Resource4u Ltd

Virtual Meetings Management System (V2MS)

V2MS turn Microsoft Office 365 Teams to a fully functional meeting management system offering features like board membership management, invites, papers sharing, video conferencing and virtual meetings. Meetings management one-stop-shop.

All information stored on the system is protected & assured with strict Microsoft security and compliance standards.


  • Board Meetings are collaboratively managed
  • Calendar, Papers, Members, Chat, Notes etc. all in one place
  • Meetings Management System
  • Integrated with Office 365 Active Directory
  • Trusted Custom Business Application over Microsoft Office 365
  • Robust solution backed with Microsoft Reliable SLAs
  • Complete solution including launch, uptake and tech support


  • Manage board & committee meetings
  • Invites, document sharing, notes, chats all in one place
  • Multi-factor security and access control
  • Board packs digital reading
  • Cross device intuitive reading access
  • Notes and annotations
  • Personal and group note books


£18000 to £24500 per instance per year

  • Education pricing available
  • Free trial available

Service documents


G-Cloud 11

Service ID

9 2 8 8 9 4 4 5 7 4 5 0 2 1 3


Resource4u Ltd

Rizwan Malik


Service scope

Software add-on or extension
What software services is the service an extension to
The system is founded on trusted Microsoft platforms combining the powers of Teams, SharePoint and Office365 groups. MarketPlace add-on are available as well as further extension development is possible using APIs.
Cloud deployment model
Public cloud
Service constraints
System requirements
  • Browsers: Current versions Chrome; Firefox, Safari, Edge, IE
  • Mobile devices requirements: Windows 10, iOS9.0, Android 5.0
  • Device Types: Smart Phones, Tablets Min. 7"
  • Outlook 2013 or Web App, OWA for iPhone, iPad, Android

User support

Email or online ticketing support
Email or online ticketing
Support response times
Critical Incident: 1 hr response time, then regular updates till resolution.
Medium Risk Incident: 3 hours response time, then regular updates till resolution
General Support: Within 24 hours, Monday to Friday. Weekend service can be provided at additional cost on case by case basis.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
Silver - An essential level support: Technical and user query support. Problem arising during usage. Manage escalations for defects. Provide technical and user guidance. Provide action plans and schedules regarding further system advancements. Support start from £9 per user per month.

Platinum - An enhanced level support: Includes all of the above, user access and licensing management, customisations and configurations of existing entities, knowledge transfer. Support starts from £19 per user per month.
Support available to third parties

Onboarding and offboarding

Getting started
Engage stakeholders at all levels of deployment including specific business requirements, analysis to pre-stage development, on-site / off-site training from basic to advance levels. Onboarding users with period of shadowing until system champions take the local control and ownership,. Generally ITIL v3 transition guidelines are followed, however, bespoke onboarding approaches are also developed upon clients' requests on case by case basis.
Service documentation
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
  • Recorded videos
  • Flow charts
End-of-contract data extraction
End-of-contract approach is typically agreed at the time of getting started with the implementation. Formulation of exit strategy is defined by keeping in mind the client's requirements.
End-of-contract process
End-of-contract scenarios are pre-agreed. Typically, we propose a defined framework approach or custom develop a methdology inline with clients requirements. Costs (if any) depending on size, nature and complexity of the deployment are also pre-agreed at the time of procurement.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Desktop service offers full features whereas some features may not be available on mobile services.
Service interface
Description of service interface
Leveraged upon compliant Microsoft platforms to meet accessibility standards.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
Leveraged upon compliant Microsoft platforms to meet accessibility standards.
What users can and can't do using the API
The Web API if offered by the core platforms Microsoft Teams, SharePoint. This provides a development experience which can be used across a wide variety of programming languages, platforms and devices.
API documentation
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Customisation available
Description of customisation
The solution is customisable and tailored to the given organisation's business needs. With the on-going development support package we offer customisation services. Customisations include but are not limited to user interfaces, datafields workflows, automations, reporting, approval processes, line of business integration, custom portal, mobile interface customisation, custom integrations with 3rd party services via APIs.


Independence of resources
Scales automatically and service quality is leveraged with Microsoft Dynamics 365 CRM, SharePoint 365 and PowerBI SLAs.


Service usage metrics
Metrics types
System tracks usages and keeps audit trails. Reporting formats are discussed and agreed on case by case basis.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
System offers data export wizards to configure export parameters or options to full export. Data is exported in Excel and CSV formats.
Data export formats
  • CSV
  • Other
Other data export formats
Files (Attachments: word, PDF, PowerPoint etc.)
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Service level 99.9% backed with Microsoft CRM Dynamics, SharePoint and PowerBI SLAs.
Approach to resilience
Information available upon request.
Outage reporting
Service outage can be communicated using various methods including public dashboards, email alerts and phone etc.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Limited access network (for example PSN)
  • Username or password
Access restrictions in management interfaces and support channels
Role based access control (RBAC) aligned with clients' requirements.
Access restriction testing frequency
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
Between 1 month and 6 months
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
Security governance is not certified, however, the security framework is based on the principles set within the ISO/IEC 27001.
Information security policies and processes
We have an information security policy that applies to the implementation of the systems and processes involved. During onboarding through induction and training, users are informed with the policy guides and the policy compliance is validated through various auditing techniques.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
ITIL framework guidelines are adopted to ensure systematic configuration and change management processes that deliver the outcomes.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Proactive threat and intrusion detection is leveraged upon Microsoft security assurance and compliance.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Various tools and techniques are used to control and safeguard the implementation and environment including access control, role based security and technical security monitoring managed and assured by Microsoft SLAs.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
We leverage on the guides provided by ITIL framework to lead on incident management approach. A bespoke and prioritised incident management approach can be agreed on case by case basis.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£18000 to £24500 per instance per year
Discount for educational organisations
Free trial available
Description of free trial
30 days free trial including:
- Contextual trial guide tailored to specific requirements
- Includes an instance of Microsoft Office365 Teams and SharePoint

Service documents

Return to top ↑