Background Checking & Pre-Employment Screening
We offer you the very best technology and operational support to deliver pre-employment screening and background checking. At giant, we ensure the candidate journey is improved, our client’s business is protected and the time to hire is positively impacted. This includes DBS, Financial, CV Verification and other checks.
Features
- Criminal Record Checks
- Referencing
- All required background checks
- Managed Service
- Cloud Based System
- Fully Outsourced
- Compliance
- Applicant Onboarding Features
- Electronic Signatures
- Highly Configurable
Benefits
- Cost Efficient
- Quick Turn Around Times
- Excellent Candidate Experience
- Highly flexible
- Branded to you
- Everything in one place
- Remove administrative burden
Pricing
£4.50 a person
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
2 4 0 2 2 6 7 8 7 4 3 5 8 5 7
Contact
giant screening
Mathew Armstrong
Telephone: 01245 379090
Email: mathew.armstrong@giantgroup.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- There are no know constraints
- System requirements
-
- Works over any Web Browser
- Mobile Enabled
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 2 Working Hours
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 A
- Web chat accessibility testing
- N/A
- Onsite support
- Yes, at extra cost
- Support levels
-
Support framework offers comprehensive assistance to ensure users derive maximum value from our background checking service. Support is structured across multiple tiers to address diverse needs:
Basic Support: assistance covers general inquiries, basic troubleshooting, and access to self-help resources such as knowledge bases and FAQs. Users receive prompt responses during standard business hours via email or chat.
Premium Support: support caters to more complex queries and technical issues. Users benefit from expedited response times, extended support hours, and access to a dedicated support representative for personalised assistance. This tier may also include phone support for immediate assistance.
Enterprise Support: Tailored to enterprise clients with mission-critical needs, this level offers prioritised support, extended availability, and proactive monitoring to anticipate and mitigate potential issues. Dedicated account managers ensure a seamless experience, with regular check-ins and strategic guidance to optimise service utilisation.
Custom Support Packages: For clients requiring specialised support beyond standard offerings, custom packages provide flexibility to tailor support levels, response times, and additional services to specific requirements. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We assist users in adopting our service through user documentation, online training, and optional onsite sessions. Our user documentation comprises comprehensive guides and tutorials accessible via our online portal, covering account setup, background checks, and report generation. Interactive online training sessions led by experienced trainers provide in-depth knowledge of key features and best practices. Additionally, optional onsite training sessions offer personalised guidance tailored to organisational requirements. Our dedicated support team is readily available to address questions and provide assistance throughout the onboarding process. By offering a combination of resources and training options, we ensure users can quickly and confidently start using our service, maximising its effectiveness for their needs.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
- HTTPS
- End-of-contract data extraction
- When the contract ends, users can easily extract their data through a seamless offboarding process facilitated by our product team. We provide tools to assist users in exporting their data in various formats compatible with common data management systems. Additionally, our customer support team is readily available to guide users through the extraction process and address any concerns they may have. We prioritise data portability and compliance with regulatory requirements, ensuring that users have full control over their data throughout the contract lifecycle and beyond.
- End-of-contract process
- All costs are transparently included in the G Cloud contract, providing clarity and predictability for our clients. This comprehensive approach means that there are no hidden fees or additional costs beyond what is outlined in the agreement. Our pricing structure encompasses all services, features, and support needed to effectively utilise our platform, ensuring that clients can budget confidently without unexpected expenses. We prioritize simplicity and fairness, striving to deliver value without burdening clients with add-on charges. This approach fosters trust and fosters long-term partnerships with our clients, who can rely on us to deliver quality services without financial surprises.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Completely mobile enabled
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
- The service interface offers a user-friendly dashboard with intuitive navigation. Users can efficiently manage candidates, conduct background checks, and generate reports. Search and filtering tools streamline candidate screening, while communication features facilitate client and candidate correspondence. Customisation options cater to client needs, ensuring branding consistency and tailored report formats. Compliance and security measures prioritise data protection and regulatory adherence. Help resources provide assistance within the interface, enhancing user support. Accessibility and responsive design ensure seamless usage across devices. Overall, the interface optimises the background checking process, empowering users with efficient tools while upholding high standards of security and compliance.
- Accessibility standards
- WCAG 2.1 A
- Accessibility testing
- N/A
- API
- Yes
- What users can and can't do using the API
-
This API allows external applications, such as client portals or HR management systems, to access and utilise the functionality of our background checking service programmatically. Key features of your API include:
Data Retrieval: External systems can retrieve candidate information and background check results from our database in real-time through API endpoints, ensuring data accuracy and timeliness.
Data Submission: Users can submit candidate information and screening requests directly from external systems to our platform via API calls, automating the process and reducing manual data entry.
Status Updates: The API facilitates real-time updates on the status of background checks, allowing external systems to track progress and receive notifications upon completion.
Authentication and Security: Robust authentication mechanisms, such as API keys or OAuth tokens, ensure secure access to your API endpoints, safeguarding sensitive data during transmission.
Customisation: Our API offers customisation options to tailor the integration experience to the specific needs and workflows of your clients, allowing them to seamlessly incorporate background checking functionalities into their existing systems.
Documentation and Support: Clear and comprehensive API documentation, including endpoint descriptions and usage examples, assists developers in implementing and troubleshooting integrations. Additionally, dedicated support channels provide assistance in API integration and usage. - API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Users have the autonomy to tailor our background checking service, ensuring it seamlessly integrates with their operations. Customisation options span various facets:
Branding: Infuse company identity by incorporating logos and colour schemes across the interface, maintaining brand consistency.
Report Templates: Craft bespoke report templates, aligning with organisational needs and industry standards for comprehensive insights.
Screening Criteria: Define precise screening parameters, selecting relevant checks and setting result thresholds for tailored evaluations.
Workflow Configuration: Configure workflows to mirror internal processes, streamlining approvals, notifications, and routing for efficiency.
Integration Options: Integrate with existing systems like applicant tracking or HR management software for seamless data synchronisation and workflow optimisation.
Access Control: Manage access levels and permissions to safeguard sensitive information, ensuring compliance with privacy regulations.
Compliance Settings: Customise compliance settings to adhere to pertinent legal requirements and industry regulations, maintaining data integrity.
Notification Preferences: Personalise notification settings, receiving updates on background check statuses and report availability via preferred channels and frequencies.
Through these versatile customisation features, users can optimise our service to their specific requirements, fostering enhanced efficiency, compliance, and user satisfaction.
Scaling
- Independence of resources
- We ensure users are not affected by demand fluctuations through robust capacity planning, auto-scaling infrastructure, and load balancing. By continuously monitoring system performance and user activity, we dynamically allocate resources to meet demand spikes, ensuring consistent service delivery. Additionally, we employ throttling and prioritization mechanisms to maintain essential functionalities during peak usage, mitigating the impact of heavy loads on user experience.
Analytics
- Service usage metrics
- Yes
- Metrics types
- For our background checking managed service, we offer comprehensive service metrics including uptime, response time, completion times, incident resolution, security compliance, customer satisfaction. These metrics ensure transparency, accountability, and performance optimisation, allowing our clients to assess the reliability, efficiency, and effectiveness of our service.
- Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Users can export their data in multiple formats to suit their specific needs. Our platform offers seamless export functionality, allowing users to effortlessly extract their data in formats such as JSON, XML, CSV, Excel, and PDF. Whether they require structured data for analysis, interoperability with other systems, or convenient presentation formats, we ensure flexibility to accommodate diverse requirements.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- Excel
- XML
- Data import formats
-
- CSV
- ODF
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- 99.9%
- Approach to resilience
- Available on request
- Outage reporting
- Available on request
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Access to management interfaces and support channels is restricted via role-based access control, where user profiles dictate permissions. Multi-factor authentication enhances security. IP whitelisting limits access to trusted networks. Encryption secures data transfers. Audit trails track user activities for accountability. Regular review of access controls and detailed logging detect unauthorised access attempts.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- UKAS
- ISO/IEC 27001 accreditation date
- 12/09/2018
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
We adhere to ISO and Cyber Essentials Plus standards to ensure robust information security. Our policies and processes include:
Enforcing role-based access control and multi-factor authentication to safeguard data confidentiality, in line with ISO 27001.
Employing encryption protocols for data both in transit and at rest, meeting ISO 27001 and Cyber Essentials Plus requirements.
Conducting regular security audits and assessments to maintain compliance with ISO 27001 and Cyber Essentials Plus.
Implementing a comprehensive incident response plan aligned with ISO 27001 and Cyber Essentials Plus standards to address security incidents promptly.
Providing regular security training to employees, aligning with ISO 27001 and Cyber Essentials Plus guidelines to mitigate human-related risks.
Vigilantly managing third-party vendors to ensure adherence to ISO 27001 and Cyber Essentials Plus standards and data protection requirements.
Continuously monitoring systems for suspicious activities and unauthorised access attempts, aligning with ISO 27001 and Cyber Essentials Plus recommendations for proactive security measures.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Our configuration and change management processes are meticulous. We track service components via a CMDB, assessing changes for security impact through rigorous testing and version control. Pre-implementation, security reviews are conducted, and stakeholder approvals are sought to ensure compliance and minimize risks. Post-implementation, continuous monitoring and feedback mechanisms are in place to maintain service integrity and promptly address any deviations.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Available on request
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Available on request
- Incident management type
- Supplier-defined controls
- Incident management approach
- Available on request
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Our G-Cloud service provision is committed to fighting climate change through several key initiatives:
Carbon Reduction: We prioritise energy-efficient infrastructure and operations, minimizing our carbon footprint.
Green Data Centers: Partnering with environmentally conscious data centers reduces our environmental impact.
Remote Work Support: By facilitating remote work and virtual collaboration, we reduce the need for commuting, thereby decreasing greenhouse gas emissions.
Paperless Operations: We promote digital documentation and processes, reducing paper usage and associated deforestation.
Eco-friendly Technologies: Implementing sustainable technologies and practices throughout our service provision further contributes to mitigating climate change.
Through these efforts, our G-Cloud service provision actively contributes to combating climate change while delivering high-quality services to our clients.Tackling economic inequality
Our G-Cloud service provision addresses economic inequality through several avenues:
Affordable Access: We offer scalable pricing models and flexible payment options, ensuring that our services are accessible to organisations of all sises, including those with limited financial resources.
Digital Inclusion: By providing user-friendly interfaces and support for diverse devices and internet connectivity options, we promote digital inclusion, enabling marginalised communities to participate in the digital economy.
Skills Development: We offer training and support programs to enhance digital literacy and skill development, empowering individuals from underserved communities to access opportunities in the digital workforce.
Local Community Engagement: Through partnerships and community initiatives, we invest in local economies and support small businesses, fostering economic growth and resilience in disadvantaged areas.
Fair Employment Practices: We uphold fair employment practices, including diversity and inclusion initiatives, to ensure equal opportunities for all individuals regardless of background or socioeconomic status.
By prioritising affordability, accessibility, skill development, community engagement, and fair employment practices, our G-Cloud service provision contributes to reducing economic inequality and promoting inclusive economic growth.Equal opportunity
Our G-Cloud service provision is committed to promoting equal opportunity through:
Non-discriminatory Practices: We adhere to policies that prohibit discrimination based on factors such as race, gender, ethnicity, or disability, ensuring equal treatment for all individuals.
Diverse Workforce: We prioritise building a diverse and inclusive workforce, fostering an environment where individuals from all backgrounds have equal opportunities for employment and advancement.
Accessibility: Our services are designed to be accessible to users with disabilities, ensuring equal access to information and resources for all individuals.
Training and Development: We provide training and development opportunities to enhance skills and capabilities, enabling individuals to pursue their professional aspirations regardless of their starting point.
Community Engagement: Through partnerships and community initiatives, we support programs that promote equal opportunity and social mobility, advocating for policies and practices that level the playing field for everyone.
By championing non-discriminatory practices, diversity, accessibility, training, and community engagement, our G-Cloud service provision actively contributes to fostering equal opportunity and creating a more equitable society.Wellbeing
Our G-Cloud service provision prioritises user wellbeing through various measures:
User-Centric Design: We design our services with user experience in mind, prioritising intuitive interfaces and workflows to minimise cognitive load and enhance user satisfaction.
Data Privacy and Security: We implement robust data privacy and security measures to protect user data, fostering trust and peace of mind among our users.
Work-Life Balance: We promote flexible work arrangements and remote collaboration tools, supporting employees in achieving a healthy work-life balance.
Mental Health Support: We offer resources and programs to support mental health and wellbeing, including access to counseling services and stress management workshops.
Health and Wellness Initiatives: We encourage healthy lifestyles through wellness programs, fitness challenges, and initiatives promoting physical activity and healthy eating.
By prioritising user-centric design, data privacy, work-life balance, mental health support, and wellness initiatives, our G-Cloud service provision aims to enhance the overall wellbeing of our users and employees alike.
Pricing
- Price
- £4.50 a person
- Discount for educational organisations
- Yes
- Free trial available
- No