Macleod Associates

Workpepper

Workpepper is a cloud-based platform to monitor, track and deliver on-line and classroom learning for training providers, L&D departments and Colleges. Ofsted recognition for improving delivery for 5-20,000+ learners. Totally customisable for scheduling, room/tutor availability/optimisation, attendance, funding eligibility and employment tracking for apprenticeships "Without data, you only have an opinion."

Features

  • Schedules learning programmes, tracks attendance and measures assessment outcomes
  • Every training intervention recorded & accessible - permission controlled
  • ALL communications recorded - SMS, Email, Phone, Mail
  • Intuitive navigation - no training required
  • Auto-communication - new templates instantly created
  • Customised look and feel to match your brand
  • Highest level of Data Security and Back-Up: ISO 27001
  • Real time reporting for all data required
  • Optimised for Laptop, Tablet & Smartphone
  • 'O' Data interface to link existing/legacy system data

Benefits

  • Access all data 24/7/365 from any internet-connected device
  • Every learner has a personalised account viewable by relevant stakeholders
  • Substantially reduce administrative time with automated but personalised communication
  • Real time data to aid immediate management interventions
  • Create wait lists & future courses based on demand data
  • Researched design to maximise user journey experience & uptake
  • Cloud based, open source software to minimise build/update costs
  • SCORM compliant to facilitate blended or e-learning delivery
  • Customisable dashboards for key metrics/reports
  • FREE, easy to use Intranet to enhance organisation-wide communications

Pricing

£1950 per instance

  • Education pricing available
  • Free trial available

Service documents

G-Cloud 9

868968436362829

Macleod Associates

Adrian Slater

07785274589

adrian.slater@hotmail.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints None
System requirements Modern Browser (Chrome, IE10+)

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Support response is within the hour during extended working hours of 08.00 to 17.00, Monday to Friday
User can manage status and priority of support tickets No
Phone support No
Web chat support Yes, at an extra cost
Web chat support availability 24 hours, 7 days a week
Web chat support accessibility standard None or don’t know
How the web chat support is accessible To some degree through web screen readers and through the responsive interface fonts which can be scaled
Web chat accessibility testing None
Onsite support Yes, at extra cost
Support levels • Email
• Phone
• Live chat
• Onsite
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started Service onboarding process forms part of the overall package.
However, as Workpepper is invariably co-designed by all stakeholders and adopts agile build and deployment, with 2 weekly sprints followed by UAT, training is very rarely required. The system is intuitive and deliberately designed to facilitate simple navigation for all stakeholders, who only need to see and access fields relevant to them.
Service documentation Yes
Documentation formats
  • PDF
  • Other
Other documentation formats Step by step narrated video training per topic
End-of-contract data extraction A service offboarding process will be agreed, as appropriate, with every customer and is included as part of the overall package.
End-of-contract process TBC

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10+
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service All platforms are optimised for desk/laptops, tablets and mobile devices
Accessibility standards None or don’t know
Description of accessibility TBC
Accessibility testing TBC
API Yes
What users can and can't do using the API 'O' Data API access is available and supported.
Connect via secure oData interface and query the datamodel. It is not possible to change security credentials of accounts via the interface or do SSO.
API documentation Yes
API documentation formats Open API (also known as Swagger)
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The entire look and feel of the Workpepper platform can be customised according to customer preferences. Workflows are also created in consultation with the customer to ensure the platform supports and optimises business processes, rather than business process having to fit the platform. Once the platform design has been co-designed and deployed, the customer can create, amend and delete many features to facilitate everyday changes and requirements, without having to wait or pay for expensive developer time.

Scaling

Scaling
Independence of resources The systems are totally siloed with scalable resources per system to exceed anticipated client demand.

Analytics

Analytics
Service usage metrics Yes
Metrics types Real-time management information is provided in a suite of pre-agreed reports.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency Less than once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process No
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach Consumers can access the data via the oData interface
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability 99% uptime. Refund on a per hour basis (1/730 of monthly fee)
Approach to resilience Servers are setup in a redundant failover configuration, with multiple backups throughout the day.
The server equipment is located individual Cabinets
Equipment is maintained and monitored in climate-controlled environments with SLAs for temperature and humidity.
The data center is designed with five layers of physical security, 24/7 security staff and access control systems.
Outage reporting Text and email notification as an option

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Though a role based approach
Access restriction testing frequency Never
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards ISO/IEC 27001
Information security policies and processes None

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Changes are managed in a continuous deployment process. Releases are packaged and tested in a staging environment before deployment to production
Vulnerability management type Undisclosed
Vulnerability management approach Systems are monitored though different vectors.
Hotfixes can be deployed within hours.
Protective monitoring type Undisclosed
Protective monitoring approach Servers are reviewed weekly for threats.
Breaches will be communicated within hours and impact coordinated with the customer for full transparency
Incident management type Undisclosed
Incident management approach Currently undefined

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £1950 per instance
Discount for educational organisations Yes
Free trial available Yes
Description of free trial A sandbox enviroment can be provided for testing purposes

Documents

Documents
Pricing document View uploaded document
Skills Framework for the Information Age rate card View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑