Briteyellow Limited

BriteLocate Footfall Counting

BriteLocate Counters are smart footfall monitoring devices providing a unified people flow counting and tracking system for any built environment operator.


  • Footfall Monitoring through unified people flow counting and tracking system.


  • Accurate people count enables accurate room occupancy estimates
  • GDPR compliant with no personally identifiable information stored
  • Real time Data insights instantly
  • Application reports export use footfall data in your own systems


£1,000 a licence

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 13

Service ID

5 0 0 0 8 9 7 2 0 3 7 5 2 4 1


Briteyellow Limited Fredi Nonyelu
Telephone: +448455570520

Service scope

Software add-on or extension
Cloud deployment model
Private cloud
Service constraints
Support for Intel cameras and Cisco or Ruckus WiFi devices.
System requirements
  • Chrome browser
  • Safari browser

User support

Email or online ticketing support
Email or online ticketing
Support response times
We respond within 4 hours.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Webchat is accessible from our website.
Web chat accessibility testing
We have not done any web chat testing with assistive technology users.
Onsite support
Yes, at extra cost
Support levels
All incidents will be assigned one of three priority levels as
• Priority High – Service has suffered a complete failure or significant partial loss of service.
• Priority Medium – Service is suffering problems which affect normal usage but a workaround exists or problem affects one user only.
• Priority Low – Work request (a simple non urgent request for work to be carried out), Non urgent faults (faults that are non urgent), or requests for information (Information request)

There is no difference is the cost.
We provide a technical account manager.
Support available to third parties

Onboarding and offboarding

Getting started
We help users start using our service with online training.
Service documentation
Documentation formats
End-of-contract data extraction
When the contract ends users can extract their data by downloading it to Excel or .csv.
End-of-contract process
At the end of the contract we will keep the data accessible for 30 days before it is securely deleted.

Using the service

Web browser interface
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
Application to install
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
Differences between the mobile and desktop service
The difference is that on mobile devices the service will adapt automatically to the screen size.
Service interface
User support accessibility
None or don’t know
Description of service interface
The service interface is our client portal from where customers can access the services online.
Accessibility standards
None or don’t know
Description of accessibility
There is a Login button on our home page from where it is possible to for customer admin to access the service.
Accessibility testing
We have not done any interface testing.
What users can and can't do using the API
Users can have complete access to configuring the setup to our system including creating new apps, registering new hardware, and getting their data out of our system.
API documentation
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
Customisation available


Independence of resources
Our cloud platform auto scales on demand.


Service usage metrics
Metrics types
Footfall counts and people flow tracks.
Reporting types
Real-time dashboards


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
Data is exported by an export button to download it to .csv or Excel format.
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
  • IPsec or TLS VPN gateway
  • Other
Other protection between networks
We do not connect to the buyers network.
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Our service is built on Azure which has a 99.9% service availability.
Approach to resilience
We use Azure Cloud services and it has geo-redundant servers.
Outage reporting
We report outages via email alerts.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
We use the Azure Dev Ops to restrict access. Everything is protected by Microsoft identity.
Access restriction testing frequency
At least once a year
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Between 1 month and 6 months

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Cyber essentials
Cyber essentials plus
Other security certifications
Any other security certifications
  • Cyber Security Essentials
  • ISO27001

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
We follow ISO 27001 security governance.
Information security policies and processes
Our reporting structure follows ISO 27001 guidelines.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our configuration and change management processes are documented in our policy documents.
These are reviewed quarterly for any potential security impact.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We use Azure Security centre to test the vulnerability of our site.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
There is an Azure security centre which detects and prevents and responds to threats.
Incident management type
Supplier-defined controls
Incident management approach
Our incident management process follows a pre-defined process for common events that guides users on how to report incidents.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks

Social Value

Equal opportunity

Equal opportunity

Briteyellow Limited
Equal Opportunities and Diversity Recruitment Monitoring Form
Job Ref:

In accordance with our Equal Opportunities and Diversity Policy, we are monitoring job applications to ensure that we provide equal opportunities to any job applicant and make sure that discrimination does not occur because of race, sex, sexual orientation, gender reassignment, religion or belief, marital or civil partnership status, age, disability, or pregnancy and maternity.

So that we can assess the success of this policy, we have set up a system of monitoring all job applications. We would be grateful, therefore, if you would complete the questions on this monitoring form and return it with your application form. We have asked for your name in order to enable us to monitor applications at the shortlisting and appointment stage.

All information supplied will be treated in confidence and will not be seen by staff directly involved in the appointment. The monitoring form will be detached from your application form, stored separately and used solely to provide statistics for monitoring purposes.

Thank you for your help.


£1,000 a licence
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.