Market Location Limited

UK Brand New Business Data

Brand New Business Data means you will be licensed for usage with a dataset of the 118 Group UK Business Database comprising of Business Records which have started, changed owner, relocated or opened a brand new office within the period of three months immediately preceding delivery date. Usage Terms&Conditions apply.

Features

  • Access to 1.8 million UK business-data records from verified Database
  • Widely recognised as the most up-to-date and accurate Business Database
  • Telephone Researched database
  • Database includes 1 million email addresses
  • Database includes 2million verified contact details
  • High data consistency, accuracy and coverage
  • Integrated Data Filtering to match customer requirements
  • SIC, Market Sector Code and offline match/append process available
  • High service availability
  • GDPR compliant sourcing and management processes

Benefits

  • Datasets of UK Business Data filtered to your needs
  • Make informed decisions about UK business sectors
  • Make informed choices about UK businesses in locations
  • Make informed choices about trends in new and closing businesses
  • Access to information whenever needed
  • High quality data
  • Fast turnaround
  • High quality data
  • High volumes to suit requirements
  • Compatible with other services

Pricing

£7000 per licence

  • Free trial available

Service documents

Framework

G-Cloud 11

Service ID

1 1 7 8 1 5 9 3 0 4 5 1 1 9 3

Contact

Market Location Limited

Jason Chainey

01252941224

customersupport@marketlocation.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
No.
System requirements
Internet access

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within three working hours
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
No
Support levels
Where a Support Call has been escalated and cannot be resolved by other methods then onsite support by appropriate staff resources will be provided at no additional charge.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
To get customers started on using the service:
- A web link is provided to customers with login details,
- Phone and email assistance is generally provided,
- In addition to provision of clear user guides.
- Onsite assistance can be provided as required.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
When the Contract ends, the licensed access to data by customers will terminate.
Within three months of this date (in accordance with the Retention and Deletion Policy) all data relating to the customer installation will be removed. A Certificate of Destruction Certificate can be issued upon request.
End-of-contract process
Following contract termination, if further access to the data is required for customer processing then the data can be re-licensed.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
No difference in the mobile or desktop service functionality.
Service interface
No
API
No
Customisation available
Yes
Description of customisation
The dataset provided to customers can be customised . This is undertaken by Market Location Limited.

Scaling

Independence of resources
Load testing is undertaken as part of Change Management promoted by any major system change or large user addition. Active user counts are tracked against load test results.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
Never
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
A Download function enables viewing and export of data from the portal.
Data export formats
  • CSV
  • Other
Other data export formats
  • Native file formats including Microsoft Word, Excel
  • PDF
  • Image File formats including gif, tif
Data import formats
  • CSV
  • Other
Other data import formats
  • Native File Formats including Microsoft Word, Excel
  • PDF
  • Image file formats including gif, png, tif

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
System is available 99.5% 24*7 except for planned maintenance communicated to the customer.

Any outages / downtime outside of this, will be communicated immediately to customers and recovery plans put in place.
Approach to resilience
We use Microsoft Azure Datacentres. Details available on Request
Outage reporting
We notify customers of any service outages using Email Communications and /or Public Dashboard.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Access controls
Access restriction testing frequency
At least once a year
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
20th May 2019
What the ISO/IEC 27001 doesn’t cover
Secure Development Controls excluded
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Other security certifications
Yes
Any other security certifications
Cyber Essentials Certificate of Assurance (22/01/19)

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Market Location publishes and manages operations in accordance with a set of policies and procedures for information security including ISMS, Information Security Policy, Assets and Threat management, Risk assessment and treatment Roles and Responsibilities, Access Controls, Supplier Management, operating procedures, Change Management, Incident Management, Business Continuity, personnel management, logs, Internal and External Audits.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Market Location operates to a Change Management Policy to manage major organisational change and development within the business including the controlled identification and implementation of required changes within computer systems.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
A Patch Management Policy is in operation for the Group to ensure systems are patched against known vulnerabilities and those identified during provision of service. Reputable sources are used for potential threat information.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Market Location operates to an Information Security Policy and also to an Information & Security Incident Management policy.
Incident management type
Supplier-defined controls
Incident management approach
In the event of a security incident a Security Incident procedure is in place to enable employees to identify, respond to and recover from security incidents. The objective of the incident response plan is to prevent damages such as service outage, data loss, and illicit access to systems. The procedure details communications with customers.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Pricing

Price
£7000 per licence
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
By agreement, a first month trial of, from 20 records (up to a maximum of 1000 records) can be provided to a customer. The quantity of records in the trial would depend on the prospective order quantity. Selected Business Data Fields would apply.

Service documents

Return to top ↑