iTrackPPE Limited
iTrackPPE is an Intelligent asset distribution, tracking and management solution for operational firefighting PPE/Equipment using RFID-QR code scanning.
A bespoke user application, back office and logistics solution incorporating RFID enabled storage units. iTrackPPE is an 'invest to save' proposition which optimisies the ROI for assets and delivers significant financial savings.
Features
- Real time RFID-QRcode tracking of Firefighter PPE assets
- Bespoke intelligent distribution and management of PPE
- RFID enabled storage units and contaminated asset containment, management/tracking
- Restful API integration and User defined real time performance dashboard
- Intuitative end user application which significantly reduces time and effort
- Legacy PPE asset RFID-QRcode tagging service
- Real time tracking and management of operational equipment
- Personal compliance monitoring for PPE and equipment
- Enhanced asset logistics and management processes
- Digital Breathing Apparatus asset log book and asset tracking/compliance
Benefits
- Invest to save initiative - 40% asset refresh savings
- Organisational wide view of asset location and status
- Enhanced business performance information
- Optimisation and enhanced asset return on investment
- Improved risk critical PPE resilience and availability and contamination tracking/management
- Immediate asset location identification and defective item quarantine
- Intelligent PPE distribution creating even wear profile across organisation
- Up to 70% annual revenue costs reduction for replacement PPE
- Significant reduction in PPE administration and locating lost items
- Reduces logistic and delivery journeys supporting environmental sustainability
Pricing
£78.00 to £300.00 a user a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 1 4 3 8 4 7 1 9 0 4 5 3 3 0
Contact
ITRACKPPE LIMITED
Steve McLinden
Telephone: 07826531582
Email: steve@itrackppe.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- None
- System requirements
-
- User must be able to access internet
- System requires RFID and QRcode devices and readers
- System works using RFID enabled barcode & QRcode tags
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Mon - Fri 0900-1700 response time will be within 4hrs
Evening and weekends response avaialble by arrangement at extra cost - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Yes, at an extra cost
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- None to date but can be undertaken as required by the customer on implementation and configuration.
- Onsite support
- Yes, at extra cost
- Support levels
-
Email and phone support included within annual subscription fee.
Hardware and bespoke RFID enabled contaminated assets containment units and storage furniture maintenance and repair as part of warranty package within hardware / storage unit provision cost for 3 years.
Warranty extension available on request.
Assigned technical account manager allocated to each customer organisation. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
Onsite and online training.
Online interactive user manual.
Suite of online training materials (presentation, functionality videos, etc.) - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Data can be directly exported via .csv at the conclusion / termination of the contract. All data remains the proprty of the customer.
- End-of-contract process
- End of organisational subscription (termination of contract) will be completed when the data is exported via .csv. This will be completed within 30 days of the last day of the contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
- Android
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Mobile accessible version
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- Administration access to managed system
- Accessibility standards
- None or don’t know
- Description of accessibility
- Administrators can access and configure the system functionalities and datasets via a backoffice interface.
- Accessibility testing
- None to date but can be made avaialble during implementation and configuration
- API
- Yes
- What users can and can't do using the API
- Restful API available as requred dependent on the customers legacy systems.
- API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- No
- Customisation available
- No
Scaling
- Independence of resources
- Service is hosted on auto-scaling infrastructure.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Bespoke analytics availble on request.
- Reporting types
-
- API access
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Export via .csv or API
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Detailed within terms and conditions
- Approach to resilience
- Available on request.
- Outage reporting
- Public dashboard and email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Various user roles with different levels of access.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Cyber Essentials plus
- Information security policies and processes
-
We work to Cyber Essential Plus standards.
Currently working towards ISO 27001 and 14 principles of cloud security
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Version control, CI-CD pipeline with secuity testing built in.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Live vulnerability scanning carried out by third party.
Secrity patches applied as soon as availble.
Information around threats is via third party. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Potential compromises identified via in house monitoring.
Compromises assessed and handled immediately by in house development team. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Incidents managed via a predesigned in house incident management process.
Users report incidents via online support portal.
Regular incident updates provided via the online support portal.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Fighting climate changeFighting climate change
We have created and supply a unique software application and RFID enabled storage solutions which delivers the intelligent distribution, management and tracking of risk critical PPE and operational equipment for firefighters and first responders.
We work with partners who have strong environmental, ethical, inclusive and sustainable credentials for the supply of hardware and storage furniture. Our solution maximizes return on investment for high cost, risk critical personal protection items, making firefighters and first responders safer whilst delivering significant business and financial improvement.
Pricing
- Price
- £78.00 to £300.00 a user a year
- Discount for educational organisations
- No
- Free trial available
- No