Plus us Workforce Services LLP

Direct Engagement

PlusUs provides a cloud-based solution that enables a Direct Engagement module for locums, staff Bank technology, agency release technology, online timesheets and an electronic consolidated invoice and payment solution; underpinned by a best-in-class reporting suite. We can provide all products supported by our people under a Managed Service.


  • Roster and Rota system integration (inc 3rd Party integration)
  • Bank technology with native app for workers
  • Vendor Management System
  • Online timesheets for workers
  • Procure to pay management system
  • Consolidated invoices and agency self-bill
  • Outsourced payroll
  • Standardised and bespoke reporting suite
  • Direct Engagement via an employed worker solution
  • IR35 Review Processes


  • Reduces Cost of Contingent Workforce
  • Risk Removal/Reduction
  • Accessible 'on the go'
  • Efficient Processes
  • Integrated Timesheets
  • Management Information
  • Online Assignment/Vacancy Management
  • Tax Status Review System (including IR35)
  • Workforce Reporting
  • Sales Ledger Integration


£1 per unit

Service documents

G-Cloud 11


Plus us Workforce Services LLP

Jon Bennett

0345 058 1499

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints Planned maintenance arrangements will be notified to Buyers in advance.

Support is available during normal office hours.
System requirements
  • Internet connectivity
  • Internet connectivity to mobile device/tablet/computer
  • Internet Explorer web browser (version 10 or later)
  • Other web browser (if not using Internet Explorer)
  • Minimum recommended screen size of 1280/1024

User support

User support
Email or online ticketing support Email or online ticketing
Support response times 24 hours within normal business hours
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Onsite support
Support levels Training support is available within normal working hours (Monday to Friday excluding bank and public holidays).

Development support is available within normal working hours (Monday to Friday excluding bank and public holidays).
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started On site training
Video training available online
User brochures available upon request.
Service documentation No
End-of-contract data extraction Full data extraction into .csv or .xls files available throughout the engagement and upon termination as required by the Buyer.
End-of-contract process Full data extraction included within the price.
Transfer of data to third party supplier included within the price.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service None
What users can and can't do using the API The API passes data from our application to third party technology in the agreed format with that third party. The data flows are two-way, meaning we can both post and receive data.

The user can use the API for 'interoperability' of other related NHS systems such as roster and rota systems, ensuring an end to end contingent workforce platform is delivered.

Each API instance needs to be scoped separately unless a identical or similar API has been used elsewhere in the NHS.
API documentation Yes
API documentation formats PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Default settings and features can be customised to the Buyer's preference.

Future development can be suggested by Buyers to feature on our development road map.


Independence of resources We ensure that sufficient resources are available to meet demand. The application is constantly monitored to evaluate performance and capacity. Increased resources are available as required.


Service usage metrics No


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process No
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach MI suite available to all users
.csv files with set data structures held within the application available to the Buyer on demand (tailored .csv files available upon request).
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability System availability is not restricted. The system is accessible 24/7 via cloud based access.

Users can access the system from any platform that has an internet connection. Support team is available weekdays 8-6. Updates are completed out of core hours between 2am-4am so not to take the system offline.
Approach to resilience All designed to N+1, further information available upon request.
Outage reporting Internal email alert.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels In built restrictions based upon the user roles within the application.
Access restriction testing frequency At least once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 BSI
ISO/IEC 27001 accreditation date 01/09/2015
What the ISO/IEC 27001 doesn’t cover Scope is group-wide, all sites, all controls are fully implemented and fully applicable.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Across the Brookson Group we have implemented and comply with ISO 27001 which is implemented via our group-wide staff Information Security Forum (lead by our Group Compliance Director and Data Protection Officer), of which Plus Us is an integral part.

We also have a Group Compliance Team of 6 people (along with a team of external consultants) who regularly test and audit functions across the Brookson Group (including regular penetration testing of our IT systems) to ensure we maintain robust systems and processes for all customers. This includes a continual review and development of the technical basis for our Direct Engagement processes, our VMS technology and online portals, as well as internal supplier management, staff engagement and recruitment processes.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Change and configuration process is audited as part of our ISO 27001 accreditation and is reviewed externally by BSI on an annual basis.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Applications are tested by a CREST certified trusted third party annually.
Internal services are tested for vulnerabilities on a scheduled basis (no less than quarterly).
Vulnerabilities are put into a remediation plan and security patches as regularly applied.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Internal and external monitoring platforms used to monitor service availability.
Consistency check applied to the information within the application to protect against integrity failures.
Application audit logs regularly reviewed within the Operational Teams.
P1 incidents are responded to within 30 minutes.
Incident management type Supplier-defined controls
Incident management approach Internal email address for security incidents which creates a ticket on the Service Desk for review and action within 15 minutes to triage the severity of the incident. P1 incidents responded to within 30 minutes.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No


Price £1 per unit
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑