Made Open Communications Ltd

Made Open community platform

Welcome to the community platform that mobilises the skills, strengths, experiences, resources and potential of everyone in your community. A social network for communities of purpose or place, any member of the community can use our platform to make a difference - connecting people, groups and businesses to their community.


  • Searchable member-led COMMUNITY DIRECTORY.
  • Public or private TEAM SPACE for planning and delivering PROJECTS.
  • Localised VOLUNTEER BANK to post, promote and manage opportunities.
  • Two-way CONVERSATIONS tool to share challenges, canvas opinion and ideas.
  • CAMPAIGNS feature aggregating activities and members around a common goal.
  • Customisable USER DASHBOARD to manage profile, activities and members.
  • One click BEST MATCH button to search activities and members.
  • CHAT features and ACTION PLANNER.
  • Configurable platform to support all communities of PURPOSE or PLACE.


  • Mobilise the SKILLS and RESOURCES available in communities.
  • Let members FIND OUT WHAT'S AVAILABLE in their community.
  • Let members POST, PROMOTE and MANAGE their own activities.
  • MATCH members to opportunities.
  • Build up your own VIRTUAL CURRENCY.
  • Exchange SKILLS for TIME CREDITS.
  • Let members join a private or public TEAM SPACE.
  • Let community members HAVE THEIR SAY and LEAD PROJECTS.
  • Activate your network around COMMUNITY-WIDE priorities (campaigns).


£1250 per licence per month

Service documents


G-Cloud 11

Service ID

7 1 7 8 5 9 3 5 0 8 3 3 6 9 4


Made Open Communications Ltd

Robert Woolf

01872 862547

Service scope

Software add-on or extension
Cloud deployment model
Private cloud
Service constraints
System requirements
N/A. Made Open is browser based.

User support

Email or online ticketing support
Email or online ticketing
Support response times
1 – High Priority - 4 hours maximum
Business critical problems (e.g. website is non-operational).

2 – Medium Priority - 1 day maximum
Severe functional problems (e.g. user cannot register or customer profile cannot be added).

3 – Medium/Low Priority - 3 days maximum
Less severe functional priority (e.g. broken link to an external provider website).

4 – Low Priority - 7 days maximum
Does not affect website operations (e.g. general technical support).

Requests submitted outside of Normal Business Hours will be deemed to be received at 10:00am on the next Business Day.
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
1 – High Priority
Business critical problems (e.g. website is non-operational).
Response time - 4 hours maximum

2 – Medium Priority
Severe functional problems (e.g. user cannot register or customer profile cannot be added).
Response time - 1 day maximum

3 – Medium/Low Priority
Less severe functional priority (e.g. broken link to an external provider website).
Response time - 3 days maximum

4 – Low Priority
Does not affect website operations (e.g. general technical support).
Response time - 7 days maximum
Support available to third parties

Onboarding and offboarding

Getting started
We provide on or offsite training. We also have 'how to' guides and video tutorials for clients to get started.
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
We will only retain a members personal data until either of the following happens (or unless a longer retention period is required by law):

- They decide to delete your account.
- They wish to enact your right to be forgotten.
- The website is terminated.

Individuals have a right to have their data erased and for processing to cease in the following circumstances:
- Where the personal data is no longer necessary in relation to the purpose for which it was originally collected and / or processed;
- Where consent is withdrawn;
- Where the individual objects to processing and there is no overriding legitimate interest for continuing the processing;
- The personal data was unlawfully processed or otherwise breached data protection laws;
- To comply with a legal obligation;
- The processing relates to a child.

We will retain personal data for no longer than is necessary. What is necessary will depend on the circumstances of each case, taking into account the reasons that the personal data was obtained.
End-of-contract process
At the end of the contract, we extract data for our clients and then turn off their platform. We follow our GDPR process for deleting data.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Service interface
Customisation available
Description of customisation
Each uniquely branded platform can be configured according to the clients preferences.

When we set you up with a new platform, we customise virtually everything about the platform so that it is tailor made to you and any partners you have engaged. This is an exciting yet rigorous process.

Customisations include:

- Customised template (e.g. logo, logomark, colour palette)
- Customised search filters
- Customised homepage (e.g. image, strapline, call-to-actions, footer)
- Customised SEO settings (e.g. SEO settings, homepage tag line, meta
- Customised menus
- Customised administrator (Authorised User) settings
- Customised Google map
- Customised user types
- Customised partner settings
- Customised email notifications
- Customised (unique) URL
- About pages set up (excludes copywriting)
- Timebanking set up
- Support email set up.


Independence of resources
We have service level agreements in place with our clients.


Service usage metrics
Metrics types
Google Analytics
Reporting types
Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Users can download platform usage data via a CSV file. This is accessible via the Content Management System.
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Description of Task / Issue Response Time

1 – High Priority

Business critical problems, e.g. website is non-operational.

2 hour maximum

2 – Medium Priority

Severe functional problems, e.g. user cannot register or customer profile cannot be added.

1 day maximum

3 – Medium/Low Priority

Less severe functional priority, e.g. broken link to an external provider website.

3 days maximum

4 – Low Priority

Does not affect website operations, e.g. general technical support.

7 days maximum

We do not have a refund policy.
Approach to resilience
Available on request.
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Access restrictions in management interfaces and support channels
Secure CMS accessible only by username and password.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
CSA CCM version 3.0
Information security policies and processes
Available on request.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Work not regarded as routine Maintenance Tasks will be regarded as enhancements (“Enhancements”). The following is a non-exhaustive list of work considered by Made Open to be Enhancements;
• Creation of new website features;
• Creation of new content management features;
• Bespoke development to social networking tools;
• Amendments to graphics, images, animations, brand identity, navigation;
• Addition of banners;
• Website redesign;
• Copywriting;
• Usability testing;
• Additional content management administrator training;
• Digital marketing services (bulk email, search engine optimisation); and,
• Creation of offline printed material.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Available on request
Protective monitoring type
Protective monitoring approach
Available on request
Incident management type
Incident management approach
Available on request

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£1250 per licence per month
Discount for educational organisations
Free trial available

Service documents

Return to top ↑