National Mobile Property Register - Credit Intelligence
Provides accurate and comprehensive financial information on the UK adult population. Can be used to confirm identity, previous addresses, financial associates, aliases, residency & household occupancy along with full financial bank & lines of credit data.
Features
- Financial Investigation
- Criminal Investigation
- Tracing of Persons of Interest
- Prevention & Detection of Crime
- Intelligence Gathering & Development
- Proceeds of Crime Investigation
- Aliases
- Financial Associates
- Publicly Available Third Party Data
- Granular Lines of Credit Account Information
Benefits
- Flexible & Tailored Deployment
- Full, Personal, Credit and Financial Associations History
- Free, Unlimited Awareness Training & Support Online / Onsite
- Unlimited User Accounts & Usage
- Specifically Designed for Law Enforcement in the UK
- Dedicated Policing Team led by ex-Police Officer as SPoC
- Full Management Information & Performance Reports
- User Group Forums & Regular Support Meetings
- Increase Operational Efficiency
- No Hidden, Ongoing Costs
Pricing
£1 to £80,000 a unit
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
7 9 2 9 7 7 3 7 6 9 8 2 3 4 9
Contact
Recipero Ltd
Les Gray
Telephone: 07968 064333
Email: les@recipero.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- None
- System requirements
-
- Web Browser
- English language
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 72 Hours
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- No
- Web chat support
- No
- Onsite support
- No
- Support levels
- One support level, ticket based replies typically within hours.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- In-person and online training led by customer requirements.
- Service documentation
- Yes
- Documentation formats
-
- ODF
- End-of-contract data extraction
- Make a request to support.
- End-of-contract process
- At the end of the contract, access is removed unless a renewed order is presented before the end of contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None aside from obviously less room, functionality is unchanged.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
- Browser based interface.
- Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- Tested with police users.
- API
- Yes
- What users can and can't do using the API
- Documentation provided on request to developers. All that is possible through the web interface is possible via API.
- API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- Over the last 20 years, we have maintained an availability level in excess of 99.95% by using multiple redundant servers & data centres along with a dedicated support team that monitor demand & load usage.
Analytics
- Service usage metrics
- Yes
- Metrics types
- We provide quarterly dashboard reports showing type of input, summary of outputs, volume of usage, active and inactive users.
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Transunion UK
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- It depends on the data they have provided. We are led by the user's desire.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- We are proud of our uptime of 99.95% over the last 20 years. We will be happy to discuss an SLA at point of contract.
- Approach to resilience
- Available on request.
- Outage reporting
- We use email alerts and API.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Controls in compliance with our ISO27001 ISMS. Individual policies and documents available on request.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- DAS Accreditation
- ISO/IEC 27001 accreditation date
- 19/02/2020
- What the ISO/IEC 27001 doesn’t cover
- Nothing we do is outside 27001.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- ISO27001 compliant ISMS. Any components are available on request.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Asset register, risk register and controls in compliance with our ISO27001 ISMS. Individual policies and documents available on request.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Asset register, risk register and controls in compliance with our ISO27001 ISMS. Individual policies and documents available on request.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Asset register, risk register and controls in compliance with our ISO27001 ISMS. Individual policies and documents available on request.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Controls in compliance with our ISO27001 ISMS. Individual policies and documents available on request.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
- Public Services Network (PSN)
Social Value
- Fighting climate change
-
Fighting climate change
Company policies dictate energy efficiency, minimising waste, re-use where possible, responsible recycling where re-use not possible. - Covid-19 recovery
-
Covid-19 recovery
Our business has operated entirely remotely for over 10 years. We were unaffected operationally by Covid-19 so our "recovery plan" is to keep doing exactly what we do. - Tackling economic inequality
-
Tackling economic inequality
Recruiting processes always publish salary and we never request information about salary, gender, race, physical ability etc. We recruit on relevant experience and capability only, not on qualifications. These two policies help address gender pay inequality and social mobility, ensuring opportunities are open to the widest possible audience irrespective of their perceived or actual economic situation. - Equal opportunity
-
Equal opportunity
We are an equal opportunity employer. - Wellbeing
-
Wellbeing
All employees benefit from life insurance, critical illness cover and income protection, full private medical cover including 24x7 GP and mental health support, generous holidays, totally flexible working hours and locations. We support healthy lifestyle choices, career breaks, extended leave, generous sick pay.
Pricing
- Price
- £1 to £80,000 a unit
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Up to 4 weeks trial for new customers. Full service included.