IRS Pro (Incident Reporting System) - Security
IRS Pro gives you full control of recording, management and reporting of incidents across your business.
The easy to use, web based system is configurable, ensuring all information you require is captured correctly, quickly and securely.
Incidents can be recorded & updated out in the field and best evidence achieved.
Features
- Cloud hosted solution, access from anywhere, over 99.8% uptime
- Dashboard and Reports allow instant access to data
- Customisable forms, questions and drop downs
- Daily Log with Pinned Entries
- Intuitive and user friendly
- Notifications - send reports from the application
- Rapid deployment and up to 1 day training offered complimentary
- Create events and link these with incidents
- Log and Search for Lost Property
- Attach files, mark as sensitive and view audit logs
Benefits
- Greatly increase data quality
- Fast entry and accurate incident information
- Save time with custom saved reports you can rerun
- Traceability and auditability for debriefs and investigations
- No costs requesting changes from the supplier, make changes yourself
- Manage incidents on the go with access anywhere
- Setup notifications to keep informed & send emails to stakeholders
- Keep personal data safe with permissions and the PII flag
- Achieve best evidence and log debriefs in one place
- Ensure data integrity and security
Pricing
£22,900 to £30,900 a licence a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
3 9 6 4 6 4 1 2 9 5 3 9 7 4 7
Contact
MOTOROLA SOLUTIONS UK LIMITED
Donna Hopper
Telephone: 01455826400
Email: donna.hopper@3tcsoftware.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
-
We will perform regular software updates for this application which you will notified of prior to being pushed. These will not affect you operationally.
We can provide help and guidance, Monday to Friday 9am-5pm.
The cloud system will be installed and maintained by us.
All data is stored in the UK. - System requirements
- Latest versions of Chrome, Safari, Edge or Firefox
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Users will receive an automatic response immediately. They will then receive a response from the assigned engineer in as little as 15 minutes depending on the priority of the incident.
Support services are provided weekdays 9am-5pm as standard.
There is also a portal for users to view the status and update of any issues.
For full details, please see the attached T&Cs. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- No
- Support levels
-
Support Monday - Friday 9am-5pm is included in the cost via the following:
* Service desk
* Email
* Phone
* Online self-access portal
* Non-Technical Account Manager
* Escalation Process
For more information please see the T&Cs attached in this listing. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
We provide four hours which can be used for training and / or configuration of the system. This is included in the cost of the system.
We will provide:
• User guides for the Configuration and Administration pages
• ‘How To’ videos
Additional training, business analysis, or configuration assistance can be purchased if required. - Service documentation
- Yes
- Documentation formats
-
- Other
- Other documentation formats
- Word
- End-of-contract data extraction
-
We provide an export of all historical data the customer has.
The volume of data and time period will depend on the customer and whether they chose to remove any data after a set number of years.
At present, this will be an export of a MongoDB document database. This is an open-standards database, which tools are freely available from third-parties for you to import into your own MongoDB.
This export process may change from time-to-time. - End-of-contract process
- An export of the data stored is included as part of our service in the licencing cost.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
The solution is mobile responsive. It is currently accessed via the browser on the mobile device.
Most core functionality is the provided excluding the administrative and configuration features which are best used on a desktop/laptop. - Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
-
API is available at request, we will require any third parties to sign our NDA.
The API provides access to create records and to modify existing records through the open standards GraphQL interface.
The exact functionality is limited by the individual user permissions and by the scope of your contract.
The API is secured using HTTPS. - API documentation
- Yes
- API documentation formats
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
IRS Pro comes with a configuration page. This allows authorised users within the system to fully configure the solution. This includes:
• Create custom incident forms depending on incident type
• Questions can be added, removed or edited and bet set to display
conditionally
• Mark questions as mandatory or optional
• Add new locations, officers, incident types, status'
• Flag questions with personally identifiable information for
anonymisation
• Create and save custom reports
• User Admin – add/remove/edit users and permissions within the system
• Set rules for notifications in 'my preferences' within your account
Scaling
- Independence of resources
-
Each customer’s data is held entirely separately in its own database. The database resources are scaled to meet demand on a per-customer basis. Another customer’s usage does not adversely affect your system performance.
The web application, API and associated services are scaled to meet demand. When service demand meets thresholds, capacity in the system is increased to meet the demand. If the capacity is increased to meet the additional load from one-or-more customers, all customers benefit from the increased capacity.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
Data can be exported via:
* Lists of incidents, lists of events in CSV format
* Output of reports (searches) in CSV format
* Individual incidents via PDF
At end-of-service, via:
* Database export (as described in the off-boarding section) - Data export formats
-
- CSV
- Other
- Other data export formats
- Data import formats
-
- CSV
- Other
- Other data import formats
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Minimum of 99.8% assured by contractual commitment.
- Approach to resilience
-
The system is hosted on Azure and benefits from the resilience services available on Azure. The system also has resilience designed and built into the architecture.
Further information available on request. - Outage reporting
- Email alerts are sent out by our Support and Delivery team to all affected customers if the situation is servicing affecting and cannot be immediately resolved.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
Administrators are required to login to the application with valid credentials. In order to configure the system, they must have the relevant privileges for the task they are wanting to perform. These privileges must have been granted to them by another administrator, or by 3tc Software.
Support channels are accessed separately from the application. Only users invited by 3tc Software can access the support site. Access is controlled by authentication and authorisation (minimum of username and password). - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- Less than 1 month
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QMS International
- ISO/IEC 27001 accreditation date
- 11/04/2012 Original. Current Certificate Expiry 10/04/2025
- What the ISO/IEC 27001 doesn’t cover
- Azure Hosting Platform
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- ISO9001:2015
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
ISO 27001 certification maintained.
CTO and ICT department manage security and handle security incidents in conjunction with HR.
Audits are held regularly, staff are trained on security policies.
Security incidents are logged, investigated and appropriate action (potentially disciplinary action) taken.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
System/Platform changes are tracked in a CCL (Change Control Log) and given a unique ID code, prefixed with an abbreviation of the customer’s name. They are also tracked within our ServiceDesk call tracking system.
If we need to make a change to configuration or code, we will submit a CCF (Change Control Form) to the customer, as notification and to gain approval.
Each of these forms will include a risk assessment and a security risk assessment, taking into account security standards such as ISO 27001.
Assessments of this type, will be carried out by our engineering and development teams, together. - Vulnerability management type
- Undisclosed
- Vulnerability management approach
-
Vulnerabilities are reviewed weekly as part of the ICT function.
Relevant vulnerabilities are raised with the product team, and an assessment made on the applicability, risk and impact.
If an OS level threat is discovered, a patch can be built into the system and re-deployed to the live environment in less than one hour (to include smoke testing at each level).
Information about potential threats is collated by the ICT team. - Protective monitoring type
- Undisclosed
- Protective monitoring approach
-
Potential compromises are recognised either through the security products automatically reporting issues, customer reported issues or by assessments by our support and delivery team.
We respond in line with our current ISO 27001 policy including our BC and DR plans.
Incidents are responded to in line with the severity and likelihood of the event occurring. If a suspected compromise of security is identified, we are likely to respond immediately by taking the affected part of the system out of service and analysing the issue. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Users can report issues via Email, Phone or via a Customer Portal.
Our Support Desk is comprised of engineers who specialise in different fields of 3tc Software. This team structure allows us to offer support at a high level across 1st 2nd and 3rd line support tiers.
We use pre-defined processes for events such as quotes, software configuration, and Software Upgrades. Our highly skilled engineers remove the need for scripted support processes.
We have means of automatically generating standard reports, including SLA figures for open/closed calls.
In the near future these reports will be available via our Customer Portal.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
3tc Software Limited is committed to both the protection of the environment and evaluating the impact that the organisation’s services can have. We recognise that we have a responsibility to the environment beyond legal and regulatory requirements and are, therefore, committed to reducing our environmental impact and continually improving our environmental performance as an integral part of our business strategy and operating methods, with regular review points. We will encourage customers, suppliers, and other stakeholders to do the same.
3tc Software is also aware of its responsibilities in relation to the wellbeing of its employees in providing a suitable environment in which to work and operate. Therefore, this policy also reflects the importance of environmental concerns and issues relating to the workplace and the protection and welfare of its employees, visitors and other persons who may be affected.
The objectives for the Company under this policy are to:
1. Reduce the carbon footprint of the business.
2. Reduce energy consumption.
3. Minimise the production of all types of waste, especially paper. Encourage reuse, recycling and the disposal of other waste that cannot be avoided, in a responsible manner.
4. Create the grounds for best environmental practices that individuals can not only adhere to whilst working but then can reproduce these at home and transmit to their family and friends.
Energy and water
Turning off the lights in the office in the evening or on a bright sunny day, slightly lowering the heating or the air conditioning or taking devices off the plugs when it’s not needed are some good actions that we, as a Company and us as an individual, can implement. Moreover, by paying more attention to other daily routine actions, we can slightly reduce our energy consumption and, thus, our impact on the climate.
Pricing
- Price
- £22,900 to £30,900 a licence a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- We offer a 30 trial setup of IRS Pro, please contact us to to utilise this. This is a fully functional version of the software that is accessed via a web URL. Upon 30 days the trial will end unless a purchase order is raised.