Thrive CSR Limited

Employee Volunteering Management & Fundraising Software

Software for promoting, tracking and reporting Employee Volunteering opportunities & Employee Charity Fundraising activity.

Our software tool provides 'end-to-end' management of the Employee Volunteering and Fundraising activities: from promoting opportunities; through to enabling volunteer sign-up; automatic tracking and verification; gathering feedback and reporting.


  • Portal for uploading and promoting opportunities to employees
  • Employees can search for opportunities and self-register
  • Automatic matching skills volunteer skills with available opportunities
  • Tracking of participation & verification of fundraising
  • Dashboards for admins to set-up, review and manage activities
  • Handling of volunteer requests/suggestions from staff or charities
  • Automatic collection of feedback from volunteers and charities
  • Ability to view and share all feedback
  • Reports on all your activity in real-time & CSV exports
  • Integration with single sign on


  • 50% reduction in admin compared to using spreadsheets and emails
  • Boost participation and achieve faster sign-up rates
  • Collect feedback and images with no time input from admins
  • Better understand your community impact and continually improve your programme
  • Easily share feedback, stories and stats to promote your programme
  • Charity partners can easily submit or upload volunteering suggestions/requests
  • All volunteering & fundraising data available in real-time
  • Boost employee engagement & organisational reputation


£5000 to £25000 per unit per year

  • Education pricing available

Service documents


G-Cloud 11

Service ID

5 4 9 3 5 1 1 2 3 3 1 0 5 3 9


Thrive CSR Limited

Neil Macdonald


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints None
System requirements
  • Access to internet
  • Modern internet browser

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Contractually within 1 business day. On average in the last rolling year the average response time has been less than 2 hours.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Yes, at an extra cost
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard WCAG 2.1 AA or EN 301 549
Web chat accessibility testing No direct testing but we use off the shelf products for web chat that already have appropriate accessibility certifications.
Onsite support Yes, at extra cost
Support levels We provide standard support levels of all our customers, with the ability to vary these for special projects.

Our standard support is via our own UK based helpdesk who can assist with both technical and product based questions/problems. This helpdesk is available to all administrators of our system.

We also provide access to an account manager.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We work with the client to scope out exactly how our platform will be configured to their needs, have it set up and then provide onsite training and documentation as appropriate to ensure a smooth roll out.
Service documentation Yes
Documentation formats
  • ODF
  • PDF
End-of-contract data extraction We help the client extract their data in a suitable CSV format.
End-of-contract process We help the client extract their data and then securely delete their data. These two actions are included in our costs.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service All parts of the system are accessible on both mobile and desktop. All public/staff facing parts of Thrive CSR have an additional level of mobile optimisation.
Service interface Yes
Description of service interface A full web interface
Accessibility standards WCAG 2.1 A
Accessibility testing We have clients who have staff using a variety of assistive technologies.
Customisation available Yes
Description of customisation Before the service is deployed we run a full scoping exercise with the client in order to understand what customisations, or configuration changes may be required. Almost anything in the platform can be customised to ensure it suits client needs.

Available configurations will carry no additional charges but any substantial bespoke customisation work will carry additional charges which will be outlined to the client in a proposal document.

Many ongoing core platform upgrades and expansions made by Thrive CSR are made available free of charge to existing clients. Any additional substantial bespoke customisations requested during the contract term will be chargeable.


Independence of resources We have a scalable cloud based architecture and we upgrade capacity far in advance of maximum user utilization being reached.


Service usage metrics Yes
Metrics types Number of users of the system and the common actions they take. Our system allows full tracking of the public/staff facing and admin parts of the platform to deeply understand and audit how the product is being used.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach From within the administration interface.
Data export formats
  • CSV
  • Other
Other data export formats XLS
Data import formats
  • CSV
  • Other
Other data import formats XLS

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability We have a 99.9% uptime SLA. Users are refunded 50% of their fee in the last month if we fall below 99%, and 100% if we fall below 96%.
Approach to resilience For security reasons this information is available on request - however as a guide, the resilient design of our architecture means we have never yet dropped below 99.9% uptime availability.
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels Access to management interfaces and support channels are restricted by both technical and procedural enforced security, including infrastructure restrictions and privileged access management software.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach We make ultimate security governance and compliance a board level responsibility yet at the same time we identify individual staff, at all levels, who are responsible for making security decisions and empower them to do so.

We look to clearly link our security activities to Thrive CSR's goals and priorities.

We have a corporate culture that ensures accountability for related decisions.

We work to ensure that feedback is provided to decision-makers on the impact of their choices.

We continously monitor our approach to make sure its fits our wider organisational approach to governance.
Information security policies and processes Thrive follows current industry best practices with numerous technical and procedural security policies. As an option, we can provide a Service Manager, as a single point of contact for ensuring service quality, for service level reporting, for keeping the client up-to-date on new releases/upgrades etc.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Thrive tracks all key assets through their life cycle via a central register and when any key asset is changed, removed, or introduced Thrive has an established risk analysis process, which includes a security analysis of any key changes. Significant changes to Thrive's risk profile require director level sign off.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Thrive performs automated and manual quality assurance and security testing on every major release.

Vulnerabilities and potential threat intelligence is sourced from external news sources and relationships with key industry advisors.

Issues and vulnerabilities are tracked in Thrive task management system and addressed per priority.
Protective monitoring type Supplier-defined controls
Protective monitoring approach We have a detailed intrusion detection and monitoring system with 24/7 alerting in place.

We have an established incident response plan that involves employees at all levels of the organisation, including director level. At the heart of this is open and clear communication with our clients about verified incidents and resolutions.
Incident management type Supplier-defined controls
Incident management approach The process starts by educating staff how to report a breach or deal with a report from the outside. Once our incident response process is triggered by a breach report a designated team of senior management is convened who directly oversee the investigation and remediation of the breach. This includes alerting users (via phone or email as contractually defined) and government entities as appropriate. After this we have a structured postmortum and process improvement process.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £5000 to £25000 per unit per year
Discount for educational organisations Yes
Free trial available No

Service documents

Return to top ↑