Target Information Systems Limited

Accord: Register of Contracts & Contract Manager

Accord Contract Management System is a secure, web based information management database for managing Supplier Expenditure Contract or Customer Income Contracts or both with additional cost.

Features

  • Secure, permission based contract management system
  • Supplier Expenditure Contracts Management
  • Customer Income Contracts Management
  • Digital DashboardingEvidence based audit trail
  • Evidence based audit trail
  • GDPR compliance database
  • Know what data you have
  • Know where it is stored
  • Know who has access to your data
  • Article 84 compliance

Benefits

  • Unlimited Users, shared data, procurement project collaboration & compliance.
  • Secure, centralised data and very easy to use database
  • Register of all contracts and detailed supplier database
  • Secure access from any computer, tablet or internet connected device
  • Time saving and real-time visualisation of status of projects
  • Suite of additional modules:
  • Additional Modules: Accord Analytics for Spend Analysis
  • Additional Modules: Accord OJEU compliant procurement project tracking
  • Additional Modules: Accord Asset Registers
  • Additional Modules: Accord Supplier Login for collaborative working

Pricing

£14750 per instance

  • Education pricing available

Service documents

G-Cloud 10

653942429705021

Target Information Systems Limited

Phil Atkinson

07702 248 948

tenders@targetis.co.uk

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints No.

Accord is a secure contract management database accessed through any modern browser connected to the Internet.
System requirements
  • A modern browser
  • A connection to the Internet

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Support response times
We provide a response within an hour to support emails Monday to Friday 9am to 5.30pm excluding bank holidays.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard WCAG 2.0 AAA
Web chat accessibility testing Target has worked with clients to enable a range of users to access our databases.
Onsite support Yes, at extra cost
Support levels All support matters are to be first raised to the support email: support@targetis.co.uk.

Target provides application support between the hours of 9.00am and 5.30pm Monday to Friday excluding Bank Holidays.

A support matter emailed to the support email can be followed up with a call in office hours to: 01226 212 056.

Support incidents are split into three priorities:

Priority One This is where an application is unavailable and users are unable to access the system. This will be responded to in one hour in business hours and have a resource dedicated to the problem until it is resolved. Target will work 24/7 on this problem until it is resolved.

Priority Two This is for intermittent, non-critical support matters where the application is available and an error is occurring which does not affect normal usage of the system. Priority two matters will be responded to within four business hours, and typically resolved within 72 hours.

Priority Three For minor matters such as layout issues, spelling mistakes in graphical text or minor amends; these will either be resolved within seven working days or scheduled for an agreed date/time
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Accord is Mobilised fit for purpose to store all required information. The mobilisation is complete with face to face training onsite and then by free training over webinar. We are here to help our clients along the entire journey towards gaining Control, Visibility, and Compliance with your Supplier Expenditure Contracts.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction All data in Accord can be exported back into the original spreadsheet provided at anytime. Target are able to help with the migration from Accord into any system. This may incur additional cost and your data remains your property at all times.
End-of-contract process The data can be exported into the original provided spreadsheets or exported in a structure to suit the importing format of a replacement system. As you Data Processor we are here to help from the commencement of the journey until the end of the journey.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices No
Accessibility standards WCAG 2.0 AAA
Accessibility testing Target has carried out accessibility testing with a variety of public sector clients using a variety of methods. If you have specific requirements we would be happy to meet them.
API No
Customisation available No

Scaling

Scaling
Independence of resources Access to the applications are load balanced.

Analytics

Analytics
Service usage metrics Yes
Metrics types Target is able to provide any service usage metrics beyond what's available for user usage in the database such as disk space usage and data transfer rates.
Reporting types Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process No
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Users are able to export their data at anytime into a CSV file.
Data export formats CSV
Data import formats Other
Other data import formats None.

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Target provide 99.95% availability
Approach to resilience Available on request
Outage reporting Target has real-time monitoring tools.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels Permission based user accounts & access.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information You control when users can access audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Acting as your Data Processor, Target takes security very seriously. We have a Information Security Policy and our systems are pentration tested annually. Our data centres are audited and/or certified by various internationally-recognized attestation and certification compliance standards. Many of the SOC reports and certifications listed below are available if a signed NDA is in place between DigitalOcean and our customer.
Information security policies and processes Target has a nominated Data Security Manager who is a board level Director. We have an Information security policy which is an element of the ISO27001 accrediation that we are working towards. Target signs a GDPR contract to act on behalf our customers as their Data Processor.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Target is accreditted with ISO9001:2008 and the change management process is part of the Quality Management System.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Target operates real-time server monitoring to attempt to track and trace unsual activity to our servers. This is also supported by our datacentre staff who are also on hand to help manage potential threats. Sapphire.net provide our regular testing and we deploy repairs immediately on being made aware of issues.
Protective monitoring type Supplier-defined controls
Protective monitoring approach We identify potential compromises by moniyoring server activity and maintaining detailed logs. These logs are reviewed periodically. We would respond immediately upon finding a potential compromise.
Incident management type Supplier-defined controls
Incident management approach As we work towards ISO27001 we are developing pre-defined processes for common events. Users would currently report any incident via support@targetis.co.uk. This would typically happen after automated processes have notified us. We provide incidents reports via email and via notification on our website.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £14750 per instance
Discount for educational organisations Yes
Free trial available No

Documents

Documents
Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑