ProduQtive Limited

ProduQtive- Total workforce management solution

A single platform for employers of all sizes and all sectors. Develop workforce plans, including complex rotas; schedule establishment against plans and convert into active rosters; manage activity such as re-deployment, swaps, absenteeism,leave management. Build and internal bank; engage in a collaborative bank, and engage framework suppliers for all staffing-groups.

Features

  • Rota Manager: plan rotas governed by terms
  • e-Roster; time-saving fulfilment tools.
  • Build an active internal flexible workforce
  • Engage approved suppliers, governed by agreed terms
  • Rules and permissions control the demand for agencies
  • Algorithms to govern cost and breaches in terms
  • Control over attendance, time worked against planned.
  • Analytics real-time, customisation and scheduled tools
  • Customisation and bespoke development as an option
  • Reduce transaction cost- higher supplier engagement

Benefits

  • Suitable for organisations of any size
  • Rapid deployment. Ease of use reduce training and increase adoption
  • High degree of innovation and customer satisfaction
  • Low cost and high value - guaranteed return on investment
  • complete control over cost, pay inflation, quality, scope creep
  • Modular - open API to interface with 3rd party solutions
  • Effective support for managers to identify and mitigate risk
  • Customisation and bespoke development as an option
  • Innovative: planning, scheduling, risk management, re-deployment and safe-staffing
  • 247 chat and email support and optional specialist services

Pricing

£25000 per instance per year

Service documents

Framework

G-Cloud 11

Service ID

8 6 3 2 1 0 6 3 3 2 5 4 3 7 3

Contact

ProduQtive Limited

Paul Pieterse

07985444513

paul@produqtive.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints No
System requirements
  • Access to reasonably fast internet
  • Access to browsers, Chrome, Safari, Firefox or Microsoft Edge

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Instant recognition of requirement which issues a tracking number followed by second response, whihc will include feedback, comments or advice within 15min.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Web chat
Web chat support availability 24 hours, 7 days a week
Web chat support accessibility standard None or don’t know
How the web chat support is accessible All users have access to the chat box, that is present on the bottom left of the page, the chat team respond to chats within seconds and can identify the user and the where in the application the user is. each chat must be resolved or closed before the next chat can be opened. All activity is monitored and feed-back/ratings are instant.
Web chat accessibility testing None.
Onsite support Yes, at extra cost
Support levels 24/7 chat support- no additional charge
Email support: 24/7 with no additional charge
Telephone support Mon-Friday 09:00 to 17:00- no additional charge
On-site support: £100 per hour excluding VAT and expenses
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We structure the implementation, training and continuous support on a case by case basis. All documentation is modular and complemented by online tutorials and structured training sessions. Our implementation and adoption programme strives to increase utilisation to maximise savings and we therefore offer a blend of options for the clients to choose from.

Clients have the option to customise our documentation and re-brand the documentation if there is a benefit.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Upon request, the client data is extracted, stored and delivered to the client, following their instructions. Other than the cost of procuring an encrypted storage device, large enough to hold the client's data, there is no additional charge.
End-of-contract process The user's account and that of all their employees, contractors and applicants will be deactivated. There is no additional cost or charges. Please note that only contractors and suppliers that are exclusively associated with the client and have no wish to continue using the service will be deactivated.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Android
  • IOS
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Pages are optimised to work on the desired device. functionality is also adjusted to support touch screen devices as apposed to using a mouse.
Service interface No
API Yes
What users can and can't do using the API Our API is evolving to support the needs of our clients. It is a relatively new component of our application and not ready for deployment. At present, the limitation will be that our technical team will need to assist in the process. We are part of a NHS I supplier framework that is working towards the standardisation of data to encourage interoperability. We had to delay our development of the API to accommodate the future standards.
API documentation Yes
API documentation formats Open API (also known as Swagger)
API sandbox or test environment Yes
Customisation available Yes
Description of customisation - Front-end labels and terminology.
- Configuration of the organisation structure.
- The association of employees, contractors, candidates and applicants to locations, divisions, projects, roles or activity.
- Rules, processes and workflows.
- Look-up tables for reporting (example- reasons for a request).
- Set-up and remove permissions and roles.
- Set-up and edit job roles, selected occupations, grades and specialisms/skills.
- Set-up and manage suppliers according to order of preference, status, cost, quality and terms.
- Configure a documents library to support transactions.
- Set-up employment and service contracts to be generated at the point of offer.
- Configure cost centres, cost codes, financial year end, currency and geo-location/time zones.
- Configure languages (case by case).
- Configure rules on timesheet management.

There are a further 15 potential variables that can be configured by the customer

Complete customisation is possible for large clients who opt for a private hosting and support service

Scaling

Scaling
Independence of resources The web-server is designed around micro services to isolate transactions down to individual department, not to affect the rest of the user base. We also implement real-time load-balancing to increase and decrease resources where needed. Our application is hosted with Microsoft Azure (United Kingdom servers) and we have visibility over activity via email alerts and dashboards

Analytics

Analytics
Service usage metrics Yes
Metrics types Part of our charging mechanism is based on usage- i.e. if you don't use it, you don't pay. We therefore track all activity on our system.
- number of users signed in at any given time
- the duration each user is signed in for
- the frequency a user accesses the solution over a period
- how they navigate through the system
- how often the repeat the same function
- what device they use to access the service
- how long it takes them to complete an action or a transaction
- correlating feed-back to actual usage
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Due to the sensitive nature of employee records and contact details, we do not provide data exports. We do however offer exports of transaction data, required to process payroll but this is limited to non sensitive data and is managed in a secure process.

Data that can be exported are reports- which will not contain any sensitive data.
Data export formats
  • CSV
  • Other
Other data export formats
  • PDF
  • Excel
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Legacy SSL and TLS (under version 1.2)
Data protection within supplier network Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability 99% continuous up-time. If we need to take the service off-line, it will not be for more than 30min; all users will be notified 7 days in advance followed up by daily reminders; A time slot between 02:00 and 03:00 will be used.
Approach to resilience Our solution is hosted with Azure where we manage a robust contingency
Outage reporting We monitor a dashboard provided by Azure, which includes an email alert. We use the same tool to notify us if we are running low on resources.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
  • Other
Other user authentication Role based permission access- limits the user on what he can see or edit.
Access restrictions in management interfaces and support channels All users are given role based access to the application, restricting their viewing and editing rights. The client has full control over this process and can activate or deactivate users along with changing their Role within the organisation.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach At present we use certified consultants to advise us on security governance. We are also in the process of accreditation with the Cloud Security Alliance (corporate membership). https://cloudsecurityalliance.org
Information security policies and processes We periodically review the handling procedures of sensitive information and hold security awareness meetings with our clients to incorporate best practice in their day to day operations.
As part of our own induction and on-boarding of a new client, we share a detailed security policy document. Employees must confirm that they understand the content of our document.
All employees that handle sensitive information undergo background checks within the limits of the law.
As a growing business, all data and system security is the responsibility of the CEO. The objective is to, over time, create a head-of data and system governance role.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We continue to enhance and develop our functionality on the ProduQtive platform. Before each release, the system undergoes a series of tests, which includes a security (penetration). We schedule 4 large updates a year. Each version is referenced and stored and all documentation is provided to support users on any changes introduced.
Vulnerability management type Supplier-defined controls
Vulnerability management approach - two factor user authentication
- encrypted passwords
- auto lockout for more than 5 failures
- Role based authentication
- Notification from data host provider (Azure) when unusual activity is identified- i.e. increased volume of access failures.
- Restrict access to production environments
- Patch management is instant
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach We employ all the services offered by Microsoft Azure to identify, isolate and remedy and threat to our application, users and or data.
- dashboard
- instant email and text notification
- immediately response
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Any incident (accidental, intentional or deliberate) is included in the process. All incidents are immediately reported to the CEO. The CEO and the CTO will investigate the incident and mitigate risks associated with the incident. Resolve the incident and keep the relevant parties informed. Provide a detailed report back to the relevant party within 2 days of the incident being resolved. Take appropriate legal action if and when required.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £25000 per instance per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial All clients qualify for a free period of 3 months, which includes all access and all modules. Specialist support services are not included.
There is no licence fee for the recruitment and flexible workforce modules (incl. vendor management) but is charged on a fee per successful transaction.
Link to free trial Www.produqtive.com

Service documents

Return to top ↑