IDIS Tenancy Verification
IDIS Tenancy Verification is a cloud-based solution that allows public sector organisations to check a property for illegal subletting or abandonment. All results are risk and RAG scored. IDIS provides users with extremely cost-effective credit bureau services from TransUnion as well free matching using internal datasets.
Features
- Securely upload and processing of your tenancy data
- Evidence based analytics and risk scoring of every claim
- Identify evidence of invalid claims via TransUnion credit data
- Automated mail merging and export for claimant canvas letters
- Create and manage cases for high-risk claims
- Validate and cleanse addresses during upload using PAF validation
- Tiered access allowing multiple departments/organisations to use one system
- Free and unlimited data matching using internal datasets
- Enhanced security functionality including two factor authentication
- Extensive reporting functionality and convenient data export options
Benefits
- Access extremely competitive rates for TransUnion credit data
- Save time with instant results on data matching campaigns
- Receive credit search results in less than 24 hours
- Enhance accuracy of results via risk and RAG scoring
- Save time on formatting spreadsheets with import merge fields
- Save costs when compared to fully managed services
- Verify who's living in your properties
- Suitable for ad-hoc, bulk or rolling reviews
Pricing
£5,999 to £20,000 a licence a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
6 0 1 7 1 6 0 0 5 8 9 5 0 0 7
Contact
INTEC for Business Ltd
Steve Gregory
Telephone: 01615071599
Email: info@intecforbusiness.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
InCase Intelligence Case Management
InCase 365 Corporate Fraud Case Management
InCase 365 Tenancy Fraud Case Management - Cloud deployment model
- Public cloud
- Service constraints
- There are no service constraints and clients have 24/7 access.
- System requirements
-
- Users must have a stable internet connection
- Users are responsible for information security on their own devices
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Priority One - Response within 1 Working Hour
Priority Two - Response within 3 Working Hours
Priority Three - Response within 1 Working Day - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Unlimited Online Training and Support is included in the licence fee at no extra charge, ensuring all users have access to support and training at any point during the contract.
Most support queries are resolved via Email, Phone Call or Microsoft Teams. Onsite Training and Support may incur an additional fee.
Each customer is provided with a dedicated account manager who they can escalate any questions or concerns to.
In addition to this, users are provided with a manual with instructions on how to use the system. As new functionality is released, users are given updated manuals including instructions and advice on how to use the new functionality. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Once an order has been placed INTEC will;
- Appoint an account manager, who will be responsible for ensuring that the onboarding process takes place smoothly and in line with the clients time frame requirements.
- Account manager will arrange an initial meeting where specific client requirements will be discussed and key dates, including for training and 'Go-Live' will be put in place.
- Create a client-specific environment on INTEC's hosted server and configure the system as per the clients requirements.
- Carry out the initial training with the users.
- Follow up meeting after the 'Go-Live' date, (usually one week after) where client can request extra training and support if required.
- Throughout the process and during the lifetime of the contract the client will be able to contact INTEC's customer care team who will be on hand to provide support and training whenever necessary. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- All information held within IDIS can simply be downloaded to a .csv file when the contract ends.
- End-of-contract process
-
A contract end timetable will be agreed.
The schedule will depict when;
- Access to the software is to be disabled.
- The data is to be extracted.
- The client's data instance is to be deleted.
- Secure data deletion has been performed.
- Confirmation of when the data has been deleted will be provided.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- The service is monitored and alerts are raised with the support team where performance issues are identified. Each customer has their own database to minimise the impact of one customer being affected by another. Additional resource can be provisioned as and when required, however INTEC reserve the right to charge for these additional resources.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Key Performance Indicators
Some of the key performance indicators used by INTEC for Business Ltd include:
• On time delivery performance against agreed project milestones
• Average Support Desk response time
• Average time and effort required to resolve incidents
• Number of incidents registered by the Service Desk
• Percentage of incidents resolved within the agreed SLA
• Number of escalations for Incidents not resolved in the agreed resolution time
• Number of repeated Incidents reported - Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- All data lists within the system have built-in export options to standard document types including .PDF and .CSV files.
- Data export formats
-
- CSV
- Other
- Other data export formats
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
-
IDIS Availability is 99.75%
Service unavailability refunds are not provided. - Approach to resilience
-
Our services are hosted with UKCloud. UKCloud comply with the UK Governments Cloud Security Principle 2 “asset protection and resilience”.
Further information on how our service is designed to be resilient is available on request. - Outage reporting
- Email Alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- INTEC adapt strict security principles. Only fully authorised members of staff are allowed access to the software platform itself. During the development of the software, support or training, if INTEC are required to access the clients data/environment then we MUST have written authorisation from a nominated user before access.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- The solution is hosted in UKCloud data centres. UKCloud complies with multiple international standards including ISO27001
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Intec for Business Ltd has documented configuration and change management policies and processes, which have been implemented, maintained and assessed in accordance with the guidance from ITIL v.3 and the current ISO20000 standard.
Formal configuration management activities, including record management and asset reporting, are monitored and validated constantly, and any identified discrepancies promptly escalated for investigation.
A robust, established process for the formal submission of change requests is mandated prior to review and approval of the daily Change Advisory Board, which is attended by a quorum of operational and technical management personnel. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
All data is hosted on UKCloud data centres which have multiple accreditations including ISO27001.
UKCloud undertakes thorough security testing of it's third-party technologies. Any weaknesses found are assessed and additional
mitigation implemented, where appropriate, to ensure that the vulnerability is managed. In addition to this, experienced, trained security analysts identify, assess and respond to key threats and vulnerabilities detected by the UKCloud protective monitoring service. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- All data is stored within UK Cloud Data Centres. All authentication requests are logged and analysed via the UKCloud GPG13-aligned protective monitoring service, which is operated 24/7. In addition to this, internet connectivity is further protected against large-scale volumetric DDoS attacks using specialised protective infrastructure and resources.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- All customer data is stored within UKCloud Data Centres. UKCloud notifies security incidents to statutory organisations, such as NCSC and CareCERT, and has established protocols to work with organisations such as CERT-UK and CISP (Cyber Security Information Sharing Partnership) and sector-based WARPs (Warning and Advisory Reporting Points).
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Tackling economic inequality
-
Tackling economic inequality
INTEC will create training and employment opportunities in high growth sectors with known skills shortages by providing at least one place for students at local Universities to take a years work experience with INTEC. This will be a highly skilled technical position and will provide each student with valuable experience which will benefit them when applying for a permanent job once they have completed their degree.
Please see figures below for the number of positions that INTEC is hoping to offer over the next five years.
22/23 - 1
23/24 - 1
24/25 - 2
25/26 - 2
26/27 - 3
Pricing
- Price
- £5,999 to £20,000 a licence a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- 30 day trial access to IDIS.