Critical View®
Critical View® is part of our 4G Range Body Worn Video Systems. Critical View® cloud server managed Live Video Transmissions, File Uploading, Mapping & Push to Talk.
Features
- Live Remote Viewing
- Live HD Video Feed over Wi-Fi/4G
- Body Worn Video Footage extraction
- SOS Button Reporting
- Mapping with Track Replay
Benefits
- The latest generation of Body Worn Camera with Live Streaming
- Control Rooms & Dispatchers have a live view on situations
- Manage secure footage remotely in a few presses
- Provides secure access with User Privileges
Pricing
£385.00 to £476.00 a device
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 2 6 1 1 0 1 9 0 1 2 5 0 8 6
Contact
RADIO COMMZ UK LTD
Steven Moore
Telephone: 08006890601
Email: steven.moore@radiocommz.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- Server maintenance is completed 04:00 once Per Week - Duration of maintenance = Offline for 4 Minutes.
- System requirements
-
- Windows OS
- Android
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Response times are provided within the SLA.
SLA 0: Out of Hours 24/7 Support Line
SLA 1: 4 Hours
SLA 2: 8 Hours
SLA 3: 12 Hours - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- Livechat System
- Onsite support
- Yes, at extra cost
- Support levels
- We provide a full setup of the Software on each device it is required. We use OTA software updates. We work fully with Local Authorities & Government organisations to ensure the required ports of open to allow our software to function correctly.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Depending on Project Size, Large Projects with a high user number are provided with onsite training in addition to online training.
All project sizes receive online training & user documentation. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
All Secure Video Footage is held on either the Device or the Control Room/Dispatcher system or an internal server within their own organisation it has been stored within.
Once a contract ends we simply Delete the User Structure with removes all aspects of Data within the Organisation created. - End-of-contract process
- Within the Critical View® range, we provide Full Software which provides the management of the Live Transmission and OTA File Transfer. If the contract comes to an end it is a simple process that incurs no further costs.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Application to install
- Yes
- Compatible operating systems
-
- Android
- Windows
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The Desktop Application is designed for Control Rooms & Dispatchers. The Android Application is standard without various User Access Rights.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
- User Authority Dependent - Allows the use of Enrolling new devices, Modifying Settings on devices, Modifying Username & Passwords, Extracting Video Evidence & Audit Data.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- None
- API
- Yes
- What users can and can't do using the API
- This is modified based on each user's rights. Senior users can modify the API from the Windows Manager software.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- Organisation Structure, Custom Device Names, User Logins & Passwords, User Rights & GPS Schedule
Scaling
- Independence of resources
- At the start of the contract, a full plan is created based on the level of users which are going to be required within the organisation. In the event of any doubts of the volume of users affecting other users the plan is to ensure the Server is solely for that organisation or upgrade existing servers prior to the contract commencing.
Analytics
- Service usage metrics
- Yes
- Metrics types
- User Auditing Logging System provided full details of Login, Emergency SOS, GPS, Live Remote Viewing & File Extraction
- Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- With Critical Views® Monitoring Software users have the ability to complete a full extraction of available data to a PC/Server of their choice.
- Data export formats
- Other
- Other data export formats
-
- .MP4
- .AVI
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
Our SLA is for 99.9% uptime.
Refund Amounts:
Less than 99.9% but equal to or greater than 99.0% = 10%
Less than 99.0% but equal to or greater than 95.0% = 30%
Less than 95.0% = 100% - Approach to resilience
- Available on request
- Outage reporting
- All outages are reported by the server management team and do monitor all core aspects of the system, email alerts are provided.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Other
- Other user authentication
-
Username & Password
Authorised Device
Server IP & Required Port - Access restrictions in management interfaces and support channels
- User Rights Management system
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- OVHCloud provided the full security data on the servers provided to us.
- Information security policies and processes
- We do not process these policies in house.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- N/A
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- N/A
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- N/A
- Incident management type
- Supplier-defined controls
- Incident management approach
- N/A
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Tackling economic inequalityTackling economic inequality
Support innovation and disruptive technologies throughout the supply chain to deliver lower cost and/or higher quality goods and services
Pricing
- Price
- £385.00 to £476.00 a device
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Full Access to Mobile Application & Windows Application - 10 Days.