Selected Interventions Ltd

ECHO Service Management Framework

A service management framework utilised in the management of refuse and recycling services to plan, deliver and manage front line services.
Elements include office and mobile systems.

Features

  • Resource management
  • Event and Service management
  • Integrated mobile operations
  • Round and route planning and scheduling
  • Real time task management and confirmation
  • Integrated weighbridge
  • Comprehensive APIs

Benefits

  • Identify the working state of vehicles and crews
  • Review routes and work completed
  • Plan resources and identify exceptions
  • Allocate and administer envoronmental service tasks
  • Manage waste, recycling and streets services
  • Track resources in real time
  • Integrate with other systems
  • MNage commercial and trade operations

Pricing

£1000 to £15000 per server per month

Service documents

G-Cloud 11

603713673448991

Selected Interventions Ltd

David Roberts

07810543700

david.roberts@selectedinterventions.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints ECHO is subject to regular updates and maintenance. Hosting enables this to be undertaken with zero down time
System requirements
  • None
  • None

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Subject to SLA level selected
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Training
Installation
Consultancy
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started On site training, user documentation and consultancy service to configure services where required.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Exports of services are available or can be provided if required
End-of-contract process Client data is extracted and returned or deleted.

Using the service

Using the service
Web browser interface Yes
Supported browsers Internet Explorer 11
Application to install Yes
Compatible operating systems
  • Android
  • IOS
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Mobile devices use a local application with a local database to enable operation in a disconnected environment
Accessibility standards None or don’t know
Description of accessibility Fonts can be adjusted and scaled. Some text to speech is supported
Accessibility testing None
API Yes
What users can and can't do using the API The API enables developers of third party applications and systems to integrate with the ECHO framework.
Typically the API is used to integrate resident portals and CRM systems.
API documentation Yes
API documentation formats PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The framework requires configuration of tasks and events

Scaling

Scaling
Independence of resources Yes, the system is designed as an N Tier application and the environments managed to maintain service

Analytics

Analytics
Service usage metrics Yes
Metrics types Concurrent users and connected devices
Reporting types
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Selected data extracts can be operated like reports to generate flat file data
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Standard system availability is 99.5% through Azure
Approach to resilience Available on request
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Management access is restricted using 2 factor authentication and secure connections
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for Between 6 months and 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Available on request

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach A documented test and deploy model is followed
Vulnerability management type Supplier-defined controls
Vulnerability management approach Vulnerability scan results are reviewed by the in house team and assessed for criticality. High level issues are prioritised by the development teams.
Protective monitoring type Undisclosed
Protective monitoring approach Available on request
Incident management type Supplier-defined controls
Incident management approach Issues are raised and resolved using a ticketing system exposed to the clients and other stakeholders.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £1000 to £15000 per server per month
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Terms and conditions
Service documents
Return to top ↑