PlusUs provides a cloud-based solution that enables a Direct Engagement module for locums, staff Bank technology, agency release technology, online timesheets and an electronic consolidated invoice and payment solution; underpinned by a best-in-class reporting suite. We can provide all products supported by our people under a Managed Service.
- Roster and Rota system integration (inc 3rd Party integration)
- Bank technology with native app for workers
- Vendor Management System
- Online timesheets for workers
- Procure to pay management system
- Consolidated invoices and agency self-bill
- Outsourced payroll
- Standardised and bespoke reporting suite
- Direct Engagement via an employed worker solution
- IR35 Review Processes
- Reduces Cost of Contingent Workforce
- Risk Removal/Reduction
- Accessible 'on the go'
- Efficient Processes
- Integrated Timesheets
- Management Information
- Online Assignment/Vacancy Management
- Tax Status Review System (including IR35)
- Workforce Reporting
- Sales Ledger Integration
£1 per unit
Plus us Workforce Services LLP
0345 058 1499
|Software add-on or extension||No|
|Cloud deployment model||Private cloud|
Planned maintenance arrangements will be notified to Buyers in advance.
Support is available during normal office hours.
|Email or online ticketing support||Email or online ticketing|
|Support response times||24 hours within normal business hours|
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Onsite support|
Training support is available within normal working hours (Monday to Friday excluding bank and public holidays).
Development support is available within normal working hours (Monday to Friday excluding bank and public holidays).
|Support available to third parties||Yes|
Onboarding and offboarding
On site training
Video training available online
User brochures available upon request.
|End-of-contract data extraction||Full data extraction into .csv or .xls files available throughout the engagement and upon termination as required by the Buyer.|
Full data extraction included within the price.
Transfer of data to third party supplier included within the price.
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||None|
|What users can and can't do using the API||
The API passes data from our application to third party technology in the agreed format with that third party. The data flows are two-way, meaning we can both post and receive data.
The user can use the API for 'interoperability' of other related NHS systems such as roster and rota systems, ensuring an end to end contingent workforce platform is delivered.
Each API instance needs to be scoped separately unless a identical or similar API has been used elsewhere in the NHS.
|API documentation formats|
|API sandbox or test environment||Yes|
|Description of customisation||
Default settings and features can be customised to the Buyer's preference.
Future development can be suggested by Buyers to feature on our development road map.
|Independence of resources||We ensure that sufficient resources are available to meet demand. The application is constantly monitored to evaluate performance and capacity. Increased resources are available as required.|
|Service usage metrics||No|
|Supplier type||Not a reseller|
|Staff security clearance||Staff screening not performed|
|Government security clearance||None|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Supplier-defined controls|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider|
|Protecting data at rest||Physical access control, complying with another standard|
|Data sanitisation process||No|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||
MI suite available to all users
.csv files with set data structures held within the application available to the Buyer on demand (tailored .csv files available upon request).
|Data export formats||CSV|
|Data import formats||CSV|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
System availability is not restricted. The system is accessible 24/7 via cloud based access.
Users can access the system from any platform that has an internet connection. Support team is available weekdays 8-6. Updates are completed out of core hours between 2am-4am so not to take the system offline.
|Approach to resilience||All designed to N+1, further information available upon request.|
|Outage reporting||Internal email alert.|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||In built restrictions based upon the user roles within the application.|
|Access restriction testing frequency||At least once a year|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||BSI|
|ISO/IEC 27001 accreditation date||01/09/2015|
|What the ISO/IEC 27001 doesn’t cover||Scope is group-wide, all sites, all controls are fully implemented and fully applicable.|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||ISO/IEC 27001|
|Information security policies and processes||
Across the Brookson Group we have implemented and comply with ISO 27001 which is implemented via our group-wide staff Information Security Forum (lead by our Group Compliance Director and Data Protection Officer), of which Plus Us is an integral part.
We also have a Group Compliance Team of 6 people (along with a team of external consultants) who regularly test and audit functions across the Brookson Group (including regular penetration testing of our IT systems) to ensure we maintain robust systems and processes for all customers. This includes a continual review and development of the technical basis for our Direct Engagement processes, our VMS technology and online portals, as well as internal supplier management, staff engagement and recruitment processes.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||Change and configuration process is audited as part of our ISO 27001 accreditation and is reviewed externally by BSI on an annual basis.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
Applications are tested by a CREST certified trusted third party annually.
Internal services are tested for vulnerabilities on a scheduled basis (no less than quarterly).
Vulnerabilities are put into a remediation plan and security patches as regularly applied.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
Internal and external monitoring platforms used to monitor service availability.
Consistency check applied to the information within the application to protect against integrity failures.
Application audit logs regularly reviewed within the Operational Teams.
P1 incidents are responded to within 30 minutes.
|Incident management type||Supplier-defined controls|
|Incident management approach||Internal email address for security incidents which creates a ticket on the Service Desk for review and action within 15 minutes to triage the severity of the incident. P1 incidents responded to within 30 minutes.|
|Approach to secure software development best practice||Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)|
Public sector networks
|Connection to public sector networks||No|
|Price||£1 per unit|
|Discount for educational organisations||No|
|Free trial available||No|