Electronic Presentation of Evidence for Courts and Public Inquiries
Our solution for electronic presentation of evidence (EPE) for courts and public inquiries facilitates live presentation, annotation, manipulation, and sharing of a range of document and media files across many formats. It is staffed by expert operators and includes fully secure hosting and management of evidence.
Features
- Presentation and annotation of documents including PDFs, Word files, spreadsheets
- Presentation and annotation of media including images, audio and video
- Side-by-side display of up to 4 documents
- Functionality including zooming and expanding
- Functionality including highlighting, redaction, annotation with text, lines and shapes
- Facilitates live sharing of evidence with in-person or remote participants
- Integrates with videoconferencing, livestreaming, and any other distribution system
- Software solution operating on a private cloud network
- Provision of secure data storage, and hardware for software operation
- Supported in-person by expert technical operators
Benefits
- Enables more dynamic, enhanced interrogation of all types of evidence
- Allows for improved ease of remote participation
- Eliminates physical evidence preparation, distribution and management
- Saves significant cost and time involved in physical evidence preparation
- Provides improved control of documents compared to physical evidence sharing
- Maintains a log of all evidence displayed and annotations applied
Pricing
£21.90 a unit
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
7 3 8 5 1 4 3 1 3 9 0 7 8 5 3
Contact
Pi Communications
Daniel Douglas
Telephone: 02890600655
Email: ddouglas@picomms.tv
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- None
- System requirements
- Windows or Windows for Mac OS
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
We respond to all support requests within 1 hour during business hours (08:00 - 17:00 Monday to Friday).
We provide an emergency email address for out of hours support requests, and aim to respond to all out of hours requests within 3 hours. - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
Onsite support is delivered by specialist Support Engineers. Onsite support is charged at an hourly rate as per the Pricing Document.
Remote support is delivered by specialist Remote Support Technicians. Remote support within business hours (08:00 - 17:00 Monday - Friday) is included within the service offering. Remote support outside of service hours is charged at an hourly rate as per the Pricing Document.
Support can be requested via email and phone, directed both to our dedicated support contacts or the Account Manager . - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Mobilisation and onboarding is a fully managed service.
A dedicated Project Manager will lead mobilisation and roll out, working with the client to define the scope and exact requirements of the service to customise the solution as necessary. Mobilisation also includes technical setup and hardware install as necessary, evidence onboarding, creation of case files and bundles, agreement of working procedures for hearings, and as-live testing,
The service includes expert technical Operator staffing to operate the solution, however onsite and online training for client personnel can be provided, tailored to client requirements. Available training includes but is not limited to end user access and usage, technical troubleshooting, evidence management and case file preparation, EPE operations, as well as training to Counsel in efficient and optimised working with EPE Operators.
Full user documentation can also be provided in PDF format. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Data handover is facilitated by the assigned Account Manager. Service usage and audit logs can be provided when the contract ends (or at intervals during service delivery), and client data held and used within the software can be transferred back when the contract ends or permanently deleted if preferable for data security purposes.
- End-of-contract process
- At the end of the contract, access to the software is withdrawn, and any supplementary hardware which may have been provided will be removed. Project data, case files and bundles will not be retained unless specifically requested during planning and mobilisation. All client data will either be transferred back to the client or permanently deleted depending on client preference, at the end of the contract. There will be no additional costs.
Using the service
- Web browser interface
- No
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- There is no difference between mobile and desktop service.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- A dedicated, private Cloud Solution is deployed to each client, a dedicated operator and management support is allocated to each client for the duration of their required service. The solution is scalable with capacity and storage customised to client requirements. The solution is standalone and increased demand by other users does not impact upon usage by each client.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Service usage and audit logs can be provided at intervals during service delivery or at the end of the contract.
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- A range of system and usage data can be exported, including document data, case data, and an audit log of usage. Training can be provided in exporting data, or our Operators can provide data to clients in a CSV file or PDF.
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- Portable Document Format (.PDF)
- Load File (.OLL)
- Data import formats
- Other
- Other data import formats
-
- Portable Document Format (.PDF)
- Microsoft Word (.DOC and .DOCX)
- Microsoft Excel (.XLS and .XLSX)
- Microsoft PowerPoint (.PPT and .PPTX)
- Joint Photographic Experts Group (.JPEG)
- Portable Network Graphics (.PNG)
- H.264 (.MP4, .M4V and .MOV)
- MPEG-4 (.MP4, .M4V and .MOV)
- MPEG Audio Layer III (.MP3)
- PCM Wave (.WAV)
Data-in-transit protection
- Data protection between buyer and supplier networks
- Private network or public sector network
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
-
We guarantee complete availability of software and systems for all planned pre-live preparation and live usage. We also guarantee availability of personnel including operators for all scheduled sittings, technicians for support (as detailed below), and in terms of management availability for escalation.
In terms of support requests, we respond to all support requests within 1 hour during business hours (08:00 - 17:00 Monday to Friday). We provide an emergency email address for out of hours support requests, and aim to respond to all out of hours requests within 3 hours.
Additional, specific SLA terms and service credits can be agreed on for each service. - Approach to resilience
- Our data centre setup is highly resilient in that our software and all data storage is fully redundant with immediately available backups and failover solution. All data is backed up daily and at the end of sessions. Furthermore, data is encrypted. System and data access is strictly controlled through multi-factor authentication. All hardware is stored in locked racks, with restricted physical access only for approved, vetted personnel. Resilience measures are regularly checked, including completeness and availability of backups and failover solutions, all other security measures, and business continuity/disaster recovery plans.
- Outage reporting
- Our system sends automated email notifications to our support team in the event of a service outage. Our Project Manager will report to the client service manager when an outage occurs, providing updates through to issue resolution on root cause, remedial actions, and lessons learned, including any changes to systems or workflows to prevent reoccurrence.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Access is based on user permissions and assigned user level. Our Support Team assign and administer profiles for Administrators, and customisable User levels based on required access to stored data, ability to import / export / configure data, and presentation mode. Interface view and functions are restricted based on profile level and permissions.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Citation ISO Certification
- ISO/IEC 27001 accreditation date
- 31/07/2023
- What the ISO/IEC 27001 doesn’t cover
- There are no exclusions to our certification.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- Our security policies and processes are fully ISO 27001-compliant. Our documented, standardised policies and processes are externally audited annually, and are subject to ongoing review and update by our Information Security (IS) Officer. Our IS Officer is responsible for management and enforcement of policies and processes through implementation of training and assessment, liaison with line managers to review performance and competence of all staff, and spot checking adherence and compliance across application of a range of processes across all functions and roles at all levels within the organisation. We have a range of security policies and processes in place, including but not limited to those for: Data Protection, Access Control, Backups, Cryptographic Controls, Information Classification and Exchange, Networking, Passwords, Remote Access, Security, and Incident Reporting and Management.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
All hardware and software assets are logged, monitored and regularly audited. Assets are subject to planned maintenance and updates through scheduled, risk-assessed procedures implemented by our Support Technicians.
We undertake software development as a continuous process which we thoroughly manage and quality assure for functionality and security.
All changes are implemented through formalised change control procedures - all changes are thoroughly alpha tested by developers and beta tested in simulated environments before being deployed live for end users. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We have a programme of procedures for vulnerability management and managed detection and response. We undertake regular information systems mapping, auditing and risk assessment. We assess potential threats on a ongoing basis through vulnerability scanning, including active and automated monitoring systems. We additionally undertake annual penetration testing.
We apply standard, scheduled updates monthly and security updated are applied in the first instance upon their availability.
We proactively monitor information about potential threats from sources such as CVE Common Vulnerabilities and Exposures https://cve.mitre.org/). - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We perform active monitoring of data, systems and networks to identify any unauthorised access or access. All personnel have clearly defined roles for monitoring and reporting any suspected or potential compromises and all responses are managed via our standardised process.
In the event of a potential compromise, we will revert to the most recent uncompromised data while our team performs root cause analysis and implements a solution.
We respond to incidents immediately upon identification; clients will be informed in the first instance following an incident and updated as remedial actions are taken and a solution is implemented. - Incident management type
- Supplier-defined controls
- Incident management approach
-
We have documented policies, processes, and standard operating procedures in place which are followed for Incident Management and response.
Incidents are reported internally through escalation forms to our Support Team and end users can report incidents via phone or email to Account Managers or the Support Team directly.
Incident Reports are tickets, and Incident Status Updates and Revolution Reports are provided via secure email.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Tackling economic inequality
- Equal opportunity
- Wellbeing
Fighting climate change
This service supports fighting climate change through providing a paperless, digital alternative to the traditional approach to evidence presentation. Our system eliminates use of large amounts of paper, ink and electricity to print daily, large bundles of documentary evidence for participants in court or inquiry hearings. Our service also facilitates remote participation in hearings as evidence can be digitally shared on video communications platforms – this eliminates unnecessary travel and emissions, helping to fight climate change.
Additionally, in delivering this service we take various measures to fight climate change including: undertaking Environmental Risk Assessments in for all mobilisation projects and for defining service workflows and operating procedures; being highly selective in choosing suppliers, manufacturers and sub-contractors based on thorough review of their environmental sustainability and the sustainability and ethics of their supply chain; we select equipment rated for optimal energy efficiency and design solutions to minimise energy consumption and wastage where feasible; in shipping equipment and facilities we always seek to minimise additional or unnecessary packaging and packing; we ensure that all decommissioned electronic and electrical assets are disposed of according to EU WEEE or RoHS directives.
Moreover, at an organisational level, measures include: we are an ISO 14001-accreddited company, and continuously review, improve and strength our approach to sustainability; our approach is defined, documented, and communicated internally and externally in our various policies including our Environmental Policy, sustainable Development Policy, Energy Policy and Waste Policy; we operate a digital-first ‘paperless office’ approach to minimise and eliminate unnecessary printing wherever possible, and make extensive use of virtual meeting platforms to minimise unnecessary travel for meetings internally and with clients; and we are currently 2 years into 1 5-year plan to replace our corporate fleet with EVs (as of 2024, 20% of our existing petrol/diesel fleet has been replaced with EVs).Covid-19 recovery
This service supports COVID-19 recovery and wider H&S/pandemic-preparedness and response through providing a digital replacement for a physical requirement, and by facilitating remote participation in court and inquiry hearings. In providing a digital solution for the management and presentation of documentary and media evidence, this service eliminates the requirement to manually, physically prepare and distribute hard-copy evidence bundles to (potentially very large) numbers of people attending courtrooms and hearings, on a daily basis. This service therefore eliminates an opportunity for potential COVID-19 or other virus transmission. Additionally, and more significantly in terms of prevention, this service facilitates remote and hybrid/fully virtual participation in court or inquiry hearings through allowing evidence to be digitally presented through full integration with video communications platforms. This removes the requirement for physical, in-person attendance, allowing vulnerable or COVID-positive individuals to attend and participate, and supporting social distancing in courts and hearing rooms, providing an invaluable function in terms of prevention and transmission management. Further to this, when in-person operations or technical support are provided, our Operators and Technicians can wear masks and PPE as required. All equipment is disinfected and sanitised prior to and after each use, and our personnel adhere to our ISO 45001-accreditted procedures in all operational processes. More broadly, in delivering services, we make extensive use of video conferencing for meetings, use remote access for infrastructure monitoring and routine maintenance and updates, and facilitate remote working for our staff, to support COVID-19 recovery and to adhere to H&S best practice for preventing and controlling transmission of infections. Additionally we have undertaken facilities installations for clients alongside technology installations to minimise transmission risk, including ergonomic redesign of furniture for social distancing, installing HEPA filter systems, installing partitions and screens, and sanitation stations on premises.Tackling economic inequality
Pi Comms is committed to tackling economic inequality through providing opportunities to employment for people who face challenges entering employment or the sector specifically. Measures include having no mandatory requirements or qualifications for certain posts; offering training placements and training roles where employees can join the company at an entry level and progress through experience and training and development (including individuals not otherwise in employment, education or training); recruiting, advertising opportunities, and engaging potential employees through a broad range of channels including through relationships with organisations dedicated to supporting individuals facing challenges to employment.
We are also committed to tackling economic inequality at a strategic level through our approach to sustainable development, to ethical and transparent conduct in all of our business practices, and to working with sub-contractors and suppliers who can demonstrate their ability to meet and match our standards. Measures we utilise include undertaking regular supply chain review and auditing to ensure we adhere to our internal requirements for supply chain diversity, flexibility, resilience and quality. We have standards existing and new suppliers must meet in terms of their ability to demonstrate evidence against sustainability and ethical standards, of the integrity of their own supply chains, and sourcing of assets and their component parts and materials (including attainment of or adherence to recognised standards and guidance such as ISO26001 in Social Responsibility, the International Labour Organisation’s ‘Labour Inspection Convention’, the OECD’s ‘Due Diligence Guidance for Responsible Business Conduct’, or the Responsible Mineral’s Initiative’s ‘Responsible Minerals Assurance Process’ [RMAP]). We are also proactive in identifying opportunities to engage with, work with, hire or procure from SMEs or collaborative networks of smaller business to build and maintain a diverse supplier base.Equal opportunity
Pi Comms are committed to providing equality of opportunity to all applicants, staff and contractors, and utilise a range of strategic and operational measures to do so, and to continuously improve in this area.
Our objectives for and approach to providing Equal Opportunity is set out in our Equality and Diversity Policy, and implemented throughout the organisation by our senior management team. Our Equality and Diversity Policy defines our ethos as an organisation, and our procedures and mechanisms extending across recruitment, HR, staff management, and training and personnel development, to encourage and foster diversity and inclusivity, and remove barriers to progress for all.
Our Staff Handbook and training provides clear guidance on Equality and Diversity, staff rights and entitlement, and responsibilities and responses to any discrimination, bullying or harassment. Training in this area is provided to all staff during induction and on an annual basis, including, for example, in Equality, Diversity and Inclusion Awareness, Equality at Work Legislation, and Neurodiversity.
We actively seek out a broad range of applicants for posts: among wider measures, we post opportunities widely across a range of platforms and sites, we engage with schools and colleges to attract trainees and applicants, and we recruit both highly qualified personnel and novice trainees with no (or few relevant) qualifications.
We invest heavily in continuous professional development of all staff, including induction and compliance training, technical and role-specific training, and culture and ethos training. We utilise inhouse training programmes, specialist training partners and membership associations, and accredited third-level educational courses and industry or discipline-specific training are also utilised, ranging from short-term highly specific training modules to post-graduate qualifications.
Pi Comms has an almost even gender balance, including representation in senior management positions, atypical in the industry STEM industries overall.Wellbeing
Pi Comms prioritises staff wellbeing and utilise approaches across staff support, training and development, and fair work practices to demonstrate our commitment to wellbeing, its importance to the organisation, and to improve the physical and mental health, wellbeing, and work-life balance of our workforce.
We provide clear progression plans and pathways for all personnel and invest in continuous professional development for all. In additional to role-specific training, we additionally provide training related to wellbeing including, for example, in Managing Workplace Stress and Mental Health Awareness.
We implement flexible and family-friendly working practices including agreeing flexible working arrangements with personnel as needed and where possible to facilitate remote working, compressed hours, or phased retirement to support specific needs. Ensuring a strong sense of job security is critical to staff wellbeing, and we regularly engage with individuals to tailor and adjust their working terms to support changes in the personal lives. We adhere to ethical employment practices, making no use of zero hours contracts or ‘fire and rehire’ practices.
We provide fair pay to all staff. We pay competitive salaries and wages in line with the Living Wage rather than the minimum wage. Pi Comms subscribes to the principles of the EU Pay Transparency Directive (and we are committed to working to the requirements and spirit of any corresponding equivalent UK proposals or legislation).
We additionally employ other staff benefit schemes such as our Employee Assistance Programme (which provides a 24/7 confidential advice line for all staff for any professional or personal issues they may be experiencing) and our Bike to Work Scheme.
Pricing
- Price
- £21.90 a unit
- Discount for educational organisations
- No
- Free trial available
- No