Market Location Limited

UK Business on the Move Data

Businesses on the Move Data means you will be licensed for usage of a dataset of the 118 Group UK Business Database comprising of Business Records which have confirmed their intention to move premises within the next 12 months. Usage Terms&Conditions apply.


  • Access to 1.8 million UK business-data records from verified Database
  • Widely recognised as the most up-to-date and accurate Business Database
  • Telephone Researched database
  • Database includes 1 million email addresses
  • Database includes 2million verified contact details
  • High data consistency, accuracy and coverage
  • Integrated Data Filtering to match customer requirements
  • SIC, Market Sector Code and offline match/append process available
  • High service availability
  • GDPR compliant sourcing and management processes


  • Datasets of UK Business Data filtered to your needs
  • Make informed decisions about UK business sectors
  • Make informed choices about UK businesses in locations
  • Make informed choices about trends in new and closing businesses
  • Access to information whenever needed
  • High quality data
  • Fast turnaround
  • High quality data
  • High volumes to suit requirements
  • Compatible with other services


£7000 per licence

  • Free trial available

Service documents


G-Cloud 11

Service ID

7 1 9 6 9 2 4 2 8 2 9 4 1 4 3


Market Location Limited

Jason Chainey


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints No.
System requirements Internet access

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Within three working hours
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support No
Support levels Where a Support Call has been escalated and cannot be resolved by other methods then onsite support by appropriate staff resources will be provided at no additional charge.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started To get customers started on using the service:
- A web link is provided to customers with login details,
- Phone and email assistance is generally provided,
- In addition to provision of clear user guides.
- Onsite assistance can be provided as required.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction When the Contract ends, the licensed access to data by customers will terminate.
Within three months of this date (in accordance with the Retention and Deletion Policy) all data relating to the customer installation will be removed. A Certificate of Destruction Certificate can be issued upon request.
End-of-contract process Following contract termination, if further access to the data is required for customer processing then the data can be re-licensed.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service No difference in the mobile or desktop service functionality.
Service interface No
Customisation available Yes
Description of customisation The dataset provided to customers can be customised . This is undertaken by Market Location Limited.


Independence of resources Load testing is undertaken as part of Change Management promoted by any major system change or large user addition. Active user counts are tracked against load test results.


Service usage metrics No


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency Never
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach A Download function enables viewing and export of data from the portal.
Data export formats
  • CSV
  • Other
Other data export formats
  • Native file formats including Microsoft Word, Excel
  • PDF
  • Image File formats including gif, tif
Data import formats
  • CSV
  • Other
Other data import formats
  • Native File Formats including Microsoft Word, Excel
  • PDF
  • Image file formats including gif, png, tif

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability System is available 99.5% 24*7 except for planned maintenance communicated to the customer.

Any outages / downtime outside of this, will be communicated immediately to customers and recovery plans put in place.
Approach to resilience We use Microsoft Azure Datacentres. Details available on Request
Outage reporting We notify customers of any service outages using Email Communications and /or Public Dashboard.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels Access controls
Access restriction testing frequency At least once a year
Management access authentication 2-factor authentication

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 BSI
ISO/IEC 27001 accreditation date 20th May 2019
What the ISO/IEC 27001 doesn’t cover Secure Development Controls excluded
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials Certificate of Assurance (22/01/19)

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Market Location publishes and manages operations in accordance with a set of policies and procedures for information security including ISMS, Information Security Policy, Assets and Threat management, Risk assessment and treatment Roles and Responsibilities, Access Controls, Supplier Management, operating procedures, Change Management, Incident Management, Business Continuity, personnel management, logs, Internal and External Audits.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Market Location operates to a Change Management Policy to manage major organisational change and development within the business including the controlled identification and implementation of required changes within computer systems.
Vulnerability management type Supplier-defined controls
Vulnerability management approach A Patch Management Policy is in operation for the Group to ensure systems are patched against known vulnerabilities and those identified during provision of service. Reputable sources are used for potential threat information.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Market Location operates to an Information Security Policy and also to an Information & Security Incident Management policy.
Incident management type Supplier-defined controls
Incident management approach In the event of a security incident a Security Incident procedure is in place to enable employees to identify, respond to and recover from security incidents. The objective of the incident response plan is to prevent damages such as service outage, data loss, and illicit access to systems. The procedure details communications with customers.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £7000 per licence
Discount for educational organisations No
Free trial available Yes
Description of free trial By agreement, a first month trial of, from 20 records (up to a maximum of 1000 records) can be provided to a customer. The quantity of records in the trial would depend on the prospective order quantity. Selected Business Data Fields would apply.

Service documents

Return to top ↑