Artificial Intelligence addon for enhanced CCTV Prison Security Surveillance
Reduce operational costs and increase safety by deploying an intelligent smart algorithm built into your existing CCTV system. Automatic focussing and alerting helps to quickly and accurately detect violent incidents and suspicious activity within and around your prison facility therefore enhancing the security function.
Features
- Real-time violence detection and perimeter protection
- Guarantee- more incidents will be detected
- At least 80% accuracy
- Integrates with any existing security system
- Scalable, brand independent and future proof
- Supports privacy-by-design
- Reliable detection from 720p/24fps
Benefits
- Fewer missed incidents in the surveillance center
- Faster detection and response times
- Improve surveillance without adding personnel, cost savings
- Quick and easy to install
- Contributes to focused and efficient operators
- Increase chance of being caught after alerting
- From reactive to proactive security
Pricing
£40,625 to £162,500 a licence a year
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 0 6 3 4 6 3 6 5 8 9 0 5 6 9
Contact
Phonio UK Ltd (Telio)
Jim Mountain
Telephone: +4915251920318
Email: jim.mountain@tel.io
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- Existing CCTV (at least 720p/24fps) and existing video management software. Can also work as a standalone Alarm Monitor.
- Cloud deployment model
- Private cloud
- Service constraints
- No constraints.
- System requirements
-
- Existing CCTV
- 720p / 24 frames per second HD camera streams
- Video management software or standalone Alarm Monitor
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 12hrs
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
-
Support Levels:
Level 1 - Phone support (ad hoc fixing of a problem)
Level 2 - Ticket which does not need onsite intervention
Level 3- Ticket which needs onsite intervention
Cost:
None (all levels are included)
Technical Account Manager or Cloud Support Engineer:
We provide Technical Account Support - Support available to third parties
- No
Onboarding and offboarding
- Getting started
- Oddity will provide documentation on how to use our alerts. The documentation is dependant on which video management system is used.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- We do not store user data.
- End-of-contract process
- At an agreed date and time the CCTV RTSP streams will be disabled from our cloud system. From that point no more incidents will be monitored. There will be no additional costs at the end of the contract.
Using the service
- Web browser interface
- No
- Application to install
- Yes
- Compatible operating systems
-
- Linux or Unix
- Windows
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- Our service is designed with a robust, scalable architecture that ensures high availability and consistent performance regardless of user demand. The only prerequisite is a stable network connection for throughputting streams. Our solution is scalable and we can scale to thousands of cameras in CCTV networks. We provide continuous monitoring of our systems allows us to identify and address potential bottlenecks before they affect service performance. This proactive approach helps in maintaining optimal service conditions and in making necessary adjustments to infrastructure in a timely manner.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
We have two user metrics:
1. True positives: the number of real incidents detected by the algorithm.
2. False positives: the number of incidents wrongly marked as real incidents.
The true positive rate is >80% and the false positive per camera per day is <0.5.
Lastly, we promise that when using this service, you will alert more incidents than you did before. - Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Oddity
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Supplier-defined controls
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- In-house
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- End users will use their existing video management systems for importing and exporting data. We do not store any data, the data is stored on the existing video management server. Therefore, no import/export is required with our service. You use pre-trained algorithms that will not learn from new data.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Phonio UK guarantees 99.5% availability of service
- Approach to resilience
- Service is often hosted on-premise. Servers use redundant power supplies, disks, and other components.
- Outage reporting
- Automatic reporting to private dashboard .
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Access restrictions in management interfaces and support channels
- Server login through user authentication, only on-site (physical access).
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- GDPR certification in progress
- IT Grundschutz
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Fabian
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Our services mainly consist of algorithms 'scanning' the cctv streams. We will notify end-users when a new algorithm model is being deployed. This changes nothing concerning the infrastructure.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Usually, our systems are deployed in closed-off environments. We apply the following principles if necessary:
1. Continuous Monitoring: Regular scanning of our systems and networks to detect vulnerabilities.
2. Risk Assessment: Prioritizing vulnerabilities based on their potential impact on the system.
3. Patch Management: Timely application of patches to mitigate identified vulnerabilities.
4. Verification: Post-patch testing to ensure that vulnerabilities have been successfully mitigated. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Usually, our systems are deployed in closed-off environments. We apply the following principles if necessary:
1. System Logging: Detailed logging of all system activity to ensure traceability.
2. Alert System: Automated alerts for unusual activities that could indicate potential security threats.
3. Incident Analysis: Detailed analysis of security alerts to determine their cause and impact.
4. Response Coordination: Coordinated response to incidents to minimize damage and restore service quickly.
5. Continuous Improvement: Regular review of monitoring tools and processes to enhance security. - Incident management type
- Undisclosed
- Incident management approach
-
Usually, our systems are deployed in closed-off environments. We apply the following principles if necessary:
1. Incident Detection and Reporting: Monitoring systems to detect incidents and mechanisms for users and staff to report incidents.
2. Initial Response: Assessing the incident to understand its nature and scope.
3. Investigation and Analysis: Investigating to determine the root cause and extent of the impact.
4. Resolution and Recovery: Taking appropriate actions to resolve the incident and recover any affected services or data.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
Phonio UK has used Cloud deployment to contribute to climate change mitigation efforts through energy efficiency, renewable energy adoption, and sustainable infrastructure practices. By embracing green computing principles and prioritizing environmental sustainability, Phonio UK has contributed to building a more sustainable and resilient digital infrastructure for the future.Covid-19 recovery
Phonio UK COVID-19 recovery efforts in prisons have addressed the mental health and well-being of inmates, who may experience heightened stress, anxiety, or isolation during the pandemic.
By deploying an AI CCTV systems inmate behavior can be monitored to detect signs of distress or mental health issues, enabling staff to intervene and provide necessary support services, such as counseling or peer support programs, to promote recovery and resilience.Tackling economic inequality
AI CCTV systems can help ensure that all inmates are treated fairly and held accountable for their actions regardless of their socioeconomic background. By providing objective surveillance and evidence of incidents, AI CCTV systems can help prevent discrimination or favoritism based on factors such as wealth or social status, thereby promoting equality within the prison environment.Equal opportunity
CCTV footage promotes accountability among both inmates and prison staff by documenting interactions and incidents within the facility. This transparency helps uphold standards of behavior, fosters trust between stakeholders, and reduces the likelihood of abuse or misconduct.Wellbeing
AI CCTV systems can help deter violence and harassment among inmates by monitoring interactions and identifying potential conflicts before they escalate. The knowledge that their actions are being observed may encourage inmates to behave in a more respectful and non-violent manner, thus contributing to a safer and more secure environment.
Pricing
- Price
- £40,625 to £162,500 a licence a year
- Discount for educational organisations
- No
- Free trial available
- No