Agenda Screening Platform for In-House Recruitment Teams
The Agenda Screening Platform is available for in-house recruitment teams of public agencies who want the benefit of an outsourced service and their development plans, screening capabilities and 3rd party relationships, but using your own HR Operations. The platform is designed to streamline the vetting process for public sector organisations.
Features
- Intuitive User Interface
- Flexible Workflows
- Secure and Compliant
- Seamless Integrations
- Powerful Reporting
- Improved HR and Recruitment Efficiency
- Streamlines Processes
- Positive Candidate Experience
- Configurable Screening Levels
- Real-Time Management Information
Benefits
- Excellent, seamless candidate experience
- Digital ID verification
- Customisable onboarding workflows
- Reduce Risk of Onboarding
- Export reports at the click of a button
- Integration with other platforms
- Intuitive workflows
- Customisable dashboards and metrics
- Intuitive navigation within software reduces likelihood of incorrect data
- Robust data encryption
Pricing
£49 a licence a year
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 7 9 0 1 3 4 8 8 3 3 3 0 7 3
Contact
AGENDA RESOURCE MANAGEMENT LIMITED
Matt Harvey/Courtney Uscroft
Telephone: 03456445546
Email: sales@agenda-screening.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- No
- System requirements
- None
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Monday - Friday 8:00AM - 5:30PM
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- Yes, Fully tested and is actively being used by candidate and clients on our live platform
- Onsite support
- Yes, at extra cost
- Support levels
- Account Management, initial training, if required. Any additional requests will be reviewed on a case by case basis
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- User guides and training are available
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Data extraction and export requirements can be discussed in detail
- End-of-contract process
- This can be discussed with your dedicated account maanger
Using the service
- Web browser interface
- No
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None - service has been optimised to perform seamlessly on both desktop and mobile devices.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- Yes
- What users can and can't do using the API
- The API supports the requirement
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- The service is bespoke and can be tailored to both the requirements of the customer and the necessary screening level
Scaling
- Independence of resources
- The provision of the Agenda Screening Platform allows customers to plan and provision their screening requirements internally
Analytics
- Service usage metrics
- Yes
- Metrics types
- Our screening services provide in-depth metrics and customisable dashboards, giving you real-time insights into your screening processes
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- You can access all your data directly within the system, eliminating the need for separate data extraction
- Data export formats
- Other
- Other data export formats
- Other
- Data import formats
- Other
- Other data import formats
- Other
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- The platform is available 24/7/365, however SLA's can be discussed as part of the commercial agreement
- Approach to resilience
- Datacentre resilience information is available upon request.
- Outage reporting
- Email alerts and account management support where incidents are reported and impact service provision
Identity and authentication
- User authentication needed
- Yes
- User authentication
- 2-factor authentication
- Access restrictions in management interfaces and support channels
- Access requirements are defined and set depending on the role to ensure no unauthorised access to management interfaces.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- ISOQAR
- ISO/IEC 27001 accreditation date
- 12/7/2023
- What the ISO/IEC 27001 doesn’t cover
- NA
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- Elavon
- PCI DSS accreditation date
- 15/4/2024
- What the PCI DSS doesn’t cover
- NA
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- ISO 27018
- ISO 27701
- BS 10012
- ISO 22301
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Agenda has a comprehensive Global Security Policy based on the ISO 27001 standard and Cyber Essentials, encompassing: Organization and Management; Information Security; Asset Classification; Physical and Environmental Security; Communications and Operations Management; System Access; Systems; Development and Maintenance; Compliance; Personnel and Provisioning; Business Continuity Management; and Third-Party Management. Our Executive Risk Management Committee, an executive-level body, owns and assumes ultimate responsibility for Agenda's risk posture, with information security as a core component. Agenda's leadership actively champions security through policy endorsement, implementation of controls, and consistent actions. All Agenda employees and contractors can access the security policy via the company intranet. Updates to the policy are communicated internally, accompanied by relevant training and awareness programs. New hires undergo mandatory computer-based information security and data protection training, which is refreshed annually for all staff. Internal audit oversees compliance with the policy.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Agenda has a robust change management policy guided by ISO27001 best practices. Our well-established process integrates with our service management tool, streamlining change implementation, incident response, problem resolution, configuration, and knowledge management. Independent audits regularly verify the strength of our policy and procedures. We employ formal risk analysis utilising an approved methodology during the project analysis phase, ensuring security remains a top priority throughout every development or change.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Agenda's approach involves continuously identifying, prioritising, and remediating security weaknesses which is achieved through automated vulnerability scanning, regular penetration testing, and applying security patches promptly. By proactively managing vulnerabilities and adhering to best practices outlined in frameworks like the Cyber Security Centre guidance, we improve overall cyber resilience. The process is plugged into an automated patch and fix strategy, underpinned with a technology infrastructure to deliver corrective updates.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- We implement a proactive protective monitoring approach to safeguard our systems and data. This includes continuous surveillance of network activity, logs, and system configurations to detect potential anomalies or suspicious behavior. In the event of a potential compromise, our incident response procedure activates. This involves immediate containment measures, a thorough investigation to determine the root cause, and swift remediation actions. Our response times are dictated by the severity of the incident, with critical issues demanding immediate attention to minimize potential impact. We prioritize effective communication and reporting throughout the process, ensuring relevant stakeholders are informed and updated.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Our incident management process is designed for responsiveness and transparency. We have well-defined procedures for handling common events, ensuring swift resolution to minimise disruption. Users can report incidents conveniently through our service desk or directly to their account manager. Upon receiving a report, we initiate a thorough investigation. Throughout the process, we provide regular updates to the affected user and maintain detailed incident reports for both internal analysis and customer records upon request.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Equal opportunity
- Wellbeing
Fighting climate change
The company recognises that its operations have an impact on the environment and as such seeks to minimise this through the implementation of an Environmental Management System (EMS) aligned with the ISO 14001 Standard. The EMS and this policy apply to all company operations and are focused on delivering the following key objectives: Deliver continual improvement in our environmental performance; Prevent pollution and reduce our carbon footprint; Comply with applicable legal and other requirements; Minimise waste and avoid landfill through recycling; Use energy, water and other resources efficiently; Minimise travel and maximise fuel efficiency; and Apply these principles to our purchasing of equipment and materials. The above objectives are addressed and implemented by a series of focused targets and programmes linked to our identified significant environmental aspects.Covid-19 recovery
Our COVID-19 response prioritised our people, clients, and consumers, leveraging data insights to navigate the crisis effectively. We remain committed to this approach as we move towards recovery. We successfully transitioned our workforce to remote operations, and continue to prioritise flexibility with enhanced collaboration tools and well-being programs like mindfulness initiatives. Maintaining open communication channels, such as webinars and leadership updates, remains vital for fostering connection and support.Equal opportunity
At Agenda, we believe every member of our team deserves to feel valued, represented, and included. Agenda recognises that equal opportunities are essential to our company's success. We're committed to a workplace that respects and promotes equality. Our Equality, Diversity, and Inclusion policy outlines the responsibilities of both the company and our employees in ensuring fairness and creating a work environment free from discrimination. Our Bullying and Harassment policy reinforces our commitment to providing a workplace where everyone is treated with respect, free from harassment and bullying. All policies comply with the Equality Act 2010.Wellbeing
We are deeply committed to fostering a work environment that prioritises employee wellbeing. Our initiatives encompass physical and mental health support, work-life balance, and a culture of open communication to ensure our employees feel valued, supported, and empowered to thrive.
Pricing
- Price
- £49 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- No