PROFix - Secure - PACE compliant - Digital Interview Recording Solution
PROFix solution is an automated, PACE compliant, Digital Interview Recording solution. PROFix securely records a multi-person, multi-language meeting (Witness / Suspect) and provides a tamperproof, verbatim, and court-ready transcript. Each utterance is time-indexed and speaker tag-identified. Compliant to MG15 and ROTI standards.
Features
- Digital Interview Recording (PACE compliant)
- Multi person recording, multi language translation, high degree of accuracy
- Powerful recording features including attributable voice, video and notes
- Real time note, bookmarking, ability to attach documents and links
- Configure standard interviews and/or prompts to provide court ready transcripts
- Cloud based software uses off-the-shelf hardware. Low Cost of Ownership
- Numerous configurable reporting functions
- Enhanced search facilities including linked interviews, Full Analytics Suite available.
- Smart forms for interview capture processing, workflows automate content handling
- Trend analysis, content co-referencing, proximity word searching, comparative sentiment analysis
Benefits
- Records conversations in multiple languages. Auto transcription and translation
- Configurable SaaS. Conforms to ISO Standards. Secure. Tamperproof.
- Secure setup. Easy to use and understand. PEACE/ ROTI Compliant.
- Police and Criminal Evidence Act 1984 (PACE), court ready transcripts
- Transcript includes: text and video clips, notes and reference documents
- Complex searches find trends, related information and comparative sentiment analysis
- Management interface can be tailored to your reporting requirments
- Workflows, prompts and questions can be defined ensuring uniform interviewing
- Off site recording possible
- Fast and secure Digital Interview Recording with far ranging uses
Pricing
£39.95 to £425.00 a licence a month
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
4 1 7 7 2 3 9 2 5 2 3 3 2 5 6
Contact
VoiceScript Technologies Ltd.
Customer Care Team
Telephone: 02033978426
Email: Admin@voicescripttech.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
-
Users will receive a completed transcript with very high levels of accuracy with all original utterances embedded behind the text in the transcript.
The system is hardware agnostic and not tied to a specific vendor.
Windows (ver 10 preferred) device is the minimum specification requried. - System requirements
-
- PC or laptop with Windows (10 preferred) for system usage
- Off the shelf microphones and video cameras compatible
- Secure connectivity to a Cloud service (SFTP, VPN, Encryption)
- Can be ON-PREM (behind your firewall).
- Unified UI usage - Training is easy and rapidly deployed
- May be used on current hardware - no upgrading required.
- Compliant to Industry Standards in Hosting and Security
- Central monitoring on Secure Web-based Dashboard
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
We respond as quickly as possible and usually within one day. Under our support contract our 24/7/365 service desk will resolve all urgent issues within 48 hours.
We have a comprehensive Service Level Agreement addendum to all Service Engagements that help to determine the severity of an issue - coupled with contracted response times and resolution windows. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- We have the ability to initiate a WEBCHAT from the secure Dashboard (accessible only by Customers).
- Web chat accessibility testing
-
We have not tested this with assistive technology Users.
WEBCHAT providers offer many accessibility configuration choices - we foresee no issues on implementing this to any / all customers. - Onsite support
- Yes, at extra cost
- Support levels
- An account manager is assigned to each client. They are extensively trained and ensure that technical support is provided rapidly and concisely. Their KPI measurement is focussed on getting the client's software working as quickly as possible. Should a complex issue arise we have skilled technicians who provide second level support.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- VST will install the software quickly and to the client's convenience. Once installed, on site training is provided to the users and the system manager. There are prompts and support text within the software. This training is included within the system installation costs.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- Other
- Other documentation formats
-
- Prompts and support within the software
- Online WEBHELP
- Specific Web Portals with instruction videos
- Custom PDF and PPT files for
- Training materials in PowerPoint and PDF formats
- Online classes and in-room classes
- End-of-contract data extraction
- Transcripts are saved on the client's database and become their property. The default format is PDF, MPG, MP3, TXT, MS Word, DOCX and JSON - that means it can be viewed without the VST software and may be extracted to an alternative application.
- End-of-contract process
- Access to the transcribing, reporting and search facilities are provided via the software on the PC that is in turn connected to our Cloud based software. At the end of the contract, access to this SaaS is removed. The client retains access to their previous transcripts that are stored on their client database.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Windows
- Other
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- User interface is a feature rich "client" that captures audio, video, text, notes, snippets, photographs, images, CCTV footage and multiple audio channels (in different languages if so desired). During an interview a fully interactive workflow, (with Q&A, Minutes, Agenda, Actions) can be tracked as well as references to internal and external resources (Internal Policy Documents / External URL and Google pages). A full Reporting function provides complex situational searches, standard reports and customised searches and reports.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Service accessed via a standard keyboard. Voice is captured via one or more, off the shelf microphones that are appropriate to the environment. Video is captured via one or more off the shelf video cameras. Data is transferred to the Cloud and is then transcripts automatically sent to the client's database where it is accessible via the management interface on the PC. The PC keyboard can be configured for accessibility by most users.
- Accessibility testing
- We have not had to undertake any interface testing.
- API
- Yes
- What users can and can't do using the API
-
API access is via agreed upon data-sharing / application sharing parameters. Our software stack allows for several different and varied entry-points, as well as a "operate in isolation' mode as well.
Changes to data adhere to a strict data restriction model - as our system maintains a clear and tamper-proof evidence handling chain. Nonetheless, APIs can be used to trigger events, interrogate databases and provide top-level management dashboards with updated content.
The process to initiate and use an API is easy and requires minimal guidance from our in-house support team. - API documentation
- No
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Clients can add the following to the interview capture: workflow, standard and/or required questions, prompts,customised forms notes and data links, participants, roles, note categories. To the reporting: standard and customisable reports, link interviews. To the searches: standard and customisable searches. To transcription: from multiple languages and speakers. To Translation: to/from over 60 languages. The system manager has complete and secure control over configurations and the content and its distribution.
Scaling
- Independence of resources
- Each account is 'siloed' so that they have their own individual service. At the start of the service each client provides their anticipated volumes - The service automatically scales and monitors usage to ensure that any increase / reduction of service is efficiently processed by the underlying technology. Independent, Secure and Private Scale-On-Demand.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
We monitor usage in a variety of cases;
- Duration of Meetings / Interviews
- Quantity of Meetings / Interviews
- Languages Spoken, Transcribed into, Translated to/from - Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- All transcriptions are sent to the client's database in their preferred format. MP3, MPG, PDF, JSON and TEXT are the default formats. Other formats available - per customer request. Data is thus readily available outside of the VST software. Immediately after the Interview, the client may securely download the audio portion of the Interview and save it to a local device (USB Card / DVD Drive / Secure Folder / Public Folder / SFTP Service / Private Portal) or their own database.
- Data export formats
-
- CSV
- ODF
- Other
- Other data export formats
-
- MP3
- MS Word
- RTF
- XML
- MPG
- JSON
- ODF
- CSV
- User Defined
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- MP3
- Ms Word - DOC, DOCX
- Text (ASCII)
- RTF
- XML
- JSON
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
- Data protection within supplier network
-
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
-
We guarantee that Apps running in a customer subscription will be available 99.95% of the time.
If we do not achieve and maintain the Service Levels for each Service as described in agreed SLAs then users/organisation may be eligible for a credit towards a portion of their monthly service / hosting fees.
We will evaluate all information reasonably available to us and make a good faith determination of whether a Service Credit is owed. We will use commercially reasonable efforts to process claims during the subsequent month and within forty-five (45) days of receipt.
Certain Limitations Apply.
Monthly Uptime Percentage = (Maximum Available Minutes-Downtime)/(Maximum Available Minutes) x 100
If the Monthly Uptime Percentage is < 99.95% a service credit of 10% may apply.
If the Monthly Uptime Percentage is < 99% a service credit of 25% may apply. - Approach to resilience
-
Our solution (when hosted in an Azure datacenter) is considered High availability and we Maintain acceptable continuous performance despite temporary failures in services, hardware, datacenters, or fluctuations in load.
Protection against loss of an entire region through asynchronous replication for failover of virtual machines and data using services such as Azure Site Recovery and geo-redundant storage (GRS). Replication of virtual machines and data to one or more regions using Azure Backup.
Azure is certified under the first international standard to demonstrate the ability to prevent, mitigate, respond to and recover from disruptive incidents. (ISO-22301). - Outage reporting
-
We have a built-in Private Dashboard (per customer) that is maintained but us. We would receive notification (typically by email or service tickets) should there be any interruption of service detected.
An automated "polling for life" system could be implemented upon a Customers' special request.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
- Other
- Other user authentication
-
Access Control Lists
IP Lockdowns
Whitelisted and Blacklisted entry points
IPSec verification - Access restrictions in management interfaces and support channels
- Access restrictions are managed by Role-Based / Group Enabled and User Definitions. Equally, these access methodologies may be subjected to IP filtering, IP-Block restrictions, NAT Translated Algorithms and IP Black- White-listing.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- Microsoft CSA STAR
- Microsoft Azure 27001:2013
- Microsoft Azure 27017:2015
- Microsoft Azure 27018:2014
- Microsoft Azure 20000-1:2011
- Microsoft Azure 22301:2012
- Microsoft Azure (not Govt) 9001:2015
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- We have an internal Governance model that manages and monitors security items relating to Data, Data-centres and Data Usage. Our company also has a on-staff Certified GDPR Practitioner for items pertaining to Data Governance, Ownership, DPO, SA, SD, DC, and DP items,
- Information security policies and processes
- We have 3 primary policies that govern our security measures. These are "VST Privacy Policy", "VST Remote Access Policy" and " VST Security and Response Plan Policy". each Policy is tied to a Board Member and each Board Member has a dedicated resource / resources to help affect ongoing monitoring and managing of these policies.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All items / changes are subjected to testing and tracking via revision numbering. All items are tested (in addition to operational fitfulness) for their security impact.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
-
As a software company, we are completely focused on function, capability, and quality. To ensure that we deliver high-quality results (and meet the expected levels of Service and Standards our customers demand) we follow a 4 step process;
1. Internal peer review.
2. External audit.
3. Quality Control via a Disciplined Promotion Process: No software is released without it being subjected to a staging area and simulated delivery.
4. Roll-Back Run Books: If an issue is discovered, we have the ability to seamlessly roll our software back to a previous production status without jeopardising operation. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We have the following process that is adhered to identify potential problem areas;
1. Regression testing.
2. The potential issue is logged in our error tracker, along with identifiable details.
3. A historical check is conducted.
4. If the error is new, we will revisit the pre-existing test scripts.
5. Identification of the ‘problem area’ species is the next step.
6. The problem, once identified, is more easily fixed, tested, and redeployed. If it is not a critical error, we will hold the fix until our next schedule upgrade rota. - Incident management type
- Undisclosed
- Incident management approach
-
We track all items (operational and User-initiated) via inbound trouble tickets or emails or calls.
Each item is logged on our ticketing system.
On a regular basis (defined by our SLAs or Customer request) we generate Incident reporting and closure statistics.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- Public Services Network (PSN)
- Police National Network (PNN)
- Other
- Other public sector networks
-
- MPN
- MoDNET
Social Value
- Equal opportunity
-
Equal opportunity
The PROFix solution is centered on transparency and honesty - especially around HR interviews, Redundancy, Hiring practices for Women and minorities. Our system demonstrates adherence to best practice, open process being followed and the ability to audit all decision making along the way. This ensures that favoritism and unjust employment decisions are exposed. - Wellbeing
-
Wellbeing
The PROFix solution is centered on transparency and honesty - especially around finding ways to accelerate and professional care and excellent handling of sensitive cases (like legal, asylum, HR interviews, Redundancy, defending hiring practices). Our system demonstrates adherence to best practice, open process being followed and the ability to audit all decision making along the way. This ensures that no undue stress or mental strain is created by activities previously considered as acrimonious.
Pricing
- Price
- £39.95 to £425.00 a licence a month
- Discount for educational organisations
- Yes
- Free trial available
- No