Data8 Ltd.

Telephone Validation

Our service is a fast and efficient method to validate which UK landline
numbers are live. Our solution works by integrating in real-time with the telephone network, using our own custom hardware and software configuration to verify the number is live and will ring.


  • Verifies that a telephone number is live
  • Standardises the telephone number format
  • Available for UK Landlines
  • Microsoft Dynamics and Salesforce Integration
  • Ease of integration via Ajax, JQuery or pre-configured plug-in
  • Provides line operator


  • Ensures accurate data is captured
  • Simple integration
  • Live validation rather than a simple rule-based check
  • Create a quicker, simpler customer experience
  • Avoid capturing inaccurate numbers through mistyping etc.
  • Flexible Pricing Options
  • Online Dashboard to monitor usage


£0.01 to £0.02 a unit

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

9 0 6 7 6 3 8 7 4 1 1 2 4 1 1


Data8 Ltd. Dale Pilling
Telephone: 01513554555

Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
There are no specific service constraints
System requirements
  • Standard internet connection
  • Ability to call an external web service

User support

Email or online ticketing support
Email or online ticketing
Support response times
All tickets have an automated response acknowledgement. During working hours (Monday - Friday 9am - 5:30pm), we provide a guaranteed 2 hour response.
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Our web chat is accessible via our website with users required to provide first name, last name and an email address. Users are able to interact with internal staff within Data8 who are knowledge experts within their fields and because our web chat solution integrates with our own CRM system, any conversations can be tracked and linked to cases to ensure end-to-end account and technical support.
Web chat accessibility testing
We have not at this stage done any specific testing with assistive technology users.
Onsite support
Yes, at extra cost
Support levels
We do not charge for any support except for on-site client visits, full support is included within our cost structures. All our clients benefit from a dedicated Account Management team; within the team, dedicated individuals are assigned to pro-actively manage the requirements of our clients. Additional members of our team are also trained to provide the required cover during any holiday and sickness periods.
Our Account Management team communicate effectively with our clients and their responsibilities include but are not limited to the following:
• Customer On-boarding and Management of all aspects of any service level agreements
• Working alongside the Technical Team to progress technical requirements effectively
• Dealing with new requests that occur during a contract
• Effectively dealing with any clients queries
• Ensuring all financial aspects are dealt with accurately
• Meeting with clients as required
• Acting as the first point of contact for issue resolution
• Actively obtaining all information from clients which is required to deliver work effectively
Support available to third parties

Onboarding and offboarding

Getting started
In order to access the service you will need to register a username and password, these will be used to authenticate the web service requests and will provide access to the admin dashboard.

User documentation and sample code will be provided to assist with the integration. We also provide pro-active support typically through a combination of email, telephone and online demonstrations. Onsite visits can be carried out but our service is simple to integrate and it is unlikely that this will be required.

A free trial can be provided which gives our clients the opportunity to test the integration within their systems before going live. We fully support all clients during the free trial, proving direct access to our specialist Technical Team as and when required.
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
We do not store the data as part of our service, so there is no need to extract data when the contract ends.
End-of-contract process
Our contract ends at the point where either the number of credits or the term has expired. Following this the users will no longer have access to the service unless the contract is extended in some way. There are no additional termination fees at the point where the contract ends.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
We offer full compatibility with mobile devices, there is no difference between the mobile and desktop service.
Service interface
What users can and can't do using the API
Users can set up and access the API using a number of different protocols as described in our service definition document. The full functionality, with no limitations, can be accessed through the API. The service can be customised and changes made as detailed in the question below. Free trials of the API can be arranged to enable users to test compatibility and integration.
API documentation
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Customisation available
Description of customisation
The API can be customised in a number of ways to meet the needs of the buyer including but not limited to the following: Barring certain prefixes from the process, the format of the returned telephone number, the mechanism for triggering the service requests and how an invalid response is reported and displayed to a user.

The customisation is restricted to users who have the relevant administrator access.

The full extent to how our service can be configured is detailed in our service documentation.


Independence of resources
All applications are run in a load-balanced environment and we constantly monitor the system to ensure there is sufficient capacity, and extend the capacity with additional infrastructure as required. We ensure that our services do not run at a capacity that would enable users to be affected by the demand from other users.


Service usage metrics
Metrics types
All our clients benefit from access to a live dashboard, which provides the following:

Number of Lookups performed which can be displayed by day, country and display response type
Number of Lookups remaining
Estimated date of expiry
Number of lookups used by day
Country they have been used

Statistics can easily be downloaded and exported as a .csv to allow implementation in excel etc., or pre-configured reports can be built and sent periodically as agreed which can include additional information such as

Authentication Type
- Protocol Type
- Referrer Domain
- API Key
- IP Address
- Application Name
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
Less than once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
User data is not stored as part of this service, so there is no requirement to export data.
Data export formats
Other data export formats
User data is not stored as part of this service
Data import formats
Other data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Financial recompense is provided should we drop below the rate as outlined in the Service Definition document.
Approach to resilience
We use two geographically separated data centres with independent suppliers in an active/active configuration to protect against data centre outage. Each data centre runs a load balanced set of servers to protect against individual server failure
Outage reporting
A public dashboard is available that shows the status for all our sevices. We also offer a service availability API which is included free of charge for all our sevices.

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Role-based authorisation restricts access to individual areas of the management interface.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Between 6 months and 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 6 months and 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
QAS International
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
All our services and associated infrastructure are covered by our ISO/IEC 27001
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Who accredited the PCI DSS certification
First Data
PCI DSS accreditation date
What the PCI DSS doesn’t cover
We are covered to PCI Level 4.
Other security certifications
Any other security certifications
  • Cyber Essentials

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Data8 recognises that the disciplines of confidentiality, integrity and availability in Information Security Management are integral parts of its management function. The Management of Data8 views these as primary responsibilities and fundamental to the best business practice of adopting appropriate Information Security Controls, along the lines laid down in the BS ISO / IEC 27001:2013 standard.

Data8 have an Information Security Policy which seeks to operate to the highest standards continuously and implements and operates fully BS ISO / IEC 27001:2013 standard, including continual improvement, through registration and annual review. Responsibility for upholding this policy is truly organisation-wide with the guidance and assistance of the Managing Director who encourages the commitment of all staff to address Information Security as part of their skills. All employees undertake Information Security training as part of their induction along with formal training annually in addition to continual on the job training. Regular internal and external audits are undertaken which are reported to the Managing Director.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All change requirements are tracked and linked to final implementation details such as code changes. Security impact is included as part of the review process before changes are accepted for deployment.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Vulnerabilities are logged as security incidents and categorised by severity. Patches can be deployed on a continual basis within 30 minutes. Information will come from internal testing and reviews and the technology/infosec media.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Intrusion Detection and Firewall notification reports. Responses may include temporarily disabling a service or blocking a source IP address, typically within 30 minutes.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
We have a documented and enforced policy which complies with ISO/IEC 27001: 2013 standard

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£0.01 to £0.02 a unit
Discount for educational organisations
Free trial available
Description of free trial
We offer a free trial with full functionality for a period of 30 days with a maximum of 2000 credits.
Link to free trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.