POC Radio Services
Body Worn Video with Integrated POC Radio Communications
Individual POC Radio Handsets
Vehicle Mounted POC Radios
POC Radio enabled rugged android tablets
All devices come with Man Down functionality with accelerometers and emergency buttons.
Ideal for remote worker communications
Features
- Remote worker safety
- Remote worker communications
- Remote worker tracking
- Incident Management
- Bodyworn video with radios
- Global radio coverage
- Emergency response
- Rugged equipment
- Web based management portal
Benefits
- Remote workforce tracking
- Lone worker safety
- Reliable communications without the need for a mast infrastructure
- Job and incident management
- Ability to send CCTV images to web based portal
Pricing
£8 to £16 a licence a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
6 8 6 8 6 9 3 3 0 7 7 3 8 4 7
Contact
BROADNET COMMUNICATIONS SYSTEMS LIMITED
Nigel Whittaker
Telephone: +44(0)3339397989
Email: sales@broadnet.systems
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- We can provide an API to connect into our system from another software platform ( such as a workflow management system)
- Cloud deployment model
- Private cloud
- Service constraints
- Devices require an internet connection to work ( 3G, 4G, Wi-Fi , Hotspot)
- System requirements
- A internet connected PC for web based portal management
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- SLA is 8 hours during normal working hours and 14 hours outside of normal working hours. Current response time to ticket creation is under 30 minutes.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- For new implementations we will include an onsite engineer to configure and train up staff on using the system. In the very unlikely event that further onsite support is required, we will provide a trained engineer for a physical onsite visit. 99% of all queries can be resolved remotely through web or email chat
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We have an extensive online support portal that details every aspect of the service, how to use it, how to set things up with simple to use help guides with images. On first implementation an onboarding engineer will be assigned to configure the service and train the service users. This can be done face to face or online
- Service documentation
- Yes
- Documentation formats
- HTML
- End-of-contract data extraction
- Data can be downloaded from the incident management portal at anytime and will be retained for at least one year after the end of the contract ( can be extended by agreement)
- End-of-contract process
- At the end of the contract there are no further costs for the user to exit. They can cancel at anytime.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The core radio product is designed to work on mobile android devices. There is a desktop version of the radio product for control room use that works on Windows PC's. The core portal and management software will work on any internet connected device, however we recommend at least a 22inch monitor for ease of use
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
- Web based portal for user and incident management
- Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- Not applicable
- API
- Yes
- What users can and can't do using the API
- Users can interact with the user management and incident management aspects of the portal
- API documentation
- Yes
- API documentation formats
-
- Open API (also known as Swagger)
- HTML
- ODF
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- For organisations of more than 150 users, we can provide a entirely bespoke version of the user management and incident management portal
Scaling
- Independence of resources
- Out technology infrastructure using AWS automatically and instantly scales up to meet service demand levels
Analytics
- Service usage metrics
- Yes
- Metrics types
- Data usage, user usage, individual radio usage
- Reporting types
-
- API access
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a CHECK service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- No
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Data can be exported in .csv and .pdf format from the incident management portal
- Data export formats
-
- CSV
- Other
- Other data export formats
- Data import formats
- Other
- Other data import formats
- No data import
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Current "uptime" for the past 6 years has been 99.8%
- Approach to resilience
- We use multiple sites with failover to the next site
- Outage reporting
- Email alerts, support portal alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Only users with a verified account can access services on the online portal via secure log on. Individual radios use a encrypted handshake with the system to connect and log in for use
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- CSA CCM version 3.0
- Information security policies and processes
- All data is stored in the highest grade commercial data centres provided by leading providers such as Amazon Web Services.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All changes are tested internally prior to roll out for customers.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Handled by third party data centre providers
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Handled by third party data centre providers
- Incident management type
- Undisclosed
- Incident management approach
- No relevent incidents
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
WellbeingWellbeing
Our system is designed to provide safer working conditions for remote workers
Pricing
- Price
- £8 to £16 a licence a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- 2 weeks, 6 devices with full access to the system