InCase 365 Corporate Fraud Case Management
InCase 365 Corporate Fraud Case Management is a customisable solution which allows local authority investigators to add information, documentation, and assessments from initial referral through to outcome and resolution. This web-based case management system allows users to build a database that can be filtered, analysed, and reported on.
Features
- Customisable web referral form and search facility with 2-way communication
- Extremely flexible and completely user definable solution
- Alerts to notify users if subjects are being investigated elsewhere
- Tiered access levels, allowing multiple organisations/departments to share access
- Full audit trail including filter and search options
- Task management, allowing delegation and oversight of user workload
- Quick, flexible and simple search functionality on every page
- Customise and save reports and a Power BI Reporting Extract
- Enhanced security functionality including MFA and SSO
- Integrated document management with no additional software required
Benefits
- Work on cases from anywhere with an internet connection
- Proactively identify emerging trends and threats to your organisation
- Monitor and delegate tasks and cases to individual users
- Customise your dashboard to monitor key metrics and milestones
- Create and export visual performance reports and graphs easily
- Build document templates to enable quick and easy mail merging
- Add outcomes and time recordings to individual cases
- Create links between subjects to build a web of data
- Set retention dates to remain compliant with GDPR regulations
- Benefit from unlimited free online training and regular product updates
Pricing
£50 to £90 a user a month
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 1 1 1 0 7 9 6 3 9 6 9 6 2 5
Contact
INTEC for Business Ltd
Steve Gregory
Telephone: 01615071599
Email: info@intecforbusiness.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
IDIS SVoD
IDIS Data Matching
InCase Intelligence Case Management
Investigation Services
Enforcement Teams - Cloud deployment model
- Public cloud
- Service constraints
- There are no service constraints and clients have 24/7 access.
- System requirements
-
- Users must have a stable internet connection
- Users are responsible for information security on their own devices
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Priority One - Response within 1 Working Hour
Priority Two - Response within 3 Working Hours
Priority Three - Response within 1 Working Day - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Unlimited Online Training and Support is included in the licence fee at no extra charge, ensuring all users have access to support and training at any point during the contract.
Most support queries are resolved via Email, Phone Call or Microsoft Teams. Onsite Training and Support may incur an additional fee.
Each customer is provided with a dedicated account manager who they can escalate any questions or concerns to.
In addition to this, users are provided with a manual with instructions on how to use the system. As new functionality is released, users are given updated manuals including instructions and advice on how to use the new functionality. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Once an order has been placed INTEC will;
- Appoint an account manager, who will be responsible for ensuring that the onboarding process takes place smoothly and in line with the clients time frame requirements.
- Account manager will arrange an initial meeting where specific client requirements will be discussed and key dates, including for training and 'Go-Live' will be put in place.
- Provide the client with an easy to understand customisation document which is then completed and returned by the client.
- If required, convert the clients existing database and import data into the solution.
- Create a client-specific environment on INTEC's hosted server and configure the system as per the clients returned customisation document.
- Carry out the initial training with the users.
- Follow up meeting after the 'Go-Live' date, (usually one week after) where client can request changes to customisation and extra training and support if required.
- Throughout the process and during the lifetime of the contract the client will be able to contact INTEC's customer care team who will be on hand to provide support, training and customisation whenever necessary. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- All information held within InCase 365 can be extracted when the contract ends. Copies of all case documents and files can be exported/downloaded in their original format. In addition to this, clients are provided with a copy of their database at the end of the contract by INTEC. Clients can also use the reporting functionality to extract all the data within the solution, including cases/subjects/tasks/outcomes etc into a .csv or .pdf file depending on their requirements.
- End-of-contract process
-
A contract end timetable will be agreed.
The schedule will depict when;
- Access to the software is to be disabled.
- The data is to be extracted.
- The client's data instance is to be deleted.
- Secure data deletion has been performed.
- Confirmation of when the data has been deleted will be provided.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- There are no differences between mobile and desktop services. The solution works on PC's, Laptops, Tablets and other mobile devices.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- No
- Customisation available
- Yes
- Description of customisation
-
INCASE365 allows the user to decide exactly what subjects are required for an investigation and what data is required for that subject. You build the cases based on the data you need, not what the system asks for.
INCASE365 gives each case a unique overview. Every case can have multiple subjects linked to it whilst constantly building the intelligence database behind the scenes. You can then create a view for each case ensuring that the primary subject is clear for every user.
Whether you are looking at time records, financial, outcomes, visits or many more INCASE365 allows the user to build in as many processes as you need. Once again you decide what data is collated for each process ensuring that ALL relevant investigation data is recorded.
INCASE365 has a fully customisable risk assessment module that allows users to build in a full risk assessment process. Whether this is a 5x5 risk based assessment or a few simple questions INCASE365 will allow you to design a standard process for every type of investigation.
Scaling
- Independence of resources
- The service is monitored and alerts are raised with the support team where performance issues are identified. Each customer has their own database to minimise the impact of one customer being affected by another. Additional resource can be provisioned as and when required, however INTEC reserve the right to charge for these additional resources.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Key Performance Indicators
Some of the key performance indicators used by INTEC for Business Ltd include:
• On time delivery performance against agreed project milestones
• Average Support Desk response time
• Number of incidents registered by the Service Desk
• Percentage of incidents resolved within the agreed SLA
• Average time and effort required to resolve Incidents
• Number of escalations for Incidents not resolved in the agreed resolution time
• Number of repeated Incidents reported - Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- All data lists within the system have built-in export options to standard document types including .PDF and .CSV files.
- Data export formats
-
- CSV
- Other
- Other data export formats
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- DOCX
- JPG
- PNG
- MP4
- MPG
- MP3
- WAV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
-
InCase 365 Availability is 99.75%
Service unavailability refunds are not provided. - Approach to resilience
-
Our services are hosted with trusted cloud platforms Microsoft Azure or UKCloud. These platforms comply with the UK Governments Cloud Security Principle 2 “asset protection and resilience”.
Further information on how our service is designed to be resilient is available on request. - Outage reporting
- Email Alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- INTEC adapt strict security principles. Only fully authorised members of staff are allowed access to the software platform itself. During the development of the software, support or training, if INTEC are required to access the clients data/environment then we MUST have written authorisation from a nominated user before access.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- The British Assessment Bureau
- ISO/IEC 27001 accreditation date
- 23/01/2023
- What the ISO/IEC 27001 doesn’t cover
- N/A the certification covers the full scope of the company.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- The solution is hosted on Microsoft Azure platforms. Azure complies with multiple international standards including ISO27001
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Intec for Business Ltd has documented configuration and change management policies and processes, which have been implemented, maintained and assessed in accordance with the guidance from ITIL v.3 and the current ISO20000 standard.
Formal configuration management activities, including record management and asset reporting, are monitored and validated constantly, and any identified discrepancies promptly escalated for investigation.
A robust, established process for the formal submission of change requests is mandated prior to review and approval of the daily Change Advisory Board, which is attended by a quorum of operational and technical management personnel. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
InCase365 makes use of the Microsoft Azure platform which has multiple accreditations including ISO27001. We make use of the Azure Security Centre which has real-time protective monitoring and scheduled vulnerability assessments. Microsoft invests over $1 billion annually in
cybersecurity, including the Azure platform, and employs over 3500
dedicated cybersecurity professionals. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- InCase365 is hosted on the Microsoft Azure Platform and uses the Azure Security Centre. Azure Security Centre provides a centralized, real-time monitoring view into the security state of our hybrid cloud resources. In the event of an incident inhouse staff are notified and will begin an immediate investigation.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
InCase365 is hosted on the Microsoft Azure Platform and uses the Azure Security Centre. The Microsoft global incident response service works every day to mitigate the effects of attacks and malicious activity.
The goal of security incident management is to identify and remediate threats quickly, investigate thoroughly, and notify affected parties. The incident response team follows an established set of procedures for incident management, communication, and recovery. Incidents passed from the Azure team are immediately investigated by our in house staff.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Covid-19 recoveryCovid-19 recovery
INTEC for Business Ltd makes regular donations to a local Manchester-based charity that supports individuals suffering from mental health issues.
Pricing
- Price
- £50 to £90 a user a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- 30 day trial access to InCase 365.