Skip to main content

Help us improve the Digital Marketplace - send your feedback

TRANSUNION INTERNATIONAL UK LIMITED

TransUnion - Data Breach Solutions - TrueIdentity

Help minimise the risk following a data breach and build trust with data subjects using TrueIdentity from TransUnion, delivering Credit Report, Credit Alerts and Dark Web Monitoring to individuals whose personal data has been exposed. It helps monitor and detect signs of identity theft, as well as restore their identities.

Features

  • IDVerification: Confirm consumer is who they are claiming to be
  • Online Access: Mobile optimised access to TransUnion credit report
  • Credit Alerts: Email notifications of key changes to credit file
  • Credit Score: Access to the TransUnion credit score
  • Dark Web Monitoring: for exposed personal data
  • Credit Education: including, fraud victim assistance and identity protection
  • Cifas: TransUnion can facilitate a proactive registration with Cifas
  • Email Notification: TransUnion can facilitate the data breach notification
  • Postal Notification: TransUnion can facilitate the notification via post
  • Contact Centre: TransUnion can provide an emergency contact centre

Benefits

  • Helps to protect businesses from potential wider reputational damage
  • Reduce the likelihood of affected consumers suffering financial loss
  • Used as a mitigating factor in Information Commissioner’s Office investigations
  • Reduce the likelihood of successful compensation claims
  • Reduce the number of consumers lost and help repair trust
  • Reduce wider reputational damage
  • Available in 24-hours immediately helping reducing the reputational damage
  • Proactively available sitting within your incident response plan
  • Use our contact centre to reduce the workload
  • Allow us to facilitate the notification on your behalf

Pricing

£2.85 to £18.25 a unit

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at mark.pestereff@transunion.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

9 9 7 4 6 8 8 6 9 3 8 6 4 3 6

Contact

TRANSUNION INTERNATIONAL UK LIMITED Mark Pestereff
Telephone: 07773 212093
Email: mark.pestereff@transunion.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
Please refer to the Service Definition
System requirements
Web access requires internet browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
We have a range of SLA's depending on the nature and criticality of the ticket; full details can be agreed as part of any contract.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Telephone and Email support available for consumer access queries and credit report disputes
Support available to third parties
No

Onboarding and offboarding

Getting started
You will have access to our team of experts who will be available to help with the roll out of service. Our dedicated team are available to provide initial and ongoing support as required. This team will deliver bespoke FAQs and notification support.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
N/A
End-of-contract process
At point of contract ending or terminating, the service is closed down and access for registered users is prevented.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
User experience mobile optimised
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
No

Scaling

Independence of resources
Our platform is hosted in Microsoft Azure allowing us to easily scale out with the provision of additional nodes for the web and app tiers and scale up the database to meet capacity demands. High availability is supported by SQL AG for data and for the application we have load balanced servers that can scale out to meet demand and will fail over automatically to a DR site for resilience. We closely monitor the environment for visibility of potential bottlenecks in throughput to enable us to act proactively ahead of demand peaks and react quickly as required.

Analytics

Service usage metrics
Yes
Metrics types
Our standard report includes the following metrics. Additional reporting requirements can be considered upon request.

1. Number of Registrations
2. Number of Successful Registrations
3. Number of Registrations resulting in a 'thin file'
4. Number of Unsuccessful Registrations
5. Number of Activations
6. Number of Logins
7. Number of distinct logins
8. Number of first time logins
Reporting types
  • Regular reports
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Encryption of all physical media
  • Other
Other data at rest protection approach
• Strong logical access control. Access is given based on least privilege and a need to know basis.
• Protective monitoring and event management using LogRhythm as a SIEM.
• Sourcefire & Palo Alto IDS.
• Checkpoint firewalls.
• Monthly vulnerability scanning programme of work.
• ISO27001 and PCI DSS compliant.
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
N/A
Data export formats
Other
Data import formats
Other

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Other
Other protection between networks
Web Application Firewall, IP Safe Listing, SSH key Pairs (for automation), complex password policy, Threat Detection Service team
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
Data Loss Prevention, Privelleged Access Management, Data Encryption at Rest, SIEM Alerts and Monitoring, Anti-Virus and EDR, Firewalls and VPN's

Availability and resilience

Guaranteed availability
Our standard availability is 98.5%. We would be happy to discuss any specific availability requirements as appropriate.
Approach to resilience
We operated on an active / passive configuration, with passive being a 'warm stand-by.' Data is pushed to the passive servers on a high frequency (every 5 minutes) to ensure high data accuracy and consistency. Front end traffic manager it used to facilitate switching between sites as required.
Outage reporting
There is extensive error handling and reporting to provide early and detailed logs of any issues / errors. Additionally our Client Support Team would notify affected clients via email as appropriate.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Other
Other user authentication
Each user will have a unique username and password provided along with company name. TransUnion also utilises the control of IP white listing and 24/7 security monitoring.
Access restrictions in management interfaces and support channels
A policy of least privilege access is applied across the group to ensure employees only have access to what is required - this is regularly reviewed. Any privileged accounts are rigorously checked both prior to granting access, during use and on termination of permissions. Users come under multiple levels of policy regarding accounts and device usage. Networks are highly segmented with monitoring for inter-segment violations. Any sensitive systems are housed in dedicated secure environments.
Access restriction testing frequency
At least once a year
Management access authentication
Other
Description of management access authentication
Available on request

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
BSI
ISO/IEC 27001 accreditation date
29/05/2021
What the ISO/IEC 27001 doesn’t cover
A.14.1.3, A.14.1.2
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
Yes
Who accredited the PCI DSS certification
Payment Software Company, Inc. (DBAPSC)
PCI DSS accreditation date
02/08/2021
What the PCI DSS doesn’t cover
Full Report on Compliance (ROC) can be screen shared upon request
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
Cyber Essentials Plus
PCI DSS
Information security policies and processes
TU follows a dedicated Information Security Policy, as well as other processes such as data encryption and key management, secure application development etc.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
TU defined product development lifecycle, which includes various gates including budget, security and IT infrastructure. Small changes are captured within our internal ticketing system.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Internal scans are completed on a regular basis (Daily, Weekly, Monthly depending on the endpoint). All Critical findings must be addressed within 30 days, High/Medium 60 days and Moderate to low 90 days. Any findings that cannot meet these deadlines must have a risk acceptance review and a deadline agreed by the business.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Threat Detection Service, Data Loss Prevention team, Incident Management team - All monitoring 24/7/365
Incident management type
Supplier-defined controls
Incident management approach
NIST 800-61 and SANS PICERL

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Wellbeing

Wellbeing

TransUnion is a global information and insights company that makes trust possible in the modern economy. We do this by providing an actionable picture of each person so they can be reliably represented in the marketplace. As a result, businesses and consumers can transact with confidence and achieve great things. We call this Information for Good®.

A leading presence in more than 30 countries across five continents, TransUnion provides solutions that help create economic opportunity, great experiences, and personal empowerment for hundreds of millions of people:

Economic Opportunity – We help businesses find their best customers and determine the right ways to serve and keep them—through access to products and services that help them achieve their goals.
Great Experiences – We enable our customers to deliver friction-right experiences and relevant offers tailored to specific consumer needs, preferences, and patterns, while reducing risks posed by fraud.
Personal Empowerment – By extending tools, offers, and opportunities directly through businesses, we help more people understand and manage their financial situations, driving loyalty and cross-sell opportunities for our customers.

Pricing

Price
£2.85 to £18.25 a unit
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at mark.pestereff@transunion.com. Tell them what format you need. It will help if you say what assistive technology you use.