Plus us Workforce Services LLP

Direct Engagement

PlusUs provides a cloud-based solution that enables a Direct Engagement module for locums, staff Bank technology, agency release technology, online timesheets and an electronic consolidated invoice and payment solution; underpinned by a best-in-class reporting suite. We can provide all products supported by our people under a Managed Service.

Features

  • Roster and Rota system integration (inc 3rd Party integration)
  • Bank technology with native app for workers
  • Vendor Management System
  • Online timesheets for workers
  • Procure to pay management system
  • Consolidated invoices and agency self-bill
  • Outsourced payroll
  • Standardised and bespoke reporting suite
  • Direct Engagement via an employed worker solution
  • IR35 Review Processes

Benefits

  • Reduces Cost of Contingent Workforce
  • Risk Removal/Reduction
  • Accessible 'on the go'
  • Efficient Processes
  • Integrated Timesheets
  • Management Information
  • Online Assignment/Vacancy Management
  • Tax Status Review System (including IR35)
  • Workforce Reporting
  • Sales Ledger Integration

Pricing

£1 per unit

Service documents

Framework

G-Cloud 11

Service ID

6 4 9 5 8 1 5 4 5 6 1 4 8 7 8

Contact

Plus us Workforce Services LLP

Matthew Fryer

01925 235796

Matthew.Fryer@brookson.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
Planned maintenance arrangements will be notified to Buyers in advance.

Support is available during normal office hours.
System requirements
  • Internet connectivity
  • Internet connectivity to mobile device/tablet/computer
  • Internet Explorer web browser (version 10 or later)
  • Other web browser (if not using Internet Explorer)
  • Minimum recommended screen size of 1280/1024

User support

Email or online ticketing support
Email or online ticketing
Support response times
24 hours within normal business hours
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Onsite support
Support levels
Training support is available within normal working hours (Monday to Friday excluding bank and public holidays).

Development support is available within normal working hours (Monday to Friday excluding bank and public holidays).
Support available to third parties
Yes

Onboarding and offboarding

Getting started
On site training
Video training available online
User brochures available upon request.
Service documentation
No
End-of-contract data extraction
Full data extraction into .csv or .xls files available throughout the engagement and upon termination as required by the Buyer.
End-of-contract process
Full data extraction included within the price.
Transfer of data to third party supplier included within the price.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
None
Service interface
No
API
Yes
What users can and can't do using the API
The API passes data from our application to third party technology in the agreed format with that third party. The data flows are two-way, meaning we can both post and receive data.

The user can use the API for 'interoperability' of other related NHS systems such as roster and rota systems, ensuring an end to end contingent workforce platform is delivered.

Each API instance needs to be scoped separately unless a identical or similar API has been used elsewhere in the NHS.
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Default settings and features can be customised to the Buyer's preference.

Future development can be suggested by Buyers to feature on our development road map.

Scaling

Independence of resources
We ensure that sufficient resources are available to meet demand. The application is constantly monitored to evaluate performance and capacity. Increased resources are available as required.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
No
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
MI suite available to all users
.csv files with set data structures held within the application available to the Buyer on demand (tailored .csv files available upon request).
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
System availability is not restricted. The system is accessible 24/7 via cloud based access.

Users can access the system from any platform that has an internet connection. Support team is available weekdays 8-6. Updates are completed out of core hours between 2am-4am so not to take the system offline.
Approach to resilience
All designed to N+1, further information available upon request.
Outage reporting
Internal email alert.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
In built restrictions based upon the user roles within the application.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
01/09/2015
What the ISO/IEC 27001 doesn’t cover
Scope is group-wide, all sites, all controls are fully implemented and fully applicable.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Across the Brookson Group we have implemented and comply with ISO 27001 which is implemented via our group-wide staff Information Security Forum (lead by our Group Compliance Director and Data Protection Officer), of which Plus Us is an integral part.

We also have a Group Compliance Team of 6 people (along with a team of external consultants) who regularly test and audit functions across the Brookson Group (including regular penetration testing of our IT systems) to ensure we maintain robust systems and processes for all customers. This includes a continual review and development of the technical basis for our Direct Engagement processes, our VMS technology and online portals, as well as internal supplier management, staff engagement and recruitment processes.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Change and configuration process is audited as part of our ISO 27001 accreditation and is reviewed externally by BSI on an annual basis.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Applications are tested by a CREST certified trusted third party annually.
Internal services are tested for vulnerabilities on a scheduled basis (no less than quarterly).
Vulnerabilities are put into a remediation plan and security patches as regularly applied.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Internal and external monitoring platforms used to monitor service availability.
Consistency check applied to the information within the application to protect against integrity failures.
Application audit logs regularly reviewed within the Operational Teams.
P1 incidents are responded to within 30 minutes.
Incident management type
Supplier-defined controls
Incident management approach
Internal email address for security incidents which creates a ticket on the Service Desk for review and action within 15 minutes to triage the severity of the incident. P1 incidents responded to within 30 minutes.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Pricing

Price
£1 per unit
Discount for educational organisations
No
Free trial available
No

Service documents

Return to top ↑