Background Checking and Pre-Employment Screening
We offer you the very best technology and operational support to deliver pre-employment screening and background checking. At giant, we ensure the candidate journey is improved, our client’s business is protected and the time to hire is positively impacted.
Features
- Criminal Record Checks
- Referencing
- All required background checks
- Managed Service
- Cloud Based System
- Fully Outsourced
- Compliance
- Applicant Onboarding Features
- Electronic Signatures
- Highly Configerable
Benefits
- Cost Efficent
- Quick Turn Around Times
- Excellent Candidate Experiance
- Highly flexible
- Branded to you
- Everything in one place
- Remove administrative burden
Pricing
£4.50 a person
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at mathew.armstrong@giantgroup.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 11
Service ID
5 8 8 6 1 5 2 2 6 4 0 6 3 6 9
Contact
giant screening
Mathew Armstrong
Telephone: 01245 379090
Email: mathew.armstrong@giantgroup.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- There are no know constraints
- System requirements
-
- Works over any Web Browser
- Mobile Enabled
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 4 Bussiness Hours
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- All our clients receive the same exceptional levels of support.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Assisted implementation and onsite training
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- In a pre-agreed format
- End-of-contract process
- All costs are included in the contract
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 7
- Internet Explorer 8
- Internet Explorer 9
- Internet Explorer 10
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Completely mobile enabled
- Service interface
- No
- API
- Yes
- What users can and can't do using the API
- Restful Json API
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Processes, Colouring, Branding, Workding, Workflows
Scaling
- Independence of resources
- We work with all clients to ensure reasonable forecast plans are in place. This enables a consistent approach to all client requirements.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Bespoke reporting is avalible to all clients
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2012
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- XML
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- XML
- Excel
- Data import formats
-
- CSV
- Other
- Other data import formats
- Excel
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99.9%
- Approach to resilience
- Available on request
- Outage reporting
- Available on request
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Through user profiles
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Bureau Verita
- ISO/IEC 27001 accreditation date
- 16/12/2014
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- Yes
- Any other security certifications
- Cyber Essentials
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- ISO
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Available on request
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Available on request
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Available on request
- Incident management type
- Supplier-defined controls
- Incident management approach
- Available on request
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £4.50 a person
- Discount for educational organisations
- No
- Free trial available
- No
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at mathew.armstrong@giantgroup.com.
Tell them what format you need. It will help if you say what assistive technology you use.