IRS Plus (Incident Recording System)
IRS Plus is a modern, comprehensive Incident Recording System for the Emergency Services. It is fast, reliable and secure and can be tailored to capture the data you want with sophisticated validation rules. A powerful advanced incident recording
system designed to save users time
and
improve accuracy of data.
Features
- Web - based solution
- Validation rules keep data accurate
- Search, list, graph/chart and map incident data
- Geo-verification, mapping
- Automatically pre-populated incident data
- Data export to industry standard packages
- Command and Control integration
- Home Office integration
- End to End data integration into any existing system
Benefits
- Increase productivity for fire fighters
- Optimise performance in times of austerity
- 100% user friendly
- Accurate reporting guaranteed
- Rapidly understand and monitor performance
- React quickly to performance issues
- Improve quality of collected data
- Fast, easy data entry
- Option to add custom Sections and Questions above HO
Pricing
£21,850 a licence a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 6 6 6 2 7 9 3 0 8 5 4 4 7 6
Contact
MOTOROLA SOLUTIONS UK LIMITED
Donna Hopper
Telephone: 01455826400
Email: donna.hopper@3tcsoftware.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
-
Installation requires an on-premise adaptor to transfer information from your Command and Control system to the cloud. You need to provide a server to run this software on. You are responsible for the server level support and infrastructure.
Information is sent via HTTPS to the cloud installation. You are responsible for ensuring firewall configuration to allow this.
From time to time we will release software updates for this component, which you will need to install.
We can provide help and guidance.
The cloud system will be installed and maintained by us. - System requirements
-
- Latest versions of Internet Explorer, Chrome or Safari
- Windows 2012 or later on-site server (virtual OK)
- Firewall configured for HTTPS to cloud for client
- Firewall configured for HTTPS to cloud for C&C adapter
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Users will receive an automatic response immediately. They will then receive a call back within 2 hours, based on the priority level. Support services are only provide weekdays 9-5 out of hours can be provided at an extra cost if required.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Support is included in the cost via the following:
* Service desk
* Email
* Phone
* Online self-access portal - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
We can provide:
* train the trainer training
* online help files
* user documentation
* admin documentation - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
-
For FRS customers that send data to the Home Office, the Home Office required information will be held online on their system and is available to be extracted via their facilities.
Some data can be extracted via the API (costed option).
We can provide an extract of the data if required. There will be an additional charge out our standard day rate to produce the data in the format required by the customer. - End-of-contract process
-
Extraction of the information in the format required by the customer is chargable at our standard day rate.
Extracting data via the API or reports (if option purchased) or via the Home Office system (if applicable) is free of charge unless assistance is required.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
-
API is available as a costed option.
The API allows incident information to be sent and received to the service.
The API is currently a SOAP API operating over HTTPS. - API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
-
The following can be customised by us on your behalf:
* The customer logo
* data mappings between your C&C and Home Office values
The following can be customised by customer administrators:
* the form layout (eg sections)
* the form contents (questions, validation rules etc)
* user access rights
* informational messages
* online help
* configuration of other features
Scaling
- Independence of resources
- The current architecture has shared database resources, but independent web applications. Azure services are scaled to the demand of the users. For example if more bandwidth is required, this automatically increases on Azure.
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
Data can be exported via:
* the API (optional extra)
* reports (optional extra)
* the Home Office system (if applicable)
* a full or partial extract (at our standard day rate) - Data export formats
-
- CSV
- Other
- Other data export formats
- XML via the API
- Data import formats
- Other
- Other data import formats
- XML via the SOAP API
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99.9 assured by contractual commitment.
- Approach to resilience
- The system is hosted on Azure. There are 3 UK data centers giving full resilience. Further information available on request.
- Outage reporting
- Email alerts are sent out by our Support and Delivery team to all affected customers if the situation is servicing affecting and cannot be immediately resolved.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
-
Management interfaces and configuration are protected by username and password. Users must also have been granted the appropriate rights to access the configuration management functionality.
Access to support channels is via a separate web portal requiring authentication using different credentials. - Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- Less than 1 month
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- QMS International
- ISO/IEC 27001 accreditation date
- 11/04/2012 Original. Current Certificate Expiry 10/04/2025
- What the ISO/IEC 27001 doesn’t cover
- Azure Hosting Platform
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- ISO9001:2015
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
-
ISO 27001 certification maintained.
CTO and ICT department manage security and handle security incidents in conjunction with HR.
Audits are held regularly and staff are trained on security policies.
Security incidents are logged, investigated and appropriate action (potentially disciplinary action) taken.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
System/Platform changes are tracked in a CCL (Change Control Log) and given a unique ID code, prefixed with an abbreviation of the customer’s name. They are also tracked within our ServiceDesk call tracking system.
If we need to make a change to configuration or code, we will submit a CCF (Change Control Form) to the customer, as notification and to gain approval.
Each of these forms will include a risk assessment and a security risk assessment, taking into account security standards such as ISO 27001.
Assessments of this type, will be carried out by our engineering and development teams, together. - Vulnerability management type
- Undisclosed
- Vulnerability management approach
-
Threats are assessed based on information provided by the security product providers.
Windows patches are applied as required based on threat level.
AV and Malware updates are applied as they are released by the provider.
Firewall and endpoint security are managed by AWS.
Information about potential threats comes from security providers, penetration testing and potentially from customers. - Protective monitoring type
- Undisclosed
- Protective monitoring approach
-
Potential compromises are recognised either through the security products automatically reporting issues, customer reported issues or by assessments by our support and delivery team.
We respond in line with our current ISO 27001 policy including our BC and DR plans.
Incidents are responded to in line with the severity and likelihood of the event occurring. If a suspected compromise of security is identified, we are likely to respond immediately by taking the affected part of the system out of service and analysing the issue. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Users can report issues via Email, Phone or via a Customer Portal.
Our Support Desk is comprised of engineers who specialise in different fields of 3tc Software. This team structure allows us to offer support at a high level across 1st 2nd and 3rd line support tiers.
We use pre-defined processes for events such as Quotes, Software configuration and Software Upgrades. Our highly skilled engineers remove the need for scripted support processes.
We have means of automatically generating standard reports, including SLA figures for open/closed calls.
In the near future these reports will be available via our Customer Portal.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
3tc Software Limited is committed to both the protection of the environment and evaluating the impact that the organisation’s services can have. We recognise that we have a responsibility to the environment beyond legal and regulatory requirements and are, therefore, committed to reducing our environmental impact and continually improving our environmental performance as an integral part of our business strategy and operating methods, with regular review points. We will encourage customers, suppliers, and other stakeholders to do the same.
3tc Software is also aware of its responsibilities in relation to the wellbeing of its employees in providing a suitable environment in which to work and operate. Therefore, this policy also reflects the importance of environmental concerns and issues relating to the workplace and the protection and welfare of its employees, visitors and other persons who may be affected.
The objectives for the Company under this policy are to:
1. Reduce the carbon footprint of the business.
2. Reduce energy consumption.
3. Minimise the production of all types of waste, especially paper. Encourage reuse, recycling and the disposal of other waste that cannot be avoided, in a responsible manner.
4. Create the grounds for best environmental practices that individuals can not only adhere to whilst working but then can reproduce these at home and transmit to their family and friends.
Energy and water
Turning off the lights in the office in the evening or on a bright sunny day, slightly lowering the heating or the air conditioning or taking devices off the plugs when it’s not needed are some good actions that we, as a Company and us as an individual, can implement. Moreover, by paying more attention to other daily routine actions, we can slightly reduce our energy consumption and, thus, our impact on the climate.
Pricing
- Price
- £21,850 a licence a year
- Discount for educational organisations
- No
- Free trial available
- No