Skip to main content

Help us improve the Digital Marketplace - send your feedback

giant screening

Background Checking & Pre-Employment Screening

We offer you the very best technology and operational support to deliver pre-employment screening and background checking. At giant, we ensure the candidate journey is improved, our client’s business is protected and the time to hire is positively impacted. This includes DBS, Financial, CV Verification and other checks.

Features

  • Criminal Record Checks
  • Referencing
  • All required background checks
  • Managed Service
  • Cloud Based System
  • Fully Outsourced
  • Compliance
  • Applicant Onboarding Features
  • Electronic Signatures
  • Highly Configurable

Benefits

  • Cost Efficient
  • Quick Turn Around Times
  • Excellent Candidate Experience
  • Highly flexible
  • Branded to you
  • Everything in one place
  • Remove administrative burden

Pricing

£4.50 a person

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at mathew.armstrong@giantgroup.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

2 4 0 2 2 6 7 8 7 4 3 5 8 5 7

Contact

giant screening Mathew Armstrong
Telephone: 01245 379090
Email: mathew.armstrong@giantgroup.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
There are no know constraints
System requirements
  • Works over any Web Browser
  • Mobile Enabled

User support

Email or online ticketing support
Email or online ticketing
Support response times
2 Working Hours
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), 7 days a week
Web chat support accessibility standard
WCAG 2.1 A
Web chat accessibility testing
N/A
Onsite support
Yes, at extra cost
Support levels
Support framework offers comprehensive assistance to ensure users derive maximum value from our background checking service. Support is structured across multiple tiers to address diverse needs:
Basic Support: assistance covers general inquiries, basic troubleshooting, and access to self-help resources such as knowledge bases and FAQs. Users receive prompt responses during standard business hours via email or chat.
Premium Support: support caters to more complex queries and technical issues. Users benefit from expedited response times, extended support hours, and access to a dedicated support representative for personalised assistance. This tier may also include phone support for immediate assistance.
Enterprise Support: Tailored to enterprise clients with mission-critical needs, this level offers prioritised support, extended availability, and proactive monitoring to anticipate and mitigate potential issues. Dedicated account managers ensure a seamless experience, with regular check-ins and strategic guidance to optimise service utilisation.
Custom Support Packages: For clients requiring specialised support beyond standard offerings, custom packages provide flexibility to tailor support levels, response times, and additional services to specific requirements.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We assist users in adopting our service through user documentation, online training, and optional onsite sessions. Our user documentation comprises comprehensive guides and tutorials accessible via our online portal, covering account setup, background checks, and report generation. Interactive online training sessions led by experienced trainers provide in-depth knowledge of key features and best practices. Additionally, optional onsite training sessions offer personalised guidance tailored to organisational requirements. Our dedicated support team is readily available to address questions and provide assistance throughout the onboarding process. By offering a combination of resources and training options, we ensure users can quickly and confidently start using our service, maximising its effectiveness for their needs.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
HTTPS
End-of-contract data extraction
When the contract ends, users can easily extract their data through a seamless offboarding process facilitated by our product team. We provide tools to assist users in exporting their data in various formats compatible with common data management systems. Additionally, our customer support team is readily available to guide users through the extraction process and address any concerns they may have. We prioritise data portability and compliance with regulatory requirements, ensuring that users have full control over their data throughout the contract lifecycle and beyond.
End-of-contract process
All costs are transparently included in the G Cloud contract, providing clarity and predictability for our clients. This comprehensive approach means that there are no hidden fees or additional costs beyond what is outlined in the agreement. Our pricing structure encompasses all services, features, and support needed to effectively utilise our platform, ensuring that clients can budget confidently without unexpected expenses. We prioritize simplicity and fairness, striving to deliver value without burdening clients with add-on charges. This approach fosters trust and fosters long-term partnerships with our clients, who can rely on us to deliver quality services without financial surprises.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Completely mobile enabled
Service interface
Yes
User support accessibility
WCAG 2.1 A
Description of service interface
The service interface offers a user-friendly dashboard with intuitive navigation. Users can efficiently manage candidates, conduct background checks, and generate reports. Search and filtering tools streamline candidate screening, while communication features facilitate client and candidate correspondence. Customisation options cater to client needs, ensuring branding consistency and tailored report formats. Compliance and security measures prioritise data protection and regulatory adherence. Help resources provide assistance within the interface, enhancing user support. Accessibility and responsive design ensure seamless usage across devices. Overall, the interface optimises the background checking process, empowering users with efficient tools while upholding high standards of security and compliance.
Accessibility standards
WCAG 2.1 A
Accessibility testing
N/A
API
Yes
What users can and can't do using the API
This API allows external applications, such as client portals or HR management systems, to access and utilise the functionality of our background checking service programmatically. Key features of your API include:
Data Retrieval: External systems can retrieve candidate information and background check results from our database in real-time through API endpoints, ensuring data accuracy and timeliness.
Data Submission: Users can submit candidate information and screening requests directly from external systems to our platform via API calls, automating the process and reducing manual data entry.
Status Updates: The API facilitates real-time updates on the status of background checks, allowing external systems to track progress and receive notifications upon completion.
Authentication and Security: Robust authentication mechanisms, such as API keys or OAuth tokens, ensure secure access to your API endpoints, safeguarding sensitive data during transmission.
Customisation: Our API offers customisation options to tailor the integration experience to the specific needs and workflows of your clients, allowing them to seamlessly incorporate background checking functionalities into their existing systems.
Documentation and Support: Clear and comprehensive API documentation, including endpoint descriptions and usage examples, assists developers in implementing and troubleshooting integrations. Additionally, dedicated support channels provide assistance in API integration and usage.
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Users have the autonomy to tailor our background checking service, ensuring it seamlessly integrates with their operations. Customisation options span various facets:
Branding: Infuse company identity by incorporating logos and colour schemes across the interface, maintaining brand consistency.
Report Templates: Craft bespoke report templates, aligning with organisational needs and industry standards for comprehensive insights.
Screening Criteria: Define precise screening parameters, selecting relevant checks and setting result thresholds for tailored evaluations.
Workflow Configuration: Configure workflows to mirror internal processes, streamlining approvals, notifications, and routing for efficiency.
Integration Options: Integrate with existing systems like applicant tracking or HR management software for seamless data synchronisation and workflow optimisation.
Access Control: Manage access levels and permissions to safeguard sensitive information, ensuring compliance with privacy regulations.
Compliance Settings: Customise compliance settings to adhere to pertinent legal requirements and industry regulations, maintaining data integrity.
Notification Preferences: Personalise notification settings, receiving updates on background check statuses and report availability via preferred channels and frequencies.
Through these versatile customisation features, users can optimise our service to their specific requirements, fostering enhanced efficiency, compliance, and user satisfaction.

Scaling

Independence of resources
We ensure users are not affected by demand fluctuations through robust capacity planning, auto-scaling infrastructure, and load balancing. By continuously monitoring system performance and user activity, we dynamically allocate resources to meet demand spikes, ensuring consistent service delivery. Additionally, we employ throttling and prioritization mechanisms to maintain essential functionalities during peak usage, mitigating the impact of heavy loads on user experience.

Analytics

Service usage metrics
Yes
Metrics types
For our background checking managed service, we offer comprehensive service metrics including uptime, response time, completion times, incident resolution, security compliance, customer satisfaction. These metrics ensure transparency, accountability, and performance optimisation, allowing our clients to assess the reliability, efficiency, and effectiveness of our service.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can export their data in multiple formats to suit their specific needs. Our platform offers seamless export functionality, allowing users to effortlessly extract their data in formats such as JSON, XML, CSV, Excel, and PDF. Whether they require structured data for analysis, interoperability with other systems, or convenient presentation formats, we ensure flexibility to accommodate diverse requirements.
Data export formats
  • CSV
  • Other
Other data export formats
  • Excel
  • XML
  • PDF
Data import formats
  • CSV
  • ODF

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
99.9%
Approach to resilience
Available on request
Outage reporting
Available on request

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Access to management interfaces and support channels is restricted via role-based access control, where user profiles dictate permissions. Multi-factor authentication enhances security. IP whitelisting limits access to trusted networks. Encryption secures data transfers. Audit trails track user activities for accountability. Regular review of access controls and detailed logging detect unauthorised access attempts.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
UKAS
ISO/IEC 27001 accreditation date
12/09/2018
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We adhere to ISO and Cyber Essentials Plus standards to ensure robust information security. Our policies and processes include:

Enforcing role-based access control and multi-factor authentication to safeguard data confidentiality, in line with ISO 27001.

Employing encryption protocols for data both in transit and at rest, meeting ISO 27001 and Cyber Essentials Plus requirements.

Conducting regular security audits and assessments to maintain compliance with ISO 27001 and Cyber Essentials Plus.

Implementing a comprehensive incident response plan aligned with ISO 27001 and Cyber Essentials Plus standards to address security incidents promptly.

Providing regular security training to employees, aligning with ISO 27001 and Cyber Essentials Plus guidelines to mitigate human-related risks.

Vigilantly managing third-party vendors to ensure adherence to ISO 27001 and Cyber Essentials Plus standards and data protection requirements.

Continuously monitoring systems for suspicious activities and unauthorised access attempts, aligning with ISO 27001 and Cyber Essentials Plus recommendations for proactive security measures.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Our configuration and change management processes are meticulous. We track service components via a CMDB, assessing changes for security impact through rigorous testing and version control. Pre-implementation, security reviews are conducted, and stakeholder approvals are sought to ensure compliance and minimize risks. Post-implementation, continuous monitoring and feedback mechanisms are in place to maintain service integrity and promptly address any deviations.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Available on request
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Available on request
Incident management type
Supplier-defined controls
Incident management approach
Available on request

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Our G-Cloud service provision is committed to fighting climate change through several key initiatives:

Carbon Reduction: We prioritise energy-efficient infrastructure and operations, minimizing our carbon footprint.

Green Data Centers: Partnering with environmentally conscious data centers reduces our environmental impact.

Remote Work Support: By facilitating remote work and virtual collaboration, we reduce the need for commuting, thereby decreasing greenhouse gas emissions.

Paperless Operations: We promote digital documentation and processes, reducing paper usage and associated deforestation.

Eco-friendly Technologies: Implementing sustainable technologies and practices throughout our service provision further contributes to mitigating climate change.

Through these efforts, our G-Cloud service provision actively contributes to combating climate change while delivering high-quality services to our clients.

Tackling economic inequality

Our G-Cloud service provision addresses economic inequality through several avenues:

Affordable Access: We offer scalable pricing models and flexible payment options, ensuring that our services are accessible to organisations of all sises, including those with limited financial resources.

Digital Inclusion: By providing user-friendly interfaces and support for diverse devices and internet connectivity options, we promote digital inclusion, enabling marginalised communities to participate in the digital economy.

Skills Development: We offer training and support programs to enhance digital literacy and skill development, empowering individuals from underserved communities to access opportunities in the digital workforce.

Local Community Engagement: Through partnerships and community initiatives, we invest in local economies and support small businesses, fostering economic growth and resilience in disadvantaged areas.

Fair Employment Practices: We uphold fair employment practices, including diversity and inclusion initiatives, to ensure equal opportunities for all individuals regardless of background or socioeconomic status.

By prioritising affordability, accessibility, skill development, community engagement, and fair employment practices, our G-Cloud service provision contributes to reducing economic inequality and promoting inclusive economic growth.

Equal opportunity

Our G-Cloud service provision is committed to promoting equal opportunity through:

Non-discriminatory Practices: We adhere to policies that prohibit discrimination based on factors such as race, gender, ethnicity, or disability, ensuring equal treatment for all individuals.

Diverse Workforce: We prioritise building a diverse and inclusive workforce, fostering an environment where individuals from all backgrounds have equal opportunities for employment and advancement.

Accessibility: Our services are designed to be accessible to users with disabilities, ensuring equal access to information and resources for all individuals.

Training and Development: We provide training and development opportunities to enhance skills and capabilities, enabling individuals to pursue their professional aspirations regardless of their starting point.

Community Engagement: Through partnerships and community initiatives, we support programs that promote equal opportunity and social mobility, advocating for policies and practices that level the playing field for everyone.

By championing non-discriminatory practices, diversity, accessibility, training, and community engagement, our G-Cloud service provision actively contributes to fostering equal opportunity and creating a more equitable society.

Wellbeing

Our G-Cloud service provision prioritises user wellbeing through various measures:

User-Centric Design: We design our services with user experience in mind, prioritising intuitive interfaces and workflows to minimise cognitive load and enhance user satisfaction.

Data Privacy and Security: We implement robust data privacy and security measures to protect user data, fostering trust and peace of mind among our users.

Work-Life Balance: We promote flexible work arrangements and remote collaboration tools, supporting employees in achieving a healthy work-life balance.

Mental Health Support: We offer resources and programs to support mental health and wellbeing, including access to counseling services and stress management workshops.

Health and Wellness Initiatives: We encourage healthy lifestyles through wellness programs, fitness challenges, and initiatives promoting physical activity and healthy eating.

By prioritising user-centric design, data privacy, work-life balance, mental health support, and wellness initiatives, our G-Cloud service provision aims to enhance the overall wellbeing of our users and employees alike.

Pricing

Price
£4.50 a person
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at mathew.armstrong@giantgroup.com. Tell them what format you need. It will help if you say what assistive technology you use.