DS Voice
Available for multi-language and dialects;
DS Voice aligns to digital transformation/management of data.
Compared to time consuming, inaccurate & expensive traditional transcription, DS Voice transcribes/analyses audio automatically.
AI - Keywords & phrases are used to improve accuracy & integrate with I2 and others. Audits and logs meet requirements of MOPI
Features
- Available in multi language and dialect versions
- Process, transcribe, analyse all types of video/audio automatically
- AI: Keywords used to improve accuracy, alerts users to ‘hits’
- Easy navigation to key areas between transcript/voice recording
- Manage collections of voice files as part of a Case.
- Share transcripts with investigation teams
- Metrics based on keyword finding rather than transcript accuracy
- Auditing and logging to meet requirements of MOPI
Benefits
- Manual version: DS Voice analyses audio, results available as files.
- Automatic version: Voice files, keywords, meta data from other systems
- Users can review/edit transcripts and keywords within DS Voice
- Change automatically pushed back to other Force systems
- DS Voice results may provide POLE data to other systems.
- Ease of implementation: Independent of complex integrations or costly IT
- Competitively priced annual licence, supports essential forensic analytics, data compliance
- Case Room features curated storage for templates, documents and material
Pricing
£0.15 a unit a minute
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
1 0 0 5 3 8 3 2 1 7 7 6 2 7 4
Contact
DSI COMPLIANCE LIMITED
Bradley Geppert
Telephone: 07989402074
Email: bradley.geppert@ds-compliance.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- I2
- Cloud deployment model
-
- Private cloud
- Hybrid cloud
- Service constraints
- None
- System requirements
-
- Cloud based Service
- API available for I2, Red Box and others
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Monday to Friday, 0700 to 2000 Allow upto 4 hours for response
Weekend rates are available - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Frontline support inclusive. We supply all resources required by the client at an agreed investment
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Onsite and online training
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- The data is entirely owned by the customer - we do not keep copies of any data.
- End-of-contract process
-
A three year contract payable monthly or quarterly in advance; Includes registration, training and support.
Discounts available for all Police and Security agencies
Additional costs are only applicable with the explicit written agreement of all parties.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
- Once logged in users see a dashboard of their activity, progress and latest projects "cases" and audio alerts.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- None as yet.
- API
- Yes
- What users can and can't do using the API
-
We can supply an API whereby all transcripts are listed, as well as keywords found can be shown to other systems.
This API is configurable to other systems. - API documentation
- No
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
Every installation requires some customisation, from white labelling to specific scenarios.
Different user scenarios require different structure of data and keyword lookups. For example a police force would use "case" and crime types, whereas a prison service merely has projects.
Every install we have created so far has a different method of getting audio in to our system, so that we can give back highlighted keywords.
Scaling
- Independence of resources
- We are on demand cloud based.
Analytics
- Service usage metrics
- Yes
- Metrics types
- The dashboard includes minutes used of audio as well as keywords found. This happens at all levels - per case or per whole police force.
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
-
We are open to new requirements if needed.
Transcripts can be downloaded as Word docs.
Transcripts and found keywords can be shared with APIs - Data export formats
- Other
- Other data export formats
-
- Word doc (as requested by Police forces)
- XML / JSON
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- API / Service
- Folder (We can see if there are new audio files)
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- Industry standard 99% uptime with backups and tested respawning as part of our PEN testing and ICO regime.
- Approach to resilience
- We use IBM Cloud based software with inherent backups and regular testing to show our live servers and data can be respawned
- Outage reporting
- The technical team get email alerts on realtime monitoring
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
There are no non-logged in users for our systems.
Each client so far has required their own 2 factor AUTH requirements, which we of course match. - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We are aligned to ISO27001
- Information security policies and processes
-
We follow all Information Security Policies recommended by ICO and in accordance with ISO standards.
We have an archive of 15 security policy documents including an Information Security Policy that indexes the others.
All staff are trained to contact the reporting officer for any incidents and a Risk Forum is conducted monthly.
All reports are enforced by training and updates.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
All technology changes are tracked through our GDPR Dashboard, which offers Board level control over requests and the publishing and testing of new aspects.
on a day to day level we use GIT for all requests and code changes. Most importantly all code reviews and publishes also happen within GIT. Security audits are continual. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Many of our systems, including hosting and DDoS protection offer real-time, non human protection from malicious users and/or jurisdictions.
But if patches are required these are done within 24 hours on working days. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
We have alerts set at several levels for our systems.
At server level we have security alerts. We also have Error Tracker to monitor any failed requests, which usually include malicious attempts.
Most of all we use Cloudflare protection which offers "bad browser" human checking as well as additional checks from suspect users and/or jurisdictions. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- In accordance with our ISO alignment
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
N/A - Covid-19 recovery
-
Covid-19 recovery
N/A - Tackling economic inequality
-
Tackling economic inequality
N/A - Equal opportunity
-
Equal opportunity
N/A - Wellbeing
-
Wellbeing
N/A
Pricing
- Price
- £0.15 a unit a minute
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Two months trial period, no cost