Swirrl IT Limited

PublishMyData

PublishMyData is an end-to-end solution for publishing and connecting data on the web, helping public sector organisations work more efficiently and to deliver improved services. PublishMyData incorporates a polished end-user website, powerful management interface, performance-tuned graph store and programming interfaces - delivered together with hosting maintenance, technical support and consultancy.

Features

  • Publish linked open data
  • Machine readable and human readable '5-star' data
  • Searchable data catalogue
  • Make complex custom data selections for download
  • API and SPARQL endpoint access to data
  • Data downloads
  • 'Grafter' Extract-Transform-Load framework for data import
  • Data visualisations
  • Support for 'data cube' statistical data
  • Sophisticated data administration user interface and API

Benefits

  • Publish open data on the web to maximise data re-use
  • Reduce costs and increase quality of the data publishing process
  • Make data easily accessible to analysts
  • Enable developers to build applications using your data
  • Present data clearly to non-specialists
  • Support data-driven decision making and policy design
  • Meet government guidance for 5-star data

Pricing

£1600 per instance per month

Service documents

Framework

G-Cloud 11

Service ID

7 6 9 5 0 6 7 7 0 2 7 9 4 1 8

Contact

Swirrl IT Limited

Bill Roberts

0845 0035 389

gcloud@swirrl.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
No specific constraints.
System requirements
  • Modern web browser (IE11+, Chrome, Firefox, Safari)
  • Web access from customer site, both http and https

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 2 hours during office hours, 8.00 - 18.00, Monday to Friday excluding public holidays.

Outside of these times, we respond to questions on a reasonable efforts basis, unless a more specific SLA is established.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
See Service Definition document for full details.

All options include: availability and support response SLA, bug fixing, security updates, backups, new software versions at no extra cost.

Resource bundles come with varying amounts of premium support time, for miscellaneous help and advice, answering end user questions, data updates, progress reviews, data strategy advice, data modelling and processing, training etc
Support available to third parties
Yes

Onboarding and offboarding

Getting started
The services comes with documentation, including guidance on getting started.

On-site training courses, can be commissioned as part of a premium support service.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
All published data hosted by the system is available for download in a range of formats. In addition, Swirrl can provide on request a single full dump of a customer's data.
End-of-contract process
At the end of the contract, the customer's site is turned off.

All customer data will be deleted 30 days after end of contract, unless the customer requests us to retain a copy of it (which we are happy to do at no extra charge).

The customer can download data themselves or Swirrl will provide a full export of the customer's databases at no extra charge.

Any custom requirements for data export can be supplied at extra cost as part of the premium support service.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
All functions are available on mobile devices, with the exception of some interactive map-based visualisations that are impractical on small touch-screen based devices, and some technical details of API access are only available on larger screens.
Service interface
No
API
Yes
What users can and can't do using the API
All published data in the system is available via API. Each page in the user interface has options to retrieve data in various machine-readable formats, as well as the HTML view; and there is an openly available fully flexible query endpoint (using the SPARQL query language) for a fully flexible approach.

In addition, authorised administrators can update the data in the site through an API, which supports all the same functions as the administration user interface (with the exception of user management) - including adding, deleting and updating dataset contents, dataset metadata and supporting vocabularies and reference data.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
The basic level of customisation is to adapt the colour scheme, customer logo, choice of fonts and introductory home page text.

Further customisations typically consist of additional external applications focused on delivering subsets of data for particular audiences or purposes. These can be developed by buyers themselves, using the APIs provided, or can be commissioned from Swirrl as part of premium support services.

Scaling

Independence of resources
Each customer has their own assigned virtual server with associated computing resources.

Analytics

Service usage metrics
Yes
Metrics types
Total data storage
Web site use (powered by Google Analytics)
Total network traffic (powered by the provider of cloud virtual servers)
Reporting types
  • Real-time dashboards
  • Regular reports

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
Less than once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can export data using the download features built in to the user interface of PublishMyData, or can use the API or query endpoint for more complex or specific export requirements.
Data export formats
  • CSV
  • Other
Other data export formats
  • JSON-LD
  • Turtle
  • N-triples
  • Plain text
Data import formats
  • CSV
  • Other
Other data import formats
  • JSON-LD
  • Turtle
  • N-triples

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
See Service Definition document for details of SLA, which provides for 99.5% availability and a scale of increasing refunds if the SLA is not met.
Approach to resilience
We use major public cloud datacentres (Google Cloud and Amazon Web Services) who provide world-leading standards of resilience.
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Access to the management interface of a service is restricted by username and password. Each registered user is assigned a role, with associated rights, so the degree of access of each user can be assigned appropriately.

A customer can nominate which users are able to use the support service and named individuals are granted access.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
We follow practices based on ISO27001 but have not been formally accredited.
Information security policies and processes
We follow internally documented security policies, available on request. A company director has responsibility for ensuring processes are followed. New staff are trained in the procedures.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All software components are tracked in a version control system. An automated continuous integration system is used to test and manage controlled builds of the overall system. New builds are only deployed after passing all tests, which include security related tests. Third party libraries used are reviewed for any known security vulnerabilities and for alignment with the overall security architecture.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Vulnerabilities in third party software, such as operating systems, databases, web servers, web development frameworks, are monitored via the subscriptions to relevant mailing lists.

Most reports of security vulnerabilities require installation of a software patch or new version.

Based on potential impacts, the urgency of installing the fix is assessed. Sometimes, immediate action will be required. Sometimes, upgrading can be part of the next software release.

Because of the use of cloud servers and the automated approach to deployment, updates to the OS are implemented by setting up a new virtual server, then applying all relevant OS patches and upgrades.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
All errors arising in the system are reported to a tracking service, which sends email alerts to support staff. A range of potential unusual server behaviour is also monitored and leads to email alerts when certain conditions are met. Any such alert is investigated to understand the cause.

The response to a compromise depends on the severity, but in serious cases it would involve taking a server offline, then rebuilding a clean new server and loading backup data. Serious incidents are addressed immediately we become aware of them.
Incident management type
Supplier-defined controls
Incident management approach
Users can report incidents by email, phone or web form to our support system (currently using the Freshdesk software), where a ticket is issued.

Reports on incident resolution, or progress towards resolution are added to the ticket in Freshdesk, which the user can view at any time.

The system provides reports on numbers and types of incidents and resolution time.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Pricing

Price
£1600 per instance per month
Discount for educational organisations
No
Free trial available
No

Service documents

Return to top ↑