Skip to main content

Help us improve the Digital Marketplace - send your feedback

Phonio UK Ltd (Telio)

Artificial Intelligence addon for enhanced CCTV Prison Security Surveillance

Reduce operational costs and increase safety by deploying an intelligent smart algorithm built into your existing CCTV system. Automatic focussing and alerting helps to quickly and accurately detect violent incidents and suspicious activity within and around your prison facility therefore enhancing the security function.

Features

  • Real-time violence detection and perimeter protection
  • Guarantee- more incidents will be detected
  • At least 80% accuracy
  • Integrates with any existing security system
  • Scalable, brand independent and future proof
  • Supports privacy-by-design
  • Reliable detection from 720p/24fps

Benefits

  • Fewer missed incidents in the surveillance center
  • Faster detection and response times
  • Improve surveillance without adding personnel, cost savings
  • Quick and easy to install
  • Contributes to focused and efficient operators
  • Increase chance of being caught after alerting
  • From reactive to proactive security

Pricing

£40,625 to £162,500 a licence a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at jim.mountain@tel.io. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

7 0 6 3 4 6 3 6 5 8 9 0 5 6 9

Contact

Phonio UK Ltd (Telio) Jim Mountain
Telephone: +4915251920318
Email: jim.mountain@tel.io

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Existing CCTV (at least 720p/24fps) and existing video management software. Can also work as a standalone Alarm Monitor.
Cloud deployment model
Private cloud
Service constraints
No constraints.
System requirements
  • Existing CCTV
  • 720p / 24 frames per second HD camera streams
  • Video management software or standalone Alarm Monitor

User support

Email or online ticketing support
Email or online ticketing
Support response times
12hrs
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
9 to 5 (UK time), 7 days a week
Web chat support
No
Onsite support
Onsite support
Support levels
Support Levels:
Level 1 - Phone support (ad hoc fixing of a problem)
Level 2 - Ticket which does not need onsite intervention
Level 3- Ticket which needs onsite intervention

Cost:
None (all levels are included)

Technical Account Manager or Cloud Support Engineer:
We provide Technical Account Support
Support available to third parties
No

Onboarding and offboarding

Getting started
Oddity will provide documentation on how to use our alerts. The documentation is dependant on which video management system is used.
Service documentation
Yes
Documentation formats
PDF
End-of-contract data extraction
We do not store user data.
End-of-contract process
At an agreed date and time the CCTV RTSP streams will be disabled from our cloud system. From that point no more incidents will be monitored. There will be no additional costs at the end of the contract.

Using the service

Web browser interface
No
Application to install
Yes
Compatible operating systems
  • Linux or Unix
  • Windows
Designed for use on mobile devices
No
Service interface
No
User support accessibility
None or don’t know
API
No
Customisation available
No

Scaling

Independence of resources
Our service is designed with a robust, scalable architecture that ensures high availability and consistent performance regardless of user demand. The only prerequisite is a stable network connection for throughputting streams. Our solution is scalable and we can scale to thousands of cameras in CCTV networks. We provide continuous monitoring of our systems allows us to identify and address potential bottlenecks before they affect service performance. This proactive approach helps in maintaining optimal service conditions and in making necessary adjustments to infrastructure in a timely manner.

Analytics

Service usage metrics
Yes
Metrics types
We have two user metrics:

1. True positives: the number of real incidents detected by the algorithm.
2. False positives: the number of incidents wrongly marked as real incidents.

The true positive rate is >80% and the false positive per camera per day is <0.5.

Lastly, we promise that when using this service, you will alert more incidents than you did before.
Reporting types
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Oddity

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
End users will use their existing video management systems for importing and exporting data. We do not store any data, the data is stored on the existing video management server. Therefore, no import/export is required with our service. You use pre-trained algorithms that will not learn from new data.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Phonio UK guarantees 99.5% availability of service
Approach to resilience
Service is often hosted on-premise. Servers use redundant power supplies, disks, and other components.
Outage reporting
Automatic reporting to private dashboard .

Identity and authentication

User authentication needed
Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
Access restrictions in management interfaces and support channels
Server login through user authentication, only on-site (physical access).
Access restriction testing frequency
At least every 6 months
Management access authentication
  • Limited access network (for example PSN)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
  • GDPR certification in progress
  • IT Grundschutz

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Fabian

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our services mainly consist of algorithms 'scanning' the cctv streams. We will notify end-users when a new algorithm model is being deployed. This changes nothing concerning the infrastructure.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Usually, our systems are deployed in closed-off environments. We apply the following principles if necessary:

1. Continuous Monitoring: Regular scanning of our systems and networks to detect vulnerabilities.
2. Risk Assessment: Prioritizing vulnerabilities based on their potential impact on the system.
3. Patch Management: Timely application of patches to mitigate identified vulnerabilities.
4. Verification: Post-patch testing to ensure that vulnerabilities have been successfully mitigated.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Usually, our systems are deployed in closed-off environments. We apply the following principles if necessary:

1. System Logging: Detailed logging of all system activity to ensure traceability.
2. Alert System: Automated alerts for unusual activities that could indicate potential security threats.
3. Incident Analysis: Detailed analysis of security alerts to determine their cause and impact.
4. Response Coordination: Coordinated response to incidents to minimize damage and restore service quickly.
5. Continuous Improvement: Regular review of monitoring tools and processes to enhance security.
Incident management type
Undisclosed
Incident management approach
Usually, our systems are deployed in closed-off environments. We apply the following principles if necessary:

1. Incident Detection and Reporting: Monitoring systems to detect incidents and mechanisms for users and staff to report incidents.
2. Initial Response: Assessing the incident to understand its nature and scope.
3. Investigation and Analysis: Investigating to determine the root cause and extent of the impact.
4. Resolution and Recovery: Taking appropriate actions to resolve the incident and recover any affected services or data.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Covid-19 recovery
  • Tackling economic inequality
  • Equal opportunity
  • Wellbeing

Fighting climate change

Phonio UK has used Cloud deployment to contribute to climate change mitigation efforts through energy efficiency, renewable energy adoption, and sustainable infrastructure practices. By embracing green computing principles and prioritizing environmental sustainability, Phonio UK has contributed to building a more sustainable and resilient digital infrastructure for the future.

Covid-19 recovery

Phonio UK COVID-19 recovery efforts in prisons have addressed the mental health and well-being of inmates, who may experience heightened stress, anxiety, or isolation during the pandemic.

By deploying an AI CCTV systems inmate behavior can be monitored to detect signs of distress or mental health issues, enabling staff to intervene and provide necessary support services, such as counseling or peer support programs, to promote recovery and resilience.

Tackling economic inequality

AI CCTV systems can help ensure that all inmates are treated fairly and held accountable for their actions regardless of their socioeconomic background. By providing objective surveillance and evidence of incidents, AI CCTV systems can help prevent discrimination or favoritism based on factors such as wealth or social status, thereby promoting equality within the prison environment.

Equal opportunity

CCTV footage promotes accountability among both inmates and prison staff by documenting interactions and incidents within the facility. This transparency helps uphold standards of behavior, fosters trust between stakeholders, and reduces the likelihood of abuse or misconduct.

Wellbeing

AI CCTV systems can help deter violence and harassment among inmates by monitoring interactions and identifying potential conflicts before they escalate. The knowledge that their actions are being observed may encourage inmates to behave in a more respectful and non-violent manner, thus contributing to a safer and more secure environment.

Pricing

Price
£40,625 to £162,500 a licence a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at jim.mountain@tel.io. Tell them what format you need. It will help if you say what assistive technology you use.