Lone Worker / Personal Safety Protection Services
Personal Safety Management service providing peace of mind for lone workers by providing access to a 24/7 monitoring centre at the push of a button from an App or dedicated device (ID or fob).
Operators are listening immediately with ability to escalate to emergency services faster than a 999 call.
Features
- Dedicated Device or Smartphone App & Panic Button
- Alarm Receiving Centre listening on push of a button
- Incapacitation feature for slips, trips or falls
- Ready2Talk: two way live operator chaperone for users anticipating risk
- Geolocation (GNSS / GPS) enabled
- Timers & Check in / Check out features
- WiFi calling for when you don't have a phone signal
- Workforce Safety Management portal for information & data management
- Cyber Essentials Plus accredited, personal information is secure
- Industry Accredited (BS8484, EN50518, ISO27001, ISO9001)
Benefits
- Fast connection time to ARC operator & fastest incident verification
- Guaranteed Level 1 Police Response for genuine incidents
- 4G devices ensuring future-proof service beyond 3G network closure
- Sophisticated business continuity for maximum availability of service
- Easy to use smartphone application/devices to raise discreet alarms
- Incapacitation feature creates alarms if user slips. trips. falls, etc
- Monitoring Timer supports low / no cellular coverage situations
- Maximise usage with detailed performance analytics and online tools
- Client data is protected in line with GDPR requirements
- Client support to maximise user engagement with the service
Pricing
£2.50 a unit a month
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 4 3 3 0 0 8 4 8 4 6 9 5 6 7
Contact
SOLOPROTECT LIMITED
Enquiries
Telephone: 01143996000
Email: info@soloprotect.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- No
- System requirements
-
- Smartphone (Android or iOS)
- Access to internet browser
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Customer Service available - 8am - 5.30pm Monday to Friday
Customer Service Calls answered within 7 seconds
48 hour response time for email tickets - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Customer support provided by a dedicated team (08:00 - 5:30pm).
Dedicated account management support available.
Key account management provided for large or complex deployments.
Alarm Receiving Centre for handling panic alarms available 24/7 & 365 days a year. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
We have a tried and tested, defined onboarding process that includes the following:
Training - choices of Webinar, Phone based, Online E-learning, 'train the trainer' superuser and face to face training, depending on deployment model required.
FAQ's - Access to Device specific or Customer Workforce Safety Management portal self help guides are available together with tutorials within the portal.
Customer Support - Phone and email based customer support delivered by a team of in house experts.
Documentation - Physical user guides and other marketing tools are available including quick reference guides and posters.
Online - Further support and guidance available via our Youtube channel and direct from our website. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
Users can export the majority of their data using SoloProtect Insights, any data not covered off in the exports provided can be requested via our customer call centre. The data below can be extracted from Insights:
- Users
- Groups
- Escalation Lists and Contacts
- Devices
- Analytical data - End-of-contract process
-
Our end of contract process comes at no cost at all. It is simply defined as part of the service.
Upon termination of the contract decommissioning will occur which will involve the removal/redaction of customer data. For any data which we are required to keep pursuant to legal and/or regulatory obligations, or data falling outside that process, such data is kept in line with our Retention Policy which can be found on our website, policies section.
Where devices are to be returned, our Customer Services Team work with your teams to arrange the collection of these.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Fully optimised
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
-
The service is managed via our Customer Workforce Safety Management portal called "Insights" which allows your organisation to add, change, delete user details, assign escalation contacts to users, update device or app information, assign devices to users, make devices live on the system, manage onboarding process including audit of online training completion / User & escalation data completion.
Additionally access detailed analytics for service performance including onboarding, usage and alarm reports, FAQ and help guides and online training.
An Insights Administration Service (Our Customer Services Team complete the above on your behalf) is available as an optional extra. - Accessibility standards
- None or don’t know
- Description of accessibility
-
The Customer Workforce Management portal is accessible via an internet browser which is also optimised for access on laptop, PC, smartphone and tablet.
Access is controlled according to user permissions (using Account ID, User ID and Group ID's) and is accessible by username and password authentication.
Users can access and update their own personal information.
Managers & System Administrators can assign app's/devices to users and update key details (escalation contacts etc) that support effective alarm handling. - Accessibility testing
- We use automated testing to test interfaces on a regular basis. We also have a Quality Assurance team who test interfaces separately as part of every update or release.
- API
- Yes
- What users can and can't do using the API
-
All current functionality within the interface can be performed using the API.
In order for a customer to use the API they would need to set up integration on their side (through the potential use of a third party plug in).
There are no limitations to changes. - API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Functions and features can be configured to suit our individual clients requirements.
Scaling
- Independence of resources
-
We have load balancers in place to adequately assess bandwidth of the service, ensuring continuity of service for users.
The service has a 99.999% uptime SLA in place which we adhere to.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Usage is split into three categories - Usage, Onboarding and Training Completion and Alarms.
1.Usage
Usage Ranking (high to low)
Latest Activity
Non Usage
Low Signal
Low Battery
Device with no user assigned
2.Onboarding and Training Completion
User Status
Trained
Untrained
Incomplete Profiles
3.Alarms
- Red Alerts
- Incapacitation Alerts
- False Alerts
Customer Support Metrics
All calls answered within 7 seconds
All emails responded to within 48 hours
ARC Metrics
Time to connect call to operator
Target = <5 secs
Current Actual = 4.1 secs
Time to verify
Target = 90 secs
Current Actual = 33.3 secs - Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Via Excel exports from within Insights - our Customer Workforce Safety Management platform.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Alarm Receiving Centre
Up Time Availability SLA = 99.999%
Insights - Customer Workforce Safety Management Portal SLA
Up Time Availability SLA = 99.999% - Approach to resilience
-
SoloProtect deploys multiple internet lines which run on diverse carriers through separate local exchanges.
Power is backed by highly available UPS’s and fuel-powered generator.
All internal equipment and servers are configured to be at least N+1 including firewalls, switches and servers.
Service uptime for the previous 12 months is 100%. - Outage reporting
-
Email alerts are sent in the unlikely event of any service outages as well as via our Insights Customer Portal.
Additionally, our dedicated Customer Success (Account Management) Team liaise directly with stakeholders in your business as required.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Access is restricted by separating user ID, Account ID and Group ID which are associated to each user in the platform. We also restrict access by defining 'user roles' which only allow access to certain areas of the platform.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QMS International
- ISO/IEC 27001 accreditation date
- 12/06/2021
- What the ISO/IEC 27001 doesn’t cover
- SoloProtect's ISO27001 scope covers the end to end supply of lone worker solutions and monitoring services.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- BS8484 - British Standard for Lone Working Device Services
- EN50518 - European Standard for Alarm Receiving Centres
- BS7858 - Security Screening of Staff
- ISO9001 - Quality Management Systems
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- We are also accredited to Cyber Essentials Plus.
- Information security policies and processes
-
As an ISO27001 certified organisation, SoloProtect maintains an holistic ISMS which provides the structure against which our various security policies and processes are governed. In addition, pursuant to our various sector specific accreditations (BS8484, EN505018, BS8591, BS7858) we also maintain a range of policies and procedures (both of a physical and information security nature) which are specific to our organisation.
The organisations technical risk committee consisting of our Managing Director, VP of Operations, Director of Software Development & IT Manager are responsible for overseeing the ISMS as well as various involvement from department heads in relation to policy and processes specific to their department.
The committee meets regularly with internal audits occurring once per quarter.
Finally, within the framework of ISO27001 and our secondary InfoSec accreditation (Cyber Essentials Plus) we undergo annual audit and penetration testing via tiger accredited third parties.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
We use a Service Management platform which includes Incident Management, Change Management, Operations Management and Asset Management.
Changes are raised by the IT team or from an Incident, and all changes must complete a checklist before approval; this checklist includes security & risk impacts. Approval is agreed by the IT Infrastructure team and changes are then planned & communicated to end users. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- We use an endpoint security platform to scan our internal infrastructure. Where patches are detected, these are installed within 14 days to meet the requirements of Cyber Essentials Plus. Potential threats are also detected from the NCSC’s Cyber Security Information Partnership, which SoloProtect is a member of.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- We use a Security Information and Event Management system which monitors traffic from core switches and collects log information from servers & applications. Any high or critical alerts are raised to the IT team who have a 4-hour SLA to investigate and resolve these alerts.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Incidents are raised by email or self-service portal to the IT service desk. All tickets have a service level contract assigned which includes both a response time and incident completion time. Incident reports can be supplied on demand.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
Our services offer your employees including lone workers the assurance that they have help on hand at any time, day or night, should their safety or welfare be threatened. This promotes greater confidence in the workforce but also greater levels of wellbeing outside of work as a result of reduced stress for the worker overall.
This provides peace of mind, reduced stress & anxiety and supports people with health conditions with confidence that they can be monitored when needed.
In turn, this can have a positive effect for the organisation through a workforce that feels more supported, where their safety & wellbeing is prioritised & can lead to reduced staff turnover, increased productivity and promotes social responsibility.
Pricing
- Price
- £2.50 a unit a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
-
We provide a full experience of the solution as part of any trial so that the entire service proposition can be experienced by any prospective clients.
Trials can be at cost, discounted or free depending on the scale & complexity of the requirement.