Luciditi Digital PASS Cards
The Luciditi is the First Digital Proof of Age Card certified by the UK’s national proof of age accreditation scheme, endorsed by the Home Office, the National Police Chiefs’ Council (NPCC) and the Security Industry Authority (SIA). It can be used for accessing Age related Services etc.
Features
- Verified digital identity
- Facial recognition & matching
- NFC read of ePassports
- Liveness detection
- In person ID verification
- Stand alone or Integrated options
- Proof of Age / address / KYC
Benefits
- Mitigate impersonation fraud
- Mitigate against prosecution for not protecting minors from harm
- Reduce time taken to do age verification
- Enhances existing identification processes with a higher degree of confidence
- Protecting access to age restricted products or services
Pricing
£7.99 a user a year
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 0 8 3 3 3 6 5 7 3 8 3 8 3 8
Contact
Arissian Ltd
Ian Moody
Telephone: +441213188878
Email: info@arissian.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- Requires access to the internet for both integrated solution and mobile apps.
- System requirements
-
- Apple phones with IOS 10 or Later
- Android phones with Android 6 or later
- Internet connection
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
UK time our business hours are :
Monday to Friday 9 am to 5 pm
We aim to respond to questions within 60 minutes during working hours. Questions raised outside of working hours will usually be dealt with with an hour of business opening.
Extended support arrangements can be purchased separately if clients need support beyond normal office hours. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- As standard we provide integration, technical and customer support within the price.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Documentation is available to support clients, including technical documentation on how to integrate the Luciditi SDK if the client wishes to integrate it with their own services. We also provide access to a technical team to help clients embed Luciditi as quickly as possible, and within 24 hours should be possible.
Users of the Luciditi app are provided an intuitive user interface with instructions and videos, which can be supplemented with email instructions and online videos. - Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
-
User and organisations can extract to file their data as well as their own transaction logs.
It is possible to permanently delete account and account linked data.
Any transactions that relate to multiple parties cannot be removed since these would break the necessary auditability of the service. - End-of-contract process
- Upon end of contract, the account becomes suspended and it will not be possible to make any changes or create new transactions, It will be possible to export data and remove the account completely.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- MacOS
- Windows
- Other
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- There is no desktop application, Luciditi is an app based system with an API. Web based sdk's are available for some processes such as identity verification and data requesting.
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- There is a Rest API and a web based SDK.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Luciditi is available via IOS and android apps, with a simple clean interface tested and reviewed by users. User feedback is accounted for in ongoing maintenance releases to ensure a good user experience.
- Accessibility testing
- N/a
- API
- Yes
- What users can and can't do using the API
- We have a REST api which allows 3rd parties control over the majority of Luciditi functions include identity verification. Web based SDK’s are suitable for web applications and also mobile integration (android and ios) where environments can host a “webview” control (including but not limited to React and Vue based apps)
- API documentation
- Yes
- API documentation formats
-
- HTML
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- We provide a white label facility where clients can upload their logo which will be displayed to end users.
Scaling
- Independence of resources
- Transaction usage is available from the account dashboard. It is possible to filter on date and see increasing and decreasing usage over time and associated transactional cost aligned with the purchased package.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Transaction Usage
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Other
- Other data at rest protection approach
- Biometric access to data on mobile devices, public/private key encryption of user data, automatic timeout due to inactivity in app. Password/Pin protection of accounts.
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
User and organisations can extract to file their data as well as their own transaction logs.
Any transactions that relate to multiple parties cannot be removed since these would break the necessary auditability of the service. - Data export formats
- CSV
- Data import formats
- Other
- Other data import formats
-
- Verified information on official ID documents
- Inputing additional data via the Luciditi app
- Via the Luciditi Identity Verification Service
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99.9% Availability through Azure services. Refunds are agreed on a case by case basis in service contracts.
- Approach to resilience
- This is available upon request
- Outage reporting
- Any service outages will be communicated on our service status page on the website. This is manually updated by our support engineers when dealing with service or infrastructure issues that effect users
Identity and authentication
- User authentication needed
- Yes
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
-
Our Information Security Policy is a key component of Arissian’s overall Information Security Management System (ISMS) and includes tight controls on restrictions in management interfaces and support channels.
Access to data, system utilities and program source libraries are controlled and restricted to those authorised users who have a legitimate business need e.g. systems or database administrators.
All accounts are owned by individuals and are managed by secure passwords conforming to the NIST guidelines and use 2FA when technically possible. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- CFECERT
- ISO/IEC 27001 accreditation date
- 25/08/2022
- What the ISO/IEC 27001 doesn’t cover
- A.11.1.2, A.11.1.5, A.14.2.7
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- We are going through the UKAS ISO 27001 certification process, and have completed stage 1 and waiting to undertake stage 2 in August 2022.
- Information security policies and processes
-
Arissian has implemented an ISO 27001 Information Management System, outlining our approach to information security. This includes applying risk management processes to people and IT Systems.
We are also Cyber Essentials certified and will be shortly undertaking Cyber Essentials Plus.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- As part of our ISO 27001 modelled Information Security Management Process we have a formal change management process, including logging approving and tracking change to maintain security.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We subscribe to a number of channels to receive security release notifications and have a Patched and Updates policy to manage deployment.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We follow a typical four step approach to protective monitoring:
Designing an Efficient Plan For Monitoring
Designing Effective Report Management Mechanism
Recommendations For Project Improvement
Ensuring Guidelines And Recommendations Are Followed Accordingly
These fit within our policies and procedures within our Information Security Management System. These are supported by a number of automated tools that monitor, capture and report issues to designated team members, with management reporting designations. - Incident management type
- Supplier-defined controls
- Incident management approach
- Users can report incidents by emailing support@luciditi.co.uk. When an incident has been resolved an report is generated and reviewed by the support team. Our incident management process conforms to ISO 27001.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Tackling economic inequalityTackling economic inequality
The Luciditi Digital Identity Platform support the development of scalable and future-proofed new methods to modernise delivery and increase productivity digitising previously manual processes. It reduces the time and costs associated with checking potential employees right to work, provides a reusable ID that can be used for onsite security while being more convenient for applicants by enabling them to interact remotely.
Pricing
- Price
- £7.99 a user a year
- Discount for educational organisations
- Yes
- Free trial available
- No