review risk assessments, carry out audits&inspections is cross browser
  • (no reliance on IE)

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Our SLAs state between 1 - 4 hours depending upon severity however we aim to respond to all questions immediately they enter the support department
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Onsite support
Support levels Unlimited phone, email, Zendesk support Monday - Friday 08:30 - 17:30 for issues and 'how to' type queries+ 20 hours of report writing time. Dedicated Account Manager
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Training is delivered as part of the implementation project, training documentation is supplied and accessible at any time
Service documentation Yes
Documentation formats
  • PDF
  • Other
Other documentation formats MS Word & Videos
End-of-contract data extraction Data can be provided to our clients at the end of their contract
End-of-contract process Data provided in format required, system decommissioned

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • MacOS
  • Windows
  • Windows Phone
  • Other
Designed for use on mobile devices Yes
Differences between the mobile and desktop service N/A
Service interface No
API Yes
What users can and can't do using the API Interfaces to upload Personnel and Demographic data.  Data can also be extracted for use in external systems in CSV or XML format.
API documentation Yes
API documentation formats
  • PDF
  • Other
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Field names can be changed, new forms can be created, existing forms changed, triggers and actions can be set i.e. automated emails. Automated Letter templates can be created and amended, new processes created etc.

Scaling

Scaling
Independence of resources The support and project departments have the largeset teams of any at WICS. IBM Cloud easily scalable.

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Reseller providing extra support
Organisation whose services are being resold ESAFETY

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach By using advanced searches/queries
Data export formats Other
Other data export formats Data can be exported by users in Excel,PD XML&XPS
Data import formats
  • CSV
  • Other
Other data import formats Excel

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability The availability of the application is monitored from a remote location to ensure the system is available over the Internet. We strive for 99.5% uptime and regularly achieve 100% uptime during the month.
Approach to resilience "eSAFETY is deployed using Microsoft Internet Information Services (IIS) and utilises Microsoft SQL Server for data storage. The application is accessed using a JavaScript enabled web browse and has a zero client footprint. Remote monitoring tools are used to monitor capacity:
• The Corporate and hosted infrastructures are monitored with PRTG & Spiceworks
• WAN links are monitored with PRTG
• Bandwidth is monitored by PRTG.
Thresholds have been set up and automated alerts are in place. The dashboard alerts page in the IT Helpdesk is also checked daily for warnings and any problems are recorded on the IT Help Desk.
Planning is a management function and capacity requirements are established prior to the introduction of any systems, taking into consideration requirements for future growth etc.
Testing and Development facilities are made available for the sole purpose of providing an isolated environment in which new application roll out, upgrades or modifications (changes) can be evaluated prior to implementation.
Warwick International test and development environments are physically and logically separated from the production systems.
Warwick International data, software and system images are backed up regularly, using schedules designed to provide minimum loss information to Warwick International & it’s hosted customers.
Outage reporting All services are monitored for uptime by WICS IT Team.  They will be notified as soon as there is any outage and remedial action taken as soon as possible.  Customers will be notified by WICS Support Desk if they are affected by any outage.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
  • Other
Other user authentication "Since the eSAFETY application is hosted within IIS, authentication to the application can make use of all the security elements IIS provides, i.e.: IP and Domain Filtering, file and folder permissions etc.
eSAFETY supports any authentication method that provides access to a domain and username. Typically, this is Windows Integrated Authentication for on-premise and Basic Authentication for Hosted deployments .
As previously mentioned, only the Genohsis_Start.aspx page is secured, with all other resources being granted anonymous access. Internal control measures prevent dynamic resources being accessible if not logged in.
Access restrictions in management interfaces and support channels Since the eSAFETY application is hosted within IIS, authentication to the application can make use of all the security elements IIS provides, i.e.: IP and Domain Filtering, file and folder permissions etc.
eSAFETY supports any authentication method that provides access to a domain and username. Typically, this is Windows Integrated Authentication for on-premise and Basic Authentication for Hosted deployments .
As previously mentioned, only the Genohsis_Start.aspx page is secured, with all other resources being granted anonymous access. Internal control measures prevent dynamic resources being accessible if not logged in.
Access restriction testing frequency At least every 6 months
Management access authentication 2-factor authentication

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 BSI
ISO/IEC 27001 accreditation date 23/08/2016
What the ISO/IEC 27001 doesn’t cover N/A Certification covers - All activities performed by Warwick International Computing Systems staff in relation to the delivery of management of internal and hosted IT systems, whether physical or cloud basedand the provision of Occupational Health and Health and Safety Management Software Solutions
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials Plus

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Warwick International is committed to ensuring the fulfilment of customer needs and continuity of its business in the face of security breaches and unwanted events and has implemented an Information Security Management System (ISMS). This ISMS is compliant with ISO/IEC 27001 the international standard for information security.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach "·       Systems will have antivirus deployed as per the Hosted Servers Policy / Internal Systems Policy. • Systems will be patched in accordance with the Internal Systems Policy / Hosted Servers Policy• Penetration testing will be performed by an agreed third party as part of the application development process (Development Procedures) or as the need arises as part of application or infrastructure improvement.Warwick International maintains an ongoing risk analysis of its information security assets in order to assess:
Vulnerability management type Supplier-defined controls
Vulnerability management approach "·       Systems will have antivirus deployed as per the Hosted Servers Policy / Internal Systems Policy. • Systems will be patched in accordance with the Internal Systems Policy / Hosted Servers Policy• Penetration testing will be performed by an agreed third party as part of the application development process (Development Procedures) or as the need arises as part of application or infrastructure improvement.Warwick International maintains an ongoing risk analysis of its information security assets in order to assess:
Protective monitoring type Supplier-defined controls
Protective monitoring approach "Remote monitoring tools are used to monitor capacityThe Corporate and hosted infrastructures are monitored with PRTG & SpiceworksWAN links are monitored with PRTG Bandwidth is monitored by PRTGAll Warwick International event logs are protected and shall be maintained until the laptop or server’s event log repository exceeds 10MB. Following this, the oldest logs will be overwritten, as per Internal Systems Policy.
For hosted environment additional log files are retained for the purposes of tracing activity on a customer’s system as per the Hosted Server Policies and Procedures.The software installed on the Cloud Systems are entered into WICS asset management system.
Incident management type Supplier-defined controls
Incident management approach "At the point an Information Security Incident occurs the employee should notify the Information Security Forum of this at the earliest possible opportunity. For this purpose, a form named ‘Information Security Incident’ form has been created on the company’s internal, Information Security SharePoint Site. This form should be used as the primary method for an employee to report all Information Security Incidents. Upon completion of the form, this facility will immediately alert the Information Security Forum by email when an incident has taken place.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £1470 per unit
Discount for educational organisations No
Free trial available No

Service documents

Return to top ↑