Collections CRM
Collections CRM is a fully integrated enterprise cloud software solution for any organisation that wants to process and manage Debt Collection. Our Collections CRM covers debtor analysis and court management helping to ensure a quicker turnaround on all debtor cases.
Features
- Electronic Signature Module
- Third Party integration with VoIP PBX and Diallers Solutions
- Full Prospect & Lead Management Module
- Full Customer Relationship CRM functionality
- Prospect, Customer, Staff, Contractor Diary Management
- Full Resource, Workflow, and Activity Process Management
- Advanced Sales & Purchasing Financial Module
- Flexible Multiple Market & Product Types
- Intelligent Bulk Processing of Workflow Activities
- Built-in Send & Receive SMS, Email Modules including Marketing
Benefits
- Business Flexibility and work from anywhere Mobility
- Reduced capital expenditure due to lower cost of ownership
- Simplified system maintenance with automatic software upgrades
- High availability business continuity and disaster recovery
- Advanced IT Cloud Security and Data Protection
- Better staff resource management increasing Competitiveness
- Environmentally Friendly
Pricing
£30 to £50 a user a month
- Education pricing available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at aimee.roby@brightoffice.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 12
Service ID
9 9 2 2 7 9 5 0 0 1 4 7 7 5 6
Contact
BrightOffice Ltd
Aimee Roby
Telephone: 0845-643-4012
Email: aimee.roby@brightoffice.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- Our service is fully scalable, and all maintenance is managed project specifically to ensure service availability to meet each customers needs.
- System requirements
-
- Hosted systems must be provided by BrightOffice
- Hosted systems must be maintained by BrightOffice
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
During normal business hours response times vary subject to triage:
1 Working Hour - RED - Business Critical
4 Working Hours - AMBER - Work around
8 Working Hours - GREEN - None Critical
On-call hours subject to pre-agreement - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
-
We offer standard UK business hours support within our standard licencing subscription service.
Users will have direct access to our 1st Line Support Team.
Each customer is assigned a dedicated Client Manager. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide a consultative implementation which includes, onsite training, documentation, remote training sessions and sandbox walk through.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- BrightOffice provide a copy of the specific system Database as well as all documents generated and files upload and attached to records.
- End-of-contract process
-
Included within the price of the contract is the provision of the final database and attached documents & files.
For large data volumes, the customer must provide to BrightOffice their own storage device to enable this service to be carried out.
BrightOffice will then return the device to the customer.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 7
- Internet Explorer 8
- Internet Explorer 9
- Internet Explorer 10
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
Our application works using the standard smartphone browsers in full windows format in the same way as a tablet or desktop browser.
Our service also has smartphone application for specific modes. - Service interface
- No
- API
- Yes
- What users can and can't do using the API
- Primary Prospect, customer, questionnaire, case, job records can be created and updated via XML.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Users with Administration rights can update properties, settings, data tables, Document, Email & SMS templates, triggers, workflows, users, permissions.
Scaling
- Independence of resources
- Each customer has their own database, application pools and allocated hardware resources assigned. Users within the same customer will be controlled by permissions, and roles limiting and controlling their accessibility. All fundamental bulk data reporting, importing, updates or processing are managed carefully and can also have restrictions applied based on day/time and number of records.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
BrightOffice can provide the user there own data in both user grids for access, and also report on activities.
On request BrightOffice can provide headline reporting showing global access, activities and other specific KPI data. - Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- All exports of data are carried out in the form of reporting which are then converted to Microsoft Excel.
- Data export formats
- Other
- Other data export formats
- Microsoft Excel
- Data import formats
- Other
- Other data import formats
- Microsoft Excel
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
-
We have 3 levels of SLA
RED - Business Critical Issues - 1 Hour Response
AMBER - - 4 Hour Response
GREEN - 8 Hour Response - Approach to resilience
- Available on Request
- Outage reporting
- All Service outage is reported by email and SMS directly to our Technical team for immediate action. In the event that clients need to be informed this is done via automatic email, and in some cases direct SMS & telephone communication.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Username or password
- Other
- Other user authentication
- Option for approved IP address, day/time restrictions permissions
- Access restrictions in management interfaces and support channels
-
Users are restricted within a "Company Settings" area, where this enables user profiles to be created with varying levels of user access. From basic call centre agents with full DPA restrictions to full administrator access which enables customer properties changes.
Our support teams have procedures to only take change requests from Pre-Approved customer CRM administrators. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
-
The Governance is structured from the top down and is set by the Directors of the company.
The Governance comes in the form of strict policies and procedures which ensure that our services are secure, and controlled in a consistent and effective manner.
All change management of these procedures are strictly controlled by the directors, monitored and fully audited by the senior management team. - Information security policies and processes
- Procedures are used within our technical team, which are managed and monitored by our software manager, and audited by our Software Director.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- As we only maintain a single framework with multiple application modes, we have developed our configuration and change management process over many years, and are able to replicate this process for all our existing and new customers. All configuration and infrastructure changes are tested on sandbox and then written into our procedures to enable full visibility, monitoring and audit.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
-
We have full sandbox systems for all application modes, and all versions and patches are tested within this environment prior to release.
We have our own dedicated development team and we have the autonomy to be able to deploy patches on a ad-hoc basis should the need arise. We have full datacentre monitoring tools to help identify threats such as brute force attacks etc, and we also ensure all feedback from customers are actioned. - Protective monitoring type
- Undisclosed
- Protective monitoring approach
- In the event of a potential threat we carry out a risk assessment, and deploy the necessary resources to start to resolve the threat. This response can be immediate, and all patches would be tested and released as a matter of utmost priority.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
We can receive incident reports via telephone, email & SMS.
All incidents are recorded by our support team, verified and tasks created.
Response times are based on Triage RED/AMBER/GREEN and Resolutions can either be resolved by the 1st Line Support Team, 2nd Line Technical or in the event of bugs our 3rd Line Development Team. Incident reports are available on request to customers.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £30 to £50 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at aimee.roby@brightoffice.co.uk.
Tell them what format you need. It will help if you say what assistive technology you use.