INPLOI LIMITED
Programmatic media buying
Social media advertising, programmatic job distribution to aggregators and job boards, campaign performance tracking, and recruitment spend optimisation.
Features
- Organic advertising
- Job aggregator advertising
- Job board advertising
- Multi-posting
- Social media advertising
- Display advertising
- Campaign analytics and source reporting
- Programmatic job distribution
Benefits
- Maximise free candidate traffic
- Active campaign and spend management
- Comprehensive source reporting and ROI determination
- Reach new audiences of job seekers
- Only pay for performance
- Highly targeted reach
- Reduce recruitment marketing spend
- Dynamic needs-based distribution
- Increased candidate quality
Pricing
£1,000 a unit
- Education pricing available
- Free trial available
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at matt@inploi.com.
Tell them what format you need. It will help if you say what assistive technology you use.
Framework
G-Cloud 14
Service ID
2 0 8 6 6 7 1 6 1 9 1 5 8 9 8
Contact
INPLOI LIMITED
Matthew de la Hey
Telephone: 07702056299
Email: matt@inploi.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Careers pages, job search, chat bot applications, data and analytics platform
- Cloud deployment model
- Private cloud
- Service constraints
- Organisations need to have an Applicant Tracking System installed
- System requirements
- Organisations need to have an Applicant Tracking System installed
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 48 hours
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
- Customers are assigned a dedicated customer success representative who is available on demand, in addition to regular scheduled (typically weekly) check in meetings.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
To help users start using our service effectively, inploi employs a comprehensive and supportive onboarding process, designed to ensure smooth integration and usability. The process is outlined in the following steps:
Initial Assessment: We conduct an initial assessment to fully understand the client's specific requirements, goals, and the timeline for implementation.
Planning and Scope Definition: We collaborate with the client to define the scope of the implementation project, detailing the specific modules or features to be implemented, and any customization or integration needs.
Timeline and Milestones Establishment: A detailed timeline is created, establishing milestones for the project to track progress and ensure timely completion of each phase.
Integration with Other Systems: We integrate the platform with the client’s existing systems and third-party applications to streamline processes and enhance data flow.
Testing and Quality Assurance: Before go-live, we conduct extensive testing to ensure all functionalities are working as expected. This includes functional testing, performance testing, and user acceptance testing.
Training and User Adoption: We provide comprehensive training to the client's team members who will be using the platform. This includes training sessions, documentation, and ongoing support to facilitate smooth adoption. - Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
- Notion pages
- End-of-contract data extraction
-
When a contractual relationship with inploi concludes, the exit plan specifies the processes for data extraction and transfer. This plan typically includes the following steps to ensure a smooth and secure transition of data to the contracting party or a designated third party:
Notice and Transition Assistance: The exit plan will specify any notice periods and the support inploi will provide during the transition. This often involves assisting with the transfer of necessary data and assets.
Data Transfer: Inploi facilitates the secure transfer of all relevant data to the client or a new service provider. This includes providing exports of all user data in a commonly used format such as CSV or JSON, depending on the client's requirements.
Data Deletion: After the data transfer is complete, and upon the client's request, inploi will securely delete all remaining user data from its systems in accordance with legal and regulatory requirements. This process also extends to any backups and subcontractor or affiliate databases where applicable.
Confirmation of Data Handling: Inploi provides a final report detailing the data that has been transferred and confirming the deletion of data from its systems, ensuring transparency and compliance with data protection regulations. - End-of-contract process
-
At the end of the contract with inploi, the following steps typically occur as part of the exit strategy outlined in the agreement:
Statement of Notice Period: This period is used to complete any outstanding work and to begin the data transfer process if applicable.
Data Transfer: Inploi assists in the secure transfer of all client data to either the client directly or to another designated service provider.
Data Deletion: After the transfer of data, inploi ensures that all client data is deleted from its systems.
Settlement of Accounts: All financial matters are settled as per the contract terms.
Review and Feedback: Often, a final meeting is held to review the service period, discuss any lessons learned, and provide feedback on the process.
All 'ordinary course of business' processes are included in the price.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- All of our technology is designed to work on mobile first and is then scaled up to larger devices. The user experience is therefore seamless across devices.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
- The service is accessed via a webplatoform with dedicated logins.
- Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- Our technology has integrated Accessibe delivering the highest standards of web accessibility.
- API
- Yes
- What users can and can't do using the API
- Users can use our API to integrate their ATS for job distribution and receiving candidate applications.
- API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Users can customise the configuration of audiences for the distribution of jobs to determine which audiences their jobs get exposure to.
Scaling
- Independence of resources
-
Inploi employs a robust infrastructure and scalable technology solutions to ensure that the service remains efficient and responsive, even under high demand from multiple users.
We undertake comprehensive resource planning to ensure that at all times we have capacity to deliver the highest level of service to all user.s
Analytics
- Service usage metrics
- Yes
- Metrics types
- We provide detailed analytics of all talent attraction and candidate application metrics, including spend, traffic generated, performance through the entire application process, stratified by channel.
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Via CSV, or through migration to a third party database
- Data export formats
- CSV
- Data import formats
- Other
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
99.9% uptime guarantee.
Downtime compensation is determined contractually with end users. - Approach to resilience
-
Inploi's service design emphasizes resilience through various strategic implementations, both in software architecture and datacentre setup:
Software and Platform Resilience
Utilizes a microservices architecture.
Employs a stateless design for scalability and redundancy.
Distributes data across multiple nodes for enhanced data integrity.
Implements automatic failover to minimize downtime.
Uses load balancing to distribute incoming requests evenly.
Datacentre Infrastructure Resilience
Features N+1 redundancy for all critical components.
Maintains multiple geographic locations for server setups to mitigate regional risks.
Ensures 99.99% uptime through high-availability configurations.
Secures facilities with comprehensive physical security measures.
Maintains optimal environmental conditions with advanced climate and fire suppression systems.
Conducts regular testing for preparedness against various failure scenarios.
Adheres to compliance standards and holds necessary certifications for security and data protection. - Outage reporting
- Inploi's uptime / outage reporting is available in realtime at this link: https://status.inploi.com/
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
Inploi enforces strict access controls for management interfaces and support channels through:
Role-Based Access Control (RBAC): Access is granted based on user roles, limiting permissions to those necessary for job functions.
Multi-Factor Authentication (MFA): Required for all users to enhance security.
Audit Trails and Logging: All access is logged and monitored with regular audits.
Regular Access Reviews: Access rights are periodically reviewed to ensure they align with current roles.
These measures collectively safeguard sensitive interfaces and support systems. - Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Cyber essentials basic. ISO27001 certification in progress.
- Information security policies and processes
-
Inploi follows a comprehensive set of information security policies and processes to ensure the protection of data and maintain compliance with industry standards:
Information Security Certifications: Holds Cyber Essentials Basic certification and adheres to ISO 27001 standards for information security management.
Data Encryption: Encrypts data both in transit and at rest using industry-standard encryption protocols such as AES-256 and TLS.
Access Control: Implements strict access controls and authentication mechanisms, including multi-factor authentication (MFA) and role-based access control (RBAC).
Regular Penetration Testing: Conducts regular penetration testing to identify and mitigate vulnerabilities.
Employee Training: Provides ongoing data protection and security training for all employees.
Incident Response Plan: Maintains a formal incident response plan to quickly address any security breaches or incidents.
Data Privacy: Complies with GDPR and other relevant data protection regulations, ensuring user data is handled securely and with respect to privacy rights.
Network Security: Uses firewalls, intrusion detection systems (IDS), and intrusion prevention systems (IPS) to safeguard network integrity.
Third-Party Risk Management: Evaluates and monitors third-party service providers to ensure they meet inploi’s security standards.
Regular Security Audits: Undergoes external security audits to assess compliance with security policies and the effectiveness of security measures.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Inploi's configuration and change management processes involve rigorous tracking and evaluation to maintain system integrity. Component Lifecycle Tracking is managed through a centralized configuration management database (CMDB), which records and monitors all components from deployment to decommissioning. Change Assessment begins with a detailed review of potential security impacts, facilitated by a risk assessment framework that evaluates the severity and likelihood of security risks. The Change Advisory Board (CAB) then scrutinizes these assessments to approve or reject changes based on potential security implications, ensuring that every change implemented is secure and aligns with overall security policies.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Inploi’s vulnerability management process involves continuous monitoring and rapid response to secure its services:
Threat Assessment: Uses automated tools and manual testing to scan for vulnerabilities. Intelligence is gathered from US-CERT, cybersecurity vendors, and ISACs.
Patching: Critical patches are prioritized and typically deployed within 24 to 48 hours after release. All patches are tested in a controlled environment before widespread deployment.
Information Sources: Relies on security advisories, public and private threat intelligence feeds, and collaborations with cybersecurity forums to stay informed about potential threats.
This structured approach ensures that inploi can swiftly address vulnerabilities, minimizing potential security risks. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Inploi implements comprehensive protective monitoring processes aligned with industry best practices:
Continuous Monitoring: Uses real-time tools to track system performance and detect unusual activities.
Log Management: Analyzes logs from all critical systems to identify potential security incidents.
Intrusion Detection Systems (IDS): Deploys IDS to automatically alert on suspicious behavior.
Security Information and Event Management (SIEM): Uses SIEM technology to correlate alerts and improve response.
Regular Audits: Conducts periodic audits to assess monitoring effectiveness and make adjustments.
These ensure proactive detection and rapid response to security threats. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Inploi's incident management processes are well-defined and structured to handle events efficiently:
Pre-defined Processes: Inploi maintains standardized procedures for common incidents to ensure quick and consistent responses.
User Incident Reporting: Users can report incidents through email or phone, which are monitored 24/7.
Incident Reporting to Users: Inploi provides incident reports through automated system alerts, followed by detailed analysis reports via email or the client portal. These reports outline the incident's nature, impact, corrective actions taken, and measures implemented to prevent recurrence.
This approach ensures transparency and continuous communication throughout the incident management process.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Tackling economic inequality
- Equal opportunity
Tackling economic inequality
inploi's software is designed to maximise the reach and accessibility of job opportunities. This is handled through a focus on diversity of reach - helping companies to reach all group of potential candidates and accessibility of software tools making sure that no groups are disadvantaged when finding and applying for jobs.Equal opportunity
Accessibility and Inclusivity: Our platforms are designed with accessibility at their core, ensuring that people with disabilities have equal access to our services. This includes compliance with the Web Content Accessibility Guidelines (WCAG) and user-friendly designs that accommodate a diverse user base. Diverse Hiring Practices: Inploi adheres to strict non-discriminatory hiring practices, ensuring fair treatment and equal employment opportunities regardless of gender, ethnicity, age, or socio-economic background. This policy is mirrored in our recruitment technology, which aids clients in implementing bias-free hiring processes. These initiatives are part of inploi’s commitment to using its G-Cloud service provision to deliver substantial social value, addressing key public sector concerns such as economic inequality and the promotion of equal opportunities.
Pricing
- Price
- £1,000 a unit
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- A paid, time-based pilot may be provided.
Service documents
Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format,
email the supplier at matt@inploi.com.
Tell them what format you need. It will help if you say what assistive technology you use.