Tracing
Data cleansing, data tracing, data population, cross referencing data against multiple sources, data recovery, data append, data minimisation, data retention, customer data accuracy, data improvement, manual forensic tracing, large scale tracing of high volumes of customers, data evidence, data security, data protection compliance, FCA, PAF standards, GDPR compliance, batch processing
Features
- Data integrity and optimisation: data issue correction
- Data cleanse: mortality screening; tele-append; address verification; email append; movers
- Specialist Forensic Tracing / Manual Tracing, detailed specialist research
- Detailed investigation to locate matches/family members/cohabitants
- Additional specific treatment strategies for particular customer vulnerability
- Trace & Identity Verification mailing of respondents, legal document procurement
- Household occupancy checks
- Deceased research to locate next of kin, executors and beneficiaries
- International tracing
- Profiling for likelihood of successful collections
Benefits
- Enhancing electronic cleansing results
- Ensuring compliance under FCA principles by maintaining data integrity/accuracy
- Data agnostic: multiple data partners to maximise results
- Allowing experiences that build customer loyalty and engagement
- Opportunities to leverage customer analytics for relevant products and services
- Operational efficiency
Pricing
£0.02 to £50.00 a unit
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 12
Service ID
3 9 2 5 6 9 8 0 3 3 9 1 9 8 5
Contact
Equiniti Data Services
Hollie Corrick
Telephone: 07808195399
Email: hollie.corrick@equiniti.com
Service scope
- Service constraints
- None
- System requirements
-
- Batch data service
- Data transferred through SFTP
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 24 hours of email
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
- Support is year round and we will provide an Account Manager & Technical Manager available between 09:00 and 17:00 Monday to Friday excluding public holidays
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
We provide full telephone and email support for anyone using our service free of charge.
Each project is managed by an Account Manager, with support from operations, and all projects have access to technical support Monday-Friday. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Each time the service is run, the user gets a full extract of their data and accompanying results
- End-of-contract process
- Not applicable
Using the service
- Web browser interface
- No
- API
- No
- Command line interface
- No
Scaling
- Scaling available
- No
- Independence of resources
- Capacity planning is conducted, in conjunction with our clients to understand their specific requirements and resources as tailored accordingly.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
- Other
- Other metrics
-
- Usage MI
- Results MI
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Backup and recovery
- Backup and recovery
- Yes
- Backup controls
- Not applicable
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- SLA's are written into our contracts against all stages of tracing, and are tracked in weekly/monthly MI reports.
- Approach to resilience
- Automatic fail over between data centres, 24/7 monitoring on the infrastructure and robust data backup policies.
- Outage reporting
- Email alerts
Identity and authentication
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Users have their access controlled using a user role and security group function
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
- Username or password
- Devices users manage the service through
- Directly from any device which may also be used for normal business (for example web browsing or viewing external email)
Audit information for users
- Access to user activity audit information
- Users receive audit information on a regular basis
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users receive audit information on a regular basis
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 27/06/2020
- What the ISO/IEC 27001 doesn’t cover
- Statement of Applicability is available upon request
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- Yes
- Any other security certifications
- Cyber Essentials Certification
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
The Chief Risk Officer Adam Green is our Data Protection Officer. He manages the Risk and Compliance teams, including DPO Support Team.
Business Continuity is also managed within same department by the Senior Resilience Consultant.
Policy and processes have been implemented, including testing of Business Continuity and Disaster Recovery (BCDR) plans at multiple levels at prescribed frequencies and quarterly attestation in relation to the adequacy of arrangements.
Data Protection / Information Security / Business Continuity is cascaded through the Equiniti Group via our organisation-wide intranet, weekly email communications and through mandatory training.Many aspects of this awareness training is enforced on a quarterly basis through online tests.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All changes to projects are tracked and recorded. The proposed change is processed, and managed internally, any change is formally recorded and all interested parties notified. As always, we continually assess for any potential security impact.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
ISO27001 - Conduct risk-based analysis of security control requirements during the development of new or changed IT systems. Delivery of these requirements are tracked through the development and are tested using penetration and other tests prior to transition to production.
As a normative part of these required controls, application level logs are retained within the application for analysis. Equiniti log all external application logins and update transactions. Full Audit trails exist within applications.
Log logic is used to analyse and report on logs, with the external Managed Security Service provider monitoring and alerting to the Equiniti Security Operations Centre - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We always respond immediately to incidents with our clients, but within a maximum of 24 hours would apply. We have a team that are on hand to respond as and when is necessary.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Regular BC/DR tests are performed at various levels, from review and update of the plan to desktop walkthroughs, scenario tests, alternative site service recovery and full IT test. Documented procedures are used - and staff included in the DR plans are instructed through regular testing. Themed tests include Cyber scenarios.
The Crisis Management Team was involved in such a Cyber scenario test in February 2019 and has currently been activated to manage the Group's response to the CoronaVirus. Meeting daily to review decisions and receiving news updates throughout the day. Currently daily guidance goes out on our group email distribution
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- No
Energy efficiency
- Energy-efficient datacentres
- No
Pricing
- Price
- £0.02 to £50.00 a unit
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Trial limited to an agreed number of searches