Skip to main content

Help us improve the Digital Marketplace - send your feedback

INPLOI LIMITED

Programmatic media buying

Social media advertising, programmatic job distribution to aggregators and job boards, campaign performance tracking, and recruitment spend optimisation.

Features

  • Organic advertising
  • Job aggregator advertising
  • Job board advertising
  • Multi-posting
  • Social media advertising
  • Display advertising
  • Campaign analytics and source reporting
  • Programmatic job distribution

Benefits

  • Maximise free candidate traffic
  • Active campaign and spend management
  • Comprehensive source reporting and ROI determination
  • Reach new audiences of job seekers
  • Only pay for performance
  • Highly targeted reach
  • Reduce recruitment marketing spend
  • Dynamic needs-based distribution
  • Increased candidate quality

Pricing

£1,000 a unit

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at matt@inploi.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

2 0 8 6 6 7 1 6 1 9 1 5 8 9 8

Contact

INPLOI LIMITED Matthew de la Hey
Telephone: 07702056299
Email: matt@inploi.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Careers pages, job search, chat bot applications, data and analytics platform
Cloud deployment model
Private cloud
Service constraints
Organisations need to have an Applicant Tracking System installed
System requirements
Organisations need to have an Applicant Tracking System installed

User support

Email or online ticketing support
Email or online ticketing
Support response times
48 hours
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Onsite support
Support levels
Customers are assigned a dedicated customer success representative who is available on demand, in addition to regular scheduled (typically weekly) check in meetings.
Support available to third parties
No

Onboarding and offboarding

Getting started
To help users start using our service effectively, inploi employs a comprehensive and supportive onboarding process, designed to ensure smooth integration and usability. The process is outlined in the following steps:

Initial Assessment: We conduct an initial assessment to fully understand the client's specific requirements, goals, and the timeline for implementation.

Planning and Scope Definition: We collaborate with the client to define the scope of the implementation project, detailing the specific modules or features to be implemented, and any customization or integration needs.

Timeline and Milestones Establishment: A detailed timeline is created, establishing milestones for the project to track progress and ensure timely completion of each phase.

Integration with Other Systems: We integrate the platform with the client’s existing systems and third-party applications to streamline processes and enhance data flow.

Testing and Quality Assurance: Before go-live, we conduct extensive testing to ensure all functionalities are working as expected. This includes functional testing, performance testing, and user acceptance testing.

Training and User Adoption: We provide comprehensive training to the client's team members who will be using the platform. This includes training sessions, documentation, and ongoing support to facilitate smooth adoption.
Service documentation
Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
Notion pages
End-of-contract data extraction
When a contractual relationship with inploi concludes, the exit plan specifies the processes for data extraction and transfer. This plan typically includes the following steps to ensure a smooth and secure transition of data to the contracting party or a designated third party:

Notice and Transition Assistance: The exit plan will specify any notice periods and the support inploi will provide during the transition. This often involves assisting with the transfer of necessary data and assets.

Data Transfer: Inploi facilitates the secure transfer of all relevant data to the client or a new service provider. This includes providing exports of all user data in a commonly used format such as CSV or JSON, depending on the client's requirements.

Data Deletion: After the data transfer is complete, and upon the client's request, inploi will securely delete all remaining user data from its systems in accordance with legal and regulatory requirements. This process also extends to any backups and subcontractor or affiliate databases where applicable.

Confirmation of Data Handling: Inploi provides a final report detailing the data that has been transferred and confirming the deletion of data from its systems, ensuring transparency and compliance with data protection regulations.
End-of-contract process
At the end of the contract with inploi, the following steps typically occur as part of the exit strategy outlined in the agreement:

Statement of Notice Period: This period is used to complete any outstanding work and to begin the data transfer process if applicable.

Data Transfer: Inploi assists in the secure transfer of all client data to either the client directly or to another designated service provider.

Data Deletion: After the transfer of data, inploi ensures that all client data is deleted from its systems.

Settlement of Accounts: All financial matters are settled as per the contract terms.

Review and Feedback: Often, a final meeting is held to review the service period, discuss any lessons learned, and provide feedback on the process.

All 'ordinary course of business' processes are included in the price.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
All of our technology is designed to work on mobile first and is then scaled up to larger devices. The user experience is therefore seamless across devices.
Service interface
Yes
User support accessibility
WCAG 2.1 AAA
Description of service interface
The service is accessed via a webplatoform with dedicated logins.
Accessibility standards
WCAG 2.1 AAA
Accessibility testing
Our technology has integrated Accessibe delivering the highest standards of web accessibility.
API
Yes
What users can and can't do using the API
Users can use our API to integrate their ATS for job distribution and receiving candidate applications.
API documentation
Yes
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Users can customise the configuration of audiences for the distribution of jobs to determine which audiences their jobs get exposure to.

Scaling

Independence of resources
Inploi employs a robust infrastructure and scalable technology solutions to ensure that the service remains efficient and responsive, even under high demand from multiple users.

We undertake comprehensive resource planning to ensure that at all times we have capacity to deliver the highest level of service to all user.s

Analytics

Service usage metrics
Yes
Metrics types
We provide detailed analytics of all talent attraction and candidate application metrics, including spend, traffic generated, performance through the entire application process, stratified by channel.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Via CSV, or through migration to a third party database
Data export formats
CSV
Data import formats
Other

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99.9% uptime guarantee.

Downtime compensation is determined contractually with end users.
Approach to resilience
Inploi's service design emphasizes resilience through various strategic implementations, both in software architecture and datacentre setup:

Software and Platform Resilience

Utilizes a microservices architecture.
Employs a stateless design for scalability and redundancy.
Distributes data across multiple nodes for enhanced data integrity.
Implements automatic failover to minimize downtime.
Uses load balancing to distribute incoming requests evenly.

Datacentre Infrastructure Resilience

Features N+1 redundancy for all critical components.
Maintains multiple geographic locations for server setups to mitigate regional risks.
Ensures 99.99% uptime through high-availability configurations.
Secures facilities with comprehensive physical security measures.
Maintains optimal environmental conditions with advanced climate and fire suppression systems.
Conducts regular testing for preparedness against various failure scenarios.
Adheres to compliance standards and holds necessary certifications for security and data protection.
Outage reporting
Inploi's uptime / outage reporting is available in realtime at this link: https://status.inploi.com/

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Inploi enforces strict access controls for management interfaces and support channels through:

Role-Based Access Control (RBAC): Access is granted based on user roles, limiting permissions to those necessary for job functions.
Multi-Factor Authentication (MFA): Required for all users to enhance security.
Audit Trails and Logging: All access is logged and monitored with regular audits.
Regular Access Reviews: Access rights are periodically reviewed to ensure they align with current roles.
These measures collectively safeguard sensitive interfaces and support systems.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Cyber essentials basic. ISO27001 certification in progress.
Information security policies and processes
Inploi follows a comprehensive set of information security policies and processes to ensure the protection of data and maintain compliance with industry standards:

Information Security Certifications: Holds Cyber Essentials Basic certification and adheres to ISO 27001 standards for information security management.

Data Encryption: Encrypts data both in transit and at rest using industry-standard encryption protocols such as AES-256 and TLS.

Access Control: Implements strict access controls and authentication mechanisms, including multi-factor authentication (MFA) and role-based access control (RBAC).

Regular Penetration Testing: Conducts regular penetration testing to identify and mitigate vulnerabilities.

Employee Training: Provides ongoing data protection and security training for all employees.

Incident Response Plan: Maintains a formal incident response plan to quickly address any security breaches or incidents.

Data Privacy: Complies with GDPR and other relevant data protection regulations, ensuring user data is handled securely and with respect to privacy rights.

Network Security: Uses firewalls, intrusion detection systems (IDS), and intrusion prevention systems (IPS) to safeguard network integrity.

Third-Party Risk Management: Evaluates and monitors third-party service providers to ensure they meet inploi’s security standards.

Regular Security Audits: Undergoes external security audits to assess compliance with security policies and the effectiveness of security measures.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Inploi's configuration and change management processes involve rigorous tracking and evaluation to maintain system integrity. Component Lifecycle Tracking is managed through a centralized configuration management database (CMDB), which records and monitors all components from deployment to decommissioning. Change Assessment begins with a detailed review of potential security impacts, facilitated by a risk assessment framework that evaluates the severity and likelihood of security risks. The Change Advisory Board (CAB) then scrutinizes these assessments to approve or reject changes based on potential security implications, ensuring that every change implemented is secure and aligns with overall security policies.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Inploi’s vulnerability management process involves continuous monitoring and rapid response to secure its services:

Threat Assessment: Uses automated tools and manual testing to scan for vulnerabilities. Intelligence is gathered from US-CERT, cybersecurity vendors, and ISACs.
Patching: Critical patches are prioritized and typically deployed within 24 to 48 hours after release. All patches are tested in a controlled environment before widespread deployment.
Information Sources: Relies on security advisories, public and private threat intelligence feeds, and collaborations with cybersecurity forums to stay informed about potential threats.
This structured approach ensures that inploi can swiftly address vulnerabilities, minimizing potential security risks.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Inploi implements comprehensive protective monitoring processes aligned with industry best practices:

Continuous Monitoring: Uses real-time tools to track system performance and detect unusual activities.
Log Management: Analyzes logs from all critical systems to identify potential security incidents.
Intrusion Detection Systems (IDS): Deploys IDS to automatically alert on suspicious behavior.
Security Information and Event Management (SIEM): Uses SIEM technology to correlate alerts and improve response.
Regular Audits: Conducts periodic audits to assess monitoring effectiveness and make adjustments.
These ensure proactive detection and rapid response to security threats.
Incident management type
Supplier-defined controls
Incident management approach
Inploi's incident management processes are well-defined and structured to handle events efficiently:

Pre-defined Processes: Inploi maintains standardized procedures for common incidents to ensure quick and consistent responses.
User Incident Reporting: Users can report incidents through email or phone, which are monitored 24/7.
Incident Reporting to Users: Inploi provides incident reports through automated system alerts, followed by detailed analysis reports via email or the client portal. These reports outline the incident's nature, impact, corrective actions taken, and measures implemented to prevent recurrence.
This approach ensures transparency and continuous communication throughout the incident management process.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Tackling economic inequality
  • Equal opportunity

Tackling economic inequality

inploi's software is designed to maximise the reach and accessibility of job opportunities. This is handled through a focus on diversity of reach - helping companies to reach all group of potential candidates and accessibility of software tools making sure that no groups are disadvantaged when finding and applying for jobs.

Equal opportunity

Accessibility and Inclusivity: Our platforms are designed with accessibility at their core, ensuring that people with disabilities have equal access to our services. This includes compliance with the Web Content Accessibility Guidelines (WCAG) and user-friendly designs that accommodate a diverse user base. Diverse Hiring Practices: Inploi adheres to strict non-discriminatory hiring practices, ensuring fair treatment and equal employment opportunities regardless of gender, ethnicity, age, or socio-economic background. This policy is mirrored in our recruitment technology, which aids clients in implementing bias-free hiring processes. These initiatives are part of inploi’s commitment to using its G-Cloud service provision to deliver substantial social value, addressing key public sector concerns such as economic inequality and the promotion of equal opportunities.

Pricing

Price
£1,000 a unit
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
A paid, time-based pilot may be provided.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at matt@inploi.com. Tell them what format you need. It will help if you say what assistive technology you use.