DS Voice

Available for multi-language and dialects;
DS Voice aligns to digital transformation/management of data.
Compared to time consuming, inaccurate & expensive traditional transcription, DS Voice transcribes/analyses audio automatically.
AI - Keywords & phrases are used to improve accuracy & integrate with I2 and others. Audits and logs meet requirements of MOPI


  • Available in multi language and dialect versions
  • Process, transcribe, analyse all types of video/audio automatically
  • AI: Keywords used to improve accuracy, alerts users to ‘hits’
  • Easy navigation to key areas between transcript/voice recording
  • Manage collections of voice files as part of a Case.
  • Share transcripts with investigation teams
  • Metrics based on keyword finding rather than transcript accuracy
  • Auditing and logging to meet requirements of MOPI


  • Manual version: DS Voice analyses audio, results available as files.
  • Automatic version: Voice files, keywords, meta data from other systems
  • Users can review/edit transcripts and keywords within DS Voice
  • Change automatically pushed back to other Force systems
  • DS Voice results may provide POLE data to other systems.
  • Ease of implementation:  Independent of complex integrations or costly IT
  • Competitively priced annual licence, supports essential forensic analytics, data compliance
  • Case Room features curated storage for templates, documents and material


£0.15 a unit a minute

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at bradley.geppert@ds-compliance.com. Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 13

Service ID

1 0 0 5 3 8 3 2 1 7 7 6 2 7 4


Telephone: 07989402074
Email: bradley.geppert@ds-compliance.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Cloud deployment model
  • Private cloud
  • Hybrid cloud
Service constraints
System requirements
  • Cloud based Service
  • API available for I2, Red Box and others

User support

Email or online ticketing support
Email or online ticketing
Support response times
Monday to Friday, 0700 to 2000 Allow upto 4 hours for response

Weekend rates are available
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
Frontline support inclusive. We supply all resources required by the client at an agreed investment
Support available to third parties

Onboarding and offboarding

Getting started
Onsite and online training
Service documentation
Documentation formats
End-of-contract data extraction
The data is entirely owned by the customer - we do not keep copies of any data.
End-of-contract process
A three year contract payable monthly or quarterly in advance; Includes registration, training and support.

Discounts available for all Police and Security agencies

Additional costs are only applicable with the explicit written agreement of all parties.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Service interface
User support accessibility
WCAG 2.1 A
Description of service interface
Once logged in users see a dashboard of their activity, progress and latest projects "cases" and audio alerts.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
None as yet.
What users can and can't do using the API
We can supply an API whereby all transcripts are listed, as well as keywords found can be shown to other systems.

This API is configurable to other systems.
API documentation
API sandbox or test environment
Customisation available
Description of customisation
Every installation requires some customisation, from white labelling to specific scenarios.
Different user scenarios require different structure of data and keyword lookups. For example a police force would use "case" and crime types, whereas a prison service merely has projects.
Every install we have created so far has a different method of getting audio in to our system, so that we can give back highlighted keywords.


Independence of resources
We are on demand cloud based.


Service usage metrics
Metrics types
The dashboard includes minutes used of audio as well as keywords found. This happens at all levels - per case or per whole police force.
Reporting types
Real-time dashboards


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
We are open to new requirements if needed.

Transcripts can be downloaded as Word docs.
Transcripts and found keywords can be shared with APIs
Data export formats
Other data export formats
  • Word doc (as requested by Police forces)
  • XML / JSON
Data import formats
  • CSV
  • Other
Other data import formats
  • API / Service
  • Folder (We can see if there are new audio files)

Data-in-transit protection

Data protection between buyer and supplier networks
Private network or public sector network
Data protection within supplier network
Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
Industry standard 99% uptime with backups and tested respawning as part of our PEN testing and ICO regime.
Approach to resilience
We use IBM Cloud based software with inherent backups and regular testing to show our live servers and data can be respawned
Outage reporting
The technical team get email alerts on realtime monitoring

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
There are no non-logged in users for our systems.

Each client so far has required their own 2 factor AUTH requirements, which we of course match.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Cyber essentials
Cyber essentials plus
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
We are aligned to ISO27001
Information security policies and processes
We follow all Information Security Policies recommended by ICO and in accordance with ISO standards.

We have an archive of 15 security policy documents including an Information Security Policy that indexes the others.

All staff are trained to contact the reporting officer for any incidents and a Risk Forum is conducted monthly.

All reports are enforced by training and updates.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All technology changes are tracked through our GDPR Dashboard, which offers Board level control over requests and the publishing and testing of new aspects.

on a day to day level we use GIT for all requests and code changes. Most importantly all code reviews and publishes also happen within GIT. Security audits are continual.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Many of our systems, including hosting and DDoS protection offer real-time, non human protection from malicious users and/or jurisdictions.

But if patches are required these are done within 24 hours on working days.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
We have alerts set at several levels for our systems.
At server level we have security alerts. We also have Error Tracker to monitor any failed requests, which usually include malicious attempts.
Most of all we use Cloudflare protection which offers "bad browser" human checking as well as additional checks from suspect users and/or jurisdictions.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
In accordance with our ISO alignment

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks

Social Value

Fighting climate change

Fighting climate change

Covid-19 recovery

Covid-19 recovery

Tackling economic inequality

Tackling economic inequality

Equal opportunity

Equal opportunity





£0.15 a unit a minute
Discount for educational organisations
Free trial available
Description of free trial
Two months trial period, no cost

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at bradley.geppert@ds-compliance.com. Tell them what format you need. It will help if you say what assistive technology you use.