HMO Licensing software, landlord licensing, property licensing
Property Licensing software management system. Landlord HMO Licensing, Additional and Selective licensing. On line application, back office processing and management of applications.
Features
- Cloud hosted - Secure and scalable
- White label - fully customiseable to client branding
- Security - single sign on, two factor authentication
- Accessibility - designed to Gov.uk guidelines and mobile responsive
- Housing Act 2004 - fully compliant with legal requirements
- Mobile app with cloud integration
- Cloud based team management and workflow
- Integrated payment gateway, print and direct post solution
- API integration
- Portfolio landlord features
Benefits
- Works out of the box - no long implementation needed
- Reduces processing time significantly and reduces administration costs
- Reduction in human error by using automated licence type identification
- Optimising teams productivity using workload scheduling
- Designed by practitioners experienced in delivering licensing schemes
- Mobile solutions cloud based to provide real time inspection information
Pricing
£10,000.00 a unit
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at pip.watson@metastreet.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 10
Service ID
9 2 2 3 5 6 8 6 3 8 8 3 8 7 9
Contact
Metastreet Ltd
Pip Watson
Telephone: 07739287331
Email: pip.watson@metastreet.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- No
- System requirements
-
- Modern web browser (v.IE8+)
- Smart phone for two factor authentication
- Each user needs unique e-mail address
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
2 hour response during normal working hours 9a.m to 5 p.m
Emergency only response at weekends
Enhanced response can be agreed as required to meet peak usage - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.0 A
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.0 A
- Web chat accessibility testing
- Webchat access is provided by a 3rd party who have extensively tested it
- Onsite support
- Yes, at extra cost
- Support levels
-
Technical account manager support
Support package can be tailored to clients requirements - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Training will be available on site and online
User documentation available
Support line available - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- We will assist in the migration of data to the buyer or a new supplier as detailed in the agreed exit plan. This will be in a format agreed with the buyer.
- End-of-contract process
- Obligations as required by the agreed exit plan and contract are included in the price of the contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 8
- Internet Explorer 9
- Internet Explorer 10
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Menu structure
- Accessibility standards
- WCAG 2.0 A
- Accessibility testing
-
Interfaces with screen reader products
Designed according to Gov.uk guidelines - API
- Yes
- What users can and can't do using the API
- No limitations, anything on the front end can be achieved through the API
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Branding
Fee levels
Post code look up
Scaling
- Independence of resources
- Auto scaling infrastructure and a queue based messaging pipeline to stop blocking requests
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Applications submitted
Applications processed
Payment - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Can be provided on request
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- 99%
- Approach to resilience
- This is available on request
- Outage reporting
-
E-mail alerts
Public dashboard
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- We implement a role based access control list and have a policy using principle of least privilege
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- All software development and products are done to OWASP guidelines
- Information security policies and processes
- Full details are available on request
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Any new feature before it goes into development has a security impact assessment .Before any functional major release there is a regression test and a external penetration test before release.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We follow industry news bulletins for potential threats. Dependant on relevance and severity we provide patches within 48 hours. All threats are risk assessed and triaged
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We employ third party tools such as 'Tripwire' which monitors any unauthorised access to production environments.
Our system administrators investigate immediately on being alerted with the relevant business and tech stakeholders - Incident management type
- Supplier-defined controls
- Incident management approach
- We have a pre-defined incident report process and all clients are notified by e-mail of the incident and our response and kept updated
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £10,000.00 a unit
- Discount for educational organisations
- No
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at pip.watson@metastreet.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.