Bang Communications Ltd

Connect Stakeholder Management and Communications Service

Connect is an open source, cloud based stakeholder management and communications system developed for UK public sector. Featuring contact, user, organisation, interaction, email, event and consultation management, contact tagging, distribution lists, data import/export and email templates. Connect offers a quick, easy way to get a grip on your stakeholder communication.


  • One focal point for all stakeholder communications
  • Keep track of all your contacts within organisations
  • Fast, secure and inexpensive mass email message sending
  • Event management and invitation
  • Create, manage and invite stakeholders to, consultations
  • Track meetings and phone calls with stakeholders
  • Allocate key account managers for individual stakeholders
  • Flexible categorisation making it easier to find relevant stakeholders
  • Flexible, comprehensive permissions to control who can do what
  • Multiple views to make it simple to use for everyone


  • Fully brief Ministers and senior managers on stakeholder contact
  • Avoid embarrassing date or communication conflicts
  • Improve relationships with stakeholders
  • Ensure the right people are consulted on the right issues
  • Track stakeholders as they leave their roles
  • Simple and easy to consult
  • Simple and easy to create lists
  • Simple and easy to create mass emails
  • Templates for consistency and professional communication
  • Specifically designed for UK public sector


£400 per instance

  • Free trial available

Service documents

G-Cloud 10


Bang Communications Ltd

David Clarke

01256 370 900

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Hybrid cloud
Service constraints There are no specific service constraints that are not detailed in this specification.
System requirements Internet Connection

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Response time are agreed as part of an SLA.
Typical response time for business hours.
Severity 1 1 hour
Severity 2 4 hours
Severity 3 16 hours
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.0 AA or EN 301 549
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Telephone and online support channels are available during standard working hours. Additional support is available outside standard working hours at an additional cost.

Support is initially provided by a Technical Account Manager who is adirect access to further technical support if required.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Onsite and online training is available and documentation available.
Service documentation Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction You can use the export tool to extract various subsets of data as csv files. A full database dump can also be supplied.
End-of-contract process Client will be provided with copies of the database files at no additional costs.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service There are no differences.
Accessibility standards WCAG 2.0 AA or EN 301 549
Accessibility testing The system has been used by people requiring assistive technology.
Customisation available Yes
Description of customisation Features and functions can be enabled by the user. Multiple email templates can be added to the system.


Independence of resources Each service user will have their own dedicated service.


Service usage metrics Yes
Metrics types Google Analytics as standard.
Reporting types Real-time dashboards


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest Other
Other data at rest protection approach Secure data centre.
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach You can use the export tool to extract various subsets of data as csv files. A full database dump can also be supplied.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability 99.99 and Service Credits
Approach to resilience Available on request.
Outage reporting Private dashboard and email alerts.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Username and password.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach This is included as part of our ISO9001 Quality Management Process and we have been 'Cyber Essentials' certified.
Information security policies and processes Bang adopt a System’s Assurance process that builds upon our collective experience. This includes:

• Considering and managing the risks that might affect client systems
• Taking action to mitigate these risks before they become real
• Deploying hardened platforms
• Only using tested software releases
• Automatically including relevant security patches
• Eliminating unnecessary processes.
• Configuring firewalls
• Limiting access to systems
• Always using multi-factor authentication
• Implementing resilient backup and recovery procedures
• Safeguarding your data at all stages in its journey
• Ensuring our data centre providers take as much care on security as we do

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach GIT repos are used for host and config and servers are reliably deployed by Ansible. History is fully tracked and detailed security are consistently deployed.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Server software uses unattended updates from trusted channels.
Active monitoring is undertaken for module/plugin updates.
Protective monitoring type Undisclosed
Protective monitoring approach The service is monitored for incidents. We will respond to potential threats within minutes of being notified.
Incident management type Supplier-defined controls
Incident management approach Automatic reports will be generated and reviewed on a weekly basis. Any incident or suspected incident will be reported and managed as a security incident via our security incident process.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks
  • Public Services Network (PSN)
  • Police National Network (PNN)


Price £400 per instance
Discount for educational organisations No
Free trial available Yes
Description of free trial Full stakeholder management system without the ability to send emails.


Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑