Linea Group Ltd

e-resourcing / e-rostering software

A bespoke software solution that works as a communication platform connecting clinical staff with hospital managers who manage rosters/ off duty's.


  • Real-time reporting
  • App accessed
  • Online software


  • Cost Saving
  • Bespoke
  • Intelligent communication platform


£27.50 per user per month

Service documents

G-Cloud 11


Linea Group Ltd

Claire Schneider-Williams


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints None
System requirements
  • Internet access
  • Google Chrome optimised

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Within 24 hours
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Onsite support
Support levels Hands on technical support and cloud based support
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started Onsite training and online assistance is provided
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction N/A
End-of-contract process N/A

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Chrome
Application to install Yes
Compatible operating systems
  • Android
  • IOS
Designed for use on mobile devices Yes
Differences between the mobile and desktop service N/A
What users can and can't do using the API Engaging with temporary staff made easy. Clinical staff download our free to use app (available on both Android and IOS) They can then: List their availability. Accept open shifts. Upload their documents. Clock in and clock out as and when they show up for and leave work.
API documentation No
API sandbox or test environment No
Customisation available No


Independence of resources The support provided is specific to the client and totally independent of other clients, thereby guaranteeing that all clients receive the required service, support and user experience.


Service usage metrics No


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach All data is exported from the system by Linea and presented to the client. This service is provided as part of the annual subscription service. The information is extracted, saved in a secure and safe location and passed over to the client.
Data export formats
  • CSV
  • Other
Other data export formats
  • Excel
  • Word
Data import formats
  • CSV
  • Other

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • Bonded fibre optic connections
Data protection within supplier network Other
Other protection within supplier network Staff and clients are regularly trained in data protection and advised how to ensure data integrity. Passwords are regularly required to be updated. New starters need to have completed system overview course before being issued with a password and Login and passwords are deleted immediately upon leaving an organisation. Our customer service team also regularly review suspicious activity and failed login attempts.

Availability and resilience

Availability and resilience
Guaranteed availability Support is consistently assessed against specific SLA's. Support is provided to clients in line with the agreed system requirements and clients extras as part of the programme. Any issues regarding this process will can be escalated to the account manager who will take the appropriate action to ensure SLA achievement and compensate the client in situation where this is deemed appropriate and necessary.
Approach to resilience Available on Request
Outage reporting Dashboard, supported by email and SMS alerts.

Identity and authentication

Identity and authentication
User authentication needed No
Access restrictions in management interfaces and support channels Access to management interfaces and support channels are restricted through individual delegation, supported by accessibility passwords, which are carefully control and regularly reviewed and updated.
Access restriction testing frequency At least once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users receive audit information on a regular basis
How long user audit data is stored for User-defined
Access to supplier activity audit information Users receive audit information on a regular basis
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Employees are CRB complaint. All data and systems are security complaint and encrypted. All processes are ISO compliant. Staff undergo regular security training.
Information security policies and processes Our reporting structure is dependent upon the type and complexity of the programme, however a typical structure comprises: Programme Director - working in partnership with the client SRO Programme Manager Programme Team - comprising various skills sets, experience and hierarchical levels. We ensure policy adherence through adoption and management of robust ISO procedures

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Change Acceptance Process (CAP) Sustainable programme success is dependent upon our ability to go beyond training clients in new skills sets & develop people as change agents. We utilise CAP to develop change culture. CAP is a 9 step process to manage change. It’s fundamental in embedding change in the culture of organisations: 1. Set-up for success 2. Clarify the vision 3. Clarify the need 4. Evaluate potential resistance 5. Communicate & convince 6. Delivery early benefits 7. Remove obstacles 8. Embed in the organisation 9. Embed in the Culture.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Five phase process: 1.) Preparation Understanding: Size, scope, and geographic dispersion of infrastructure, Number of applications and devices on the network at all times. Critical assets (financial data & sensitive information). 2.) Discovery Low-risk assets are scanned at least quarterly. High risk assets are scanned daily. Patches are released in line with this schedule. 3.) Analysis We analyse and review high value information that each scan yields. 4.) Reporting Reports, focus on threat analysis, SLA status, compliance, and exceptions are reviewed to assess the required actions. 5.) Remediation This is undertaken both remotely and locally, with the benefit of contingencies.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Our service includes: Comprehensive monitoring & alerting. We collect log data on the activities of users, and review/audit it. Coupled with intelligent baselining & effective prioritisation, enabling critical alerts to be raised to the right people at the right time. Knowledgeable analysts. understand and remediate possible attacks and incidents. Deciphering the information generated through monitoring. We provide regular reports/reviews to ensure the service continues to deliver at expected levels. This means no issues are missed, and alerts can be analysed/understood after the event. Our flexible process isn't tied to specific design so the service can evolve based changes to GPG13.
Incident management type Supplier-defined controls
Incident management approach Security incidents are inevitable and they will vary in their business impact. All incidents need to be effectively managed, particularly those that invoke the organisation’s disaster recovery and business continuity plans. How risk are managed? Obtain senior management approval and backing. Establish an incident response capability. Provide specialist training Define the required roles and responsibilities Establish a data recovery capability Test the incident management plans Decide what information will be shared and with whom Collect and analyse post-incident evidence Conduct a lessons learned review Educate users and maintain their awareness Report criminal incidents to Law Enforcement.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £27.50 per user per month
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑