Data8 Ltd.

Email Validation

Validates email addresses at the point of capture and identifies whether they are valid or invalid.


  • Validates email addresses at the point of capture
  • Checks that the individual mailbox can accept incoming emails
  • Suggests corrections for misspelt domain names
  • Suggests corrections for misspelt user names
  • Identifies email addresses as personal, generic, free
  • Integrates with a range of systems
  • Checks that the email domain exists and can accept messages


  • Improved user experience
  • Ensures accurate data is captured
  • Enables segmentation of data by email type
  • Improved email deliverability rates
  • Reduces the number of hard bounces
  • Improved reputation score
  • Flexible pricing options
  • Online dashboard to monitor usage


£0.005 to £0.016 per unit

  • Education pricing available
  • Free trial available

Service documents


G-Cloud 11

Service ID

7 8 2 2 6 8 8 8 5 5 1 1 2 0 0


Data8 Ltd.

Dale Pilling


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Public cloud
Service constraints There are no specific service constraints
System requirements
  • Standard internet connection
  • Ability to call an external web service

User support

User support
Email or online ticketing support Email or online ticketing
Support response times All tickets have an automated response acknowledge. During working hours (Monday - Friday 9am - 5:30pm), we provide a guaranteed 2 hour response.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support Web chat
Web chat support availability 9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard None or don’t know
How the web chat support is accessible Our web chat is accessible via our website with users required to provide first name, last name and an email address. Users are able to interact with internal staff within Data8 who are knowledge experts within their fields and because our web chat solution integrates with our own CRM system then any conversations can be tracked and linked to cases to ensure end-to-end account and technical support.
Web chat accessibility testing We have not at this stage done any specific testing with assistive technology users.
Onsite support Yes, at extra cost
Support levels We do not charge for any support except for onsite clienet visits, full support is included within our cost structures. All our clients benefit from a dedicated Account Management team, within the team dedicated individuals are assigned to pro-actively manage the requirements of our clients. Additional members of our team are also trained to provide the required cover during any holiday and sickness periods.
Our Account Management team communicate effectively with our clients and their responsibilities include but are not limited to the following:
• Customer Onboarding and Management of all aspects of any service level agreements
• Working alongside the Technical Team to progress technical requirements effectively
• Dealing with new requests that occur during a contract
• Effectively dealing with any clients queries
• Ensuring all financial aspects are dealt with accurately
• Meeting with clients as required
• Acting as the first point of contact for issue resolution
• Actively obtaining all information from clients which is required to deliver work effectively
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started In order to access the service you will need to register a username and password, these will be used to authenticate the web service requests and will provide access to the admin dashboard.

User Documentation and sample code will be provided to assist with the integration. We also provide pro-active support typically through a combination of email, telephone and online demonstrations. Onsite visits can be carried out but our service is simple to integrate and it is unlikely that this will be required.

A free trial can be provided which gives our clients the opportunity to test the integration within their systems before going live. We fully support all clients during the free trial proving direct access to our specialist Technical Team as and when required.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction We do not store the data as part of our service, so there is no need to extract data when the contract ends.
End-of-contract process Our contract ends at the point where either the number of credits or the term has expired. Following this the users will no longer have access to the service unless the contract is extended in some way. There are no additional termination fees at the point where the contract ends.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service We offer full compatibility with mobile devices.
Service interface No
What users can and can't do using the API Users can set up and access the API using a number of different protocols as described in our service definition document. The full functionality, with no limitations, can be accessed through the API. The service can be customised and changes made as detailed in the question below. Free trials of the API can be arranged to enable users to test compatibility and integration.
API documentation Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment Yes
Customisation available Yes
Description of customisation The API can be customised in a number of ways to meet the buyer needs including but not limited to the following: The Level of Validation, whether smart suggestions are returned, the mechanism for triggering the service requests and how an invalid response is reported and displayed to a user.

The details for the levels of validation and how smart suggestions operate are provided in our Service Definition document.

The customisation is restricted to users who have the relevant administrator access.

The full extent to how our service can be configured is detailed in our service documentation.


Independence of resources All applications are run in a load-balanced environment and we constantly monitor the system to ensure there is sufficient capacity, and extend the capacity with additional infrastructure as required. We ensure that our services do not run at a capacity that would enable users to be affected by the demand from other users.


Service usage metrics Yes
Metrics types All our clients benefit from access to a live dashboard, which provides the following: Number of Lookups performed which can be displayed by day, country and display response type Number of Lookups remaining Estimated date of expiry Number of lookups used by day Country they have been used Statistics can easily be downloaded and exported as a .csv to allow implementation in excel etc., or pre-configured reports can be built and sent periodically as agreed which can include additional information such as Authentication Type - Protocol Type - Referrer Domain - API Key - IP Address - Application Name
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency Less than once a year
Penetration testing approach ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach User data is not stored as part of this service, so there is no requirement to export data.
Data export formats Other
Other data export formats User data is not stored as part of this service
Data import formats Other
Other data import formats XML

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Financial recompense is provided should we drop below the rate as outlined in the Service Definition document.
Approach to resilience We use two geographically separated data centres with independent suppliers in an active/active configuration to protect against data centre outage. Each data centre runs a load balanced set of servers to protect against individual server failure
Outage reporting A public dashboard is available that shows the status for all our sevices. We also offer a service availability API which is included free of charge for all our sevices.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Role-based authorisation restricts access to individual areas of the management interface.
Access restriction testing frequency At least every 6 months
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for Between 6 months and 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for Between 6 months and 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 QAS International
ISO/IEC 27001 accreditation date 27th August 2018
What the ISO/IEC 27001 doesn’t cover All our services and associated infrastructure are covered by our ISO/IEC 27001
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications
  • Cyber Essentials

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Data8 recognises that the disciplines of confidentiality, integrity and availability in Information Security Management are integral parts of its management function. The Management of Data8 views these as primary responsibilities and fundamental to the best business practice of adopting appropriate Information Security Controls, along the lines laid down in the BS ISO / IEC 27001:2013 standard.

Data8 have an Information Security Policy which seeks to operate to the highest standards continuously and implements and operates fully BS ISO / IEC 27001:2013 standard, including continual improvement, through registration and annual review. Responsibility for upholding this policy is truly organisation-wide with the guidance and assistance of the Managing Director who encourages the commitment of all staff to address Information Security as part of their skills. All employees undertake Information Security training as part of their induction along with formal training annually in addition to continual on the job training. Regular internal and external audits are undertaken which are reported to the Managing Director.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach All change requirements are tracked and linked to final implementation details such as code changes. Security impact is included as part of the review process before changes are accepted for deployment.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Vulnerabilities are logged as security incidents and categorised by severity. Patches can be deployed on a continual basis within 30 minutes. Information will come from internal testing and reviews and the technology/infosec media.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Intrusion Detection and Firewall notification reports. Responses may include temporarily disabling a service or blocking a source IP address, typically within 30 minutes.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach We have a documented and enforced policy which complies with ISO/IEC 27001: 2013 standard

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £0.005 to £0.016 per unit
Discount for educational organisations Yes
Free trial available Yes
Description of free trial We offer a free trial with full functionality for a period of 30 days with a maximum of 2000 credits.

Service documents

Return to top ↑