T-Impact Limited

RPA Data de-duplication Robot

Automatically merge duplicate records from your IT systems. Our data de-duplication Robot automates your IT system’s duplicate record checking. The Robot compares duplicate records, based on your business rules, and merges the records or marks them as not duplicate.

Features

  • Automated work flow for UiPath unattended Robot
  • Includes 12 mo UiPath unattended Robot license
  • 24 days configuration to implement your care-in-the-community process
  • Includes 12 months support
  • Includes configuration to implement with your IT systems
  • Automates work to merge duplicate records in your IT systems
  • Enforces standard process across your IT systems
  • Includes configuration to implement your business rules process
  • Works with UI Path Orchestrator
  • Scalable solutions that supports parallel processing

Benefits

  • Improve data accuracy, reducing work across many other processes
  • Ensure customer data consistency across all IT systems
  • Reduce customer complaints with improved customer data accuracy
  • Improve compliance reporting, audit every transaction
  • Free staff to improve services and support customers
  • Reduce costs, 90% cheaper than UK support staff
  • Improve staff morale, freeing them from tedious data cleansing work
  • Automate with Latest technology rather than using temporary labour

Pricing

£48108 per unit per year

Service documents

G-Cloud 11

775076858757012

T-Impact Limited

Trevor Cole

01865 818952

sales@t-impact.com

Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to This robot solution is built using the latest Robotic Process Automation (RPA) from UI Path . The licenses subscriptions are incorporated into the solution costing and can used for additional robot workflows.
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints Solution does not include infrastructure. Cloud infrastructure can be provided separately.
Configuration requires separate development and testing environments
System requirements Infrastructure to support UiPath unattended robot (cloud or on-premise)

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Standard support is provided Monday to Friday from 9 Am to 5 PM for BST, excluding UK Bank Holidays. Responses are normally provided by email. Response times are:
Severity 1 = 1 Hour
Severity 2 = 2 Hours
Severity 3 = 1 Business day

Premium support is provided Monday to Saturday from 9 AM to 6 PM BST, excluding UK Bank Holidays. Responses are normally provided by email. Sunday and extended hours support are available for an extra charge, where required. Response times are:
Severity 1 = 1 Hour
Severity 2 = 2 Hours
Severity 3 = 4 Hours
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.1 A
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Yes, at an extra cost
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard WCAG 2.1 A
Web chat accessibility testing Web chat available from July, 2019. We use Jira support tools, who state: We test our software using a variety of screen readers and browsers. We've found the following combinations provide the most accessible experience when using our products: If you're using Windows, we recommend using NVDA with Firefox. If you're using OSX, we recommend using VoiceOver with Safari.b chat is provided
Onsite support Yes, at extra cost
Support levels Support level "Standard", response times:
Severity 1 = 1 Hour
Severity 2 = 2 Hours
Severity 3 = 1 Business day

Support level "Premium", response times:
Severity 1 = 1 Hour
Severity 2 = 2 Hours
Severity 3 = 4 Hours

Standard support is included with T-impact's support contracts. Premium support is charged at £200 per month per process.

Technical account manager is provided
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Service includes 1 training class. Additional training available separately
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction All data will be stored in your existing IT systems and is therefore immediately available at end of contract
End-of-contract process At the end of contract, a renewal option will be offered. If you decide not to renew the contract, then the system access will stop.

Your existing IT systems will continue to operate without the solution, your staff can revert to the manual on-boarding procedures used before this solution was implemented.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Linux or Unix
  • Windows
Designed for use on mobile devices No
API No
Customisation available Yes
Description of customisation This service includes customisation support to ensure compatibility with your process and IT systems

Scaling

Scaling
Independence of resources The architecture of Microsoft Azure cloud services maintains logical separation of client data. Internal rules and measures separate data processing, such as inserting, modifying, deleting, and transferring data, according to the contracted purposes.

In essence your existing CRM and or Case Management Systems are the matter of record and their performance should not be adversely affected by the automation. However as Robotic processes are 20 times faster than a human, some load balancing might be required to run processes when users are less likely to be on the system to ensure maximum performance.

Analytics

Analytics
Service usage metrics Yes
Metrics types All service usage log files can be interrogated. Service availability reports available upon request. Additional service metrics can be customised, provided separately
Reporting types Reports on request

Resellers

Resellers
Supplier type Reseller providing extra features and support
Organisation whose services are being resold UiPath, Microsoft, IBM and Bonitasoft

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least every 6 months
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach The platform does not store any user data so there is no need to export.
Data export formats Other
Other data export formats No data retained within platform.
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • Legacy (mainframe, terminal screen, etc.)
  • Microsoft Office (Word, Excel, Outlook, Access)
  • IT systems from Capita, Northgate and others
  • Native PDF documents
  • OCR'd documents and forms
  • Images (JPEG, GIF, PNG, etc.)
  • Web (any HTML including frames and multiple screens)
  • Chatbot (Google and Microsoft cognitive services)

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability The UiPath platform is operational 24/7/365. Our Cloud provides 99.999% availability.
Approach to resilience This automated workflow solution can be deployed on multiple UiPath unattended robots for resilience and disaster recovery. Solution can be deployed on highly resilient cloud infrastructure or on your on-premise infrastructure.
Outage reporting This solution automatically logs service outages on the T-Impact Jira support desk. Service outages are available on the Jira public dashboard or can be configured to send email alerts. Additional service outage reporting are available separately, including updates to other dashboards, API, text alerts or emailing lists.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels User name and password control over access to uipath products.

This can be achieved via AD or other auth mechanisms.
Access restriction testing frequency At least once a year
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 AEROQ
ISO/IEC 27001 accreditation date 30/08/2017
What the ISO/IEC 27001 doesn’t cover N/A
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber security essentials

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards CSA CCM version 3.0
Information security policies and processes UiPath Systems, Networks and processes are reviewed annually by the Information Security Office to ensure compliance with security policies and standards. Additionally, this review is subject to audit by the Internal Audit and External Audit.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Configuration & Change management is handled via Hipbath Maintenance and support agreement.

UiPath will track the UiPath RPA product components and will ensure changes are handled via a documented & agreed procedure.

From a RPA Solution perspective our change management and robot configuration is in line with the Industry Standards for Source and version control. We will work with our public customers to create the necessary Dev, Test, UAT and Live environments.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach UiPath implements all applicable security requirements reasonably needed for the protection of confidential data processed through UiPath systems while still continuing to operate its businesses effectively and efficiently.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach UiPath uses internal resources & external vendors to run assessment of potential risks & vulnerabilities.

If a risk or vulnerabilities is identified we have a internal procedure that handle them based on impact/ priority.

incidents are handled based on priority, starting from 4hrs response.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach UiPath provide incident management via support portal for its customers.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £48108 per unit per year
Discount for educational organisations Yes
Free trial available Yes
Description of free trial A community edition of RPA software is available that's limited to non-commercial use.
Link to free trial https://www.uipath.com/community

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑