Turn2us Intermediaries User Guide - Key features of intermediary accounts
- Last reviewed 01 September 2023
Key features of intermediary accounts
There are features that are only available to people who have an intermediary account. Intermediaries can access the My Turn2us area of the website.
Manage Clients and Calculations
You can search for an existing client; add a new client or update/change client details. View and download previous client calculations (made less than six months ago).
Sometimes your client will want to know how their income will be affected by changes of circumstances.
You can now create and save unlimited calculations and compare up to six calculations (scenarios) per client. You can find out which scenario gives the client the most income by using our comparison graph and table tool.
Some charitable funds on Turn2us Grants Search can only be accessed via an application from an intermediary. These funds do not appear on the public part of the Grants Search. However, registered intermediaries who have a My Turn2us account can view this information when logged in.
Turn2us direct grant-giving funds
Turn2us has three grant-giving funds to help people on low incomes who meet certain qualifying rules:
Confidentiality and data protection
Our website uses an SSL certificate which makes sure that there is an encrypted connection between the web browser and the server. This means that any personal information that's entered on the website is encrypted when being transferred to the web server.
We have carried out penetration testing where we get a third party company to attempt to hack the website. They report back if there are any vulnerabilities in the site (which there are none).
Passwords are all encrypted within our database which means that even if someone were to access the database, they would not be able to read someone's password.
Protection against cyber attacks/hackers
We have a firewall on our web server which is designed to inspect incoming traffic, weed out any malicious attacks and provides a first line of defence between a potential hacker and the data that we are hosting.