TransUnion - Online Trace, Fraud and Financial Investigations - Retriever
Retriever is an online tracing tool used for debtor tracing, asset reunification and anti-fraud/money laundering purposes. Retriever instantly returns name, DOB and address matches, ranked on likelihood, along with supporting evidence. Contact data, associate, alias, and address links are also returned, with no footprint left on the consumers credit file.
Features
- One search box - increasing user efficiency
- One click to search - simple and intuitive to use
- Provides elastic best fit results, ranked-by-likelihood result
- Compliant - ensures data and permitted uses are appropriate
- Provides public and financial evidence placing individual at address
- Returns CCJ data when present, including active/satisfied/value
- Direct links to Google Maps location
- Returns contact data for searched individual
- Provides alias, associate and address links
- Reverse look-up where data is limited
Benefits
- Single search box for rapid use and non-standard format
- Accuracy - Retriever returns results which are ranked
- Up to 10 possible results returned
- Allows for a manual assessment of where the individual resides
- Build a clear picture of the citizen's situation
- Inform your decisions/strategy from presence/volume of financial data
- Leaves no footprint on the consumers credit file
- No IT support or implementation required
- Licence based rather than per click models available
- Best fit results, not just exact matches
Pricing
£2,500 a user
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 6 6 2 0 7 4 3 2 9 3 5 8 8 0
Contact
TRANSUNION INTERNATIONAL UK LIMITED
Mark Pestereff
Telephone: 07773 212093
Email: mark.pestereff@transunion.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- Please refer to the Service Definition
- System requirements
- Online, web access required through standard browsers
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We have a range of SLA's depending on the nature and criticality of the ticket; full details can be agreed as part of any contract.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- N/A
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- You will be provided full supporting documentation and have access to our team of experts who will be available to help with the initial integration and setup.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- N/A
- End-of-contract process
- The contract ends and access to the service is removed
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- N/A
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Single search entry box
- Accessibility standards
- None or don’t know
- Description of accessibility
- N/A
- Accessibility testing
- N/A
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- Through capacity planning and monitoring of service use.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Number of searches carried out and results achieved
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Encryption of all physical media
- Other
- Other data at rest protection approach
-
• Strong logical access control. Access is given based on least privilege and a need to know basis.
• Protective monitoring and event management using LogRhythm as a SIEM.
• Sourcefire & Palo Alto IDS.
• Checkpoint firewalls.
• Monthly vulnerability scanning programme of work.
• ISO27001 and PCI DSS compliant. - Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- On an individual search basis it is possible to export search results via CSV or save as PDF
- Data export formats
-
- CSV
- Other
- Other data export formats
- Data import formats
- Other
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Other
- Other protection between networks
- Web Application Firewall, IP Safe Listing, SSH key Pairs (for automation), complex password policy, Threat Detection Service team
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
- Data Loss Prevention, Privelleged Access Management, Data Encryption at Rest, SIEM Alerts and Monitoring, Anti-Virus and EDR, Firewalls and VPN's
Availability and resilience
- Guaranteed availability
- Our standard availability is 98.5%. We would be happy to discuss any specific availability requirements as appropriate.
- Approach to resilience
- We have multiple support staff available and multiple, scalable platforms which support the service.
- Outage reporting
- The Client Support Team and/or Client Manager would notify affected clients via email as appropriate.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Username or password
- Other
- Other user authentication
- Each user will have a unique username and password provided along with company name. TransUnion also utilises the control of IP white listing and 24/7 security monitoring.
- Access restrictions in management interfaces and support channels
- A policy of least privilege access is applied across the group to ensure employees only have access to what is required - this is regularly reviewed. Any privileged accounts are rigorously checked both prior to granting access, during use and on termination of permissions. Users come under multiple levels of policy regarding accounts and device usage. Networks are highly segmented with monitoring for inter-segment violations. Any sensitive systems are housed in dedicated secure environments.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Username or password
- Other
- Description of management access authentication
- All management accounts must go through TU privileged access management, which limits access based on security groups and only provides the required access. Usernames and Passwords are domain managed and follow the Transunion Password Policy.
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 29/05/2021
- What the ISO/IEC 27001 doesn’t cover
- A.14.1.3, A.14.1.2
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- Payment Software Company, Inc. (DBAPSC)
- PCI DSS accreditation date
- 02/08/2021
- What the PCI DSS doesn’t cover
- Full Report on Compliance (ROC) can be screen shared upon request
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
-
Cyber Essentials Plus
PCI DSS - Information security policies and processes
- TU follows a dedicated Information Security Policy, as well as other processes such as data encryption and key management, secure application development etc.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- TU defined product development lifecycle, which includes various gates including budget, security and IT infrastructure. Small changes are captured within our internal ticketing system.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Internal scans are completed on a regular basis (Daily, Weekly, Monthly depending on the endpoint). All Critical findings must be addressed within 30 days, High/Medium 60 days and Moderate to low 90 days. Any findings that cannot meet these deadlines must have a risk acceptance review and a deadline agreed by the business.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Threat Detection Service, Data Loss Prevention team, Incident Management team - All monitoring 24/7/365
- Incident management type
- Supplier-defined controls
- Incident management approach
- NIST 800-61 and SANS PICERL
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
TransUnion is a global information and insights company that makes trust possible in the modern economy. We do this by providing an actionable picture of each person so they can be reliably represented in the marketplace. As a result, businesses and consumers can transact with confidence and achieve great things. We call this Information for Good®.
A leading presence in more than 30 countries across five continents, TransUnion provides solutions that help create economic opportunity, great experiences, and personal empowerment for hundreds of millions of people:
Economic Opportunity – We help businesses find their best customers and determine the right ways to serve and keep them—through access to products and services that help them achieve their goals.
Great Experiences – We enable our customers to deliver friction-right experiences and relevant offers tailored to specific consumer needs, preferences, and patterns, while reducing risks posed by fraud.
Personal Empowerment – By extending tools, offers, and opportunities directly through businesses, we help more people understand and manage their financial situations, driving loyalty and cross-sell opportunities for our customers.
Pricing
- Price
- £2,500 a user
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Proof of concept trial may be available by agreement