OWN YOUR BUSINESS LTD

Smart API blockchain

Service for the notarisation of digital assets in Blockchain, for the certification of processes and documents to guarantee transparency and traceability.
It provides an interface with permission-less Blockchain, guaranteeing immutability, authenticity and integrity of any digital asset. The service integrates with existing systems and applications and GDPR compliant.

Features

  • Data validation in blockchain
  • Data verification in blockchain
  • Data invalidation in blockchain
  • Event log

Benefits

  • Access Blockchain without entrusting information to third parties
  • GDPR compliant
  • Facilitate connecting to most popular public blockchains
  • Integrates with processes and systems easily.

Pricing

£1.00 a transaction

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at murzakova@ownyourbusiness.tech. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

1 3 3 1 6 9 2 3 7 2 1 5 5 8 7

Contact

OWN YOUR BUSINESS LTD Ekaterina Murzakova
Telephone: +447758665024
Email: murzakova@ownyourbusiness.tech

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
BIM
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
Planned SW upgrade (mainly quartly)
System requirements
Browsers: Chrome v 5.4+, Edge 38+, Firefox 64+

User support

Email or online ticketing support
Email or online ticketing
Support response times
First Support Response Time: 120 minutes maximum
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Request: acknowledge 24h, reply 5 days

Incident: acknowledge 2h, fix 1 day
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Sending request via email, after receipt any additional information necessary to activate the service will be requested
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
The customer is able to extract and store the notarization receipts of his interest on his systems, using the REST APIs made available by the service and accessible through the same invocation credentials of the notarization functions.
The receipt extraction functions will remain accessible for a further 30 calendar days after the actual deactivation of the service.
End-of-contract process
The service can be cancelled via email 30 days prior renewal.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
Users can setup the service by using REST API type and allow the operations necessary to validate and invalidate documents

Changes can be requested via support
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
No

Scaling

Independence of resources
The software is deployed on Public cloud infrastructures and can easily scale.

Analytics

Service usage metrics
Yes
Metrics types
Customer-specific application metrics (number of transactions, sla stats)
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least every 6 months
Penetration testing approach
In-house
Protecting data at rest
Other
Other data at rest protection approach
At rest data is stored in encrypted Storage buckets (AES-256 encryption algorithm).
Data retention policies are implemented and objects that can be deleted according to the policies get removed.
Application Servers and Databases Backup data is encrypted as well
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
The customer is able to extract and store the notarization receipts of his interest on his systems, using the REST APIs made available by the service and accessible through the same invocation credentials of the notarization functions. The receipt extraction functions will remain accessible for a further 30 calendar days after the actual deactivation of the service.
Data export formats
  • CSV
  • Other
Other data export formats
Json
Data import formats
Other
Other data import formats
Json

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
SLA:
- Request: acknowledge 24h, reply 5 days
- Incident: acknowledge 2h, fix 1 day

Guarantee: 99% availability
Approach to resilience
It’s available on request
Outage reporting
- an API
- email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels
Access restrictions to management resources is performed via:
* Identity and Access Management policies on secured cloud
* Public key authentication
* Network Security Groups and IP based filtering
* DMZ VM secure access/Bastion host jumphost
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Establish objectives.
Identify all relevant security regulations—corporate, industry, and government.
Customize the information security policy.
Align the policy with the needs of the organization.
Inventory all systems, processes, and data.
Identify risks.
Assess security related to systems, data, and workflows.
Document procedures thoroughly and clearly.
Review procedures carefully to ensure they are accurate and complete.
Train everyone who has access to the organization's data or systems on the rules that are outlined in the information security policy.
Review and update the policy regularly.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
OYB Cloud is AWS. Application components are all tracked via AWS Config.
All changes are tracked via software delivery toolchain and are assessed.
Production changes are rolled out at a predetermined time window to ensure people are available in case of issues.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We are subscribed to security mailing list for the technologies used in our software.
Patches of critical CVSS vulnerabilities are implemented within 3 days of availability.
Within the DevOps teams, security champions have been identified. They work together for a swift issue resolution.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Our monitoring tools are configured to scan for potential compromises.
The IT team routinely scan application logs to be "security proactive" and reduce the risk of compromise.
Our on call team gets notified via e-mail and messages in case logs are shown compromise pattern.
Incident management type
Supplier-defined controls
Incident management approach
The IT team relies on up-to-date documentation for incident management.
Users are able to report incident via e-mail.
The e-mail will generate a ticket that OYB support receives.
Incident reports/Post mortem can be provided on a case-by-case basis, in case of disaster or SLA breach.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

We integrate with one of the most Eco-friendly blockchain.
Polygon's validators consume approximately 0.00079TWh of electricity per year with an approximate continuous draw of 0.00009GW, orders of magnitude below the energy consumption of the main PoW blockchain networks.

Pricing

Price
£1.00 a transaction
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Data validation
Data check
Data invalidation
Link to free trial
https://apiproxy.ownyourbusiness.tech/accounts/login/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at murzakova@ownyourbusiness.tech. Tell them what format you need. It will help if you say what assistive technology you use.