Skip to main content

Help us improve the Digital Marketplace - send your feedback

DAVID HORN COMMUNICATIONS LIMITED

Davidhorn Mobile

Davidhorn Mobile is our enterprise solution for the capture, storage and analysis of digital evidence and interviews in police forces, courts, health institutions.

Ark server is the facilitator as-well-as evidence storage and management. The client applications facilitate the recording of evidence on cell phones, interview rooms, court rooms, laptop computers.

Features

  • Digital Evidence Capture on your mobile device
  • Task management for interviews and evidence capture sessions
  • In-the-field evidence capture for digital media
  • Secure and automatic transfer to server backend
  • Configurable workflows to match existing procedures
  • Standardise all meta-data for all interviews
  • Access and and share interviews and data from anywhere
  • Automated speech to text for all media captured available
  • Geotagging on all media captured
  • Applications for data and interview capture

Benefits

  • Optimise interview and data capture processes
  • Automated secure data transfer to save time and travel costs
  • Conduct secure Interview Recording on-site or out in the field
  • Detailed audit log of all actions from users
  • Reduce paper and management costs
  • Interviews available as soon as upload is verified
  • No DVD or physical media needed for storage or sharing
  • Automatic transcoding of video audio recordings for playable format
  • Media import from other applications
  • GDPR, PACE and DPA compliant

Pricing

£29 a user a month

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at jeff@davidhorn.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

5 9 4 1 4 9 9 3 4 8 3 2 9 1 0

Contact

DAVID HORN COMMUNICATIONS LIMITED Jeff Horn
Telephone: 01582 490300
Email: jeff@davidhorn.com

Service scope

Software add-on or extension
Yes
What software services is the service an extension to
Ark Interview management, Portable recorder, Fixed recorder
Cloud deployment model
  • Public cloud
  • Private cloud
  • Hybrid cloud
Service constraints
Solution can be provided as hosted service or on premises.
System requirements
  • Ark interview management
  • IPhone: iOS, 15 or newer
  • Ipad: iPadOS 15.0 or newer
  • Android 11 or newer

User support

Email or online ticketing support
Email or online ticketing
Support response times
Support Call, Email support and Support Ticket system.
Within one working day.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Bronze Service Level is supplied as standard, this is a reactive service with standard business day telephone support from 9:00 am to 17:00 Monday to Friday, Excluding Bank Holidays. The support level also includes an online ticketing system, however faults raised outside of standard office hours will not be actioned until the office opens.
All calls are taken by our dedicated support team, contact details are available online.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Online training and documentation is provided to buyers. Onsite training can be ordered if required through our portal.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
A custom export connector service is included in the solution. This can be used to export all media files and meta-data content to a external storage solution.
End-of-contract process
Normally contract ends with data extraction then secure deletion from the servers that where running the applications. If needed the data extraction could be assisted on a per hour basis.

Using the service

Web browser interface
No
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Not designed for desktop use.
Service interface
No
User support accessibility
None or don’t know
API
Yes
What users can and can't do using the API
API access is licensed. All operational system features, such as uploading, accessing or downloading all content are available using the API.
API documentation
No
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
All task and workflow can be configured dynamically in the administration interface of the system, subject to the necessary administrative access rights.

Scaling

Independence of resources
Davidhorn Mobile is designed for in the field evidence capture, and is therefore not dependent of server availability.

Analytics

Service usage metrics
Yes
Metrics types
The server records app usage, platform, OS version, phone model etc.
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Once the data has been uploaded to the server, users can export their data through the Ark Interview management.
Data export formats
Other
Other data export formats
  • Video MP4, H264
  • Audio: MP4, MP3, AAC
  • Photo: JPG
  • Reports: PDF
Data import formats
Other
Other data import formats
Existing photos and videos (configurable)

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
99%+ availability for viewing of stored files. SLAs exist to cover availability and refund to buyer subject to contract.
Approach to resilience
Multiple servers are deployed with load balancing applied and all hardware is high availability.
Outage reporting
Incident reporting is via email, with critical incidents notified by telephone.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Specifying users with management and support channel authentication. Multiple levels of authentication are configured by the end user during the registration phase of the self service web portal.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
User-defined
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
Other
Other security governance standards
Cyber Essentials.
Information security policies and processes
Information security policies and processes are as specified within the company Cyber Essentials accreditation.
All Application updates and/or security updates are installed automatically as soon as they are available.
An audit is checked by an IT Administrator weekly. Any Application that has not updated automatically is updated manually if this is required.
We operate a formal ticketing system. Request for change/ system access is submitted to the System Administrator. All requests must then be signed off in writing by a Director before the administrator will give access to, or as is usual, make changes to a user system. A register of changes requested/completed is maintained by the Administrator.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All requests for change are documented within the company's environment by creating a new change record. The completion of a new request for change is completed by the Change Coordinator with input from the Change Requester.
A post-implementation review is conducted to ensure whether the change has achieved the desired goals. Post-implementation actions include deciding to accept, modify or back-out the change; contacting the end user to validate success; and finalizing the change documentation within the company's environment.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Regular Penetration testing and development in response to test results.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
The solution will be monitored by our engineers and compromises identified through the Azure Portal using Microsoft Toolsets.
Any compromise will be identified and clients notified according to standard security protocol.
Our engineering team will react and aim to close any new vulnerabilities as soon as they are identified.
Incident management type
Supplier-defined controls
Incident management approach
A help line will be operated during normal "Business Hours" where calls for support will be logged.
Calls will be classified as severity 1, 2, or 3, with the required response activated.
Support can be emailed. This email is monitored during normal business Hours. Emails delivered out of these hours will be actioned the next working day.
For the resolution of any dispute that may arise during the operation of this service the contacts, in the event that you wish to escalate any issue will be provided.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Wellbeing

Wellbeing

We contributes to legal certainty by providing secure and effective solutions for investigative interview.

Pricing

Price
£29 a user a month
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at jeff@davidhorn.com. Tell them what format you need. It will help if you say what assistive technology you use.