Kuorum.org enables city and borough councils to launch a citizen engagement website. The platforms built with our technology can be customized with logo and colors. They have a contact management board, mass mailing features and user profiles. Users can participate in: Debates, surveys, petitions, events with ticketing and participatory budgets.


  • Custom citizen engagement website
  • CRM
  • Email blasts
  • Online debates and forums
  • Surveys
  • Polls
  • Events with ticketing
  • Petitions
  • Participatory Budgets
  • Citizen authentication and online voting


  • Easily generate debates, forums, surveys, polls and much more
  • Segment your audiences and automatically classify your contacts
  • Revise participation statistics in an intuitive way
  • Export Excel and pdf reports or connect with our API
  • Manage all the phases of your budget in one table
  • No technical knowledge required to maintain the site
  • Authorized legal contracts and maximum security standards
  • Help desk service and free updates
  • Responsive (user friendly in all devices)
  • Pay only for the features you use


£6000 per licence per year

  • Education pricing available
  • Free trial available

Service documents


G-Cloud 11

Service ID

8 5 9 7 9 7 0 9 3 2 6 9 1 1 4



Matias Nso



Service scope

Service scope
Software add-on or extension No
Cloud deployment model
  • Public cloud
  • Community cloud
Service constraints N/A
System requirements None

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Less than 8 working hours
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.1 AA or EN 301 549
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels We provide free technical support and training, so that our customers can get up to speed quickly. We also provide strategic consultancy on participatory processes and communication at an additional cost.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We provide free on- and offline training to clients. We also provide user guides, a tour and other documentation.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction They can download it in csv or xlsx format. They can also connect to the platform API.
End-of-contract process The use of the platform, technical support and training is included with the yearly price of the service.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service None.
Service interface Yes
Description of service interface Clients can easliy manage their admin config.
Accessibility standards WCAG 2.1 AA or EN 301 549
Accessibility testing We continuously monitor the usage of our tools and use heatmaps and analytics to enhance the service. We also carry out qualitive tests frequently.
What users can and can't do using the API Our customers can use our API to do data mining and coordinte the platform with other software.
API documentation Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
API sandbox or test environment Yes
Customisation available Yes
Description of customisation Clients can customize the platform with their look & feel (logo, colours and pictures) and can also choose the level of participation they want to allow in the platform (for example, letting user create petitions is an optional feature). Users can also customize their profiles.


Independence of resources We use scalable on-demand web server and emailing services.


Service usage metrics Yes
Metrics types We provide aggregated metrics about the use of the platform. Clients can also see and download a complete package of metrics in their dashboard.
Reporting types
  • API access
  • Real-time dashboards
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest Other
Other data at rest protection approach Third party service.
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Data can be exported with cvs, xls and pdf files or through our API.
Data export formats
  • CSV
  • Other
Other data export formats
  • XLS
  • PDF
  • API
Data import formats
  • CSV
  • Other
Other data import formats Directly coordinating Gmail, Yahoo! or Hotmail agendas

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability We guarantee that, if the service stops working for any reason, it will be recovered in less than 40 operational hours. May the cut last longer, we will refund our customers the proportional part of the subscription monthly fee.
Approach to resilience All services are balanced and duplicated. If one of the services falls down, the balancer redirects all traffic to the others services while the system recovers the valid status.
Outage reporting Email alerts.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels Access to the API is restricted throuhg a JWTS key.
Access to the Website is restricted throuhg OAuth2 authentication protocol.
Access restriction testing frequency At least once a year
Management access authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information You control when users can access audit information
How long user audit data is stored for Less than 1 month
Access to supplier activity audit information You control when users can access audit information
How long supplier audit data is stored for Less than 1 month
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach We have an internal security protocol.
Information security policies and processes We follow the European General Data Protection Regulation, as described in our Privacy Policy, Terms of Use and Purchase Agreement. All the data accessed is protected via personal RSA key and through VPN. And the personnel authorised to access data must follow the internal security protocol.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We evolve the product applying Agile and Scrum. If a component of the service suffers big modifications, we will inform clients in advance. Changes are always assessed for potential secutiry impact.
Vulnerability management type Supplier-defined controls
Vulnerability management approach We run tests before every deploy to the test and pro environments.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Potential risks that can compromise security are identified during the tests before every deploy or at the twice-yearly stress tests. If a potential compromise is found, we deploy back the last secure version of the code until we solve the problem or we generate the corresponding patch.
Incident management type Supplier-defined controls
Incident management approach Helpdesk is included in all the services and by any means of communication during office hours. Every incident will also need to be registered through JIRA, a project management system. The client will get a ticket with an incident number that will serve to identify the issue. The client will be able to access the system at any time and see the state of its request. Incidents will be classified according to their nature (bug, task or enhancement) and level of urgency (high, medium or low). Those errors that block the normal functioning of the client will be considered urgent.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £6000 per licence per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Unrestricted 14-day trial.

Service documents

Return to top ↑