PublishMyData is an end-to-end solution for publishing and connecting data on the web, helping public sector organisations work more efficiently and to deliver improved services. PublishMyData incorporates a polished end-user website, powerful management interface, performance-tuned graph store and programming interfaces - delivered together with hosting maintenance, technical support and consultancy.
- Publish linked open data
- Machine readable and human readable '5-star' data
- Searchable data catalogue
- Make complex custom data selections for download
- API and SPARQL endpoint access to data
- Data downloads
- 'Grafter' Extract-Transform-Load framework for data import
- Data visualisations
- Support for 'data cube' statistical data
- Sophisticated data administration user interface and API
- Publish open data on the web to maximise data re-use
- Reduce costs and increase quality of the data publishing process
- Make data easily accessible to analysts
- Enable developers to build applications using your data
- Present data clearly to non-specialists
- Support data-driven decision making and policy design
- Meet government guidance for 5-star data
£1600 per instance per month
- Pricing document
- Skills Framework for the Information Age rate card
- Service definition document
- Terms and conditions
Swirrl IT Limited
0845 0035 389
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
|Service constraints||No specific constraints.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
Within 2 hours during office hours, 8.00 - 18.00, Monday to Friday excluding public holidays.
Outside of these times, we respond to questions on a reasonable efforts basis, unless a more specific SLA is established.
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
See Service Definition document for full details.
All options include: availability and support response SLA, bug fixing, security updates, backups, new software versions at no extra cost.
Resource bundles come with varying amounts of premium support time, for miscellaneous help and advice, answering end user questions, data updates, progress reviews, data strategy advice, data modelling and processing, training etc
|Support available to third parties||Yes|
Onboarding and offboarding
The services comes with documentation, including guidance on getting started.
On-site training courses, can be commissioned as part of a premium support service.
|End-of-contract data extraction||All published data hosted by the system is available for download in a range of formats. In addition, Swirrl can provide on request a single full dump of a customer's data.|
At the end of the contract, the customer's site is turned off.
All customer data will be deleted 30 days after end of contract, unless the customer requests us to retain a copy of it (which we are happy to do at no extra charge).
The customer can download data themselves or Swirrl will provide a full export of the customer's databases at no extra charge.
Any custom requirements for data export can be supplied at extra cost as part of the premium support service.
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||All functions are available on mobile devices, with the exception of some interactive map-based visualisations that are impractical on small touch-screen based devices, and some technical details of API access are only available on larger screens.|
|What users can and can't do using the API||
All published data in the system is available via API. Each page in the user interface has options to retrieve data in various machine-readable formats, as well as the HTML view; and there is an openly available fully flexible query endpoint (using the SPARQL query language) for a fully flexible approach.
In addition, authorised administrators can update the data in the site through an API, which supports all the same functions as the administration user interface (with the exception of user management) - including adding, deleting and updating dataset contents, dataset metadata and supporting vocabularies and reference data.
|API documentation formats||
|API sandbox or test environment||Yes|
|Description of customisation||
The basic level of customisation is to adapt the colour scheme, customer logo, choice of fonts and introductory home page text.
Further customisations typically consist of additional external applications focused on delivering subsets of data for particular audiences or purposes. These can be developed by buyers themselves, using the APIs provided, or can be commissioned from Swirrl as part of premium support services.
|Independence of resources||Each customer has their own assigned virtual server with associated computing resources.|
|Service usage metrics||Yes|
Total data storage
Web site use (powered by Google Analytics)
Total network traffic (powered by the provider of cloud virtual servers)
|Supplier type||Not a reseller|
|Staff security clearance||Staff screening not performed|
|Government security clearance||Up to Baseline Personnel Security Standard (BPSS)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||
|User control over data storage and processing locations||No|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||Less than once a year|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||Physical access control, complying with SSAE-16 / ISAE 3402|
|Data sanitisation process||Yes|
|Data sanitisation type||Deleted data can’t be directly accessed|
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||Users can export data using the download features built in to the user interface of PublishMyData, or can use the API or query endpoint for more complex or specific export requirements.|
|Data export formats||
|Other data export formats||
|Data import formats||
|Other data import formats||
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
|Guaranteed availability||See Service Definition document for details of SLA, which provides for 99.5% availability and a scale of increasing refunds if the SLA is not met.|
|Approach to resilience||We use major public cloud datacentres (Google Cloud and Amazon Web Services) who provide world-leading standards of resilience.|
|Outage reporting||Email alerts|
Identity and authentication
|User authentication needed||Yes|
|User authentication||Username or password|
|Access restrictions in management interfaces and support channels||
Access to the management interface of a service is restricted by username and password. Each registered user is assigned a role, with associated rights, so the degree of access of each user can be assigned appropriately.
A customer can nominate which users are able to use the support service and named individuals are granted access.
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||Username or password|
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||Between 1 month and 6 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||Between 1 month and 6 months|
|How long system logs are stored for||Between 1 month and 6 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||We follow practices based on ISO27001 but have not been formally accredited.|
|Information security policies and processes||We follow internally documented security policies, available on request. A company director has responsibility for ensuring processes are followed. New staff are trained in the procedures.|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||All software components are tracked in a version control system. An automated continuous integration system is used to test and manage controlled builds of the overall system. New builds are only deployed after passing all tests, which include security related tests. Third party libraries used are reviewed for any known security vulnerabilities and for alignment with the overall security architecture.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
Vulnerabilities in third party software, such as operating systems, databases, web servers, web development frameworks, are monitored via the subscriptions to relevant mailing lists.
Most reports of security vulnerabilities require installation of a software patch or new version.
Based on potential impacts, the urgency of installing the fix is assessed. Sometimes, immediate action will be required. Sometimes, upgrading can be part of the next software release.
Because of the use of cloud servers and the automated approach to deployment, updates to the OS are implemented by setting up a new virtual server, then applying all relevant OS patches and upgrades.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
All errors arising in the system are reported to a tracking service, which sends email alerts to support staff. A range of potential unusual server behaviour is also monitored and leads to email alerts when certain conditions are met. Any such alert is investigated to understand the cause.
The response to a compromise depends on the severity, but in serious cases it would involve taking a server offline, then rebuilding a clean new server and loading backup data. Serious incidents are addressed immediately we become aware of them.
|Incident management type||Supplier-defined controls|
|Incident management approach||
Users can report incidents by email, phone or web form to our support system (currently using the Freshdesk software), where a ticket is issued.
Reports on incident resolution, or progress towards resolution are added to the ticket in Freshdesk, which the user can view at any time.
The system provides reports on numbers and types of incidents and resolution time.
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£1600 per instance per month|
|Discount for educational organisations||No|
|Free trial available||No|