Placecube Ltd

Digital Place for Local Public Services

Your open digital platform for making and re-using local services, co-developed with Councils. Re-use 150+ pre-built cubes and create new services using the full development environment or low code tools within Liferay’s global leading open-source Digital Experience Platform. Digital Place is cloud-based and fully scalable to accelerate your digital transformation.


  • User research based, local authority information architecture and visual templates
  • Liferay Digital Experience Platform, combines developer and low-code features
  • Fully featured Web Content Management System with granular controls
  • Intelligent form builder solution with multipage and integration points
  • Integrated Workflow engine serving CRM, Case Management and Intranet functionality
  • Single Sign-On and Authentication options out of the box
  • Role-based access control allows for "contextual personalisation"
  • Fully responsive, mobile ready for any device
  • Built-in support for developing service integrations, plus optional open-source ESB
  • Headless API


  • Accelerate your digital journey with co-developed, reusable features
  • Established set of business processes to deliver local digital services
  • Improve accessibility to Local Authority services
  • Improve responsiveness from Local Authority services
  • Improve the cost effectiveness of delivering services digitally
  • End-to-end service and process improvement reduces cost
  • Adaptability and flexibility in managing or extending features
  • Scalable system to meet high levels of demand
  • Open standards and ease of integration removes legacy application constraints
  • Pre-built, co-developed, low-code functionality puts you in control


£100,000.00 an instance a year

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

5 5 9 2 1 6 2 0 2 0 4 4 8 6 5


Placecube Ltd Jenny Dias
Telephone: 020 8895 6756

Service scope

Software add-on or extension
Cloud deployment model
Private cloud
Service constraints
System requirements
Computer with a browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
Level Acknowledge Receipt (2)
1 08:00 –18:00 1 clock hour
2 08:00 –18:00 2 business hours
3 08:00 –18:00 2 business hours
4 08:00 –18:00 24 business hours
User can manage status and priority of support tickets
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
Support levels
Level 1 Support
Level 2 Support
Level 3 Support
Level 4 Support
Placecube provide a dedicated web-based support desk, available from 09.00-17.00, normal business days as standard. Telephone, on-site or 24/7 extended support service can be made available at extra cost. Our support team consists of highly skilled, experienced professionals, who can help troubleshoot any problems.
We also have an expert technical and content team who will optimise your Directory and build your in-house skills. Additional training beyond the standard described above is available at extra cost.
Support available to third parties

Onboarding and offboarding

Getting started
Implementation of Digital Place for Local Public Services will vary dependent on your objectives. We will work with you to understand the wider context of your implementation and together we will determine your specific Digital Place requirements. Your implementation will be overseen by a designated account manager, co-ordinated by a project lead and delivered by a technical lead. Other team members will participate, as required. Once the core implementation is complete, you will have access to our Support Desk. The Placecube implementation team will then work with you as needed through any other agreed implementation elements. The annotated sequence below describes the key stages in implementation, including those elements that are core (required for every implementation). Other requirements could be executed by you or Placecube (or a combination of both)
Introductory Call - Kick-Off Meeting - Implementation Planning - Implementation - Sign-Off. The Core Implementation is designed to be a 4 week cycle.
Comprehensive, bespoke training is a standard component of our implementations and it has been developed to support our clients’ in becoming self-sufficient.
Service documentation
Documentation formats
End-of-contract data extraction
In the event that you no longer wish to use the service, Placecube can provide an encrypted archive of all client-owned data stored within the platform.
End-of-contract process
Based on an agreed end-of-service date, we can provide a copy of the data as described above. We can hold the data for an agreed period, not exceeding one month (or as agreed with the client), and then delete all the data (unless we are legally required to retain it).

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Service interface
Description of service interface
Access through web browser over the internet
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
Third party testing, customer testing, internal testing
What users can and can't do using the API
Through the API, users can view, create, edit and delete any entity their user account has permissions to perform those actions on.
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
Colour scheme, logos, pages, navigation, features, forms, and content can be customised.


Independence of resources
Proactive monitoring and auto-scaling


Service usage metrics
Metrics types
All login requests and end user contribution activity.
Reporting types
API access


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Encryption of all physical media
  • Other
Other data at rest protection approach
All data encrypted at rest using AES-256.
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
The platform provides built-in export tools for users to download a compressed archive of data.
Data export formats
Other data export formats
Data import formats
  • CSV
  • Other
Other data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We aim to provide at least a 99.9% uptime service availability level. The service is fully resilient, with no single points of failure throughout the technology stack. The service comes with a 4-hour recovery time objective (RTO) and a 24-hour recovery point objective (RPO). This means that in the event of a major loss of infrastructure, the service would be available again within 4 hours, with a data loss of no more than 24 hours.
Availability excludes agreed scheduled maintenance events, customer-caused or third party-caused outages or disruptions, or outages or disruptions attributable in whole or in part to force majeure events. Any service-impacting planned maintenance work is always performed outside of UK business hours, with adequate notification to our clients.
We take nightly backups of all operating system and user data, with a 35-day backup retention as standard.
Approach to resilience
Redundancy across all application tiers, spread across multiple physical data centers.
Outage reporting
Support platform where service outages are reported and customers are added to the ticket and emailed the details.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
Role-based access control
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
UKAS by Bureau Veritas
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
Physical location, which is covered by Hosting Partner
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Cyber Security

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
We follow ISO standards and processes. Placecube have a policy and manual set that all staff must accept sign and adhere to.
The organisation leadership team commit its support to the ISMS and empower the Chief Security Officer to undertake any steps necessary to achieve the objectives of this policy and will ensure that its information security management practices are suitable for:

• Confidentiality of information.
• Integrity of information and services are maintained.
• Availability of information and services are maintained.
• Regulatory and legislative requirements are met.
• Continuous improvements being made to the Information Security Management System.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Each individual project has its own Configuration Management Database (CMDB), describing all Configuration Items (CIs) . The CMDB is maintained as a Git repository describing current and historical state of all CIs. Whenever a change is made within an environment, manually or automatically, the CMDB repository is updated to reflect the change.

Change requests are reviewed by project lead/Line Manager Comments, questions, revisions, and updates are recorded, a full assessment is carried out, and the Change approved or rejected.
Tests for both successful change deployment, and successful rollback are reviewed, modified and implemented.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
All components within the stack (infrastructure and software) are continuously tested for vulnerabilities. Placecube are alerted of any detected vulnerabilities by third party suppliers, and take action on a timescale commensurate with the severity.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Services are monitored continuously, with alerting to the support team. The support team will assess the potential compromise and undertake corrective action according to the severity threat level.
Incident management type
Supplier-defined controls
Incident management approach
Managed through our support desk. The CSO and ISO ensure appropriate action taken in accordance with ISO27001 Incident management policy.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£100,000.00 an instance a year
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.