Made Open Communications Ltd

Made Open community platform

Welcome to the community platform that mobilises the skills, strengths, experiences, resources and potential of everyone in your community. A social network for communities of purpose or place, any member of the community can use our platform to make a difference - connecting people, groups and businesses to their community.

Features

  • Searchable member-led COMMUNITY DIRECTORY.
  • Unique TIMEBANK and SKILLS EXCHANGE.
  • Public or private TEAM SPACE for planning and delivering PROJECTS.
  • Localised VOLUNTEER BANK to post, promote and manage opportunities.
  • Two-way CONVERSATIONS tool to share challenges, canvas opinion and ideas.
  • CAMPAIGNS feature aggregating activities and members around a common goal.
  • Customisable USER DASHBOARD to manage profile, activities and members.
  • One click BEST MATCH button to search activities and members.
  • CHAT features and ACTION PLANNER.
  • Configurable platform to support all communities of PURPOSE or PLACE.

Benefits

  • Mobilise the SKILLS and RESOURCES available in communities.
  • Let members FIND OUT WHAT'S AVAILABLE in their community.
  • Let members POST, PROMOTE and MANAGE their own activities.
  • MATCH members to opportunities.
  • Build up your own VIRTUAL CURRENCY.
  • Exchange SKILLS for TIME CREDITS.
  • Let members join a private or public TEAM SPACE.
  • Connect PEOPLE and BUSINESSES on a LOCALISED PLATFORM.
  • Let community members HAVE THEIR SAY and LEAD PROJECTS.
  • Activate your network around COMMUNITY-WIDE priorities (campaigns).

Pricing

£1250 per licence per month

Service documents

G-Cloud 11

717859350833694

Made Open Communications Ltd

Robert Woolf

01872 862547

robert@madeopen.co.uk

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints No
System requirements N/A. Made Open is browser based.

User support

User support
Email or online ticketing support Email or online ticketing
Support response times 1 – High Priority - 4 hours maximum
Business critical problems (e.g. website is non-operational).

2 – Medium Priority - 1 day maximum
Severe functional problems (e.g. user cannot register or customer profile cannot be added).

3 – Medium/Low Priority - 3 days maximum
Less severe functional priority (e.g. broken link to an external provider website).

4 – Low Priority - 7 days maximum
Does not affect website operations (e.g. general technical support).

Requests submitted outside of Normal Business Hours will be deemed to be received at 10:00am on the next Business Day.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels 1 – High Priority
Business critical problems (e.g. website is non-operational).
Response time - 4 hours maximum

2 – Medium Priority
Severe functional problems (e.g. user cannot register or customer profile cannot be added).
Response time - 1 day maximum

3 – Medium/Low Priority
Less severe functional priority (e.g. broken link to an external provider website).
Response time - 3 days maximum

4 – Low Priority
Does not affect website operations (e.g. general technical support).
Response time - 7 days maximum
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide on or offsite training. We also have 'how to' guides and video tutorials for clients to get started.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction We will only retain a members personal data until either of the following happens (or unless a longer retention period is required by law):

- They decide to delete your account.
- They wish to enact your right to be forgotten.
- The website is terminated.

Individuals have a right to have their data erased and for processing to cease in the following circumstances:
- Where the personal data is no longer necessary in relation to the purpose for which it was originally collected and / or processed;
- Where consent is withdrawn;
- Where the individual objects to processing and there is no overriding legitimate interest for continuing the processing;
- The personal data was unlawfully processed or otherwise breached data protection laws;
- To comply with a legal obligation;
- The processing relates to a child.

We will retain personal data for no longer than is necessary. What is necessary will depend on the circumstances of each case, taking into account the reasons that the personal data was obtained.
End-of-contract process At the end of the contract, we extract data for our clients and then turn off their platform. We follow our GDPR process for deleting data.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service N/A
Service interface No
API No
Customisation available Yes
Description of customisation Each uniquely branded platform can be configured according to the clients preferences.

When we set you up with a new platform, we customise virtually everything about the platform so that it is tailor made to you and any partners you have engaged. This is an exciting yet rigorous process.

Customisations include:

- Customised template (e.g. logo, logomark, colour palette)
- Customised search filters
- Customised homepage (e.g. image, strapline, call-to-actions, footer)
- Customised SEO settings (e.g. SEO settings, homepage tag line, meta
description)
- Customised menus
- Customised administrator (Authorised User) settings
- Customised Google map
- Customised user types
- Customised partner settings
- Customised email notifications
- Customised (unique) URL
- About pages set up (excludes copywriting)
- Timebanking set up
- Support email set up.

Scaling

Scaling
Independence of resources We have service level agreements in place with our clients.

Analytics

Analytics
Service usage metrics Yes
Metrics types Google Analytics
Reporting types Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency Never
Protecting data at rest Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process No
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Users can download platform usage data via a CSV file. This is accessible via the Content Management System.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Description of Task / Issue Response Time

1 – High Priority

Business critical problems, e.g. website is non-operational.

2 hour maximum

2 – Medium Priority

Severe functional problems, e.g. user cannot register or customer profile cannot be added.

1 day maximum

3 – Medium/Low Priority

Less severe functional priority, e.g. broken link to an external provider website.

3 days maximum

4 – Low Priority

Does not affect website operations, e.g. general technical support.

7 days maximum

We do not have a refund policy.
Approach to resilience Available on request.
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication needed No
Access restrictions in management interfaces and support channels Secure CMS accessible only by username and password.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards CSA CCM version 3.0
Information security policies and processes Available on request.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Work not regarded as routine Maintenance Tasks will be regarded as enhancements (“Enhancements”). The following is a non-exhaustive list of work considered by Made Open to be Enhancements;
• Creation of new website features;
• Creation of new content management features;
• Bespoke development to social networking tools;
• Amendments to graphics, images, animations, brand identity, navigation;
• Addition of banners;
• Website redesign;
• Copywriting;
• Usability testing;
• Additional content management administrator training;
• Digital marketing services (bulk email, search engine optimisation); and,
• Creation of offline printed material.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Available on request
Protective monitoring type Undisclosed
Protective monitoring approach Available on request
Incident management type Undisclosed
Incident management approach Available on request

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £1250 per licence per month
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Terms and conditions
Service documents
Return to top ↑