Built Intelligence LMS is our easy to use Learning Management System, it provides you and your project team with access to a suite of eLearning, ePortfolio and knowledge management tools.
In addition it also contains tools to facilitate face-to-face training, monitoring, reporting and the development of role-based capability frameworks.
- Hosted/SaaS LMS
- SCORM 1.2 and Tin Can xAPI compliant
- Accessible via Mac, PC, iPhone, iPad, Android
- Themes/brand customization
- API - for integration with other systems
- Course library
- Automatic and scheduled compliance reminders
- Extensive reporting
- Save time and money on travel and venues for training
- Increase workforce productivity
- Access a wider global audience
- Manage and build on your current training material
- Create dialogue & discussion around training topics
£1 to £15 per user per month
- Education pricing available
- Free trial available
Built Intelligence Ltd
0117 214 0890
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
All non-critical software updates occur outside normal office hours, usually between 9pm and 12am, all users will be warned on login about any impending updates. Critical maintenance may happen during office hours but this will happen if there is a functional issue with the system to all users. Online support is available via help pages, FAQ sections and training information.
For private/internal instances the client will need to supply details of the appropriate Private cloud service for hosting.
|Email or online ticketing support||Email or online ticketing|
|Support response times||
Support is email based and within UK office hours 8:30am to 5:30pm.
We aim to respond within 1 working hour.
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||WCAG 2.0 AA or EN 301 549|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||Yes, at an extra cost|
|Web chat support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support accessibility standard||WCAG 2.0 AA or EN 301 549 9: Web|
|Web chat accessibility testing||We have not currently carried out any testing of assistive technology solutions with our web chat system but are waiting for confirmation from our supplier that this has been carried out.|
|Onsite support||Yes, at extra cost|
|Support levels||We provide telephone and email support free of charge to all our customers, on-site support requirements are negotiated on a per customer basis and charged at our standard day rate.|
|Support available to third parties||Yes|
Onboarding and offboarding
We provide an initial consultancy service where we identify key stakeholders within your organisation, your training and content requirements.
We can then train appropriate individuals in the management and support of the learning process and also provide general support on an ongoing basis.
Our support staff and development team are all UK based and available during office hours (8:30am to 5:30pm).
|Other documentation formats||System specific Wiki (Separate User and Admin documentation)|
|End-of-contract data extraction||System data is stored as a MySQL database and as such can be exported and manipulated very easily into any suitable format using any modern database administration tool.|
We can provide a data export of the system as part of our service. Any further assistance with data migration is costed on a per project basis according to our standard day rate.
We retain customer data for 30 days as standard.
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||
For standard users, functionality on the mobile version of the service is largely the same as that of the desktop version. There may be alteration to the layout and behaviour of certainly elements of the system functionality.
Administrative users may require the use of a desktop to access all of the functionality available to them.
|Accessibility standards||WCAG 2.0 AA or EN 301 549|
|Accessibility testing||We have tested our system internally against the WCAG2.0 guidelines.|
|What users can and can't do using the API||
The service offers an API with CRUD access to key system data models.
Access to the API is provide through the use of an access token which needs to be issued to the service accessing the API externally.
|API documentation formats||HTML|
|API sandbox or test environment||Yes|
|Description of customisation||
The system can be configured and customised to a limited extent via the backend administration system.
Further to this, the system is fully themeable and can be extended through the use of the modular plugin architecture.
|Independence of resources||
Our choice of cloud hosting provider allows us to scale the hosting infrastructure according to site traffic with very little notice.
In addition, larger scale changes in system capacity can be provided for by moving to a load-balanced distributed architecture.
|Service usage metrics||Yes|
|Metrics types||The system provide basic back end usage metrics, there is also the option of integrating with 3rd party web metrics services.|
|Reporting types||Real-time dashboards|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||None|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||In-house|
|Protecting data at rest||Physical access control, complying with another standard|
|Data sanitisation process||Yes|
|Data sanitisation type||Deleted data can’t be directly accessed|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||We can provide a data export of the system as part of our service. Any further assistance with data migration is costed on a per project basis according to our standard day rate.|
|Data export formats||
|Other data export formats||MySQL|
|Data import formats||
|Other data import formats||MySQL|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
We contractually guarantee 99.5% availability apart from for scheduled maintenance downtime which are carried out outside normal working hours.
Any failures to meet this level of availability will result in service credits awarded to to the customer.
|Approach to resilience||Available on request.|
We have a 3rd party monitoring service in place on top of the standard monitoring offered by our cloud hosting supplier. It provides a dashboard, API and alerts via SMS and email.
Clients will be made aware of any unplanned outages via email alerts, within one working hour (Mon-Fri, 9am to 5pm). Any planned maintenance will be alerted to users via their dashboard no later than 24 hours before the scheduled start.
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||Access to the management console of the application is managed through the application itself and can be further limited via a 3rd party authentication service to include limits such as IP, location and use of a hardware key or multi-factor authentication app.|
|Access restriction testing frequency||At least once a year|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||Other|
|Other security governance standards||We take information security very seriously and understand how important it is to our clients. Our choice of infrastructure and software tools reflect this. We are accredited under the Cyber Essentials Scheme (http://www.cyberessentials.org).|
|Information security policies and processes||We are implementing GDPR best practice and training staff to ensure compliance.|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||
All of our code is managed using a Version Control System and changes are tracked via a ticketing system where we prioritise and manage tickets.
Any updates to the production environment are tested prior to deployment to live using a dedicated test environment.
All hosting environments include incremental backups which supports both short term and long term roll back of the code and database.
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
We monitor 3rd party vendors of each of the system components for the latest software updates and security patches.
Our cloud hosting provider offers security monitoring of infrastructure and application behaviour as standard.
All account credentials are managed via an encrypted system access to which is limited to the appropriate staff.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
On top of the standard monitoring services offered buy our cloud hosting provider we also include a 3rd party monitoring service which reports on system level issues and events.
We also employ a distributed network availability monitoring tool which providers alerts on the availability of the various services from multiple locations across the internet.
|Incident management type||Supplier-defined controls|
|Incident management approach||
Any incidents are first tracked by our ticketing system and then if required, escalated to our technical team.
All progress and feedback is managed through our ticket system and followed up until the issue is confirmed resolved by the client.
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||Yes|
|Price||£1 to £15 per user per month|
|Discount for educational organisations||Yes|
|Free trial available||Yes|
|Description of free trial||
We can offer a 'sandbox' version of the service containing dummy data should this be required for evaluation purposes.
It will contain a single working instance of the system but won't include any customer data or bespoke functionality.
|Pricing document||View uploaded document|
|Skills Framework for the Information Age rate card||View uploaded document|
|Service definition document||View uploaded document|
|Terms and conditions document||View uploaded document|