Community Policing App
An innovative digital resource designed for and with police officers to help improve and promote effective and efficient policing in the community. This customised policing App will integrate existing website, policies, and social media while providing officers easy access to crime incident resources, guidance, and support.
Features
- Customised Policing App
- Management portal
- Analytics and Dashboard
- Push notifications
- News builder
- Surveys
- Calendar, policies, website, and social media integrations
- Staff and service directories
Benefits
- Communication hub featuring relevant information and guidance
- Open and role based access
- Secure login for management portal
- Quick access to relevant advice, guidance, and support
- Multi-platform compatibility (Android and iOS)
- Accessibility
- User friendly interface
Pricing
£25,000 a licence a year
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 4 9 6 6 6 7 1 8 6 5 7 7 1 2
Contact
INEQE SAFEGUARDING GROUP
Colin Stitt
Telephone: 02890232060
Email: enquiries@ineqe.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
-
Our Apps are built on both native iOS and Android operating systems.
This will ensure it is accessible on Android smartphones, tablets, Chromebooks, as well as iPads and iPhones.
The management portal can be accessed via an internet browser. - System requirements
-
- Apps require iOS v14+ or Android v5.1+
- Latest internet browser is required to access management portal
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Support requests will be acknowledged on the same day during operating business hours.
Support is not available at the weekend. - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- Our chosen CRM system is Hubspot which provides us with a live web chat interface that is inclusive and accessible to all users, regardless of their abilities or assistive technology requirements.
- Onsite support
- Yes, at extra cost
- Support levels
-
Our Service Engagement team will be available to assist you with any technical support issues during operational business hours via email, telephone or live web chat.
We believe in providing equal support to all our clients, so you can be assured that the same level of technical assistance is offered to all our clients.
Urgent queries regarding system disruptions are prioritised and will be responded to immediately. Other support queries are typically acknowledged on the same day during operational business hours.
As part of our commercial agreement, costs include ongoing maintenance, which means:
Bug fixes
Major iOS and Android updates.
Pre-launch consultancy and testing.
Dedicated onboarding and technical support. - Support available to third parties
- No
Onboarding and offboarding
- Getting started
-
All our products and services come with dedicated assistance. A Dedicated Account Manager will be allocated to each customer, who will be their point of contact and will guide them through the onboarding process.
External testing will be completed with the client and upon final agreement, face to face or remote training sessions will be scheduled to ensure key stakeholders have adequate training on the App and Management Portal before hand over. - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Not applicable to this service.
- End-of-contract process
- Our Service Engagement Team will work with the client to navigate and agree the off-boarding process and time scale. Essentially this means that on an agreed date client administrators will no longer be able to login to the portal and the Apps will be removed from the App stores.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Our layouts are carefully designed to ensure optimal performance and seamless user experience on any device. Whether you're browsing on a smartphone or tablet, our designs are responsive and tailored to provide the best user experience possible.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- Description of service interface
-
Authorised admin users nominated by the client will have access to the management portal to administer your Apps. Services will include the following functions:
Create, send, and queue push notifications.
Create and publish news articles direct to specific roles or all users.
Add additional administrators.
Review and update/edit staff and service directories. - Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- All our Apps are designed to comply with industry-standard accessibility. The App will be built to meet WCAG 2.1 AA Standard, from text alternatives, time-based media, adaptable and distinguishable use of text, captions, and colour to facilitate contrasting, audio and visual presentation needs as well as operable elements in terms of easily accessible navigation through buttons and text signposting.
- API
- No
- Customisation available
- Yes
- Description of customisation
-
Our unique App framework provides you with the ability to add additional features that have been or will be developed by INEQE.
Your App can be customised in your colours and branding, integrating your existing calendars, news feeds, policies and social media.
Content within the app can be customisable to reflect all relevant information and resources your app users require.
Scaling
- Independence of resources
- Our unique framework is hosted within a cloud-based infrastructure that can be scaled at any time to cope with demand.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Metrics includes:
Page views
Roles accessed
Platforms and devices - which are used
Push notifications opened - Reporting types
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- Less than once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
- Other
- Other data at rest protection approach
- Access control provided by Microsoft Azure, which complies with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
- Not applicable to this service
- Data export formats
- Other
- Data import formats
-
- CSV
- Other
- Other data import formats
-
- JPG
- PNG
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Availability is based on Microsoft Azure SLA , which is currently 99.99%.
- Approach to resilience
- We currently use Microsoft as our cloud provider as they provide high levels of end-to-end backup and speedy disaster recovery, including accidental deletion and corruption of data.
- Outage reporting
- Email alerts to the client administrators.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
- Access restrictions in management interfaces and support channels
- The management portal is only accessible by designated client administrators, with a valid email address and password.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Cyber Essentials
- Information security policies and processes
-
We have an in-house Information Security and Management Policy and a Security Policy. Our Chief Operating Officer is the responsible person for information security. He is assisted by our Lead Software Developer.
The policies form part of our staff induction training and are readily available for all staff.
Reporting lines are via Team Leaders to the Director of Operations and onward to the Chief Operating Officer. In urgent cases, reporting can be direct to the COO.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Our Cloud provider, Microsoft Azure has developed formal standard operating procedures (SOPs) governing the change management process. These SOPs cover both software development and hardware change and release management, and are consistent with established regulatory guidelines including ISO 27001, SOC 1 / SOC 2, NIST 800-53, and others.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Our Cloud provider, Microsoft Azure provides access to the following vulnerability management processes:
1: Run automated vulnerability scanning tools
2: Deploy automated operating system patch management solution
3: Deploy automated patch management solution for third-party software titles
4: Compare back-to-back vulnerability scans
5: Use a risk-rating process to prioritize the remediation of discovered vulnerabilities
Further details can be found at: https://docs.microsoft.com/en-us/security/benchmark/azure/security-control-vulnerability-management - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Microsoft Defender for Cloud helps you prevent, detect, and respond to threats. Defender for Cloud gives you increased visibility into, and control over, the security of your Azure resources as well as those in your cloud environment.
Defender for Cloud performs continuous security assessments of your connected resources and compares their configuration and deployment against the Azure Security Benchmark to provide detailed security recommendations tailored for your environment. - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Microsoft Azure has developed robust processes to facilitate a coordinated response to incidents, including:
• Identification
• Containment
• Eradication
• Recovery
• Lessons Learned, to provide post incident analysis.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
Our Apps are designed to safeguard children and vulnerable adults
Pricing
- Price
- £25,000 a licence a year
- Discount for educational organisations
- Yes
- Free trial available
- No