UK Business Database
Selecting the Market Location Business Database will enable you to be licensed for usage of the master Business Database of UK business names, telephone numbers, addresses, and other location related information collected, verified, updated and owned by 118 Group.
Features
- Access to 1.7 million UK business-data records from verified Database
- Widely recognised as the most up-to-date and accurate Business Database
- Telephone Researched database
- Database includes 1.4 million email addresses
- Database includes 2 million verified contact details
- High data consistency, accuracy and coverage
- Integrated Data Filtering to match customer requirements
- SIC, Market Sector Code and offline match/append process available
- High service availability
- GDPR compliant sourcing and management processes
Benefits
- Datasets of UK Business Data filtered to your needs
- Make informed decisions about UK business sectors
- Make informed choices about UK businesses in locations
- Make informed choices about trends in new and closing businesses
- Access to information whenever needed
- High quality data
- Fast turnaround
- GDPR compliant sourcing to ISO27701 PIMS processes
- High volumes to suit requirements
- Compatible with other services
Pricing
£7,000 a licence
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 4 4 0 8 2 0 7 0 2 8 9 5 5 3
Contact
Market Location Limited
Kelly Preston
Telephone: 01252941224
Email: acm@marketlocation.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- No.
- System requirements
- Internet access
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within three working hours
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
- Where a Support Call has been escalated and cannot be resolved by other methods then onsite support by appropriate staff resources will be provided at no additional charge.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
To get customers started on using the service:
- A web link is provided to customers with login details,
- Phone and email assistance is generally provided,
- In addition to provision of clear user guides.
- Onsite assistance can be provided as required. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
When the Contract ends, the licensed access to data by customers will terminate.
Within three months of this date (in accordance with the Retention and Deletion Policy) all data relating to the customer installation will be removed. A Certificate of Destruction Certificate can be issued upon request. - End-of-contract process
- Following contract termination, if further access to the data is required for customer processing then the data can be re-licensed.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- An API for the service is offered by pre agreement if required. All details of the API service, usage and scope are provided upon request.
- API documentation
- Yes
- API documentation formats
- HTML
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- The dataset provided to customers can be customised . This is undertaken by Market Location Limited.
Scaling
- Independence of resources
- Load testing is undertaken as part of Change Management promoted by any major system change or large user addition. Active user counts are tracked against load test results.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- A Download function enables viewing and export of data from the portal.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- Native file formats including Microsoft Word, Excel
- Image File formats including gif, tif
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Native File Formats including Microsoft Word, Excel
- Image file formats including gif, png, tif
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
System is available 99.5% 24*7 except for planned maintenance communicated to the customer.
Any outages / downtime outside of this, will be communicated immediately to customers and recovery plans put in place. - Approach to resilience
- We use Microsoft Azure Datacentres. Details available on Request
- Outage reporting
- We notify customers of any service outages using Email Communications and /or Public Dashboard.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Access controls
- Access restriction testing frequency
- At least once a year
- Management access authentication
- 2-factor authentication
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI Group
- ISO/IEC 27001 accreditation date
- 12/05/2023
- What the ISO/IEC 27001 doesn’t cover
- The scope of the certificate extends to all companies in our 118 Group.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- SecurityMetrics Ltd
- PCI DSS accreditation date
- 16/06/2023
- What the PCI DSS doesn’t cover
- The scope extends to the credit card services within Market Location Limited. A scope definition statement is available for review.
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- Cyber Essentials Certificate of Assurance
- ISO27001 Information Security Management System Certificate
- ISO27701 Privacy Information Management System Certificate
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Market Location publishes and manages its operations in accordance with a set of policies and procedures for information security including IS&PIMS, Information Security and Privacy Policy, Assets and Threat management, Risk assessment and treatment Roles and Responsibilities, Access Controls, Supplier Management, operating procedures, Change Management, Incident Management, Business Continuity, personnel management, logs, Internal and External Audits. The scope of our IS&PIMS is all trading companies in our 118 Group.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Market Location operates to a Change Management and a Configuration Management Policy to manage major organisational change and development within the business including the controlled identification and implementation of required changes within computer systems. We operate with identified and documented device configurations and a managed change programme all of which is externally audited by BSI Group annually as part of our ISO 27001 and 27701 standard certifications.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- A Patch Management and a Threat Intelligence Policy is in operation for the Group to ensure systems are patched against known vulnerabilities and those identified during provision of service. We operate a patching management programme for deployment of firmware, driver, operating system, and application updates to our computing endpoints. We have in place reputable sources for threat intelligence as required by the ISO standard 2022 version.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Market Location operates to an Information Security and Privacy Policy and also to an Information & Security Incident Management policy. We have mechanisms in place for protective monitoring for collecting ICT log information to provide an audit trail of defined security relevant events which can be used for reporting and alerting.
- Incident management type
- Supplier-defined controls
- Incident management approach
- In the event of a security incident a Security Incident procedure is in place to enable employees to identify, respond to and recover from security incidents. The objective of the incident response plan is to prevent damages such as service outage, data loss, and illicit access to systems. The procedure details communications with customers.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Tackling economic inequalityTackling economic inequality
Our G-Cloud service provision will deliver against the following social value theme of Tackling economic inequality through our activities in increasing supply chain resilience and capacity. Through the activities of our Compliance Department we can demonstrate our actions to identify and manage cyber security risks in the delivery of the contract including in the supply chain. Through these activities we can show how we influence employees, suppliers, and customers through the delivery of the contract to support resilience and capacity in the supply chain.
Pricing
- Price
- £7,000 a licence
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- By agreement, a trial of, from 20 records (up to a maximum of 1000 records) can be provided to a customer. The quantity of records in the trial would depend on the prospective order quantity. Selected Business Data Fields would apply.