TransUnion - Data Breach Solutions - TrueIdentity
Help minimise the risk following a data breach and build trust with data subjects using TrueIdentity from TransUnion, delivering Credit Report, Credit Alerts and Dark Web Monitoring to individuals whose personal data has been exposed. It helps monitor and detect signs of identity theft, as well as restore their identities.
Features
- IDVerification: Confirm consumer is who they are claiming to be
- Online Access: Mobile optimised access to TransUnion credit report
- Credit Alerts: Email notifications of key changes to credit file
- Credit Score: Access to the TransUnion credit score
- Dark Web Monitoring: for exposed personal data
- Credit Education: including, fraud victim assistance and identity protection
- Cifas: TransUnion can facilitate a proactive registration with Cifas
- Email Notification: TransUnion can facilitate the data breach notification
- Postal Notification: TransUnion can facilitate the notification via post
- Contact Centre: TransUnion can provide an emergency contact centre
Benefits
- Helps to protect businesses from potential wider reputational damage
- Reduce the likelihood of affected consumers suffering financial loss
- Used as a mitigating factor in Information Commissioner’s Office investigations
- Reduce the likelihood of successful compensation claims
- Reduce the number of consumers lost and help repair trust
- Reduce wider reputational damage
- Available in 24-hours immediately helping reducing the reputational damage
- Proactively available sitting within your incident response plan
- Use our contact centre to reduce the workload
- Allow us to facilitate the notification on your behalf
Pricing
£2.85 to £18.25 a unit
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
9 9 7 4 6 8 8 6 9 3 8 6 4 3 6
Contact
TRANSUNION INTERNATIONAL UK LIMITED
Mark Pestereff
Telephone: 07773 212093
Email: mark.pestereff@transunion.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- Please refer to the Service Definition
- System requirements
- Web access requires internet browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We have a range of SLA's depending on the nature and criticality of the ticket; full details can be agreed as part of any contract.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Telephone and Email support available for consumer access queries and credit report disputes
- Support available to third parties
- No
Onboarding and offboarding
- Getting started
- You will have access to our team of experts who will be available to help with the roll out of service. Our dedicated team are available to provide initial and ongoing support as required. This team will deliver bespoke FAQs and notification support.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- N/A
- End-of-contract process
- At point of contract ending or terminating, the service is closed down and access for registered users is prevented.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- User experience mobile optimised
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- Our platform is hosted in Microsoft Azure allowing us to easily scale out with the provision of additional nodes for the web and app tiers and scale up the database to meet capacity demands. High availability is supported by SQL AG for data and for the application we have load balanced servers that can scale out to meet demand and will fail over automatically to a DR site for resilience. We closely monitor the environment for visibility of potential bottlenecks in throughput to enable us to act proactively ahead of demand peaks and react quickly as required.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Our standard report includes the following metrics. Additional reporting requirements can be considered upon request.
1. Number of Registrations
2. Number of Successful Registrations
3. Number of Registrations resulting in a 'thin file'
4. Number of Unsuccessful Registrations
5. Number of Activations
6. Number of Logins
7. Number of distinct logins
8. Number of first time logins - Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Encryption of all physical media
- Other
- Other data at rest protection approach
-
• Strong logical access control. Access is given based on least privilege and a need to know basis.
• Protective monitoring and event management using LogRhythm as a SIEM.
• Sourcefire & Palo Alto IDS.
• Checkpoint firewalls.
• Monthly vulnerability scanning programme of work.
• ISO27001 and PCI DSS compliant. - Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- N/A
- Data export formats
- Other
- Data import formats
- Other
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- Other
- Other protection between networks
- Web Application Firewall, IP Safe Listing, SSH key Pairs (for automation), complex password policy, Threat Detection Service team
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- Other
- Other protection within supplier network
- Data Loss Prevention, Privelleged Access Management, Data Encryption at Rest, SIEM Alerts and Monitoring, Anti-Virus and EDR, Firewalls and VPN's
Availability and resilience
- Guaranteed availability
- Our standard availability is 98.5%. We would be happy to discuss any specific availability requirements as appropriate.
- Approach to resilience
- We operated on an active / passive configuration, with passive being a 'warm stand-by.' Data is pushed to the passive servers on a high frequency (every 5 minutes) to ensure high data accuracy and consistency. Front end traffic manager it used to facilitate switching between sites as required.
- Outage reporting
- There is extensive error handling and reporting to provide early and detailed logs of any issues / errors. Additionally our Client Support Team would notify affected clients via email as appropriate.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Other
- Other user authentication
- Each user will have a unique username and password provided along with company name. TransUnion also utilises the control of IP white listing and 24/7 security monitoring.
- Access restrictions in management interfaces and support channels
- A policy of least privilege access is applied across the group to ensure employees only have access to what is required - this is regularly reviewed. Any privileged accounts are rigorously checked both prior to granting access, during use and on termination of permissions. Users come under multiple levels of policy regarding accounts and device usage. Networks are highly segmented with monitoring for inter-segment violations. Any sensitive systems are housed in dedicated secure environments.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Other
- Description of management access authentication
- Available on request
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- BSI
- ISO/IEC 27001 accreditation date
- 29/05/2021
- What the ISO/IEC 27001 doesn’t cover
- A.14.1.3, A.14.1.2
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- Payment Software Company, Inc. (DBAPSC)
- PCI DSS accreditation date
- 02/08/2021
- What the PCI DSS doesn’t cover
- Full Report on Compliance (ROC) can be screen shared upon request
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
-
Cyber Essentials Plus
PCI DSS - Information security policies and processes
- TU follows a dedicated Information Security Policy, as well as other processes such as data encryption and key management, secure application development etc.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- TU defined product development lifecycle, which includes various gates including budget, security and IT infrastructure. Small changes are captured within our internal ticketing system.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Internal scans are completed on a regular basis (Daily, Weekly, Monthly depending on the endpoint). All Critical findings must be addressed within 30 days, High/Medium 60 days and Moderate to low 90 days. Any findings that cannot meet these deadlines must have a risk acceptance review and a deadline agreed by the business.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Threat Detection Service, Data Loss Prevention team, Incident Management team - All monitoring 24/7/365
- Incident management type
- Supplier-defined controls
- Incident management approach
- NIST 800-61 and SANS PICERL
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
TransUnion is a global information and insights company that makes trust possible in the modern economy. We do this by providing an actionable picture of each person so they can be reliably represented in the marketplace. As a result, businesses and consumers can transact with confidence and achieve great things. We call this Information for Good®.
A leading presence in more than 30 countries across five continents, TransUnion provides solutions that help create economic opportunity, great experiences, and personal empowerment for hundreds of millions of people:
Economic Opportunity – We help businesses find their best customers and determine the right ways to serve and keep them—through access to products and services that help them achieve their goals.
Great Experiences – We enable our customers to deliver friction-right experiences and relevant offers tailored to specific consumer needs, preferences, and patterns, while reducing risks posed by fraud.
Personal Empowerment – By extending tools, offers, and opportunities directly through businesses, we help more people understand and manage their financial situations, driving loyalty and cross-sell opportunities for our customers.
Pricing
- Price
- £2.85 to £18.25 a unit
- Discount for educational organisations
- No
- Free trial available
- No