Factmata

Factmata Expert Media Intelligence & Social Listening

Factmata Expert Media Intelligence helps government departments spot claims and rumours online about any topic. Our software helps outline and identify key trends in public opinion, who is driving these, and where they originate. It also detects harmful rumours and disinformation, terrorist content and hate speech.

Features

  • Rumour Monitoring and Fake News Detection
  • Propaganda/Hyper-partisan Language Detection
  • Claim Detection, Clustering & Assisted Fact Checking
  • Stance Detection/Opinion Classification
  • Harmful Content Classification/Scoring API
  • Unsafe Content Website Blacklist
  • First Story Detection

Benefits

  • Flag and monitor disinformation campaigns and threats early
  • Find key voices driving harmful messaging campaigns
  • Pick out stance/opinion people have on any public issue
  • Help react to false claims/rumours
  • Analyse real time public opinion shifts and drivers/origins

Pricing

£250 per unit per month

Service documents

Framework

G-Cloud 11

Service ID

3 6 2 8 4 7 7 7 9 9 7 7 1 9 7

Contact

Factmata

Dhruv Ghulati

+447786256893

business@factmata.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints - Time: reports will be ready 1-3 weeks after a topic is configured
- Language: the service currently only works in English
- Data: Media content analysed is limited to third party social listening vendors source lists. Custom data sources can be implemented.
- Data: video is not supported
- Frequency: Once set up, media content analysis and intelligence reporting is on daily/weekly basis.
System requirements
  • One of the supported web browsers installed
  • Access to the internet

User support

User support
Email or online ticketing support Email or online ticketing
Support response times 24 hours, discluding weekends
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support No
Web chat support No
Onsite support Onsite support
Support levels 1 technical account manager, 1 machine learning engineer, and 1 cloud support/development operations engineer is provided as part of contract free of charge.
Email support is provided as part of the contract, as well as on-site support with a technical account manager up to 1x a month free of charge.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started - onsite training
- user documentation
- account management support (configuring sources and keywords)
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction - Request to Factmata for a data dumps available in CSV format
End-of-contract process Included
- dashboard service becomes unavailable
- stop data ingestion for the client topics
- purge of custom source data collected upon request
- purge of derived insights upon request

Additional cost
- full data dump in the format of client choosing

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices No
Service interface Yes
Description of service interface Self-service web application dashboard
Accessibility standards None or don’t know
Description of accessibility -
Accessibility testing -
API Yes
What users can and can't do using the API Can
- Send requests for data to be retrieved for a report topic
- Retrieve data for a specific date range

Cannot
- Setup a new report topic
- Edit any data in the report
- Setup a new account programmatically
API documentation Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation - Customise initial keywords for media monitoring
- Customise the sources they are interested in tracking
- Customise a report frequency
- Change the topics/issues that need to be tracked
- Clients can customise directly using the dashboard interface
- Factmata will customise these aspects for clients using the API

Scaling

Scaling
Independence of resources - dedicated infrastructure available upon request/need

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations European Economic Area (EEA)
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach - from the dashboard UI, CSV exports can be downloaded
- data can be exported via the API
Data export formats CSV
Data import formats
  • CSV
  • Other
Other data import formats
  • HTML
  • Custom formats upon request

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability 99% availability guarantee.
Refunds available as a pro-rated amount of downtime over 1%.
Approach to resilience Details available on request
Outage reporting Email alerts sent to customers

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
  • Other
Other user authentication API Keys
Access restrictions in management interfaces and support channels Username/password
Identity federation with an existing provider (for example Google Apps)
Access restriction testing frequency At least once a year
Management access authentication
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information No audit information available
How long system logs are stored for Less than 1 month

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach In the process of implementing the ISO 27001 standard
Information security policies and processes Current implementing ISO 27001 based process

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach - gitflow patterns: https://www.atlassian.com/git/tutorials/comparing-workflows/gitflow-workflow
- system of branches for code change approvals
- changes are assessed for security impact using pipenvs
- github security impact checks
- comprehensive testing in our staging environment
Vulnerability management type Supplier-defined controls
Vulnerability management approach We receive notifications from third-party vulnerability tracking systems
2 days to patch critical vulnerabilities
Protective monitoring type Supplier-defined controls
Protective monitoring approach We use GuardDuty from Amazon Web Services (our current provider) for active monitoring.
Risks are analysed and a patch is compiled as quickly as possible.
Incidents are responded to within 1 business day.
Incident management type Supplier-defined controls
Incident management approach High-level incident management process:
1. Acknowledge and notify (with continual progress updates to clients)
2. Produce a temporary fix to restore service
3. Identify the root cause
4. Implement permanent fix based on the root cause analysis
5. Publish root cause & impact analysis
6. Update documentation and procedures accordingly

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £250 per unit per month
Discount for educational organisations No
Free trial available No

Service documents

Return to top ↑