Security Watchdog - Employee Background Screening (VOLT)
Security Watchdog provide bespoke pre-employment screening packages to suit the requirements of your organisation. Background Checking, such as Right to Work, Digital ID (Identity), DBS (Disclosure and Barring Service), Referencing, Financial Probity, Social Media, Security, Financial, Criminal, Sanctions, Directorship, BPSS, SM&CR, BS7858, CQC, FCA, FORS, and International Checks.
Features
- Over 20 years' experience
- Leading and largest supplier of Background Checking services in EMEA
- Industry leading screening software - VOLT
- Mobile First design approach
- UK hosted
- Optical Character Recognition (OCR)
- Dynamic question sets
- Full integration with eBulk+ and Equifax
- Email, SMS, and WhatsApp communication
Benefits
- VOLT minimises the time, complexity, cost, and risk
- Details captured on any smart device easily and efficiently
- Fully Azure hosted and backed up in the UK
- Login without having to remember passwords and other security details
- Pre-population leads to improved data accuracy and increased speed
- Client data based questions, based on where they live/work
- Seamless and frictionless Criminality and Financial Checks
- Contacted via the candidate's preferred method thus increasing engagement
- Power BI and Google Analytics to deliver HQ visual reports
Pricing
£8.00 a transaction
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
2 9 1 0 7 3 1 9 3 6 3 1 4 7 8
Contact
CONEXIA LIMITED
Sara Wright
Telephone: 02071507500
Email: bidteam@peregrineresourcing.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- No
- System requirements
-
- Any internet enabled device built in the past 5 years
- HTTP
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We offer sector dedicated SME support/2-hour response window for clients/48-hour response time for candidates. Online support is also available directly through the relevant client or candidate portal. More limited support outside UK business hours.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- The day-to-day support is typically managed via email and phone through to your dedicated operations team. Depending on the requirements and size of the contract, face to face client relationship meetings can be arranged to discuss in more detail any operational queries and MI. Typically, we would not charge for this support service unless the requirements are outside the scope of our standard support offering. This will be fully scoped and discussed during implementation.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Training is provided for the client admin users. Candidates will not require training as the candidate portal is highly intuitive, however, there are FAQ and support options available via the portal.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- Other
- Other documentation formats
- Microsoft Excel
- End-of-contract data extraction
- All client owned data can be downloaded and extracted on a CSV document to be archived or transferred according to client requirements.
- End-of-contract process
- Typically contracts run on a rolling annual commitment unless the client wishes to terminate at the end of the agreed contract time frame.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Our VOLT digital screening service is cross-platform compatible which means that our technology works on different devices and platforms. Our Candidate Portal has been designed with a 'Mobile First' design approach which means that candidates can fill out their details on any smart device easily and efficiently, thus improving the candidate experience and driving speed of completion.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- Both candidates and client admin users have access to our Virtual Online Tracker (VOLT) software through which candidates can be created, monitored, and tracked by the client admin. Candidates can effortlessly upload and submit the relevant information relating to the screening package the client has selected for the role.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- We have undertaken limited manual testing in relation to WCAG AA compliance.
- API
- Yes
- What users can and can't do using the API
- Clients can use the API to integrate with other solutions, an Applicant Tracking System for example. This would be a separate project and scoped accordingly. Additional charges may apply.
- API documentation
- Yes
- API documentation formats
-
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Our service is configurable, and we can offer a number of options regarding the colours and logos used for the email and automatic messaging templates. This will help set the tone of our system’s correspondence with your candidates to align with your own organisation’s language and branding. The options are discussed, scoped, and agreed during implementation.
Scaling
- Independence of resources
- Auto Scaling - Automatically scales when load reaches a threshold
Analytics
- Service usage metrics
- Yes
- Metrics types
- MI data is available for the client via the Client Portal. This will cover a number of data fields, including Checks Status, Time Scales, Costings, and other relevant information regarding the screening process. Clients will also have the benefit of using Google Analytics to help visualise the reporting data.
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Encryption of all physical media
- Other
- Other data at rest protection approach
- At-rest the Azure Database for PostgreSQL service uses the FIPS 140-2 validated cryptographic module for storage encryption of data at-rest. Data, including backups, are encrypted on disk, with the exception of temporary files created while running queries. The service uses the AES 256-bit cipher included in Azure storage encryption, and the keys are system managed. Storage encryption is always on and cannot be disabled.
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
Clients can export their data through the system via PDF Download
Candidates, by request - Data export formats
- Other
- Other data export formats
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- Microsoft Word
- JPG
- Bitmap
- PNG
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99%
- Approach to resilience
-
The solution design constrains the single points of failure. Within the application, load balancing across multiple instances of service and automated restart of failed services preserves availability. To support these measures the service is monitored such that failures or anomalous behaviour can be identified and corrective action taken, in many cases prior to defects emerging.
The technical measures outlined are supported by a range of operational controls including: comprehensive testing, configuration control, release management, and asset management. In the event of a failure effective issue and problem, management ensures the service is quickly recovered and lessons learned preventing repeat scenarios. In the event of a BC/DR failure, cloud-enabled replication across the region enables rapid restoration of the service. - Outage reporting
- In terms of system errors that are reported internally or externally, this is raised to the IT team who notify the business via teams/email. If this impacts service or we as a business decide to notify clients, this is done via email and by the Client Relationship Manager (CRM). If we have scheduled downtime for maintenance, this will also initially be communicated internally by IT, but it is then the CRM’s responsibility to notify the client, via email, and usually 2 weeks ahead of downtime.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Other
- Other user authentication
- Security Watchdog users access VOLT via the Microsoft Dynamics 365 online portal which enforces the Capita password policy, with mandatory Multi-Factor Authentication (MFA) required. Client portal users are authenticated using the same Azure Active Directory based policy. MFA can be provided against either physical or mobile factor device definition to generate one-time passcodes.
- Access restrictions in management interfaces and support channels
- Role Base Access Control (RBAC), Okta, Global Protect
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Other
- Description of management access authentication
- Management access is strictly restricted to those that have a business need and is conditional on two factor authentication using Okta. Only Capita staff hold admin accounts.
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 6 months and 12 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Alcumus ISOQAR
- ISO/IEC 27001 accreditation date
- 21/12/2018
- What the ISO/IEC 27001 doesn’t cover
- See Statement of Applicability
- ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- 19/06/2020
- CSA STAR certification level
- Level 3: CSA STAR Certification
- What the CSA STAR doesn’t cover
- Support and process outside the Azure Hosted VOLT Portals
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- ISO9001
- NAPBS (National Association of Professional Background Screeners)
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- ISO9001, Cyber Essentials Plus, NAPBS (National Association of Professional Background Screeners)
- Information security policies and processes
- Security Watchdog ISMS in line with ISO27001/Cyber Essentials Plus
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Defined in Capita Threat and Incident Management standard - confidential document for internal use only
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Defined in Capita Threat and Incident Management standard - confidential document for internal use only
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Defined in Capita Threat and Incident Management standard - confidential document for internal use only
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Defined in Capita Threat and Incident Management standard - confidential document for internal use only
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- NHS Network (N3)
- Other
- Other public sector networks
- DBS and Disclosures Scotland
Social Value
- Equal opportunity
-
Equal opportunity
One of Capita’s responsible business strategies is “Enhancing diversity to create better outcomes for our clients and customers”. We are committed to increase our focus on diversity, inclusion and wellbeing; a key consideration for all our products and services. Indicative of this strategy is that fact that Capita are a:
o signatory of the UK Government and Business in the Community’s Race at Work Charter
o Disability Confident Employer
o supporter of the Social Mobility Foundation
o Global Member of the Employee Networks for Equality and Inclusion
We also collaborate with leading D&I organisations, such as:
o Radiate
o Stonewall
o Age UK
o Fawcett Society
o Women on Boards
o Race for Opportunity
o Network for Black and Asian Professionals
o Inter Faith Network
o Gender Trust
Clients know that their candidates are looking for authenticity and proof that they are about to apply for, and possibly join, an inclusive, diverse organisation. Our products are tailored to assist with this, we ensure:
• language used is societally acceptable and comprehensible
• applications can be used on various types of hardware, i.e. PC, tablet or mobile phone, providing full accessibility and functionality
Pricing
- Price
- £8.00 a transaction
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- We offer a 'Pay Per Candidate' service which enables the prospective client to choose from a small range of standard screening packages. This option can be used to trial our service, but it is not free. The experience will also be slightly different to that of a contracted customer.
- Link to free trial
- https://www.securitywatchdog.org.uk/ppc-screening-packages