Skip to main content

Help us improve the Digital Marketplace - send your feedback

Datalynx Limited

Reference Data Management Application with Data Management

The Reference Data Management Application (RDMA) is a secure application for managing reference data mappings suitable for use in the supply of information to the Police National Database.

Features

  • Reference Data Management
  • Multi Tenant Support
  • Data Validation
  • Code List Management
  • Migration of existing code lists into the application
  • Data Management Support for Reference Data

Benefits

  • Reduced Effort for Data Providers / Tenants
  • Compatible with PND Reference Data Ingest Format XML
  • Allows for automatic mapping of codes
  • Improved Standards: Consistent Application of mapping standards
  • Increased Security: Data Management Staff have BPSS and SC Clearance
  • Improved Data Quality: Reference Data Mapping Validation

Pricing

£13,500 a unit a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at f.keeling@datalynx.net. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

6 4 1 1 6 4 4 4 4 2 0 4 2 2 6

Contact

Datalynx Limited Fred Keeling
Telephone: +44 (0)7782523923
Email: f.keeling@datalynx.net

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
RDMA is available as a hosted, software as a service offering, for secure use by the customer and the Reference Data Management Service. Individual data suppliers will not access the RDMA.
System requirements
End User Compute Device hardened to Datalynx Security Specification

User support

Email or online ticketing support
Email or online ticketing
Support response times
1 working day
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
No
Support levels
Support calls are logged with the Datalynx IT Service Desk portal and users indicate the priority of their request. It is then reviewed and allocated. The support costs are included in the contract price. There is an account manager for the product.
Support available to third parties
No

Onboarding and offboarding

Getting started
A member of the Datalynx Reference Data Services will engage with you to discuss data onboarding and other onboarding activities.

Onsite training and documentation will be provided to users of the service.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
Data exports will be configured on a per client basis. Users will request an extract by raising a support ticket.
End-of-contract process
As part of the service price at the end of contract
a) the customer can request data exports by raising a service desk ticket
b) the customer reference data mappings and all data related to the customer will be permanently deleted

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Chrome
Application to install
Yes
Compatible operating systems
Windows
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
No

Scaling

Independence of resources
To meet Service Level Objectives (SLO) we maximise performance isolation in our virtual machine based infrastructure

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Standard pre-defined extracts will be available via the menu in the application
Data export formats
Other
Other data export formats
  • XML
  • XLSX
Data import formats
Other
Other data import formats
  • XML
  • XLSX

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
The service will be normally be available 24/7 excluding scheduled downtime however this is not part of the service guarantee.

The standard hours of service are Monday-Friday 08:00-18:00 excluding bank holidays. Within the standard hours there is a 99.5% availability target over a rolling 6 month period. Refunds will be issued pro-rata on the service price for the time the service is unavailable beyond this target.
Approach to resilience
Available on request
Outage reporting
Email alerts

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Access to management interfaces and elevated administrator functions are restricted by user access controls.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
British Standards Institute
ISO/IEC 27001 accreditation date
Original Registration 15/04/2015 re-certified 20/03/2024
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
  • Cyber Essentials Plus
  • ISO 27001

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
We have a full set of information security policies including "Physical & Equipment Security Policy" and "Data and Information Security Policy". Compliance with the the policies is ensured by continuous audit and regular management review.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Our configuration and change management approach is part of our ISO27001 compliance. Components in our services are tracked through their lifetime through the asset register and changes are managed through a formal change management process which includes assessment for potential security impact
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Our vulnerability approach is part of our incident management process. We identify and manage threats and vulnerabilities via our risk management process. Patching is done on a regular schedule but if a high/critical vulnerability is identified we would patch within 48 hours as defined by the Cyber Essentials standard. We get our information about potential threats via the NCSC, public news feeds and monitoring of
the CVE security vulnerability database
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
We have implemented LogPoint’s SIEM tool to identify potential compromises. When a potential compromise is identified we implement our incident management process. Incidents are responded to in accordance with their severity.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
We have a documented incident management process which sets out how incidents are reported, managed and closed.
Users can report incidents via the service desk or email. Our internal incident management process engages with a customers to report incidents.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Equal opportunity

Fighting climate change

Datalynx's sustainability strategy works to uphold SDG 12 (Responsible Consumption and Production). As a supplier of services (rather than hardware or material goods), we have a relatively low carbon footprint and therefore focus on improving our resource efficiency and waste management. We work remotely to reduce commuting pollution as well as unused office space. We have a low waste policy to reduce printing and paper usage, and we securely recycle what we do use. We also recycle hardware where secure to do so, so that computer parts can be re-used and reduce the demand on natural resource and production.

Equal opportunity

Another pillar of our Sustainability Strategy supports SDG 5 (Gender Equality). We are currently a 60:40 male: female split which is far in advance of the industry benchmark, and we have equal opportunity for all of our positions, both technical and in leadership and management. Furthermore, we are a signatory of the Armed Forces Covenant, and have recently introduced a policy allowing all staff two days a year off work to support any charity (or equivalent) of their choice.

Pricing

Price
£13,500 a unit a month
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at f.keeling@datalynx.net. Tell them what format you need. It will help if you say what assistive technology you use.