As a leading provider of information, Experian takes its Data Protection and Information Security responsibilities very seriously. As such, it is imperative that our clients fully understand and adhere to both the internet security requirements and best practice guidelines below.
Experian fully supports and implements practices that protect the confidential nature of the information in our databases and respects consumers' right to privacy. Therefore, only companies that are approved members of our services ("Clients") and have permissible purpose for obtaining credit information and other reports are permitted access to the Experian applications, which provide access to this restricted data.
There are 4 key client roles within Experian’s client access management framework:
Notes:
Role | Responsibility | Frequency |
---|---|---|
End Users |
Note: End users must access Experian systems using their own named user IDs. The sharing of user IDs is not permitted. |
|
Authorised Signatories |
|
|
Security Designates |
|
|
Security Reviewers |
|
|
The following recommendations should be communicated and adhered to by all users:
Passwords/passphrases dos & don’ts:
Do:
Do not:
The SLA for access requests in currently 5 working days. The most efficient way to submit an access request is to send it via e-mail to client.supportolcs@uk.experian.com and include the words “User” or “Access” in the e-mail subject line.