Reference Data Management Application with Data Management
The Reference Data Management Application (RDMA) is a secure application for managing reference data mappings suitable for use in the supply of information to the Police National Database.
Features
- Reference Data Management
- Multi Tenant Support
- Data Validation
- Code List Management
- Migration of existing code lists into the application
- Data Management Support for Reference Data
Benefits
- Reduced Effort for Data Providers / Tenants
- Compatible with PND Reference Data Ingest Format XML
- Allows for automatic mapping of codes
- Improved Standards: Consistent Application of mapping standards
- Increased Security: Data Management Staff have BPSS and SC Clearance
- Improved Data Quality: Reference Data Mapping Validation
Pricing
£13,500 a unit a month
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 4 1 1 6 4 4 4 4 2 0 4 2 2 6
Contact
Datalynx Limited
Fred Keeling
Telephone: +44 (0)7782523923
Email: f.keeling@datalynx.net
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- RDMA is available as a hosted, software as a service offering, for secure use by the customer and the Reference Data Management Service. Individual data suppliers will not access the RDMA.
- System requirements
- End User Compute Device hardened to Datalynx Security Specification
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 1 working day
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
- Support calls are logged with the Datalynx IT Service Desk portal and users indicate the priority of their request. It is then reviewed and allocated. The support costs are included in the contract price. There is an account manager for the product.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
A member of the Datalynx Reference Data Services will engage with you to discuss data onboarding and other onboarding activities.
Onsite training and documentation will be provided to users of the service. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Data exports will be configured on a per client basis. Users will request an extract by raising a support ticket.
- End-of-contract process
-
As part of the service price at the end of contract
a) the customer can request data exports by raising a service desk ticket
b) the customer reference data mappings and all data related to the customer will be permanently deleted
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Chrome
- Application to install
- Yes
- Compatible operating systems
- Windows
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- To meet Service Level Objectives (SLO) we maximise performance isolation in our virtual machine based infrastructure
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Standard pre-defined extracts will be available via the menu in the application
- Data export formats
- Other
- Other data export formats
-
- XML
- XLSX
- Data import formats
- Other
- Other data import formats
-
- XML
- XLSX
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
The service will be normally be available 24/7 excluding scheduled downtime however this is not part of the service guarantee.
The standard hours of service are Monday-Friday 08:00-18:00 excluding bank holidays. Within the standard hours there is a 99.5% availability target over a rolling 6 month period. Refunds will be issued pro-rata on the service price for the time the service is unavailable beyond this target. - Approach to resilience
- Available on request
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Access to management interfaces and elevated administrator functions are restricted by user access controls.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- British Standards Institute
- ISO/IEC 27001 accreditation date
- Original Registration 15/04/2015 re-certified 20/03/2024
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- Cyber Essentials Plus
- ISO 27001
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- We have a full set of information security policies including "Physical & Equipment Security Policy" and "Data and Information Security Policy". Compliance with the the policies is ensured by continuous audit and regular management review.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Our configuration and change management approach is part of our ISO27001 compliance. Components in our services are tracked through their lifetime through the asset register and changes are managed through a formal change management process which includes assessment for potential security impact
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Our vulnerability approach is part of our incident management process. We identify and manage threats and vulnerabilities via our risk management process. Patching is done on a regular schedule but if a high/critical vulnerability is identified we would patch within 48 hours as defined by the Cyber Essentials standard. We get our information about potential threats via the NCSC, public news feeds and monitoring of
the CVE security vulnerability database - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- We have implemented LogPoint’s SIEM tool to identify potential compromises. When a potential compromise is identified we implement our incident management process. Incidents are responded to in accordance with their severity.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
We have a documented incident management process which sets out how incidents are reported, managed and closed.
Users can report incidents via the service desk or email. Our internal incident management process engages with a customers to report incidents.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
Fighting climate change
Datalynx's sustainability strategy works to uphold SDG 12 (Responsible Consumption and Production). As a supplier of services (rather than hardware or material goods), we have a relatively low carbon footprint and therefore focus on improving our resource efficiency and waste management. We work remotely to reduce commuting pollution as well as unused office space. We have a low waste policy to reduce printing and paper usage, and we securely recycle what we do use. We also recycle hardware where secure to do so, so that computer parts can be re-used and reduce the demand on natural resource and production.Equal opportunity
Another pillar of our Sustainability Strategy supports SDG 5 (Gender Equality). We are currently a 60:40 male: female split which is far in advance of the industry benchmark, and we have equal opportunity for all of our positions, both technical and in leadership and management. Furthermore, we are a signatory of the Armed Forces Covenant, and have recently introduced a policy allowing all staff two days a year off work to support any charity (or equivalent) of their choice.
Pricing
- Price
- £13,500 a unit a month
- Discount for educational organisations
- No
- Free trial available
- No