Skip to main content

Help us improve the Digital Marketplace - send your feedback

Smartlytics Consultancy Limited

NowPrivacy

NowPrivacy is a comprehensive data governance and management platform designed to empower organisations fully understand and control their data landscape. As data environments grow increasingly complex, NowPrivacy provides a robust solution to navigate, manage, and secure both unstructured and structured data, ensuring compliance and enhancing data privacy across the board.

Features

  • Data Discovery and Classification
  • Data Remediation and Redaction
  • Access Control Lists
  • Data Governance and Management
  • Data Regulatory Compliance
  • Data Risk Management
  • Unstructured and Structured Data Management

Benefits

  • Enhanced Data Security
  • Data Protection
  • Regulatory Compliance
  • Operational Efficiency
  • Simplify DSAR's
  • Holistic View of the entire data estate
  • Risk Management
  • Easily Identify Documents Outside Retention Period

Pricing

£600 to £850 a terabyte a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Mostafa.hashem@smartlytics.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

3 5 9 9 4 2 3 4 3 2 0 8 5 6 6

Contact

Smartlytics Consultancy Limited Mostafa Hashem
Telephone: 02476970151
Email: Mostafa.hashem@smartlytics.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
N/A
System requirements
Linux VM's

User support

Email or online ticketing support
Email or online ticketing
Support response times
S1 - 1 Business Hour
S2- 2 Business Hours
S3 - 4 Business Hours
S4 - 1 Business Day
Mon - Fri excluding bank holidays
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 A
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
All licenced customers get full support with their requirements. An additional fee can be paid during the contract for consultation days, this can range from a few days a year to a completely managed service.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Online Training, User Documentation, Implementation Support, Use case identification and support.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
We will agree an exit plan with the client, including return of any software and hardware plus additional services (if required) to transfer, export or otherwise secure client data they wish to retain or remove.
End-of-contract process
Assist the buyer to export tags and classifications stored on the software before it is commissioned.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
No
Service interface
No
User support accessibility
WCAG 2.1 A
API
Yes
What users can and can't do using the API
Run searches, return results, basic administration of accounts
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
Buyers can run and save their own queries and searches and perform administration of the service

Scaling

Independence of resources
Resources scale depending on demand

Analytics

Service usage metrics
Yes
Metrics types
Volume of Data Crawled and Indexed
List of Tags Created
List of Workflows Created
Reporting types
Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Export CSV
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
We agree SLAs on a case by case basis depending on the customer environment
Approach to resilience
Available on request.
Outage reporting
Any planned outages would be reported to any effected users via email

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Role Based Access Control and Dataset Access Control methods in place along with following procedures in line with client policies
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
SOC2

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
SOC 2
Information security policies and processes
Operate to the 10 mandated clause for the ISO:27001 and apply relevant controls in line with Annex A

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our configuration and change management follows a typical software lifecycle - component change is tracked through an internal ticketing system and passes Quality Assurance (QA) checks and tests (including assessing any potential security impact) before being deployed as an update to any system
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Regular pen-testing via an accredited external firm. Internal monitoring of OWASP vulnerability lists and internal QA testing. Security patches are quickly deployed.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Access control monitoring.
Audit Logging and Reporting.
Monitoring tools.
Vulnerability Management
Incident management type
Supplier-defined controls
Incident management approach
- Playbooks
- Incident Classification
- Remediation Protocols
- User Reporting Channels
- Internal and External Reporting

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Tackling economic inequality
  • Equal opportunity

Tackling economic inequality

We prohibit the use of modern slavery/human trafficking in our operations/supply chain. committed to implementing systems/controls aimed at ensuring modern slavery doesn't take place within the organisation

Equal opportunity

Our company is committed to fostering an inclusive and diverse workplace. We believe in providing equal employment opportunities to all individuals regardless of race, ethnicity, gender identity, sexual orientation, age, disability, religion, veteran status, or any other characteristic protected by law. Our goal is to create a welcoming environment where every employee feels valued, respected, and empowered to contribute fully. We stand firmly against discrimination and promote a culture of fairness, equity, and belonging.

Pricing

Price
£600 to £850 a terabyte a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
1 Week POC License

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Mostafa.hashem@smartlytics.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.