RPA Data de-duplication Robot
Automatically merge duplicate records from your IT systems. Our data de-duplication Robot automates your IT system’s duplicate record checking. The Robot compares duplicate records, based on your business rules, and merges the records or marks them as not duplicate.
Features
- Automated work flow for UiPath unattended Robot
- Includes 12 mo UiPath unattended Robot license
- 24 days configuration to implement your care-in-the-community process
- Includes 12 months support
- Includes configuration to implement with your IT systems
- Automates work to merge duplicate records in your IT systems
- Enforces standard process across your IT systems
- Includes configuration to implement your business rules process
- Works with UI Path Orchestrator
- Scalable solutions that supports parallel processing
Benefits
- Improve data accuracy, reducing work across many other processes
- Ensure customer data consistency across all IT systems
- Reduce customer complaints with improved customer data accuracy
- Improve compliance reporting, audit every transaction
- Free staff to improve services and support customers
- Reduce costs, 90% cheaper than UK support staff
- Improve staff morale, freeing them from tedious data cleansing work
- Automate with Latest technology rather than using temporary labour
Service scope
Software add-on or extension | Yes, but can also be used as a standalone service |
What software services is the service an extension to | This robot solution is built using the latest Robotic Process Automation (RPA) from UI Path . The licenses subscriptions are incorporated into the solution costing and can used for additional robot workflows. |
Cloud deployment model |
|
Service constraints |
Solution does not include infrastructure. Cloud infrastructure can be provided separately. Configuration requires separate development and testing environments |
System requirements | Infrastructure to support UiPath unattended robot (cloud or on-premise) |
User support
Email or online ticketing support | Email or online ticketing |
Support response times |
Standard support is provided Monday to Friday from 9 Am to 5 PM for BST, excluding UK Bank Holidays. Responses are normally provided by email. Response times are: Severity 1 = 1 Hour Severity 2 = 2 Hours Severity 3 = 1 Business day Premium support is provided Monday to Saturday from 9 AM to 6 PM BST, excluding UK Bank Holidays. Responses are normally provided by email. Sunday and extended hours support are available for an extra charge, where required. Response times are: Severity 1 = 1 Hour Severity 2 = 2 Hours Severity 3 = 4 Hours |
User can manage status and priority of support tickets | Yes |
Online ticketing support accessibility | WCAG 2.1 A |
Phone support | Yes |
Phone support availability | 9 to 5 (UK time), Monday to Friday |
Web chat support | Yes, at an extra cost |
Web chat support availability | 9 to 5 (UK time), Monday to Friday |
Web chat support accessibility standard | WCAG 2.1 A |
Web chat accessibility testing | Web chat available from July, 2019. We use Jira support tools, who state: We test our software using a variety of screen readers and browsers. We've found the following combinations provide the most accessible experience when using our products: If you're using Windows, we recommend using NVDA with Firefox. If you're using OSX, we recommend using VoiceOver with Safari.b chat is provided |
Onsite support | Yes, at extra cost |
Support levels |
Support level "Standard", response times: Severity 1 = 1 Hour Severity 2 = 2 Hours Severity 3 = 1 Business day Support level "Premium", response times: Severity 1 = 1 Hour Severity 2 = 2 Hours Severity 3 = 4 Hours Standard support is included with T-impact's support contracts. Premium support is charged at £200 per month per process. Technical account manager is provided |
Support available to third parties | Yes |
Onboarding and offboarding
Getting started | Service includes 1 training class. Additional training available separately |
Service documentation | Yes |
Documentation formats | |
End-of-contract data extraction | All data will be stored in your existing IT systems and is therefore immediately available at end of contract |
End-of-contract process |
At the end of contract, a renewal option will be offered. If you decide not to renew the contract, then the system access will stop. Your existing IT systems will continue to operate without the solution, your staff can revert to the manual on-boarding procedures used before this solution was implemented. |
Using the service
Web browser interface | Yes |
Supported browsers |
|
Application to install | Yes |
Compatible operating systems |
|
Designed for use on mobile devices | No |
API | No |
Customisation available | Yes |
Description of customisation | This service includes customisation support to ensure compatibility with your process and IT systems |
Scaling
Independence of resources |
The architecture of Microsoft Azure cloud services maintains logical separation of client data. Internal rules and measures separate data processing, such as inserting, modifying, deleting, and transferring data, according to the contracted purposes. In essence your existing CRM and or Case Management Systems are the matter of record and their performance should not be adversely affected by the automation. However as Robotic processes are 20 times faster than a human, some load balancing might be required to run processes when users are less likely to be on the system to ensure maximum performance. |
Analytics
Service usage metrics | Yes |
Metrics types | All service usage log files can be interrogated. Service availability reports available upon request. Additional service metrics can be customised, provided separately |
Reporting types | Reports on request |
Resellers
Supplier type | Reseller providing extra features and support |
Organisation whose services are being resold | UiPath, Microsoft, IBM and Bonitasoft |
Staff security
Staff security clearance | Conforms to BS7858:2012 |
Government security clearance | Up to Developed Vetting (DV) |
Asset protection
Knowledge of data storage and processing locations | Yes |
Data storage and processing locations | United Kingdom |
User control over data storage and processing locations | Yes |
Datacentre security standards | Complies with a recognised standard (for example CSA CCM version 3.0) |
Penetration testing frequency | At least every 6 months |
Penetration testing approach | Another external penetration testing organisation |
Protecting data at rest |
|
Data sanitisation process | Yes |
Data sanitisation type | Explicit overwriting of storage before reallocation |
Equipment disposal approach | Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001 |
Data importing and exporting
Data export approach | The platform does not store any user data so there is no need to export. |
Data export formats | Other |
Other data export formats | No data retained within platform. |
Data import formats |
|
Other data import formats |
|
Data-in-transit protection
Data protection between buyer and supplier networks |
|
Data protection within supplier network |
|
Availability and resilience
Guaranteed availability | The UiPath platform is operational 24/7/365. Our Cloud provides 99.999% availability. |
Approach to resilience | This automated workflow solution can be deployed on multiple UiPath unattended robots for resilience and disaster recovery. Solution can be deployed on highly resilient cloud infrastructure or on your on-premise infrastructure. |
Outage reporting | This solution automatically logs service outages on the T-Impact Jira support desk. Service outages are available on the Jira public dashboard or can be configured to send email alerts. Additional service outage reporting are available separately, including updates to other dashboards, API, text alerts or emailing lists. |
Identity and authentication
User authentication needed | Yes |
User authentication |
|
Access restrictions in management interfaces and support channels |
User name and password control over access to uipath products. This can be achieved via AD or other auth mechanisms. |
Access restriction testing frequency | At least once a year |
Management access authentication |
|
Audit information for users
Access to user activity audit information | Users have access to real-time audit information |
How long user audit data is stored for | User-defined |
Access to supplier activity audit information | Users have access to real-time audit information |
How long supplier audit data is stored for | User-defined |
How long system logs are stored for | User-defined |
Standards and certifications
ISO/IEC 27001 certification | Yes |
Who accredited the ISO/IEC 27001 | AEROQ |
ISO/IEC 27001 accreditation date | 30/08/2017 |
What the ISO/IEC 27001 doesn’t cover | N/A |
ISO 28000:2007 certification | No |
CSA STAR certification | No |
PCI certification | No |
Other security certifications | Yes |
Any other security certifications | Cyber security essentials |
Security governance
Named board-level person responsible for service security | Yes |
Security governance certified | Yes |
Security governance standards | CSA CCM version 3.0 |
Information security policies and processes | UiPath Systems, Networks and processes are reviewed annually by the Information Security Office to ensure compliance with security policies and standards. Additionally, this review is subject to audit by the Internal Audit and External Audit. |
Operational security
Configuration and change management standard | Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402 |
Configuration and change management approach |
Configuration & Change management is handled via Hipbath Maintenance and support agreement. UiPath will track the UiPath RPA product components and will ensure changes are handled via a documented & agreed procedure. From a RPA Solution perspective our change management and robot configuration is in line with the Industry Standards for Source and version control. We will work with our public customers to create the necessary Dev, Test, UAT and Live environments. |
Vulnerability management type | Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402 |
Vulnerability management approach | UiPath implements all applicable security requirements reasonably needed for the protection of confidential data processed through UiPath systems while still continuing to operate its businesses effectively and efficiently. |
Protective monitoring type | Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402 |
Protective monitoring approach |
UiPath uses internal resources & external vendors to run assessment of potential risks & vulnerabilities. If a risk or vulnerabilities is identified we have a internal procedure that handle them based on impact/ priority. incidents are handled based on priority, starting from 4hrs response. |
Incident management type | Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402 |
Incident management approach | UiPath provide incident management via support portal for its customers. |
Secure development
Approach to secure software development best practice | Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0) |
Public sector networks
Connection to public sector networks | No |
Pricing
Price | £48108 per unit per year |
Discount for educational organisations | Yes |
Free trial available | Yes |
Description of free trial | A community edition of RPA software is available that's limited to non-commercial use. |
Link to free trial | https://www.uipath.com/community |