Swirrl IT Limited


PublishMyData is an end-to-end solution for publishing and connecting data on the web, helping public sector organisations work more efficiently and deliver improved services. PublishMyData incorporates a polished end-user website, powerful management interface, performance-tuned linked-data store and APIs - delivered together with hosting maintenance, technical support and consultancy.


  • Publish linked open data
  • Machine readable and human readable '5-star' data
  • Searchable data catalogue
  • Make complex custom data selections for download
  • API and SPARQL endpoint access to data
  • Data downloads
  • 'Grafter' Extract-Transform-Load framework for data import
  • Data visualisations
  • Support for 'data cube' statistical data
  • Sophisticated data administration user interface and API


  • Publish open data on the web to maximise data re-use
  • Reduce costs and increase quality of the data publishing process
  • Make data easily accessible to analysts
  • Enable developers to build applications using your data
  • Present data clearly to non-specialists
  • Support data-driven decision making and policy design
  • Meet government guidance for 5-star data


£2,000 an instance a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at gcloud@swirrl.com. Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

8 1 7 0 3 2 1 8 1 4 7 2 0 8 0


Swirrl IT Limited Bill Roberts
Telephone: 0845 0035 389
Email: gcloud@swirrl.com

Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
No specific constraints.
System requirements
  • Modern web browser (IE11+, Chrome, Firefox, Safari)
  • Web access from customer site, both http and https

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within 2 hours during office hours, 8.00 - 18.00, Monday to Friday excluding public holidays.

Outside of these times, we respond to questions on a reasonable efforts basis, unless a more specific SLA is established.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
See Service Definition document for full details.

All options include: availability and support response SLA, bug fixing, security updates, backups, new software versions at no extra cost.

Resource bundles come with varying amounts of premium support time, for miscellaneous help and advice, answering end user questions, data updates, progress reviews, data strategy advice, data modelling and processing, training etc
Support available to third parties

Onboarding and offboarding

Getting started
The services comes with documentation, including guidance on getting started.

On-site training courses, can be commissioned as part of a premium support service.
Service documentation
Documentation formats
End-of-contract data extraction
All published data hosted by the system is available for download in a range of formats. In addition, Swirrl can provide on request a single full dump of a customer's data.
End-of-contract process
At the end of the contract, the customer's site is turned off.

All customer data will be deleted 30 days after end of contract, unless the customer requests us to retain a copy of it (which we are happy to do at no extra charge).

The customer can download data themselves or Swirrl will provide a full export of the customer's databases at no extra charge.

Any custom requirements for data export can be supplied at extra cost as part of the premium support service.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
All functions are available on mobile devices, with the exception of some interactive map-based visualisations that are impractical on small touch-screen based devices, and some technical details of API access are only available on larger screens.
Service interface
What users can and can't do using the API
All published data in the system is available via API. Each page in the user interface has options to retrieve data in various machine-readable formats, as well as the HTML view; and there is an openly available fully flexible query endpoint (using the SPARQL query language) for a fully flexible approach.

In addition, authorised administrators can update the data in the site through an API, which supports all the same functions as the administration user interface (with the exception of user management) - including adding, deleting and updating dataset contents, dataset metadata and supporting vocabularies and reference data.
API documentation
API documentation formats
  • Open API (also known as Swagger)
  • HTML
API sandbox or test environment
Customisation available
Description of customisation
The basic level of customisation is to adapt the colour scheme, customer logo, choice of fonts and introductory home page text.

Further customisations typically consist of additional external applications focused on delivering subsets of data for particular audiences or purposes. These can be developed by buyers themselves, using the APIs provided, or can be commissioned from Swirrl as part of premium support services.


Independence of resources
Each customer has their own assigned virtual server with associated computing resources.


Service usage metrics
Metrics types
Total data storage
Web site use (powered by Google Analytics)
Total network traffic (powered by the provider of cloud virtual servers)
Reporting types
  • Real-time dashboards
  • Regular reports


Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
Less than once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can export data using the download features built in to the user interface of PublishMyData, or can use the API or query endpoint for more complex or specific export requirements.
Data export formats
  • CSV
  • Other
Other data export formats
  • Turtle
  • N-triples
  • Plain text
Data import formats
  • CSV
  • Other
Other data import formats
  • Turtle
  • N-triples

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
See Service Definition document for details of SLA, which provides for 99.5% availability and a scale of increasing refunds if the SLA is not met.
Approach to resilience
We use major public cloud datacentres (Google Cloud and Amazon Web Services) who provide world-leading standards of resilience.
Outage reporting
Email alerts

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Access to the management interface of a service is restricted by username and password. Each registered user is assigned a role, with associated rights, so the degree of access of each user can be assigned appropriately.

A customer can nominate which users are able to use the support service and named individuals are granted access.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
We follow practices based on ISO27001 but have not been formally accredited.
Information security policies and processes
We follow internally documented security policies, available on request. A company director has responsibility for ensuring processes are followed. New staff are trained in the procedures.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All software components are tracked in a version control system. An automated continuous integration system is used to test and manage controlled builds of the overall system. New builds are only deployed after passing all tests, which include security related tests. Third party libraries used are reviewed for any known security vulnerabilities and for alignment with the overall security architecture.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Vulnerabilities in third party software, such as operating systems, databases, web servers, web development frameworks, are monitored via the subscriptions to relevant mailing lists.

Most reports of security vulnerabilities require installation of a software patch or new version.

Based on potential impacts, the urgency of installing the fix is assessed. Sometimes, immediate action will be required. Sometimes, upgrading can be part of the next software release.

Because of the use of cloud servers and the automated approach to deployment, updates to the OS are implemented by setting up a new virtual server, then applying all relevant OS patches and upgrades.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
All errors arising in the system are reported to a tracking service, which sends email alerts to support staff. A range of potential unusual server behaviour is also monitored and leads to email alerts when certain conditions are met. Any such alert is investigated to understand the cause.

The response to a compromise depends on the severity, but in serious cases it would involve taking a server offline, then rebuilding a clean new server and loading backup data. Serious incidents are addressed immediately we become aware of them.
Incident management type
Supplier-defined controls
Incident management approach
Users can report incidents by email, phone or web form to our support system (currently using the Freshdesk software), where a ticket is issued.

Reports on incident resolution, or progress towards resolution are added to the ticket in Freshdesk, which the user can view at any time.

The system provides reports on numbers and types of incidents and resolution time.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£2,000 an instance a month
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at gcloud@swirrl.com. Tell them what format you need. It will help if you say what assistive technology you use.