Skip to main content

Help us improve the Digital Marketplace - send your feedback

MOTOROLA SOLUTIONS UK LIMITED

IRS Plus (Incident Recording System)

IRS Plus is a modern, comprehensive Incident Recording System for the Emergency Services. It is fast, reliable and secure and can be tailored to capture the data you want with sophisticated validation rules. A powerful advanced incident recording
system designed to save users time
and
improve accuracy of data.

Features

  • Web - based solution
  • Validation rules keep data accurate
  • Search, list, graph/chart and map incident data
  • Geo-verification, mapping
  • Automatically pre-populated incident data
  • Data export to industry standard packages
  • Command and Control integration
  • Home Office integration
  • End to End data integration into any existing system

Benefits

  • Increase productivity for fire fighters
  • Optimise performance in times of austerity
  • 100% user friendly
  • Accurate reporting guaranteed
  • Rapidly understand and monitor performance
  • React quickly to performance issues
  • Improve quality of collected data
  • Fast, easy data entry
  • Option to add custom Sections and Questions above HO

Pricing

£21,850 a licence a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at donna.hopper@3tcsoftware.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

4 6 6 6 2 7 9 3 0 8 5 4 4 7 6

Contact

MOTOROLA SOLUTIONS UK LIMITED Donna Hopper
Telephone: 01455826400
Email: donna.hopper@3tcsoftware.com

Service scope

Software add-on or extension
No
Cloud deployment model
Private cloud
Service constraints
Installation requires an on-premise adaptor to transfer information from your Command and Control system to the cloud. You need to provide a server to run this software on. You are responsible for the server level support and infrastructure.
Information is sent via HTTPS to the cloud installation. You are responsible for ensuring firewall configuration to allow this.
From time to time we will release software updates for this component, which you will need to install.
We can provide help and guidance.
The cloud system will be installed and maintained by us.
System requirements
  • Latest versions of Internet Explorer, Chrome or Safari
  • Windows 2012 or later on-site server (virtual OK)
  • Firewall configured for HTTPS to cloud for client
  • Firewall configured for HTTPS to cloud for C&C adapter

User support

Email or online ticketing support
Email or online ticketing
Support response times
Users will receive an automatic response immediately. They will then receive a call back within 2 hours, based on the priority level. Support services are only provide weekdays 9-5 out of hours can be provided at an extra cost if required.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Support is included in the cost via the following:
* Service desk
* Email
* Phone
* Online self-access portal
Support available to third parties
No

Onboarding and offboarding

Getting started
We can provide:
* train the trainer training
* online help files
* user documentation
* admin documentation
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
For FRS customers that send data to the Home Office, the Home Office required information will be held online on their system and is available to be extracted via their facilities.

Some data can be extracted via the API (costed option).

We can provide an extract of the data if required. There will be an additional charge out our standard day rate to produce the data in the format required by the customer.
End-of-contract process
Extraction of the information in the format required by the customer is chargable at our standard day rate.
Extracting data via the API or reports (if option purchased) or via the Home Office system (if applicable) is free of charge unless assistance is required.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
No
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
API is available as a costed option.
The API allows incident information to be sent and received to the service.
The API is currently a SOAP API operating over HTTPS.
API documentation
Yes
API documentation formats
PDF
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
The following can be customised by us on your behalf:
* The customer logo
* data mappings between your C&C and Home Office values

The following can be customised by customer administrators:
* the form layout (eg sections)
* the form contents (questions, validation rules etc)
* user access rights
* informational messages
* online help
* configuration of other features

Scaling

Independence of resources
The current architecture has shared database resources, but independent web applications. Azure services are scaled to the demand of the users. For example if more bandwidth is required, this automatically increases on Azure.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Data can be exported via:
* the API (optional extra)
* reports (optional extra)
* the Home Office system (if applicable)
* a full or partial extract (at our standard day rate)
Data export formats
  • CSV
  • Other
Other data export formats
XML via the API
Data import formats
Other
Other data import formats
XML via the SOAP API

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99.9 assured by contractual commitment.
Approach to resilience
The system is hosted on Azure. There are 3 UK data centers giving full resilience. Further information available on request.
Outage reporting
Email alerts are sent out by our Support and Delivery team to all affected customers if the situation is servicing affecting and cannot be immediately resolved.

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Management interfaces and configuration are protected by username and password. Users must also have been granted the appropriate rights to access the configuration management functionality.

Access to support channels is via a separate web portal requiring authentication using different credentials.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Less than 1 month

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
QMS International
ISO/IEC 27001 accreditation date
11/04/2012 Original. Current Certificate Expiry 10/04/2025
What the ISO/IEC 27001 doesn’t cover
Azure Hosting Platform
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
ISO9001:2015

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
ISO 27001 certification maintained.
CTO and ICT department manage security and handle security incidents in conjunction with HR.
Audits are held regularly and staff are trained on security policies.
Security incidents are logged, investigated and appropriate action (potentially disciplinary action) taken.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
System/Platform changes are tracked in a CCL (Change Control Log) and given a unique ID code, prefixed with an abbreviation of the customer’s name. They are also tracked within our ServiceDesk call tracking system.
If we need to make a change to configuration or code, we will submit a CCF (Change Control Form) to the customer, as notification and to gain approval.
Each of these forms will include a risk assessment and a security risk assessment, taking into account security standards such as ISO 27001.
Assessments of this type, will be carried out by our engineering and development teams, together.
Vulnerability management type
Undisclosed
Vulnerability management approach
Threats are assessed based on information provided by the security product providers.

Windows patches are applied as required based on threat level.
AV and Malware updates are applied as they are released by the provider.
Firewall and endpoint security are managed by AWS.

Information about potential threats comes from security providers, penetration testing and potentially from customers.
Protective monitoring type
Undisclosed
Protective monitoring approach
Potential compromises are recognised either through the security products automatically reporting issues, customer reported issues or by assessments by our support and delivery team.
We respond in line with our current ISO 27001 policy including our BC and DR plans.
Incidents are responded to in line with the severity and likelihood of the event occurring. If a suspected compromise of security is identified, we are likely to respond immediately by taking the affected part of the system out of service and analysing the issue.
Incident management type
Supplier-defined controls
Incident management approach
Users can report issues via Email, Phone or via a Customer Portal.

Our Support Desk is comprised of engineers who specialise in different fields of 3tc Software. This team structure allows us to offer support at a high level across 1st 2nd and 3rd line support tiers.

We use pre-defined processes for events such as Quotes, Software configuration and Software Upgrades. Our highly skilled engineers remove the need for scripted support processes.

We have means of automatically generating standard reports, including SLA figures for open/closed calls.

In the near future these reports will be available via our Customer Portal.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

3tc Software Limited is committed to both the protection of the environment and evaluating the impact that the organisation’s services can have. We recognise that we have a responsibility to the environment beyond legal and regulatory requirements and are, therefore, committed to reducing our environmental impact and continually improving our environmental performance as an integral part of our business strategy and operating methods, with regular review points. We will encourage customers, suppliers, and other stakeholders to do the same.

3tc Software is also aware of its responsibilities in relation to the wellbeing of its employees in providing a suitable environment in which to work and operate. Therefore, this policy also reflects the importance of environmental concerns and issues relating to the workplace and the protection and welfare of its employees, visitors and other persons who may be affected.

The objectives for the Company under this policy are to:

1. Reduce the carbon footprint of the business.

2. Reduce energy consumption.

3. Minimise the production of all types of waste, especially paper. Encourage reuse, recycling and the disposal of other waste that cannot be avoided, in a responsible manner.

4. Create the grounds for best environmental practices that individuals can not only adhere to whilst working but then can reproduce these at home and transmit to their family and friends.

Energy and water

Turning off the lights in the office in the evening or on a bright sunny day, slightly lowering the heating or the air conditioning or taking devices off the plugs when it’s not needed are some good actions that we, as a Company and us as an individual, can implement. Moreover, by paying more attention to other daily routine actions, we can slightly reduce our energy consumption and, thus, our impact on the climate.

Pricing

Price
£21,850 a licence a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at donna.hopper@3tcsoftware.com. Tell them what format you need. It will help if you say what assistive technology you use.