Synectics Solutions Ltd

ReCheck

NFI ReCheck is a flexible, cost effective and fully hosted ‘software as a service’ (SaaS) solution for public sector organisations. ReCheck allows you to retrospectively check existing customer records against one of the most sophisticated data sets available, eliminating over payments and reducing financial loss to your organisation.

Features

  • Easy checking of the validity of an application in real-time.
  • Built-in risk assessment and simple referral escalation interface
  • Matches employees details against key Home Office data
  • Search against 1/3 billion NFI data records including immigration data
  • Establishes if an applicant has the right to work
  • Referral escalation coding is easy to use
  • Alert’s you to fraud and error within your customer database
  • Ensures payments made and services provided are correct and genuine
  • Allows you to prioritise investigations to suit resource availability
  • Allows you to run your own “Campaigns” searching for commonalities.

Benefits

  • You can identify and stop fraudulent claims from existing customers
  • Reduce and stop the provision of invalid or fraudulent payments
  • Reduces the number of mandated referrals you need to investigate
  • Provides reassurance you are taking precautions to reduce fraud exposure
  • Mitigates risk of falling foul of the employment legislation requirements
  • Proactively protects your organisation and improve customer interactions
  • Reduce administration and future investigations costs
  • Allows you to prioritise resource in areas of greater success

Pricing

£300 to £10000 per transaction

Service documents

G-Cloud 11

270112688975183

Synectics Solutions Ltd

Louise Williams

01782 664000

publicsectorservices@synectics-solutions.com

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to Recheck can also be used in conjunction with NFI mandated exercises, AppCheck .
Cloud deployment model Private cloud
Service constraints The service is for the detection and prevention of fraud only
System requirements
  • Have access to PC, tablet or computer device
  • Access to the internet or web services
  • Needs to have a current web browser

User support

User support
Email or online ticketing support Email or online ticketing
Support response times We respond to email queries within 2 hours Monday to Friday 8am to 6pm and at weekends we respond within 48 hours
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Onsite support
Support levels We provide training and set up materials as well as coaching. We have a dedicated help desk facility. Dependent on the complexity of the account we can also supply technical account support staff and project management. Support costs are included in the overall contract value.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started New users or existing customers have access to a dedicated help desk facility that can support with training and guidance. We have training materials and guide books and hold training workshops on a regular basis.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction The service is for matching data to the National Fraud Initiative data only once matching is complete the client can extract the matches via excel or CSV downloads. We delete all data held within the system within 3 months of the contract ending
End-of-contract process The contract is a fixed priced related to the usage of the data and to that end once the contract ends all access to the product ceases. Data can be exported via excel at any point during the contract. We will delete all data and resulting matches held within ReCheck within 3 months of contract termination. We do not make any additional charges on contract termination.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install No
Designed for use on mobile devices No
Accessibility standards WCAG 2.1 AA or EN 301 549
Accessibility testing We workwith user groups to ensure screens and accessibility is as inclusive as possible
API No
Customisation available No

Scaling

Scaling
Independence of resources We consistently perform testing on capacity levels and service . We have load balancing in place and multiple internet connections and multiple points of redundancy and resilience.

Analytics

Analytics
Service usage metrics Yes
Metrics types A full suite of reports are available from logging all usage, out of hours logins, service provision and user engagement. These can be accessed through the site, they also monitor usage, matching levels and overall performance of the product.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least once a year
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Other
Other data at rest protection approach Independent review of processes (for example CESG CPA Build Standard, Cyber Essentials Plus , ISO/IEC 27001 )
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Through CSV or excel
Data export formats
  • CSV
  • Other
Other data export formats Excel
Data import formats
  • CSV
  • Other
Other data import formats
  • Xls
  • Xlsx
  • Mdb
  • Accdb
  • Zip
  • 7Z
  • Rar

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability We maintain 98% service level or higher with all development, upgrades and maintenance performed in scheduled windows, which are executed outside of normal operating hours.
Approach to resilience Data centres are highly resilient with back up generators, UPS and FM200 fire suppressant systems. Our Systems are built to be highly fault tolerant using dual power and network connections. Data centres are served by multiple ISP connections. We have a dedicated Business Continuity Management department. We load balance our systems across multiple virtual machines which themselves can be migrated to new physical hardware when required.
Outage reporting We report service outages once they have exceeded the clients contractual targets directly to the client with estimated fix times and solutions by email or phone.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels We issue specific passwords and log on code, once we have received written authorisation from senior persons of authority from within the purchasing organisation. Every user account has an associated user level. The user level dictates the set of permissions the user has and therefore their access within the system
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 BSI Assurance Group Ltd .
ISO/IEC 27001 accreditation date 22-10-2017
What the ISO/IEC 27001 doesn’t cover The ISO/IEC 27001 scope covers the entire business operation of Synectics Solutions.
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications
  • Cyber Essentials Plus
  • SAFO ( Specified Anti Fraud Organisation )

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Security policy is owned by the Synectics Solutions Board of Directors and managed on their behalf by the CISO. A Compliance Manager, who is responsible for the internal audit function, also sits within this business function. All revisions to the Security Policy will be notified to the User.
Operational Security Responsibilities:
• The IT Security Team are responsible for operational aspects of security, including protective monitoring and vulnerability management.
• The Facilities Team (within Business Operations) are responsible for Physical Security.
• The IT Operations Teams are responsible for server management (including patch management)
Synetics Solutions holds and adheres to the following policies:
Cyber Essentials Plus,
• Security operating Procedures (SyOPS)
• Protective Monitoring Controls selected from GPG13 in accordance with risks resultant from IS1 calculations. Monitoring is currently designed to protect OFFICIAL records (individually (IL3) and aggregated (IL5)).
• A ‘Requirements for Secure Delivery of Online Public Services’ (RSDOPS) assessment has been carried out as part of the accreditation to profile the current system design against GPG43 guidance.
Synectics also design and host the multiple fraud prevention solutions for the financial services sector. The Synectics ISMS is certified to ISO27001:2013. We have fully documented security policies available.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Configuration and change management processes are operated in line with ITIL V3.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Penetration and Vulnerability tests will be completed on an annual basis. If further investigation is required we will evoke the BCP to manage and operate a project team to rectify issues and risks to the business. The IT Security team use a number feeds to enable them to proactively manage new threats and vulnerabilities and reduce the windows of vulnerability. These include: NCSC, McAfee, CheckPoint, Microsoft, AlienVault Open Threat Exchange, thehackernews, theregister and reddit. Synectics also participate in the NCSC CiSP. Patch management is in accordance with defined patching policy dependant on risk and severity of situation.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Synectics have implemented a protective monitoring policy with associated technology and processes to oversee the use of ICT systems (including NFI) and to provide assurance and user accountability. This, along with the Information Security Incident Management policy forms part of the current NFI system accreditation and are documented within the current RMADS.
The technology employed includes IPS/IDS (intrusion prevention/detection) software and a SIEM (Security Incident and Event Management) solution. Penetration and Vulnerability tests will be completed on an annual basis. Incidents are accessed and responded to inline with our Information Security Incident Management policy.
Incident management type Supplier-defined controls
Incident management approach The Security Incident Management Policy and processes are designed in line with NCSC guidance, industry best practice, and ISO27035. Any incident that is uncovered will be rectified using each departments BCP plan. Any client is welcome to review the plans during an onsite visit or secure video conference. Users can report incidents through the dedicated helpdesk facilities and we are able to provide reporting.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £300 to £10000 per transaction
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑