ProduQtive- Total workforce management solution
A single platform for employers of all sizes and all sectors. Develop workforce plans, including complex rotas; schedule establishment against plans and convert into active rosters; manage activity such as re-deployment, swaps, absenteeism,leave management. Build and internal bank; engage in a collaborative bank, and engage framework suppliers for all staffing-groups.
- Rota Manager: plan rotas governed by terms
- e-Roster; time-saving fulfilment tools.
- Build an active internal flexible workforce
- Engage approved suppliers, governed by agreed terms
- Rules and permissions control the demand for agencies
- Algorithms to govern cost and breaches in terms
- Control over attendance, time worked against planned.
- Analytics real-time, customisation and scheduled tools
- Customisation and bespoke development as an option
- Reduce transaction cost- higher supplier engagement
- Suitable for organisations of any size
- Rapid deployment. Ease of use reduce training and increase adoption
- High degree of innovation and customer satisfaction
- Low cost and high value - guaranteed return on investment
- complete control over cost, pay inflation, quality, scope creep
- Modular - open API to interface with 3rd party solutions
- Effective support for managers to identify and mitigate risk
- Customisation and bespoke development as an option
- Innovative: planning, scheduling, risk management, re-deployment and safe-staffing
- 247 chat and email support and optional specialist services
|Software add-on or extension||No|
|Cloud deployment model||
|Email or online ticketing support||Email or online ticketing|
|Support response times||Instant recognition of requirement which issues a tracking number followed by second response, whihc will include feedback, comments or advice within 15min.|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||Web chat|
|Web chat support availability||24 hours, 7 days a week|
|Web chat support accessibility standard||None or don’t know|
|How the web chat support is accessible||All users have access to the chat box, that is present on the bottom left of the page, the chat team respond to chats within seconds and can identify the user and the where in the application the user is. each chat must be resolved or closed before the next chat can be opened. All activity is monitored and feed-back/ratings are instant.|
|Web chat accessibility testing||None.|
|Onsite support||Yes, at extra cost|
24/7 chat support- no additional charge
Email support: 24/7 with no additional charge
Telephone support Mon-Friday 09:00 to 17:00- no additional charge
On-site support: £100 per hour excluding VAT and expenses
|Support available to third parties||Yes|
Onboarding and offboarding
We structure the implementation, training and continuous support on a case by case basis. All documentation is modular and complemented by online tutorials and structured training sessions. Our implementation and adoption programme strives to increase utilisation to maximise savings and we therefore offer a blend of options for the clients to choose from.
Clients have the option to customise our documentation and re-brand the documentation if there is a benefit.
|End-of-contract data extraction||Upon request, the client data is extracted, stored and delivered to the client, following their instructions. Other than the cost of procuring an encrypted storage device, large enough to hold the client's data, there is no additional charge.|
|End-of-contract process||The user's account and that of all their employees, contractors and applicants will be deactivated. There is no additional cost or charges. Please note that only contractors and suppliers that are exclusively associated with the client and have no wish to continue using the service will be deactivated.|
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||Pages are optimised to work on the desired device. functionality is also adjusted to support touch screen devices as apposed to using a mouse.|
|What users can and can't do using the API||Our API is evolving to support the needs of our clients. It is a relatively new component of our application and not ready for deployment. At present, the limitation will be that our technical team will need to assist in the process. We are part of a NHS I supplier framework that is working towards the standardisation of data to encourage interoperability. We had to delay our development of the API to accommodate the future standards.|
|API documentation formats||Open API (also known as Swagger)|
|API sandbox or test environment||Yes|
|Description of customisation||
- Front-end labels and terminology.
- Configuration of the organisation structure.
- The association of employees, contractors, candidates and applicants to locations, divisions, projects, roles or activity.
- Rules, processes and workflows.
- Look-up tables for reporting (example- reasons for a request).
- Set-up and remove permissions and roles.
- Set-up and edit job roles, selected occupations, grades and specialisms/skills.
- Set-up and manage suppliers according to order of preference, status, cost, quality and terms.
- Configure a documents library to support transactions.
- Set-up employment and service contracts to be generated at the point of offer.
- Configure cost centres, cost codes, financial year end, currency and geo-location/time zones.
- Configure languages (case by case).
- Configure rules on timesheet management.
There are a further 15 potential variables that can be configured by the customer
Complete customisation is possible for large clients who opt for a private hosting and support service
|Independence of resources||The web-server is designed around micro services to isolate transactions down to individual department, not to affect the rest of the user base. We also implement real-time load-balancing to increase and decrease resources where needed. Our application is hosted with Microsoft Azure (United Kingdom servers) and we have visibility over activity via email alerts and dashboards|
|Service usage metrics||Yes|
Part of our charging mechanism is based on usage- i.e. if you don't use it, you don't pay. We therefore track all activity on our system.
- number of users signed in at any given time
- the duration each user is signed in for
- the frequency a user accesses the solution over a period
- how they navigate through the system
- how often the repeat the same function
- what device they use to access the service
- how long it takes them to complete an action or a transaction
- correlating feed-back to actual usage
|Supplier type||Not a reseller|
|Staff security clearance||Conforms to BS7858:2012|
|Government security clearance||None|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||Deleted data can’t be directly accessed|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||
Due to the sensitive nature of employee records and contact details, we do not provide data exports. We do however offer exports of transaction data, required to process payroll but this is limited to non sensitive data and is managed in a secure process.
Data that can be exported are reports- which will not contain any sensitive data.
|Data export formats||
|Other data export formats||
|Data import formats||CSV|
|Data protection between buyer and supplier networks||Legacy SSL and TLS (under version 1.2)|
|Data protection within supplier network||Legacy SSL and TLS (under version 1.2)|
Availability and resilience
|Guaranteed availability||99% continuous up-time. If we need to take the service off-line, it will not be for more than 30min; all users will be notified 7 days in advance followed up by daily reminders; A time slot between 02:00 and 03:00 will be used.|
|Approach to resilience||Our solution is hosted with Azure where we manage a robust contingency|
|Outage reporting||We monitor a dashboard provided by Azure, which includes an email alert. We use the same tool to notify us if we are running low on resources.|
Identity and authentication
|User authentication needed||Yes|
|Other user authentication||Role based permission access- limits the user on what he can see or edit.|
|Access restrictions in management interfaces and support channels||All users are given role based access to the application, restricting their viewing and editing rights. The client has full control over this process and can activate or deactivate users along with changing their Role within the organisation.|
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||At least 12 months|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||At least 12 months|
|How long system logs are stored for||At least 12 months|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||At present we use certified consultants to advise us on security governance. We are also in the process of accreditation with the Cloud Security Alliance (corporate membership). https://cloudsecurityalliance.org|
|Information security policies and processes||
We periodically review the handling procedures of sensitive information and hold security awareness meetings with our clients to incorporate best practice in their day to day operations.
As part of our own induction and on-boarding of a new client, we share a detailed security policy document. Employees must confirm that they understand the content of our document.
All employees that handle sensitive information undergo background checks within the limits of the law.
As a growing business, all data and system security is the responsibility of the CEO. The objective is to, over time, create a head-of data and system governance role.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||We continue to enhance and develop our functionality on the ProduQtive platform. Before each release, the system undergoes a series of tests, which includes a security (penetration). We schedule 4 large updates a year. Each version is referenced and stored and all documentation is provided to support users on any changes introduced.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
- two factor user authentication
- encrypted passwords
- auto lockout for more than 5 failures
- Role based authentication
- Notification from data host provider (Azure) when unusual activity is identified- i.e. increased volume of access failures.
- Restrict access to production environments
- Patch management is instant
|Protective monitoring type||Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402|
|Protective monitoring approach||
We employ all the services offered by Microsoft Azure to identify, isolate and remedy and threat to our application, users and or data.
- instant email and text notification
- immediately response
|Incident management type||Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402|
|Incident management approach||Any incident (accidental, intentional or deliberate) is included in the process. All incidents are immediately reported to the CEO. The CEO and the CTO will investigate the incident and mitigate risks associated with the incident. Resolve the incident and keep the relevant parties informed. Provide a detailed report back to the relevant party within 2 days of the incident being resolved. Take appropriate legal action if and when required.|
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||No|
|Price||£25000 per instance per year|
|Discount for educational organisations||Yes|
|Free trial available||Yes|
|Description of free trial||
All clients qualify for a free period of 3 months, which includes all access and all modules. Specialist support services are not included.
There is no licence fee for the recruitment and flexible workforce modules (incl. vendor management) but is charged on a fee per successful transaction.
|Link to free trial||Www.produqtive.com|