Accipio Ltd

Moodle Learning Management System

Accipio supplies the worlds most popular learning management system - Moodle. Moodle has an incredibility rich set of functionality, and we work with you to make Moodle the “backbone” of building learning and performance culture. Moodle offers significant cost savings compared with other platforms since it is open-source.

Features

  • Create and manage eLearning delivery and assessment
  • Wide mix of supported media (SCORM, Interactive Documents, HVP, Video)
  • Enables social learning, collaboration, social networking and knowledge sharing
  • Customisable branded Themes and Dashboards different types of audiences
  • Personal development plans for targeted training, and full competency/goal management
  • 360 degree feedback management
  • Integrated interactive performance Dashboards for Corporate performance management
  • Detailed reporting
  • Integrate with third party authentication/HR systems, and OpenBadges

Benefits

  • Easily manage users, and track completion / competence / certification
  • Provide access to interactive and engaging learning 24/7
  • Manage classroom sessions for blended learning
  • View real-time usage and completion monitoring
  • No “vendor lock-in” and significant savings
  • Managers can assign learning, and view completion data
  • See what percentage has completed compliance training
  • Manage performance
  • Deploy a beautifully branded site learners want to visit

Pricing

£1 per user per year

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 9

763931220385646

Accipio Ltd

Sascha Benson-Cooper

02071172690

sascha@accipio.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints No
System requirements Modern browser (compatible with IE9 and above)

User support

User support
Email or online ticketing support Email or online ticketing
Support response times 8am-8pm Mon-Fri, 9am-5pm Sat and Sun and Bank Holidays (closed Christmas Day and New Years Day).

Phone- immediate response. Email- response within 4 working hours.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.0 AA or EN 301 549
Phone support Yes
Phone support availability 9 to 5 (UK time), 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels We have three support packages:

1) Pay as you go. This is a credit based support system, and covers advice and task delivery. 10 credits cost £800 ex VAT and last for 3 months. Each credit is worth up to 1 hour of work.

2) All you can eat. This is for unlimited "advice" on front end configuration. This costs £3,000 ex VAT per annum.

3) Bespoke. We can create a bespoke support package to meet your needs. This could include on-site support, complete service management and training. Our fees start at £750 per day ex VAT.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We recommend a two day practitioner course which we can deliver at your offices or as part of an open programmes. There is comprehensive online documentation.
Service documentation Yes
Documentation formats HTML
End-of-contract data extraction We will provide a full backup of the site at the end of the contract. Data can be extracted via course backups and csv exports for example.
End-of-contract process We will provide a full backup of the site at the end of the contract. This is normally on a USB drive. The costs £200 ex VAT.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10+
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Our sites are fully responsive. We can also deploy a standalone App if required.
Accessibility standards WCAG 2.0 A
Accessibility testing When deciding how Totara/Moodle should present its content for best Web accessibility, the WCAG 2.0 guidelines is followed.

We do not do any testing ourselves as the main code is open source.
API Yes
What users can and can't do using the API RESTful and SOAP

Our team can work with you to develop any bespoke changes.
API documentation Yes
API documentation formats HTML
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Clients can customise key parts of the theme, and all front-end configuration. This includes user processes, courses, learning plans, hierarchies, positions and much more.

We would need to be involved in any back-end bespoke enhancements.

Scaling

Scaling
Independence of resources Each client has a dedicated server.

We normally configure the server so that 10% of users can be on the platform at the same time. In reality, the server can cope with a much higher load.

We can deploy a second load balancing instance on request for larger sites.

Analytics

Analytics
Service usage metrics Yes
Metrics types We use a combination of Totara custom reports and Google Analytics to report on the platform.

We can report on most things, from usage per day to most popular courses.

We even embed feedback surveys to capture qualitative data about courses and the platform.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest Physical access control, complying with CSA CCM v3.0
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach There are a number of ways to export user data. The main method is CSV. Full documentation can be found here: https://docs.moodle.org/22/en/Import_and_export_FAQ
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • Excel
  • HTML table
  • XML
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats XML

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Our standard SLA includes:
- First-Call Resolution - 70% of incoming enquires resolved on first contact;
- Turn-Around Time - 80% of administrative and technical issues resolved completed within 24 hours;
- Scheduled maintenance windows - Weekends and after 16:00 during week days with prior written permission; and

For critical issues (those impacting all users):
- Response within 4 hours with estimated resolution time (with acknowledgement of Critical status)
- Resolution within 2 working days before escalation

For non – critical issues:
- Response within 24 hours
- Resolution within 4 working days

Escalated issues:
- Daily update
- Resolution within 3 working days
- Supply of bespoke reports
- Acknowledgement of request within 6 hours with estimated delivery time and cost
- Delivery of business critical reports within 7 working days

Downtime:
- No more than 5% downtime during office hours within 1 year (19 hours falling between 9am and 5pm, Monday – Friday which is 2 working days)

We will provide support credit if we do not meet the above SLA. This is calculated 10% of support credits paid for the year for each time we do not meet one of the above criteria.
Approach to resilience Available on request
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels 2-factor authentication
Username and password
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information You control when users can access audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation No
Security governance approach We are in the process of securing ISO 27017 certification. We outsource our hosting to AWS (ISO 27017 certified).

Access to AWS cloud hosting is restricted by:

1) auth key to access the AWS console (only registered devices have access)
2) pem / private key to access the server

Any local backups are kept on an encrypted key.

Computers with access servers are encrypted.

Access to our offices is via a security key.

Staff are vetted and only gain access to servers once they have demonstrated competence and gained trust.

We have disaster recovery plans to deal with most circumstances.
Information security policies and processes Accipio takes measures to protect from loss or corruption, unauthorized access and modification. We follow the eight principles of the Data Protection Act 1998, and the broad outline of ISO 17799 guidelines for information security.

All staff will report any suspected security breaches to a Director who will log in the security breech log. A Director will maintain,
monitor and report on any security incidents which may result in further investigation and action if required.

Accipio maintains a register of all employees who are allowed access to all parts of the system containing electronic data. All staff must agree to written terms and conditions covering use of IT when they are employed at the company.

Our Information Security policy is available on request.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Our cloud hosting is provided by AWS - a leading cloud hosting provider trusted by the largest brands in the world. They manage the cloud infrastructure.

We run two EC2 instances for each client - one for the live site, and one for a development and testing. Changes made to the development site are tracked, and once tested, rolled out to the live site.

We use Github for code management and versioning.

Totara releases updates which we deploy. These are tracked and managed by Totara.
Vulnerability management type Undisclosed
Vulnerability management approach We perform vulnerability assessments on a monthly basis. We also follow the latest Moodle security alerts, and notifications from AWS. We run scans and keep current with the latest insights from the industry. Our configured alarms and penetration testing help to threats. We have a vulnerability triage group which meets once a vulnerability assessment has been performed. We assess the severity and likelihood of the threat, and use a Common Vulnerability Scoring System. New vulnerabilities reported by Moodle normally result in a patch being generated rapidly. We would install this within one day in most cases.
Protective monitoring type Supplier-defined controls
Protective monitoring approach We have measures in place to detect attacks and unauthorised activity on the service. We have configured various alarms and audit logs to identify suspicious activity. We have high levels of security for access. Events are analysed to identify potential compromises or inappropriate use of our service. If we find a potential compromise, we take swift and appropriate action (normally within hours).
Incident management type Supplier-defined controls
Incident management approach We have an incident management process which is deployed in response to security incidents. The response depends on the type of incident or attack. We report all incidents to the Director in charge, and where appropriate, the client as soon as practicable. This is normally in the form of electronic incident reports sent via email. A follow up phone call is normally made as well for clients.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £1 per user per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Our free trail includes a simple branded site with admin login. The site is live for 2 weeks.

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Terms and conditions document View uploaded document
Return to top ↑