iSAMS Independent Ltd

iSAMS Management Information System

iSAMS is the first entirely web based school administration management information system. Its clever design combines a single database and suite of portals/apps to offer bespoke management of all academic, pastoral and administrative information for your Academy. iSAMS integrates with a number of approved third party software solutions.


  • 100% web-based supporting all browsers
  • Access onsite and offsite for flexible working
  • Intuitive and easy to use
  • Third-party integration and open RESTful API
  • Available on desktop, tablet and mobile
  • Managed migration and onboarding for a smooth transition
  • Regular system updates managed and performed by supplier
  • Management Information with statutory reporting
  • Academic tracking and behaviour management


  • Easy access to your school Management Information
  • Intuitive interface for all users, making data more accessible
  • Provides all statutory reports
  • Third-party vendors can connect to the iSAMS API
  • Access iSAMS from your desktop, tablet or mobile
  • Records assessment data for full analysis and monitoring
  • Monitor links between attainment and behaviour
  • Removed administrative burden enables teachers to focus on teaching
  • Integrated, flexible solution specifically developed for the education market
  • Feedback mechanism so you can influence future functionality


£4000 per instance per year

Service documents

G-Cloud 10


iSAMS Independent Ltd

Jamie Reid


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints We are regularly updating and enhancing iSAMS. Updates are typically released twice a week and include a combination of functionality improvements and system fixes. Formal release notes are available for each update, detailing the modules and associated enhancements. The updates are released during times of minimal use to avoid disruption – typically overnight - and are delivered via the internet directly to the server, regardless of the hosting arrangements.
System requirements
  • Browser
  • Windows or macOS

User support

User support
Email or online ticketing support Email or online ticketing
Support response times We have a ticketing systems which is monitored 24 hours a day Monday - Friday.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels Support is in included in the annual cost of the service and covers a standard level of service. Each new contact to the Service Desk is responded to within 30 minutes and provided with a unique reference number.

The Service Desk comprises 3 sub teams:
Customer Support – Responsible for receiving and managing all requests, front-end application support, accurately directing requests to other support teams and supporting clients with how they can best use iSAMS.
Technical Support – Responsible for back-end application support, data manipulation and all other technical support.
Reporting Services – Responsible for report creation, development and consultation.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started You are first greeted by our Onboarding Team. We arrange a Pre-Installs WebEx where we explain the installation process. A dedicated Installer is assigned to your school, they are available via Telephone and Email and will help migrate your schools data to iSAMS.

Once installation is complete one Experience Trainers will visit your school. We usually recommend 5 days of training initially. Our training programme is personalised to each School we visit and we help you configure iSAMS to your Schools requirements. Additional onsite training days can be provided and so can online WebEx's. All iSAMS modules are documented online and some videos can be provided.

Once training is complete you will have access to our 24 hour helpdesk.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction Schools have full access to iSAMS up until the contract expires. Data can be extracted through the front end of iSAMS. A backup of their iSAMS database and file structure is also provided so that all data can be extracted by the school.
End-of-contract process The end of contract process is included in the initial price. Once the contract ends, requested data is backed up and passed to the client. A copy is kept for 30 days before deletion. Any outstanding support requests are completed and the client advised. Support accounts for the client are suspended and removed after 30 days. Hosted site access is removed and an any associated accounts.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Being web-based, iSAMS can be accessed via a desktop or mobile device. Android and iOS Apps have been specifically designed for Teachers, Parents and Students. Each App has been designed with key functionality in mind for the targeted user.
Accessibility standards None or don’t know
Description of accessibility N/A
Accessibility testing N/A
What users can and can't do using the API All API methods are documented and can be found here:

API methods are designed to pass data securely over the internet between iSAMS and a Third Party.
API documentation Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The iSAMS front-end is highly customisable, including all brand elements. It can be configured online, on a user by user basis; different module views and preferences can also be saved.


Independence of resources Whether hosted on-site or in our cloud servers, each school has a separate instance of iSAMS.


Service usage metrics Yes
Metrics types Standard reporting is available to include:
Usage By Day Of Month
Usage By Day Of Week
Usage By Hour Of Day
Usage By Browser & User
Navigation & Referrers
Content Type Usage
Server Errors & Problems
Bandwidth Usage By Time
Methods, Status & Processing
Extensive logging throughout all of iSAMS is applied, schools can request custom reports and provide their own requirements.
Reporting types
  • Real-time dashboards
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process No
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Wizard routines have been designed to allow staff to easily export data for multiple students. Data is exported to PDF, CSV and Excel spreadsheets. CTF are supported and can be imported and exported within iSAMS.
Data export formats CSV
Data import formats Other
Other data import formats CTF

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability Agreed as part of the individual contract.
Approach to resilience Information is available on request.
Outage reporting A public Dashboard is available here: Users can subscribe for email alerts via the above Dashboard

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels Many Security Profiles can be created and assigned to a User. Each Security Profile controls a users access to the various modules in iSAMS.
Access restriction testing frequency At least once a year
Management access authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach We have a security policy documented which will soon be made public. The policy covers, but is not limited to:

- Secure Software Development Lifecycle
- Security testing
- Process when dealing with vulnerabilities
- Process for dealing with security breaches

We are also working towards ISO27001 accreditation.
Information security policies and processes We have an information security policy and are currently working towards ISO27001 accreditation.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We follow a Security Software Development Lifecycle in line with our security strategy.

We also have Product Owners who are responsible for individual components. They are responsible for reviewing and implementing any change management processes.
Vulnerability management type Undisclosed
Vulnerability management approach In line with our security strategy, we utilise a Security Software Development Lifecycle. The software is scanned for vulnerabilities using third-party scanning tools.

Patches for vulnerabilities are deployed within 48 hours to all clients.
Protective monitoring type Undisclosed
Protective monitoring approach We utilise a web-application firewall for all our customers. This allows us to identify potential compromises and respond accordingly.
Incident management type Undisclosed
Incident management approach We have a full Service Desk used by our clients for reporting any manner of incident.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No


Price £4000 per instance per year
Discount for educational organisations No
Free trial available No


Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑