Skip to main content

Help us improve the Digital Marketplace - send your feedback

Zero Burden Services

ZBS Zero Touch Lost & Found Property Management Service

You take 30 seconds to register the item, leave it in our box, we take care of the rest to identify the owner, repatriate it, or recycle it ethically, and we share any revenue with you.


  • Annual Subscriptions or One off for Singular Events
  • Simple web and mobile interface for all types of user
  • Managed service includes all needed software, services and hardware
  • ZBS Managed Pickups from your locations and postal returns packaging
  • Secure ZBS Provided Lock Boxes at required locations with pickups
  • ZBS provided secure guarded storage for items
  • Police Forces integrated for automated reporting of items and searches
  • Fully DPA May18 (GDPR) Compliant with full digital auditing
  • ZBS pays you a revenue share from its returns/recycling
  • Range of Services for Lost & Stolen Property Management


  • Proven repatriation rate in UK of 87%
  • Offloads approx 90% of all customer/citizen support cost & time
  • Customer empowerment through self-search and service
  • Removes call handling and social media costs from Lost Property
  • Drive public confidence and satisfaction in Lost Property Operators
  • Reduce legal liabilities and burdens with full audit capability
  • Provides revenue generation without upfront or recurring costs
  • Ensure safe and lawful disposal of property not repatriated
  • Provides certified actions for Environmental Certifications
  • Effectively removes the need for storage at your sites


£15,000 an instance a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 13

Service ID

1 5 7 3 5 2 7 0 6 5 3 2 3 2 5


Zero Burden Services UK Sales
Telephone: 0203 951 0506

Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
All Maintenance and support is detailed in our SLA
System requirements
  • Internet Access to PC or Mobile devices
  • PC/Mobile device with browser or application capability
  • For Hardware clients with a PC Windows 8+
  • User ID for each user, preferably email address
  • For Hardware Clients with a PC 4 Free USB2 ports

User support

Email or online ticketing support
Email or online ticketing
Support response times
Provider Service Commitment: 99.95% Uptime

Service hours are 9-5 UK time, Monday-Friday

Support functions 24 hours a day, 365 days a year
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
We provide chat functions, when agents are available, via our website
Web chat accessibility testing
Onsite support
Yes, at extra cost
Support levels
Support & maintenance are built into the service agreement
On-site support, where requested and agreed, will be charged at a rate agreed to in a mutually signed Statement of Work
Support available to third parties

Onboarding and offboarding

Getting started
We provide full documentation, plus short training videos, and where needed can run remote or onsite training
Service documentation
Documentation formats
End-of-contract data extraction
The SaaS service is built such that it has a separate database for each client so ZBS can extract all data in excel file as required
End-of-contract process
If the agreement comes to an end, access to the information and service is suspended. At the end of this, the clients data, on agreement, is either destroyed, or exported and delivered securely by ZBS to the client.
No extra fees are anticipated.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
The provided capability is native to any environment, mobile, laptop , desktop or SoC
Service interface
User support accessibility
None or don’t know
What users can and can't do using the API
APIs can be used to integrate the SaaS functionality with third party software. The APIs allow users to get lists of lost and found items, register lost or found items, user registration, manage registered items, claim items.
API documentation
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Customisation available
Description of customisation
ZBS will work with clients to agree on how much will be done by the client and by ZBS. This also includes locations with secure pickup boxes and the frequency of those pickups. Customisation , where needed, of any needed software is also supported as is branding.


Independence of resources
The Cloud system is hosted in secured hosting centres with a 99.95% availability guarantee. Additional capacity is added as needed and is shared across all users and products based upon demand.


Service usage metrics
Metrics types
We provide dashboards and regular reports on items logged, claims made, items repatriated, courier actions
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Clients can export there data on demand
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • XLS
  • As agreed

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
ZBS provides a contractual SLA with a 99.95% availability.
Service credits are provided for SLA breaches
Approach to resilience
Our Tier 3 standard data centres have concurrent maintainability to ensure 100% uptime. We operate N+1 configurations throughout including UPS and standby diesel generators to make sure your business is always online.
Our data centres are carrier-neutral with a range of leading tier 1 and tier 2 carriers and peering agreements in place.
Our data centres are ISO 27001 certified, PCI-compliant and secured to UK government IL4 standards, which ensures your solution is protected by exceptional levels of both physical and virtual security at all times.
Outage reporting
ZBS provides email alerts and clients can monitor the server url's for automated outage reporting

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Other
Other user authentication
We also support Microsoft Azure or self hosted AD authentication for both our web and mobile apps
Access restrictions in management interfaces and support channels
Each user is individually identified, authenticated and all actions audited.
Role Based Access control assures no access outside the required rights for the individuals role are granted. Access to the databases is not permitted even to management and support teams.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Cyber essentials
Cyber essentials plus
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
Our data centres are ISO 27001 certified, PCI-compliant and secured to UK government IL4 standards, which ensures your solution is protected by exceptional levels of both physical and virtual security at all times.
Information security policies and processes
The cloud system is currently proceeding through ISO27001.

Its processes are documented and audited internally several times a year by the board.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
The system design & development teams follow a system documented process managed by the Development Management team who report to the board, with all actions included in our CMS.
Components are built using best practise AGILE methodology, which includes a security review.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
The IT system has a secured tested hosted service infrastructure.
We frequently perform updates in infrastructure, with high risk patches being prioritised based on the risk from the vendor and taking into account the security infrastructure the cloud system is protected by.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Within the Cloud system environment based upon the vulnerability testing, Our responses immediately to ensure no potential compromise is left unpatched or unprotected by the security infrastructure in place.
Incident management type
Supplier-defined controls
Incident management approach
Users report incidents via our support portal, which then based upon the severity of the issue is then reviewed by the cloud system team, this process for review is standardised and documented within the cloud, and remedial actions taken.
This process for review is standardised and documented within the cloud system.
these actions are fully registered and logged in the support portal for the user to track and use as a formal record of the incident report.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks

Social Value

Fighting climate change

Fighting climate change

ZBS delivers direct support for this through its service :
ZBS is committed to being carbon zero
We upcycle roughly 35% of all items received
We never land fill anything
We use over 35 ethical recyclers, specialists in each area
We aggregate different client/location pickups to minimise Transport usage
We are expanding to more warehouse/processing centres country wide to minimise travel time
All supplies used by/provided by ZBS are ethically sourced and from renewable materials
We recycle rather than destroy/burn
Our IT systems are cloud based and based on best practise environmental standards
Our suppliers and warehouses use electricity from renewable sources
All meetings are virtual in nature to reduce Travel and fuel usage
ZBS works with environmentally friendly couriers
Covid-19 recovery

Covid-19 recovery

ZBS supports Covid-19 recovery through :

Aggressive re-hiring itself and in its suppliers
Maintaining operations and employees during the lockdowns
Supporting work from home, but also with regular meetings to ensure physical and mental benefit
Optimising its provision of charitable funds and recycled items to local charities and organisations supporting local communities impacted badly
Tackling economic inequality

Tackling economic inequality

ZBS tackles economic inequality by :

ZBS solely deals with UK based suppliers
ZBS preferentially and today solely, with UK SME's
ZBS, uses small start-ups for software development with long term relationships
ZBS always reviews processes and technology through its entire supply chain to benefit from innovation
ZBS continuously monitors and reviews its infrastructure and its suppliers for cyber security and resilience
Equal opportunity

Equal opportunity

ZBS supports this pillar by :

Providing training and optimised systems to make this available and usable by all, thus reducing the disability employment gap
Providing process and people consulting to ensure all people can be included and employed equally in the property management process


ZBS delivers benefits in this regard via :

Provision of funding to both local and national charities - examples of which are Action for Children and local homeless shelters
Provision of recycled items for usage - examples of which are given to local homeless shelters, refugee organisations, glasses and replacement limbs for usage, under applicable regulations abroad.


£15,000 an instance a year
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.