Advanced Business Solutions

Staffplan SaaS Portfolio

Staffplan is designed as a complete care management software, serving all functions of a modern care service - from initial referral through to scheduling, timesheet processing, invoicing, gross payroll and reporting. The optional modules (Landline Monitoring/Electronic Call Monitoring, Business Intelligence Reporting) also help automate the running of care businesses.


  • Standard Microsoft Windows convention compliant (consistent and intuitive user interface).
  • Supports 3rd party integration via XML.
  • Self-Service Reporting + Exports.
  • Mobile point of care solution for online/offline task capture.
  • Database views live and dynamic (wallcharts interlinked and instantly update).
  • ‘Multiple Document Interface’, allowing multiple forms to remain open simultaneously.
  • Extensive service user and care worker records.
  • Supports ‘drag and drop’ visits between care workers/different times.
  • Integrated SMS Text, email and roster optimisation modules.
  • Integrates with electronic monitoring, third party systems (commissioning, finance, payroll).


  • Match service user requirements with suitable care worker resources, skills.
  • Manage rapidly changing service requirements efficiently.
  • Mobile solution provides real time view of staff activity.
  • Optimise rosters for one, and multiple care workers.
  • Manage available resource, flagging in advance where deficiencies could arise.
  • Manage training requirements, health and safety, QA reviews.
  • Offer visits to care workers via integrated SMS Text service.
  • Integrated mobile solution streamlines paperless business process.
  • Highly configurable alarms to meet business and commissioner rules.
  • Easily manage multiple service offerings for public and private customers.


£90 a user a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

5 3 8 7 0 2 2 1 1 2 8 5 3 5 5


Advanced Business Solutions Bid Support
Telephone: 0330 343 8000

Service scope

Software add-on or extension
Cloud deployment model
Private cloud
Service constraints
System requirements
  • Citrix Client
  • Internet Access

User support

Email or online ticketing support
Email or online ticketing
Support response times
For all priorities clients should expect to receive confirmation that an Incident has been raised via email within one hour. Clients may also receive additional information or be contacted by a Support Professional within this hour, depending on the priority of the incident raised.
User can manage status and priority of support tickets
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
Advanced will provide a multi-tiered telephone based Service Desk, supporting our services in-line with the Clients Terms and Conditions.
Our Service Management processes are based on the ITILv3 framework and ISO 20000 standard for IT Service Management.
Advanced have multiple support offerings based customers' requirements ranging from our standard offering of normal business hours to our premium service which is available 24/7 365 days per year via the following means:
• Telephone
• Email
• Customer Portal
All support will be provided by remote access in-line with the clients own security policies. Onsite support can be provided subject to contract and may incur additional cost.
As part of Advanced’s continual improvement plan, periodic service reviews will be scheduled with the client to review the ongoing support services; to include the support model and agree any relevant changes.
Support or Service Levels are agreed with the customer at the Service Design phase to ensure that we're able to provide a service that meets their business requirements. Our standard offering for application support consists of the following target response times.
Priority 1 - 1 Hour
Priority 2 - 4 hours
Priority 3 - 8 hours
Priority 4 - 24 hour
Support available to third parties

Onboarding and offboarding

Getting started
A full consultative approach is taken and appropriate consultancy and training is given in line with the go live. Ultimately Advanced understand that every customer is different and will tailor the methodology around the needs of each individual customer/council.
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Written into any contract is an exit clause. We are able to run through a number of options with the customers and provide a tailored archiving solution that suits their needs.
End-of-contract process
A contract extension will be offered to continue using the software, if this is not signed an ‘out of contract’ service will continue (without explicit cancellation from the customer) which will be charged at an unfixed rate.

When a contract ends explicitly, Advanced charge for the Exit Process because customer generated content is to be returned to the customer, or to an alternative supplier at the customer’s request and/or listed and/or certified as destroyed upon termination.

Advanced charges for these services on a time and materials basis, at rates that are in accordance with the SFIA Rates Card for Staffplan SaaS portfolio.

Using the service

Web browser interface
Application to install
Compatible operating systems
Designed for use on mobile devices
Differences between the mobile and desktop service
Dedicated mobile solution available for point of care usage
Service interface
What users can and can't do using the API
Our API allows integration with 3rd party systems to allow a master system to feed data into our application for read only usage, reducing data duplication and transcription errors. Allows for integration with 3rd party HR, CRM or social services. Our API does not allow full access to the system but is extensible allowing for additional data and functionalities as required.
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
Customers can customise the service in a number of ways:
- Terminology can be customised, providing their own translations and business terms.
- Customers can add additional fields to the UI to capture additional business information.
- Customised exports and reports can be designed to extract information as required. More complex customisation can be performed by the supplier on request i.e. reports, invoices, functionality.
- Customers can customise security of any field/form/button at read, write or view at user or group level.
- Customisation of mobile solution business rules and processes.
- Customisation of charge and pay rates for individual services or contracts.


Independence of resources
We run resource management profiles ensuring no single user can adversely impact another user. Due to active/active deployment, individual servers are only loaded to 50% under normal usage.


Service usage metrics
Metrics types
We can provide statistics around data size, usage, audit and login audit.
Reporting types
Reports on request


Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Microsoft- Bing Maps

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
There are a number of built in exports for 3rd party finance systems. These can be run by end users with sufficient privileges. Additional exports can be developed in app by the customer or via the supplier as required. Extracts for ETL reporting/BI performed from a dedicated reporting database. Datasets also available through CSV/ XML exports.
Data export formats
  • CSV
  • Other
Other data export formats
Data import formats
  • CSV
  • Other
Other data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
Other protection within supplier network
Robust backup policy with regular restore tests. Physical security restricts access to hardware and disks.

Availability and resilience

Guaranteed availability
We undertake to provide a minimum of 99.95% availability.  Although we do not always need it, we do set a contractual maintenance window of 4 hours per month, set in the small hours of a night. There are many users already on the infrastructure and we have proven to deliver at this level to them. The Managed Services environment has been purpose built between two active/active data centres for High Availability and resiliency to failure.
Approach to resilience
"Data is synchronously replicated between the two centres using Microsoft and web technologies including Hyper-V Server virtualisation and SQL Availability Groups. With the technology enabling a real time replica to be created at an alternate location, it provides operational continuity in the unlikely event of a partial or complete failure of either centre.
Communication lines between the data centres, N3 and the Internet are resilient, with diverse points of presence, and have the ability to link to other data centres within the Advanced Group.
Data is then in turn backed-up using Dell DR4100 Disk Backup Appliances, de-duped and then replicated in the alternate data centre. A full weekly backup is taken and a daily differential backup, each one being automatically verified with any inconsistencies automatically and immediately flagged to our team of database administrators.
A combination of the data centres’ significant infrastructures and our active/active operating model therefore delivers a flexible, robust and proven approach to disaster avoidance and resilience and provides a high degree of business continuity
Outage reporting
In Line with our High Severity Support Incident Process, should the service become unavailable the customer will receive both a verbal and written notification of the outage. A verbal update schedule will be agreed with the customer who will also receive written updates for the duration of the outage. The written update will include details of any progress made and the time of the next update. Following the outage a root cause analysis (RCS) report can then be made available to the customer on request. A copy if our HSSI process, Email notification and RCA report template can also be made available on request

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
StaffPlan uses role based access to gain access to various modules of the system.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
All of Advanced's operations on GCloud are within scope of the certificate.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Information Governance Statement of Compliance (IGSoC) V14, L3, 100%

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
IGSoC Version 14
Information security policies and processes
Advanced have implemented IS policies to cover Data Security, Information Security Systems, Acceptable Use, Data Protection, Patient Data, Mobile Working, Access Control and Monitoring. These are all outlined in our InfoSec Manual and supported by in-depth Policy statements. Key processes have been developed and implemented which include, but are not limited to, Secure transfer of data, access provisioning and incident reporting.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
The configuration and change management process ensures operational systems, services and application software are subject to change control. All staff are responsible for submitting completed change requests to the change authorisation board (CAB) using the change request form. Change requests forms, before submission to the CAB must be peer reviewed and pre-authorised by the appropriate system service owners and or business stake holder. All changes are recorded, tested and verified prior to implementation, (where possible), and are communicated to relevant members of staff and users as appropriate.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Vulnerability management is an essential component of Advanced Information Security Program and the process of vulnerability assessment is vital to effective vulnerability management. The vulnerability assessment process provides visibility into the vulnerability of critical assets deployed in the IT Infrastructure. The process comprises of identifying critical systems, their corresponding owners, vulnerability scanning on regular basis, determining and assessing potential vulnerabilities, documenting and establishing a time line to remediate critical vulnerabilities.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Advanced complies with protective monitoring in line with GPG 13.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Incident management control objectives are defined within our ISO 27001:2013 certified Information Security Management System and the procedures for Incident management are aligned to ITIL v3 industry best practice.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£90 a user a month
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.