Market Location Limited

UK Business Database

Selecting the Market Location Business Database will enable you to be licensed for usage pf the master Business database of UK business names, telephone numbers, addresses, and other related information collected, verified, updated and owned by 118 Group


  • Access to 1.8 million UK business-data records from verified Database
  • Widely recognised as the most up-to-date and accurate Business Database
  • Telephone Researched database
  • Database includes 1 million email addresses
  • Database includes 2million verified contact details
  • High data consistency, accuracy and coverage
  • Integrated Data Filtering to match customer requirements
  • SIC, Market Sector Code and offline match/append process available
  • High service availability
  • GDPR compliant sourcing and management processes


  • Datasets of UK Business Data filtered to your needs
  • Make informed decisions about UK business sectors
  • Make informed choices about UK businesses in locations
  • Make informed choices about trends in new and closing businesses
  • Access to information whenever needed
  • High quality data
  • Fast turnaround
  • High quality data
  • High volumes to suit requirements
  • Compatible with other services


£7,000 a licence

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

7 6 3 2 1 4 4 0 1 6 7 0 4 9 8


Market Location Limited Jason Chainey
Telephone: 01252941224

Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
System requirements
Internet access

User support

Email or online ticketing support
Email or online ticketing
Support response times
Within three working hours
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Support levels
Where a Support Call has been escalated and cannot be resolved by other methods then onsite support by appropriate staff resources will be provided at no additional charge.
Support available to third parties

Onboarding and offboarding

Getting started
To get customers started on using the service:
- A web link is provided to customers with login details,
- Phone and email assistance is generally provided,
- In addition to provision of clear user guides.
- Onsite assistance can be provided as required.
Service documentation
Documentation formats
End-of-contract data extraction
When the Contract ends, the licensed access to data by customers will terminate.
Within three months of this date (in accordance with the Retention and Deletion Policy) all data relating to the customer installation will be removed. A Certificate of Destruction Certificate can be issued upon request.
End-of-contract process
Following contract termination, if further access to the data is required for customer processing then the data can be re-licensed.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
No difference in the mobile or desktop service functionality.
Service interface
Customisation available
Description of customisation
The dataset provided to customers can be customised . This is undertaken by Market Location Limited.


Independence of resources
Load testing is undertaken as part of Change Management promoted by any major system change or large user addition. Active user counts are tracked against load test results.


Service usage metrics


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
A Download function enables viewing and export of data from the portal.
Data export formats
  • CSV
  • Other
Other data export formats
  • Native file formats including Microsoft Word, Excel
  • PDF
  • Image File formats including gif, tif
Data import formats
  • CSV
  • Other
Other data import formats
  • Native File Formats including Microsoft Word, Excel
  • PDF
  • Image file formats including gif, png, tif

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
System is available 99.5% 24*7 except for planned maintenance communicated to the customer.

Any outages / downtime outside of this, will be communicated immediately to customers and recovery plans put in place.
Approach to resilience
We use Microsoft Azure Datacentres. Details available on Request
Outage reporting
We notify customers of any service outages using Email Communications and /or Public Dashboard.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Access controls
Access restriction testing frequency
At least once a year
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
20th May 2019
What the ISO/IEC 27001 doesn’t cover
Secure Development Controls excluded
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Cyber Essentials Certificate of Assurance (22/01/19)

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Market Location publishes and manages operations in accordance with a set of policies and procedures for information security including ISMS, Information Security Policy, Assets and Threat management, Risk assessment and treatment Roles and Responsibilities, Access Controls, Supplier Management, operating procedures, Change Management, Incident Management, Business Continuity, personnel management, logs, Internal and External Audits.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Market Location operates to a Change Management Policy to manage major organisational change and development within the business including the controlled identification and implementation of required changes within computer systems.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
A Patch Management Policy is in operation for the Group to ensure systems are patched against known vulnerabilities and those identified during provision of service. Reputable sources are used for potential threat information.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Market Location operates to an Information Security Policy and also to an Information & Security Incident Management policy.
Incident management type
Supplier-defined controls
Incident management approach
In the event of a security incident a Security Incident procedure is in place to enable employees to identify, respond to and recover from security incidents. The objective of the incident response plan is to prevent damages such as service outage, data loss, and illicit access to systems. The procedure details communications with customers.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£7,000 a licence
Discount for educational organisations
Free trial available
Description of free trial
By agreement, a trial of, from 20 records (up to a maximum of 1000 records) can be provided to a customer. The quantity of records in the trial would depend on the prospective order quantity. Selected Business Data Fields would apply.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.