IDscan reads, extracts data from and authenticates a multitude of complex documents including passports, visas, ID cards, DL, utility bills etc. Using images captured from sophisticated passport scanners IDscan’s can authenticate documents. IDscan’s ground-breaking innovation in mobile technology enables validation, data extraction and document inspection from smartphones and tablet computers.


  • ICAO Passports & ID document
  • Validate & Authenticate documents
  • Utility Bills
  • Artificial Intelligence & Machine Learning
  • Passport scanners
  • Identity Validation
  • SDK & OCR
  • In-house proprieterary document library
  • Mobile App
  • MRZ


  • Automated process in 1 second
  • Reads 4000+ IDs and passports & utility bills
  • Extract contact data from scanned ID documents
  • Reduce recruitment administration and paper consumption/storage
  • UV, Infrared and Bio-chip authentication
  • a quick, fast, efficient method of filling Advanced Passenger Information


£75000 per licence per year

  • Free trial available

Service documents

G-Cloud 9



Tamlyn Thompson


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Hybrid cloud
Service constraints No
System requirements
  • Windows License (2012 and above)
  • Database License - MS SQL Server or Oracle
  • Virtual Machine

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Outside of Business Hours: The IDscan Enterprise Support Ticketing System will be available to receive reported faults outside of Business Hours. The target times will not begin until the start of Business Hours on the next Business Day. With the exception of Priority 1 faults, all other priorities which cannot be resolved by the the IDscan support team by the end of Business Hours on the Business Day that IDscan acknowledges them will be put on hold until the start of Business Hours on the next Business Day.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard None or don’t know
How the web chat support is accessible Chat with support agent as well as share screen for troubleshooting
Web chat accessibility testing Tested in-house before each release.
Onsite support Yes, at extra cost
Support levels 24x7 help desk, named account manager and named technical account manager
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started Support provided, onsite, online and via documentation.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Data can be extracted at anytime whilst contract is in place. Client can watch GBG destroy data at end of contract and also remove the data from GBG if there want to keep a copy.
End-of-contract process Contract covers a charge for a set-up. Data can be extracted by client using APIs or export can provided for an additional cost.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10+
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Browser based access on mobile devices can access Photo Library as well as invoke the camera
Accessibility standards None or don’t know
Description of accessibility Accessible via all web browsers. Can be used with a combination of keyboard and mouse. Upload document images for validation
Accessibility testing Tested in-house before each release.
What users can and can't do using the API REST API. No limitations.
API documentation Yes
API documentation formats PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The way an Identity Check is configured and the data used in it.


Independence of resources The service has been load tested to ensure that this will not become an issue. Peak period for the service is driven by existing customer demand and this tested every six months.


Service usage metrics Yes
Metrics types All data regarding usage and results is available online and to download.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach ‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
  • Other
Other data at rest protection approach FIPS-assured encryption, assured by independent validation of assertion
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Via API call
Data export formats
  • CSV
  • Other
Other data export formats Excel
Data import formats Other
Other data import formats Not Applicable

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Other
Other protection between networks PSN assured service PSN protected service Assured by independent testing of implementation
Data protection within supplier network IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Service up-time is typically 99.9%. SLA's are referenced in the terms and conditions. For a priority 1 fault, where the Service is not operational or is inaccessible, we aim to clear 80% of faults within 4 hours of GBG’s acknowledgement of the fault.
Approach to resilience This is information is available upon request. In practical terms we run a process where we fall-over to a back-up data centre if the primary data centre goes off-line.
Outage reporting Email alerts to users and technical contacts.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Access is based on user type. Only administrators can have access to management interfaces.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification Yes
Who accredited the PCI DSS certification Verizon
PCI DSS accreditation date 15/10/2016
What the PCI DSS doesn’t cover Nothing.
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation Yes
Security governance standards ISO/IEC 27001
Information security policies and processes The development, delivery, management and maintenance of secure infrastructure and applications, in support of GBG Identity Management offerings, being; Identity Verification and Assurance. Using identity intelligence for online identity verification; combating ID fraud, money laundering and under-age gambling; Identity Capture, Maintenance, Tracing; Verification of Driving License Information & CRB Checking - providing accurate and up to date customer information for customer contact strategy and Identity based Marketing – understanding, targeting, and retaining profitable customers, across GBGroup Plc. Within GBG, the CTO has overall accountability for Information Security and it is the responsibility of the CTO to make the appropriate provisions for establishing controls to ensure adherence to the GBG Information Security Management System. The CTO also provides the Executive Management Team and GBG Shareholders with an Information Security review at the end of the financial year. The Company Secretary has overall accountability for risk and Data Protection. The Company Secretary chairs the quarterly Internal Controls Board, and is the main document signatory for GBG. The Company Secretary is also head of GBG’s Legal team, who are responsible for ensuring compliance to all relevant legislation.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach All changes to the service must be delivered under the governance of the GBG Change Management Process. No change will be approved without clear remediation or back-out plan, properly identified, documented, tested and approved. There are three levels of configuration and change management: Standard Change, Emergency Change and Reviewed Change. The latter is not a routine or standard change and no documented process exists for the change. If there is uncertainty as to whether or not further review is required. It is better to request further review than to press forward with the change and have it fail.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach The Vulnerability Management Process will involve assessing the extent to which the assets are vulnerable to the identified threat. Once the Vulnerability assessments have been conducted, the level of riskwill then need to be determined. Risk’s with a risk rating that falls below the Risk Appetite for the business are ‘tolerated’. The Risk Appetite for GBG is Cautious. Risk’s that fall within the Risk Appetite will require the risk owner to create a treatment plan to reduce the level of risk. Treatment plans are proposed ideas or controls that can be implemented that would reduce the level of risk.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach This is ongoing process. The response is immediate.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No


Price £75000 per licence per year
Discount for educational organisations No
Free trial available Yes
Description of free trial Trial will deliver full access for up to a month.


Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑