Davidhorn Mobile
Davidhorn Mobile is our enterprise solution for the capture, storage and analysis of digital evidence and interviews in police forces, courts, health institutions.
Ark server is the facilitator as-well-as evidence storage and management. The client applications facilitate the recording of evidence on cell phones, interview rooms, court rooms, laptop computers.
Features
- Digital Evidence Capture on your mobile device
- Task management for interviews and evidence capture sessions
- In-the-field evidence capture for digital media
- Secure and automatic transfer to server backend
- Configurable workflows to match existing procedures
- Standardise all meta-data for all interviews
- Access and and share interviews and data from anywhere
- Automated speech to text for all media captured available
- Geotagging on all media captured
- Applications for data and interview capture
Benefits
- Optimise interview and data capture processes
- Automated secure data transfer to save time and travel costs
- Conduct secure Interview Recording on-site or out in the field
- Detailed audit log of all actions from users
- Reduce paper and management costs
- Interviews available as soon as upload is verified
- No DVD or physical media needed for storage or sharing
- Automatic transcoding of video audio recordings for playable format
- Media import from other applications
- GDPR, PACE and DPA compliant
Pricing
£29 a user a month
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 9 4 1 4 9 9 3 4 8 3 2 9 1 0
Contact
DAVID HORN COMMUNICATIONS LIMITED
Jeff Horn
Telephone: 01582 490300
Email: jeff@davidhorn.com
Service scope
- Software add-on or extension
- Yes
- What software services is the service an extension to
- Ark Interview management, Portable recorder, Fixed recorder
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- Solution can be provided as hosted service or on premises.
- System requirements
-
- Ark interview management
- IPhone: iOS, 15 or newer
- Ipad: iPadOS 15.0 or newer
- Android 11 or newer
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
Support Call, Email support and Support Ticket system.
Within one working day. - User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Bronze Service Level is supplied as standard, this is a reactive service with standard business day telephone support from 9:00 am to 17:00 Monday to Friday, Excluding Bank Holidays. The support level also includes an online ticketing system, however faults raised outside of standard office hours will not be actioned until the office opens.
All calls are taken by our dedicated support team, contact details are available online. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Online training and documentation is provided to buyers. Onsite training can be ordered if required through our portal.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- A custom export connector service is included in the solution. This can be used to export all media files and meta-data content to a external storage solution.
- End-of-contract process
- Normally contract ends with data extraction then secure deletion from the servers that where running the applications. If needed the data extraction could be assisted on a per hour basis.
Using the service
- Web browser interface
- No
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Not designed for desktop use.
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- API access is licensed. All operational system features, such as uploading, accessing or downloading all content are available using the API.
- API documentation
- No
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- All task and workflow can be configured dynamically in the administration interface of the system, subject to the necessary administrative access rights.
Scaling
- Independence of resources
- Davidhorn Mobile is designed for in the field evidence capture, and is therefore not dependent of server availability.
Analytics
- Service usage metrics
- Yes
- Metrics types
- The server records app usage, platform, OS version, phone model etc.
- Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Once the data has been uploaded to the server, users can export their data through the Ark Interview management.
- Data export formats
- Other
- Other data export formats
-
- Video MP4, H264
- Audio: MP4, MP3, AAC
- Photo: JPG
- Reports: PDF
- Data import formats
- Other
- Other data import formats
- Existing photos and videos (configurable)
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- 99%+ availability for viewing of stored files. SLAs exist to cover availability and refund to buyer subject to contract.
- Approach to resilience
- Multiple servers are deployed with load balancing applied and all hardware is high availability.
- Outage reporting
- Incident reporting is via email, with critical incidents notified by telephone.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Specifying users with management and support channel authentication. Multiple levels of authentication are configured by the end user during the registration phase of the self service web portal.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Cyber Essentials.
- Information security policies and processes
-
Information security policies and processes are as specified within the company Cyber Essentials accreditation.
All Application updates and/or security updates are installed automatically as soon as they are available.
An audit is checked by an IT Administrator weekly. Any Application that has not updated automatically is updated manually if this is required.
We operate a formal ticketing system. Request for change/ system access is submitted to the System Administrator. All requests must then be signed off in writing by a Director before the administrator will give access to, or as is usual, make changes to a user system. A register of changes requested/completed is maintained by the Administrator.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
All requests for change are documented within the company's environment by creating a new change record. The completion of a new request for change is completed by the Change Coordinator with input from the Change Requester.
A post-implementation review is conducted to ensure whether the change has achieved the desired goals. Post-implementation actions include deciding to accept, modify or back-out the change; contacting the end user to validate success; and finalizing the change documentation within the company's environment. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Regular Penetration testing and development in response to test results.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
The solution will be monitored by our engineers and compromises identified through the Azure Portal using Microsoft Toolsets.
Any compromise will be identified and clients notified according to standard security protocol.
Our engineering team will react and aim to close any new vulnerabilities as soon as they are identified. - Incident management type
- Supplier-defined controls
- Incident management approach
-
A help line will be operated during normal "Business Hours" where calls for support will be logged.
Calls will be classified as severity 1, 2, or 3, with the required response activated.
Support can be emailed. This email is monitored during normal business Hours. Emails delivered out of these hours will be actioned the next working day.
For the resolution of any dispute that may arise during the operation of this service the contacts, in the event that you wish to escalate any issue will be provided.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
We contributes to legal certainty by providing secure and effective solutions for investigative interview.
Pricing
- Price
- £29 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- No