Infosys Collections and Dispute Management System (ICDM)
Infosys Collections and Dispute Management (ICDM) leverages intelligent automation to streamline collections and dispute processes.It prioritizes payment collection activities, improving AR team efficacy,optimizing cash flow,reducing bad debt,and enhancing customer relationships.
Features
- Automated worklist for collectors based on collection strategies
- Configurable rules for collections and assign to strategies
- Record of follow-up actions, promise-to-pay and customer notes
- Complete Audit Trail of collection activities
- Configurable and rule-based allocation of accounts to collectors
- Multi-level and configurable approval workflow
- Built-in operational reports and downloadable in xls/Dashboards
- Centralized channel for all collections and disputes communication
Benefits
- Improved cash flow
- Reduced DSO
- Increase in productivity
- Faster resolution of disputes
- Real time monitoring of collections
Pricing
£185 to £1,105 a unit
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 7 0 4 7 4 1 4 4 7 0 7 7 0 0
Contact
Infosys Limited
Peter Gill
Telephone: +44 7391393866
Email: ukps@infosys.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Hybrid cloud
- Service constraints
-
ICDM support is provided over email and from Infosys India delivery location.
Maintenance arrangements are planned and schedules are published in advance - System requirements
-
- Windows server 2016
- MS SQL 2017 with SSISMicrosoft IIS 8
- TomCAT Apache 9.0.17
- SPARK, Mlib
- Python 3.7
- Anaconda 9
- I - Flow (Infosys in-house workflow engine)
- Microsoft .NET 4.5
- Dokustart OCR
- Microsoft BI / Tableau
User support
- Email or online ticketing support
- Yes, at extra cost
- Support response times
-
ICDM application support is via Email. While the standard approach is Mon- Fri , 8 X 5 shared support services, dedicated support presonnel can be provisioned at extra cost.
The work hours and support personnel is aligned to Client work hours and business calendar. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Support will be defined during the solutioning phase as per the requirements.
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
Infosys aligns Domain Consultant(s) who bring in the required expertise to tie Business Process & ICDM together; review as-is process state and define to-be state.
Process blueprinting workshops are held with Client Business & IT functions to cover both, Business Process as well as IT specific requirements.
Requirements are detailed in BRD (Business Requirement Document) and vetted by Client's Business & IT functions
Subsequently, ICDM is configured based on the BRD ; detailed integration testing followed by Onsite User Training are provided to key users; User Acceptance Testing is done to cover all real-life representative scenarios; post sign off, process go-live happens on ICDM platform.
User Documentation / FAQs are provided to the relevant teams
During the implementation phase itself client users are involved in the UAT. Training will be facilitated based on client preference, it can be both onsite or online training. Both train the trainer and train the class models adopted. End user product documentation shared with client users as part of the training. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- As a standard practice, upon closure of Contract, all the meta-data and associated documents / files are exported to a path / system of Client's choice. This can be SFTP / Storage Account etc.,
- End-of-contract process
-
Upon closure of Contract, ICDM as an application ceases to exist for invoice processing. However, perpetual usage of the application can be enabled at addtional cost.
From an application standpoint
1. User are deactivated and access is revoked.
2. If ICDM hosted on the Client side, ICDM application, Database and associated services, code binaries etc., will be removed
3. All the meta data along with documents / files are exported to a location such as SFTP / Storage Account etc.., from where the Client can import the same into their long term document repository system(s)
4 All associated Servers / Components are cleansed and deleted (Ex: Virtual Machines / Storage Accounts etc.,)
From a price standpoint, following elements are included
1. One time implementation cost
2. Run costs
a. 3rd party components
b.AMC
c. L1 / L2 support
d. Platform usage charges
Additional costs during the contract can be, but, not limited to
1. Scope deviation
2. Change Requests
3. Increase in transactional volumes compared to baseline
4. Additional users
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- API services can be set up and associated documentation can be provided on need basis.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
-
ICDM is a highly configurable platform with minium requirement to customize. However, minor customizations can be implemented within the scope of existing technical and architectural capabilities
Custom requirements are captured during the process blueprinting phase and is customized by Infosys' ICDM platform implementation team.
Subsequent customizations can be raised via a Change Request management process
Scaling
- Independence of resources
-
ICDM platform is
1. Enabled to auto-scale based on load / demand
2. Load balancers are used to manage increase in demand
3. Parallel threaded technology is used to enable serial processing
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Service Usage Metrics can be provided on request.
Details around transactions count, number of users, volume, resource consumption etc., can be provided. - Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Other
- Other data at rest protection approach
-
As it is a Cloud platform, data at rest is usually stored in storage accounts such as File Share / Blob etc.,
Access to Storage Account is restricted only via
1. Managed Service Identify or Shared Access Signature (SaS)
2. Pre-authorized list of personnel from Platform Administration team with "Least Access Privileges" policy.
3. Only named user accounts federated via AD integration with MFA is allowed to have access to the storage account
4. Storage Account level encryption is managed as part of offering by the Cloud Service Providers - Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- In case of reports, end users can generate and download the data in CSV format. However, for exporting data such as meta data and documents / files
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- XLS
- FLat files
- XML
- API
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- Flat Files
- XML
- API from source systems
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Legacy SSL and TLS (under version 1.2)
- Other
- Other protection within supplier network
-
3. For SPI / PII information, Transparent data encryption with field level masking is enabled at the database level
4. Access to storage areas is restricted with private end points within VPN
5. Access to storage area is given only Platform Administration personnel and with "Least Access Privilege" policy and with named user accounts, which are integrated with AD via SAML / OIDC etc.,
6. User Access Monitoring tools are used to log, audit and alert any attempts unauthorized access
Availability and resilience
- Guaranteed availability
- Our platform has 98% availability considering planned maintenance activities and uptime commitments offered by Cloud Service Providers.
- Approach to resilience
- Service resilience is defined and set up based on case-by-case basis and business criticality defined by each Client. Details around the same can be shared based on request
- Outage reporting
- Service outages are communicated via email
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Role based access provisioning and Segregation of Duties are in place to enforce controls and compliance.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Bureau Veritas Holding SAS - UK
- ISO/IEC 27001 accreditation date
- 2017
- What the ISO/IEC 27001 doesn’t cover
- N/A
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- ISO27001
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- ISO 27701:ISO 9001:2015, ISO 20000:2018, ISO 14001:2015, ISO 45001:2018, ISO 13485:2016, CMMI 2.0, SSAE 18/ISAE 3402 SOC 1 Type II, ISO 22301:2019, ISO 42001:2023, ISO 27701:2019
- Information security policies and processes
- Details can be provided on request
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
Provides systematic approach to control life cycle of all changes, facilitating beneficial changes to be made with minimum disruption to IT services. Change Management offers ITIL-aligned processes for normal, standard, and emergency change types.
Normal change: Follows complete change lifecycle including peer or technical approval, management, Change Advisory Board (CAB) authorization before being implemented, reviewed, closed.
Standard change: Frequently implemented, repeatable implementation steps, low risk, proven history of success.
Emergency change: Covers fix on fail or retroactive situations where impact to service has been experienced or fail situations where the impact to service is imminent if action is not taken. - Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Every release goes through Vulnerability assessment (e.g. SAST, DAST) by Infosys Information Security Group before moving to production. All production environments are monitored by Infosys Internal Infrastructure monitoring and management teams and any vulnerabilities identified in production are addressed ASAP.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Cloud native monitoring tools monitoring the availability your infrastructure, hosted application and services.
- Incident management type
- Supplier-defined controls
- Incident management approach
- NA
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Infosys’ balanced approach to environmental, social, and governance (ESG) enabled the company to become carbon neutral as of 2023. The same approach will be taken with GCloud14, with a strong emphasis on governance and transparency.
Coupled with our strong governance approach and the environmentally sympathetic design of our delivery model, we can:
• Achieve Net Zero by 2028,
• Adopt UN Climate Neutral Now definition of Net Zero: “where a balance between anthropogenic greenhouse gas (GHG) emissions and removals is achieved”
• Identify 100% of emissions, from design to implementation, prioritising the elimination of emissions
• Offset emissions that cannot be eliminated
• Offsets assured by an external environmental consultancy
• Have our suppliers present an action plan to move from offset to elimination by 2029, setting course for a carbon negative future
In compliance with PPN 06/21, Infosys publishes its Carbon Reduction Plan which is available at Crown Commercial Website as well as Infosys’ own website: https://www.infosys.com/about/corporate-responsibility/documents/carbon-reduction-plan.pdf
For Call-Off Contracts, a baseline emissions level set prior to contract commencement will be created using data supplied by the incumbent supplier, Contracting Authority, and Environmental Contractor. This allows environmental performance to be measured against the previous approach. While the commitment to establishing carbon neutrality is set at 2028, granular targets depend upon consultation with the Contracting Authority, as reflected in the timeline.
Supply chain emissions management will be in place prior to contract commencement through the Contracting Partners’ procurement methodology. The reporting design on emissions will be supplied to the Contracting Authority, with aggregated subcontractor emission provided within an integrated biannual report. A sustainability manager will be aligned to the initiative, who will, working with the client, develop a project plan during the first month identifying, each obligation, associated event/activity and required resources (people, venue, collateral, rollout).Covid-19 recovery
Infosys will invest in the local communities and in partnership through this contract will help create opportunities to tackle economic inequality, increase supply chain resilience and capacity thereby helping support COVID-19 recovery. Infosys has announced it will create 1,000 new Digital Jobs in the UK to support post -Pandemic Growth (Infosys to Create 1,000 Digital Jobs in the UK to Fuel Post-Pandemic Growth): https://www.infosys.com/newsroom/press-releases/2021/create-digital-jobs-uk.htmlTackling economic inequality
Infosys’ plan for GCloud14 contracts include addressing economic and aspirational inequality, ensuring end-users can forge a meaningful career and follow curated, individualised development paths toward success.
Infosys creates opportunities for personal growth through training and career development. Increased online training opens a wide range of options to those looking to enhance their skills or grow into a new field, particularly among under-represented demographics where classroom learning is unsuitable. This democratisation of knowledge will revolutionise how people of all backgrounds develop their career. The data on uptake of such training can ensure all demographics are reached and, where proven to be less effective, steps can be taken to identify why.
Infosys has long recognised the importance of tackling inequality; it is essential to creating a workplace where professional growth faces as few barriers as possible. We are adamant that what barriers remain are determined only by aptitude and hard work – never by background or physical characteristics.
This is evidenced by Infosys’ approach to Corporate Social Responsibility (CSR), with its global foundation investing £30 million last year on education in deprived communities, alongside its community-focussed Springboard learning platform and other philanthropic efforts. We have the commitment and expertise to deliver a transformation that has a meaningful impact on economic inequality.
Working with Local Authorities, including Brent and Sandwell Borough Councils, Infosys has made over 220 vocational courses available to the public free of charge. Local Authorities have adopted the technology as their skills platform of choice and are driving citizens towards the tool.
This will result in high-quality training reaching those in need, doubling the reach of the Infosys Springboard deployment in the UK. Furthermore, it will ensure that the co-morbidities of poor educational and health outcomes linked to economic inequality are addressed through a single tool.Equal opportunity
Infosys supports businesses to create their modern slavery policy, helping them to map their supply chain and create robust procedures. This methodology ensures a proactive, compliant approach to modern slavery whereby action planning is reviewed and renewed to adapt to the changing practices.
The UK proudly boasts the highest ranking on Global Slavery Index as the most active country in the world fighting the practice. This achievement is the perfect expression of the values at the core of Britain’s democratic traditions; its global leadership in this area is a source of pride for colleagues working on this engagement.
We will contribute to this under-celebrated achievement by ensuring the Gcloud14 contracts result in net reduction of Modern Slavery. We will achieve this by keeping the practice out of our supply chain while taking targeted action to improve the lives of people most at risk of exploitation. We will build our approach with close reference to the UK Government guidance on modern slavery.
To ensure a clear understanding of the risks of modern slavery and human trafficking across our organisations, we conduct training with relevant members of the supply chain on staffing benefits and appropriate anti-sexual harassment policies. In line with the policies that apply to our own staff, we require our human resource suppliers to provide training to their employees on their rights, wages policy, benefits, and grievance redressal forums; this is periodically and randomly audited. We have also circulated to our supply chain management employees a training module to improve awareness on modern slavery and human trafficking –a core responsibility of their role.
The programme will be governed by the overall social value governance model under the Social Value Manager’s accountability, who will share a narrative report every six months with the contracting authority on supplier performance.Wellbeing
At Infosys, employee’s health and wellbeing drives a culture of wellness.
Through our efforts, our employee well-being rates reached an all-time high of 91% among employees across locations, even with the virtual setup. The sense of connectedness stands at 88% because of the ability of different teams to come together and collaborate with each other emotionally. We successfully touched the lives of 150,000+ employees through 431+ initiatives, witnessing a three-fold increase in employee participation virtually.
We created three aspects essential to shaping employee experience:
1. Self-Help: Emphasises providing our employees the right tools and resources for them to take charge of their wellbeing.
2. Micro-Environment: Our objective is to create an environment that is conducive for individuals to work together, seamlessly.
3. Macro Environment: The focus here is on driving the programs centrally, conceptualising policies keeping the user at the centre.
Great Place to Work® and Fortune have recognised Infosys as one of the Best Big Companies to Work For™. In alignment with the organisations’ social value themes to ensure Employee wellbeing and health improvement, Infosys invests in following engagements:
• New approaches to focus on prevention, resilience supported by internal policies. For instance, digital platforms for scientifically validated therapies such as cognitive behavioural therapy (CBT) to improve access to care options.
• Infosys Employee Assistance Programme, powered by LifeWorks via Generali, a 24/7 service for our employees or eligible dependents.
• Infosys, in collaboration with Virgin Pulse are committed to augment health and wellness agenda of UK by providing free/subsidised memberships.
To monitor the effectiveness of these programmes our HR team conduct regular surveys, and as part of town halls take direct feedback. Data collected is used to ensure that the programmes are reaching the right people and are adjusted to meet the changing needs of our employees.
Pricing
- Price
- £185 to £1,105 a unit
- Discount for educational organisations
- No
- Free trial available
- No