Interfolio UK Ltd


Researchfish Impact and Evaluation Hub is a data collection service specifically tailored to the needs of the research community. Researchers have a single sign-on portal from which they can report the outputs and outcomes of their research. This data is used to measure and assess the impacts of funded research


  • Real-time reporting
  • Research Outcomes and Outputs collection
  • Research impact analysis
  • Research evaluation tool
  • Research impact assessment
  • Data curation and data management
  • Data harvesting and enrichment


  • Saves time and administrative burden for researchers
  • Allows cross attribution of outcomes and outputs
  • Enables benchmarking across organisations
  • Identify pathways to impact
  • Data harvesting and enrichment


£5500 to £1000000 per licence

Service documents


G-Cloud 11

Service ID

8 1 6 0 4 0 0 2 3 2 7 9 0 9 7


Interfolio UK Ltd

Sean Newell


Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
System requirements
Connected internet connection

User support

Email or online ticketing support
Email or online ticketing
Support response times
We operate the support desk during UK business hours 9:00am to 5:30pm. According to our Service Level Agreement, emails are replied to within 8 hours but typically we respond within an hour.
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Web chat accessibility testing
Onsite support
Yes, at extra cost
Support levels
We provide a permanent help desk offering phone, webchat and email support, Monday to Friday 9am to 5pm UK time. For international clients we provide out of UK hours support during submission periods, by prior arrangement. We also provide online training (free) and face to face training (chargeable) for administrators of the Researchfish service. Webinars are held at regular intervals each month to show new features as well as providing videos and online documentation to help users. We also have a customer service team to look after each client from an account management perspective, ensuring that each client has proactive assistance in managing their Researchfish account.
There is no additional charge for this support.
Support available to third parties

Onboarding and offboarding

Getting started
The first step is to set up the user on the Research fish platform and start to import the grants data into the system. Training is then given, either face to face or via the web, on the management of the account, how to set up and run a submission period. Documentation is available in digital format. Test awards are established to enable to administrator to fully understand the process before inviting the PIs to begin the submission process. After the submission period has completed further training is given in how to use the reporting tools and how to get the best out of the data gathered.
Service documentation
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
  • Video
  • Webinar
End-of-contract data extraction
Users can download their data at any time via the online interface. Further our contracts state that Researchfish will export all of the client's data and make it available in a standard format, within 30 days of the contract end. The client's data remains within researchfish for up to a year, after which it is deleted (or sooner if this client requests it)
End-of-contract process
Within 30 days of the contract end Research Fish Ltd will make available a copy of the client data in a standard digital format. All user accounts will be shut down and the account archived. The client may request that their data be permanently deleted from the platform and this will be done. If the client has not requested this, we will delete the data after 1 year. We remove the client's name from the "Our member's" webpage on the site.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
There is no difference in functionality between the mobile and desktop service
Service interface
Description of service interface
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
What users can and can't do using the API
Users are granted access via a backoffice function, which provides them with a unique key to access the researchfish API. This API is documented and allows the user to read agreement and outcome information. No write access is currently permitted via the API.
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
Users can add their own set of questions to the common question set. These additional questions are specified via an additional question specification document which is discussed with the client and then passed to the Researchfish configuration team for implementation. Adding additional questions can only be done by Researchfish staff.

In some situations a customer may wish to customise the functionality and these are considered on a case by case basis


Independence of resources
We use the Amazon elastic cloud which automatically spins up new instances of servers when the CPU capacity hits 35% thereby ensuring that no single server will become overloaded should user numbers increase.


Service usage metrics
Metrics types
Clients can see the progression of submissions at any time during the year via our online tracker dashboard. This shows the number of awards in submission, number of outputs submitted, attribution rates and percentage of awards submitted.
Reporting types
  • Real-time dashboards
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users may export their data in CSV, DOCX or XLSX formats from within the researchfish platform at any time.
Data export formats
  • CSV
  • Other
Other data export formats
  • DOCX
  • XLSX
Data import formats
  • CSV
  • Other
Other data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
Research Fish Ltd makes reasonable endeavours to ensure an SLA of 99.9%. In the event of an outage, Researchfish will restore the availability of the service as soon as possible however as Researchfish relies on 3rd party services Research Fish Ltd cannot guarantee that the service will always be available, uninterrupted or error free. There are no provisions for refunding users if the service is unavailable.
Approach to resilience
Researchfish is hosted on Amazon Web Services and utilises a number of cloud computing features in order to provide high availability. This includes auto-scaling and full monitoring of the service. The infrastructure is distributed across multiple geographic locations (within the EEA) to provide further resilience.
Outage reporting
Outages may be reported via a number of channels including:
Notice within the software

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Access restricted by individual user accounts and role based access controls.

Access to management interfaces controlled via two factor authentication / access via SSH bastion host.
Access restriction testing frequency
At least once a year
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
Outsourced development and working in secure areas
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Research Fish Ltd is ISO27001 certified

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Research Fish conduct a secure development process where all changes are tracked through version control and reviewed at each stage of the development cycle.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Software is kept patched to the latest version and patches can be applied immediately depending upon the severity of the issue.
Protective monitoring type
Protective monitoring approach
Available on Request
Incident management type
Supplier-defined controls
Incident management approach
Inline with ISO27001:2013

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£5500 to £1000000 per licence
Discount for educational organisations
Free trial available

Service documents

Return to top ↑