Experian Data Management with Email Validation
Experian's cloud-based email validation tool removes bad email addresses at the point of capture to improve your sender reputation, increase deliverability and ensure your communications reach your citizens.
Features
- Superior technology to identify invalid emails
- Corrections logic to identify misspellings and typo traps
- Clear, actionable response codes
- Flexible integration options
- Pre-validation syntax check to ensure the email is well-formed
- Experian's trusted secure data and privacy standards
- 99.9% uptime Service Level Agreement
- Robust and secure infrastructure
- Active validation of the email by communication with each ISP
Benefits
- Improved data integrity for better decision making
- Accelerated processes for improved citizen experience
- Decreased IT costs from using cloud based service
- Improved operational efficiencies
- Better communication with citizens by ensuring your messages arrive efficiently
- Risk-averse approach to data management
Pricing
£0.00 a transaction
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at damian.kenny@experian.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 11
Service ID
6 7 0 5 5 6 9 7 5 9 8 5 5 5 5
Contact
Experian
Damian Kenny
Telephone: +44 (0) 7976 702247
Email: damian.kenny@experian.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- No however if we do have any planned improvements which we believe will materially affect your service, we will contact you.
- System requirements
- Fully supported release of web browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Responses are provided within 24 hours
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- Constant review/enhancement of user journey to ensure case resolution provided via chat
- Onsite support
- Yes, at extra cost
- Support levels
- We do not operate a differentiated service model (i.e no gold, silver, bronze levels of access)
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Full user guides available, welcome product calls, online FAQ and video content, plus paid-for integration assistance available
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Data is not held by Experian therefore data extraction is not necessary
- End-of-contract process
- At the end of the contract, the Buyer shall cease to use all Licensed Materials and Licensed Programs
Using the service
- Web browser interface
- No
- Application to install
- Yes
- Compatible operating systems
- Linux or Unix
- Designed for use on mobile devices
- No
- Service interface
- No
- API
- Yes
- What users can and can't do using the API
- Full service functionality provided via API
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Integration into own environment - requires relevant code language knowledge
Scaling
- Independence of resources
- Full load balancing, multiple data centres
Analytics
- Service usage metrics
- Yes
- Metrics types
- Usage metrics are partially available across software suite. the describe usage levels, click balance and service availability
- Reporting types
- API access
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- EU-US Privacy Shield agreement locations
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- No
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Data is not required to be imported by the Buyer to Experian's platform therefore data export is not required
- Data export formats
- Other
- Other data export formats
- N/A
- Data import formats
- Other
- Other data import formats
- N/A
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Other
- Other protection between networks
-
SOAP endpoint sslv3/tls1.0/1.1/1.2
REST endpoint TLS1.2 - Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
-
SOAP endpoint sslv3/tls1.0/1.1/1.2
REST endpoint TLS1.2
Availability and resilience
- Guaranteed availability
- We guarantee 99.9% service availability
- Approach to resilience
- Automated global failover of product
- Outage reporting
- We will notify you of any material outages, that may effect you, by email.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Username or password
- Other
- Other user authentication
- Secure token
- Access restrictions in management interfaces and support channels
- -
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- DNV GL Business Assurance Limited
- ISO/IEC 27001 accreditation date
- 20/12/2016
- What the ISO/IEC 27001 doesn’t cover
- The following is covered by the scope of the certificate; the delivery and support of Experian IT infrastructure, operations, architecture and associated compliance and facilities management undertaken within the UK data centres.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- Trustwave
- PCI DSS accreditation date
- 28th October 2016
- What the PCI DSS doesn’t cover
- Everything is covered
- Other security certifications
- Yes
- Any other security certifications
- Cyber Essentials
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Experian have a comprehensive global security policy based on the ISO27001 standard which covers: Organisation and Management, information security, asset classification, physical and environmental security, communications and operations management, system access, systems development and maintenance, compliance, personnel and provisioning, business continuity management, third party management. The policy is owned by Experian's executive risk management committee which is an executive level body, and which assumes ultimate responsibility for Experian's risk position. Information security is a key component of the risk management framework. Experian management supports security through leadership statements, actions and endorsement of the security policy and implementing/improving the controls specified in the policy. The policy is available to all Experian employees and contractors on the intranet. Changes to the policy are announced on the company's intranet computer based information security and data protection training, and this is repeated on at least an annual basis. Compliance to policy is overseen by internal audit.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Experian have a change management policy which is underpinned by processes and procedures based on ITIL best practice. This is a mature process. We use a service management tool that integrates change management, incident management, problem management, configuration management and knowledge management. Our change management policy, processes, and procedures are regularly audited by independent auditors. Formal risk analysis is employed using an approved information risk analysis phase for developments/changes. Security requirements for the system are identified and continue to be considered throughout the life of the product.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Servers and PCs are built to a documented secure standard, which includes anti-virus and malware defences. Information assets have a defined patching schedule, determined by the system's criticality and the level of threat the patch is mitigating. Experian actively monitors threat environment and checks the effectiveness of security controls by reviewing both free and paid for sources of threat information, including, public information, major vendor feeds and also receiving information from specialist closed group mailing lists. The overall process is also plugged into an automated patch and fix strategy, underpinned with a technology infrastructure to deliver corrective updates.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Monitoring processes and tools are in place to manage alarms generated by security related alerts and these are fed into the incident management process. Experian has a formally documented risk based incident management process to respond to security violations, unusual or suspicious events and incidents. In the event an incident occurs a team of experts from all relevant areas of Experian are gathered to form an incident response team, who manage activities until resolution. The incident response team are available 24/7 to resolve any incident. Out of core hours the dedicated incident hotline is routed to the command centre
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- The incident management process incorporates a number of participants and contributors, including: Global Security Office - who facilitate and coordinate activities under the business security coordinator's guidance; Business Security Coordinator - a representative of the impacted business area, responsible for coordinating resolution activities; Incident Response Team (IRT) - IRT is made up of a membership that are empowered to make key decisions surrounding the actions to be taken to reduce impact, control actions, and impose corrective activities. A client report would be created, including: high level overview; facts; overview of events; actions taken.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £0.00 a transaction
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Free trials can be provided to Buyers for a maximum period of 3 months. During this period, the Buyer will have full functionality and where transactions are provided, transactions will be limited to 500 lookups. The trial is only for demonstration purposes and cannot be used in a live environment.
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at damian.kenny@experian.com.
Tell them what format you need. It will help if you say what assistive technology you use.