CCube eForms
The Electronic Form gives the ability to capture and workflow e-business forms and is completely compatible with any application. The form is very easy to setup and use - the user simply fills out drop down lists, check-boxes, radio buttons, and text fields that can be validated in real time.
Features
- Interactively change according to needs of each individual user’s session
- Electronic forms link to supporting documents of all types
- System Administrators can change the way the form presents itself
- No need for programming– eForms model business process
- eForms are independent of back-end business systems
- eForms support integration with back-end business systems
- Completed forms can be saved in any repository
- Completed forms can trigger back end workflows
- eForms are detached from any front-end application
- eForms are application independant, eliminating any licensing implications
Benefits
- Maximize engagement with users
- Dramatically cut data entry and duplication costs
- Streamline business processes and improve efficiencies
- Improved service to users by automating feedback
- Reduction in data duplication and errors
- Reduction in printing and management costs compared with paper forms
- Standardization of procedures and templates and reduction in paper
- Forms completed by staff that don't need to be specialist
- Improved use and access promotes integrity of business data
- Integration with back-end IT solutions and databases
Pricing
£21,650 a licence a year
- Education pricing available
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at henry.francis@ccubesolutions.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 11
Service ID
8 8 8 2 0 7 9 5 3 4 8 5 2 1 4
Contact
CCube Solutions
Henry Francis
Telephone: 01908677752
Email: henry.francis@ccubesolutions.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- EDRMS - Electronic Document and Records Management Service.
- Cloud deployment model
- Private cloud
- Service constraints
- Planned maintenance arrangements will be agreed with customers to minimise any impact to their usage of the service.
- System requirements
-
- Linux 64 bit OS
- Min 1 GB memory (recommended 8 GB memory)
- Min 50 GB storage
- Access to SQL Database
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 1 hour of receipt.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
We offer a 24x7x365 days per year Service desk software that enables issues to be logged. This Service desk is monitored out of hours. Support is offered weekdays from 08:30 to 17:30. We manage a central, UK based Help Desk and Call Logging facility which is web based and accessible to customers – each customer has an account setup within this facility for logging calls and for monitoring their progress. The on-line help desk facility is available on a 24/7 basis. Monitoring of calls received takes place during extended normal hours, ie. between 8.30am and 17.30. Call monitoring outside these hours is available on an agreed basis.
We provide direct Technical Support, including:
• call receipt
• call screening
• incident reporting and tracking
• search problem databases and resolve documented problems
• installation assistance
• problem isolation
• problem resolution.
All calls are logged and information on issues and their resolutions held within our on-line call-logging facility which is accessible to customers. This in turn provides a knowledge repository. The service also includes an internal error log facility as well as a full audit trail.
We provide a technical account manager to each customer. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Onsite or remote training (Train the Trainer is the favoured approach), video tutorials, webinars, to setup of service. User documentation is provided.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Via API, database extraction (dump).
- End-of-contract process
- At the end of the contract, assuming that the customer does not wish to renew, the customer extracts their data from the service and we, in agreement with the customer, delete all data records held. This is included in the price of the contract. Any additional requirements that the customer may have, may be subject to an additional fee.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 7
- Internet Explorer 8
- Internet Explorer 9
- Internet Explorer 10
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- There are no differences between mobile and desktop service, other than screen size.
- Service interface
- No
- API
- Yes
- What users can and can't do using the API
- Create, Delete, Modify documents and database items within the service.
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Users can customise our service through the creation of new forms/documents to be published for use. Customisation would normally be carried out by Users who create forms.
Branding of the service for users is also possible. Re branding would normally be carried out by a System Administrator/Super User.
Scaling
- Independence of resources
- Service automatically scales out to accommodate increased user load and storage.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Logging of changes made, documents created, modified or deleted, system level audit trail and application level logging.
- Reporting types
-
- API access
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Via API, database extraction (dump).
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- Minimum 99.95% service availability - Unavailability applies to existing VMs that become unresponsive due to a fault recognised at the IaaS layer or below, that is, the fault is within UKCloud-controlled components, such as the physical host availability, storage, power and internal networking such as physical firewalls and routers.
- Approach to resilience
- Multiple secure UK data centres separated by more than 100km and connected by high-bandwidth, low-latency dedicated connectivity.
- Outage reporting
- Proactive monitoring, 24 hour staffed NOC
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Role based security within the service.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Limited access network (for example PSN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Platform optimised for OFFICIAL and OFFICIAL-SENSITIVE data and fully aligned to the National Cyber Security Centre (NCSC) 14 Cloud Security Principles.
- Information security policies and processes
- Platform optimised for OFFICIAL and OFFICIAL-SENSITIVE data and fully aligned to the National Cyber Security Centre (NCSC) 14 Cloud Security Principles.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Change management and configuration management is undertaken at 3 levels, first by development team during coding, then by development team and CTO on predeployment server, finally on locally hosted live server. Once passed all stages it is deployed to production installations.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Vulnerabilities are identified and the risks of these vulnerabilities are evaluated. This then leads to correcting the vulnerabilities and removing the risk or formal risk acceptance by the organization. Vulnerability scanning is carried out, consisting of using software to identify vulnerabilities in networks, computer infrastructure or applications.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Protective Monitoring provides visibility and an understanding of who is accessing sensitive data.The Protective Monitoring system is used to ensure that there is a level of operational insight, to ensure that we have an understanding of how the systems are being used or abused by internal or external agents.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Issues/problems are raised via our Service desk facility Zendesk, the call is assigned to 1st line support, who will perform a base level diagnosis of the issue. If they can fix the issue the call will be closed. If not, they will gather as much information and assign the call to second line support, who will then look more deeply into the issue. If the issue is deemed to be with the core code this will be passed onto the Development manager. At every stage the Customer is updated with what is happening to the call.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
- NHS Network (N3)
Pricing
- Price
- £21,650 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- EForms Software for a 3 month period, including 1 Form set up and Training.
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at henry.francis@ccubesolutions.com.
Tell them what format you need. It will help if you say what assistive technology you use.