Skip to main content

Help us improve the Digital Marketplace - send your feedback

  1. Digital Marketplace
  2. Lot 2: Cloud software
  3. IDIS Temporary Accommodation
INTEC for Business Ltd

IDIS Temporary Accommodation

IDIS Temporary Accommodation is a cloud-based solution that allows Local Authorities to quickly review and analyse their temporary accommodation claims for fraud and error. All results are risk and RAG scored, helping to save investigator’s time. IDIS provides users with extremely cost-effective credit bureau services from TransUnion.


  • Securely upload and processing of your temporary accommodation data
  • Evidence based analytics and risk scoring of every claim
  • Identify evidence of invalid claims via TransUnion credit data
  • Automated mail merging and export for claimant canvas letters
  • Create and manage cases for high-risk claims
  • Validate and cleanse addresses during upload using PAF validation
  • Tiered access allowing multiple departments/organisations to use one system
  • Free and unlimited data matching using internal datasets
  • Enhanced security functionality including two factor authentication
  • Extensive reporting functionality and convenient data export options


  • Access extremely competitive rates for TransUnion credit data
  • Save time with instant results on data matching campaigns
  • Receive credit search results in less than 24 hours
  • Enhance accuracy of results via risk and RAG scoring
  • Save time on formatting spreadsheets with import merge fields
  • Save costs when compared to fully managed services
  • Verify who's living in your properties
  • Suitable for ad-hoc, bulk or rolling reviews


£5,999 to £20,000 a licence a year

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 13

Service ID

5 7 0 3 8 8 9 2 1 3 1 5 0 4 0


INTEC for Business Ltd Steve Gregory
Telephone: 01615071599

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
InCase Intelligence Case Management
InCase 365 Corporate Fraud Case Management
InCase 365 Tenancy Fraud Case Management
Cloud deployment model
Public cloud
Service constraints
There are no service constraints and clients have 24/7 access.
System requirements
  • Users must have a stable internet connection
  • Users are responsible for information security on their own devices

User support

Email or online ticketing support
Email or online ticketing
Support response times
Priority One - Response within 1 Working Hour
Priority Two - Response within 3 Working Hours
Priority Three - Response within 1 Working Day
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
Unlimited Online Training and Support is included in the licence fee at no extra charge, ensuring all users have access to support and training at any point during the contract.
Most support queries are resolved via Email, Phone Call or Microsoft Teams. Onsite Training and Support may incur an additional fee.
Each customer is provided with a dedicated account manager who they can escalate any questions or concerns to.
In addition to this, users are provided with a manual with instructions on how to use the system. As new functionality is released, users are given updated manuals including instructions and advice on how to use the new functionality.
Support available to third parties

Onboarding and offboarding

Getting started
Once an order has been placed INTEC will;
- Appoint an account manager, who will be responsible for ensuring that the onboarding process takes place smoothly and in line with the clients time frame requirements.
- Account manager will arrange an initial meeting where specific client requirements will be discussed and key dates, including for training and 'Go-Live' will be put in place.
- Create a client-specific environment on INTEC's hosted server and configure the system as per the clients requirements.
- Carry out the initial training with the users.
- Follow up meeting after the 'Go-Live' date, (usually one week after) where client can request extra training and support if required.
- Throughout the process and during the lifetime of the contract the client will be able to contact INTEC's customer care team who will be on hand to provide support and training whenever necessary.
Service documentation
Documentation formats
End-of-contract data extraction
All information held within IDIS can simply be downloaded to a .csv file when the contract ends.
End-of-contract process
A contract end timetable will be agreed.
The schedule will depict when;
- Access to the software is to be disabled.
- The data is to be extracted.
- The client's data instance is to be deleted.
- Secure data deletion has been performed.
- Confirmation of when the data has been deleted will be provided.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Designed for use on mobile devices
Service interface
User support accessibility
WCAG 2.1 AA or EN 301 549
Customisation available


Independence of resources
The service is monitored and alerts are raised with the support team where performance issues are identified. Each customer has their own database to minimise the impact of one customer being affected by another. Additional resource can be provisioned as and when required, however INTEC reserve the right to charge for these additional resources.


Service usage metrics
Metrics types
Key Performance Indicators
Some of the key performance indicators used by INTEC for Business Ltd include:
• On time delivery performance against agreed project milestones
• Average Support Desk response time
• Average time and effort required to resolve incidents
• Number of incidents registered by the Service Desk
• Percentage of incidents resolved within the agreed SLA
• Number of escalations for Incidents not resolved in the agreed resolution time
• Number of repeated Incidents reported
Reporting types
Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
All data lists within the system have built-in export options to standard document types including .PDF and .CSV files.
Data export formats
  • CSV
  • Other
Other data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
IDIS Availability is 99.75%
Service unavailability refunds are not provided.
Approach to resilience
Our services are hosted with UKCloud. UKCloud comply with the UK Governments Cloud Security Principle 2 “asset protection and resilience”.
Further information on how our service is designed to be resilient is available on request.
Outage reporting
Email Alerts

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
INTEC adapt strict security principles. Only fully authorised members of staff are allowed access to the software platform itself. During the development of the software, support or training, if INTEC are required to access the clients data/environment then we MUST have written authorisation from a nominated user before access.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Cyber essentials
Cyber essentials plus
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
The solution is hosted in UKCloud data centres. UKCloud complies with multiple international standards including ISO27001

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Intec for Business Ltd has documented configuration and change management policies and processes, which have been implemented, maintained and assessed in accordance with the guidance from ITIL v.3 and the current ISO20000 standard.
Formal configuration management activities, including record management and asset reporting, are monitored and validated constantly, and any identified discrepancies promptly escalated for investigation.
A robust, established process for the formal submission of change requests is mandated prior to review and approval of the daily Change Advisory Board, which is attended by a quorum of operational and technical management personnel.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
All data is hosted on UKCloud data centres which have multiple accreditations including ISO27001.
UKCloud undertakes thorough security testing of it's third-party technologies. Any weaknesses found are assessed and additional
mitigation implemented, where appropriate, to ensure that the vulnerability is managed. In addition to this, experienced, trained security analysts identify, assess and respond to key threats and vulnerabilities detected by the UKCloud protective monitoring service.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
All data is stored within UK Cloud Data Centres. All authentication requests are logged and analysed via the UKCloud GPG13-aligned protective monitoring service, which is operated 24/7. In addition to this, internet connectivity is further protected against large-scale volumetric DDoS attacks using specialised protective infrastructure and resources.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
All customer data is stored within UKCloud Data Centres. UKCloud notifies security incidents to statutory organisations, such as NCSC and CareCERT, and has established protocols to work with organisations such as CERT-UK and CISP (Cyber Security Information Sharing Partnership) and sector-based WARPs (Warning and Advisory Reporting Points).

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks

Social Value

Tackling economic inequality

Tackling economic inequality

INTEC will create training and employment opportunities in high growth sectors with known skills shortages by providing at least one place for students at local Universities to take a years work experience with INTEC. This will be a highly skilled technical position and will provide each student with valuable experience which will benefit them when applying for a permanent job once they have completed their degree.

Please see figures below for the number of positions that INTEC is hoping to offer over the next five years.
22/23 - 1
23/24 - 1
24/25 - 2
25/26 - 2
26/27 - 3


£5,999 to £20,000 a licence a year
Discount for educational organisations
Free trial available
Description of free trial
30 day trial access to IDIS.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.