Skip to main content

Help us improve the Digital Marketplace - send your feedback

INKERMAN (GROUP) LIMITED

Employee verification and screening - human resources and employee management

Pre-employment checks, security screening and verification of staff and employees

Features

  • Remote access to screening platforms
  • Updated in real-time
  • Efficient user interface
  • Available 24/7
  • Comprehensive management of data
  • Security of personal data - GDPR
  • Cross-verification of data and information
  • Identity verification and supporting documentation
  • Right to Work employment checks on-line

Benefits

  • Updated information available in real-time
  • Access and manage data from any location
  • 24/7 operational support to users
  • Access information from multiple devices

Pricing

£100.00 to £300.00 a user a 6 months

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at karen.englishby@inkerman.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 3 9 7 4 5 7 1 8 0 9 4 8 2 2

Contact

INKERMAN (GROUP) LIMITED Karen Englishby
Telephone: 01233646940
Email: karen.englishby@inkerman.com

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
No - any required maintenance would be advised
System requirements
None required

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Urgent requests within 1 hour of receipt.
Standard requests within 24 hours.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
No
Onsite support
No
Support levels
Support levels are based on usage of software systems - so are provided online and / or by personal contact (telephone) to all end users.
Standard support costs are included in the overall service package price - so, no additional costs unless increased coverage or availability is required and are determined on a case-by-case basis on 'at cost' pricing.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Documentation on system usage and detailed guidelines for users.
Online training, webinars and meetings provided - including bespoke design for clients.
Trained and qualified staff available throughout the period of service delivery for ongoing assistance, advice and support.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
Microsoft Word
End-of-contract data extraction
Either by transfer to alternative platform / format on request, dependent on technical specification requirements.
Download of data conducted to required format, generally Microsoft Excel or database.
End-of-contract process
Standard contracts are based on all-inclusive pricing for service set-up, delivery, support, training, limited customisation / branding, reporting.
Additional costs could be attracted by any requirements for significant / premium customisation being requested.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Functionality and usage remain unchanged - interface is designed to be 'user friendly' in best way for alternative device access.
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
Yes
Description of customisation
Some aspects of the service can be customised in terms of functionality (for example, which specific employment screening checks to include; re-branding to the buyer organisation's branding).
Customisation is managed and implementation by the Inkerman screening team direct and attracts an additional cost, depending on the nature of customisation required.

Scaling

Independence of resources
Service usage is monitored on a regular basis.
Full redundancy of services is in place.
Service SLAs are agreed with users at start of contract and strictly adhered to.

Analytics

Service usage metrics
Yes
Metrics types
Number of applicants in the system.
Status of applicants in the system.
Length of time application in process.
Progress of application from start to completion of screening process, including which aspects have been completed.
Tracking of status application vs timeline.
Performance against agreed service SLAs / KPIs.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Other
Other data at rest protection approach
All data at rest is stored on company servers, with robust physical access controls in place to both the building premises and the server room itself.
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Within the system - transfer / export options.
Manual alternatives available as downloads and / or reporting documents
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
For all service components (except Account management): 100% 0800 hours to 1800 hours (Monday-Friday) excluding bank holidays.

Account management: 100% 0900 hours to 1700 hours (Monday-Friday) excluding bank holidays.

Subject to Planned Outages and Planned Maintenance all Services are available Monday-Friday 0800-1900 excluding bank holidays.

Planned Outages - The process for agreed planned outages is:
The Contractor’s initiated outages – other than in agreed emergency situations, the Contractor will provide no less than 5 working days’ notice to the Authority for any periods when the Services will not be available for planned outages.

Emergency Outage – the Contractor and the Authority will agree outages to take place at short notice.

Planned Maintenance : In order to fulfil its obligations the Contractor may require periods of time to perform maintenance to the Service. The Contractor will agree proposed maintenance opportunities with the Authority on a quarterly basis.
Prioritisation - A published matrix outlines the priority levels that the Authority shall use when logging a call with Contractor’s Service/Help Desk and the response and resolutions targets for the Service.
The Authority will agree by mutual consent with the supplier the priority call allocation for all calls logged with Contractor’s Service/Help Desk
Approach to resilience
Frequent onsite and offsite back ups and replication of all critical systems
Outage reporting
Email alerts

All systems are monitored remote monitoring system which push notifications and email alerts - reports outages

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
All management interfaces are only accessible by authorised users. For the server administration side, this is limited to our managed services provider / helpdesk team.
Internal database systems have a very limited number of admin accounts which only the manager for the relevant department has the credentials of.
Any cloud systems have multi-factor authentication requirements.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users receive audit information on a regular basis
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users receive audit information on a regular basis
How long supplier audit data is stored for
User-defined
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Citation ISO Certification
ISO/IEC 27001 accreditation date
Original certification 11/12/2002; current certificate 02/12/2023
What the ISO/IEC 27001 doesn’t cover
ISO27001 covers our information security - it is complemented with other Company frameworks and practices to address the specific needs and gaps.
Operational Details - ISO27001 sets the high-level requirements, not the operational specifics. These are covered with Company detailed policies, procedures and controls based on the requirements set.
Legal and Regulatory Compliance - ISO27001 does not directly address this - the organisation has policies and procedures internally to ensure compliance with relevant laws and regulations.
Business Continuity / Disaster Recovery - ISO27001 touches on the subject but does not comprehensively cover disaster recovery strategies or continuity testing; these are covered by the Business Continuity Plan.
Physical security aspects such as access control and facility protection are not detailed - internal business policies and procedures are in place.
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
Inkerman employees are screened to BS7858 security standard

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Inkerman (Group) Limited's Information Security Policy applies to all business functions within the business and covers the information, information systems, networks, physical environment and people supporting these business functions.
The Chief Executive Officer has approved the Information Security Policy and has overall responsibility for Information Security.
Day-to-day responsibility for procedural matters, legal compliance including data protection, maintenance and updating of documentation, promotion of security awareness, liaison with external organisations, incident investigation, management reporting etc. rests with the ISMS Manager.
All employees have a duty to safeguard assets, including locations, hardware, software, systems or information, in their care and to report any suspected breach in security without delay, direct to the ISMS Manager.
Information Security aspects are considered in all daily activities, processes, plans, projects, contracts and partnerships entered into by the Organisation.

Employees are advised and trained on general and specific aspects of Information Security, according to the requirements of their function within the Organisation. The Contract of Employment includes a condition covering confidentiality regarding the Organisation’s business.
Adherence to Information Security procedures as communicated in the Organisation’s policies and guideline documents is the contractual duty of all employees - a clause of which is included in Contracts of Employment.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Use content from ISO27001 on change management
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
All external e-mails pass through a third party mail filtering and threat detection system. Malware, viruses and other known threats are blocked before they enter our systems.
Other suspicious content is flagged and quarantined.
All endpoints in the business have managed endpoint protection, which is centrally managed by our managed services provider.
The endpoint management system also deploys updates and patches to all devices for all critical applications. Any devices that fall out of compliance with the patch or security policies are alerted to our IT helpdesk for investigation.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
All alerts are sent to and monitored by our IT helpdesk and / or our 24/7 Operations Centre. This includes firewalls, mail filtering and endpoint agents.
We have incident response plans which detail various compromise scenarios and provide detailed instructions on how the incident should be responded to.
All incidents are responded to as soon as a staff member is alerted.
Incident management type
Supplier-defined controls
Incident management approach
Incident response plans cover most types of attack or incident, with examples to help determine type of attack.
Plans cover areas such as who to notify, in which order, whether external parties such as cyber security specialists or law enforcement need to be involved.
Users are required to report any incidents to management;assuming it's a cyber incident, our managed services provider is informed and engaged.
Incident reports compiled internally and with the help of the MSP; once completed, entered into the ISO27001 Incident Log.
Reports that are legally required to be notified to external parties done within the reporting process.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Tackling economic inequality

All employment opportunities are advertised, including on local forums etc. We work towards creating new business opportunities, new jobs and new skills throughout our business.

We work together with specialist organisations such as Armed Forces Covenant, ICAREC and Armed Forces recruitment services to provide new work opportunities, as well as local job centre services and career services in educational establishments.

Training for all members of staff in the team is reviewed at the beginning of their engagement on the contract and on an ongoing basis throughout the contract, including at each staff members's annual appraisal meeting as part of our training and development commitment. Vocational qualifications are supported financially and in terms of management / mentoring support and time off work to complete the studies.

All contracts are required to operate within the Company's overall policy and commitment to investigate our supply chains and conduct company audits and due diligence checks on our suppliers, with an emphasis on ethical employment practices, particularly in the area of the Modern Slavery Act and related aspects.

Equal opportunity

Actions taken to identify and manage the risks of modern slavery in the delivery of the contract, including in the supply chain:
With regard to Modern Slavery - to identify and manage the risks of modern slavery, we have initiated a service / method to support businesses in meeting the compliance obligations of the Modern Slavery requirements - Inkerman has established a compliance programme that enables businesses to be more easily be able to identify and manage their business in the fight against slavery and human trafficking and to comply with the expected requirements of the current legislation.
In addition, we operate within the Company's overall policy and commitment to investigate our supply chains and conduct company audits and due diligence checks on our suppliers, including within the area of the Modern Slavery Act and related aspects.

All staff are able to apply for all job opportunities within the Company - applications are proactively invited by internal vacancy advertisements being issued before external applications are sought.

All staff are proactively encouraged to progress within the organisation in their careers - this can include opportunities for additional training, inclusion in in-house training initiatives, secondment to other teams / involvement in new projects and development opportunities - throughout the business.

Wellbeing

Inkerman is committed to providing measures that contribute to the wellbeing of all its employees in the business.

We are responsive to staff and their individual needs and work with them to provide the best, workable solutions to the team and their concerns / needs such as consideration to employee requests to work from home and / or at other locations, physical health and / or other health / medical requirements as identified and discussed with individuals etc. In addition, we support staff in attending identified wellbeing programmes during their employment.

Staff are encouraged to participate with community organisations, locally, within their areas of interest / specialisms and with organisations supporting these such as specialist groups within our industry sector (Armed Forces Covenant, ICAREC and Armed Forces) supporting colleagues to participate in new employment and training opportunities.

Pricing

Price
£100.00 to £300.00 a user a 6 months
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
All services except criminal record checks (attract an external cost from DBS)
Limited time period - typically valid for one month but negotiable maximum of 5 screenings

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at karen.englishby@inkerman.com. Tell them what format you need. It will help if you say what assistive technology you use.