Lone Worker Protection Services
Orbis Protect's BS8484 lone worker service provides life-line protection to at-risk lone workers, 24/7/365. We offer a range of devices, smartphone apps and bespoke solutions. The system provides individuals with discreet SOS functionality, welfare checks, location positioning, mandown and pre-emptive alerting, backed up by full access to Police URN system.
Features
- 24/7/365 Wholly-owned Alarm Receiving Centre with Police URN
- Real-Time Lone Worker Location Information
- One-Touch SOS Functionality on all solutions
- 2-Way Audio Communication
- Roaming SIM Cards to ensure best Connectivity
- Bespoke Training
- Fully-Managed Implementation and Mobilisation
- Welfare Check Pre-Emptive Alerting Service - Amber Timer
- Compliance to BS8484: 2016, BS5979 Cat II, ISO27001, BS7858
- Secure Cloud-Based Management Portal
Benefits
- Fastest possible Police response
- Accurate location information during an incident for responder
- Covertly raise an alarm by pressing one button
- Two way conversation through the device/app to the ARC operator
- Automatically selects best network giving best possible network coverage
- Maximising user engagement ensuring ongoing high usage & compliance
- Bespoke device setup dependant on user needs.
- Checks on user welfare even in zero signal locations
- Confirmation that you are procuring a audited compliant system
- Management information securely accessed via any browser
Pricing
£1.05 to £9.95 a user a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 8 2 6 9 0 7 6 7 5 3 9 5 5 0
Contact
Orbis Protect Ltd
Bid Team
Telephone: 01895465500
Email: bidteam@orbisprotect.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
Workforce Management and Job Scheduling Solutions for most workforce management platforms.
Also compatible with Office365 Outlook Calendar integration and single sign on option - Cloud deployment model
- Hybrid cloud
- Service constraints
- Supported Devices and Apps
- System requirements
-
- Android
- IPhone/iOS
- Non-Smartphones
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- 1st Line Support Available 24/7/365 2nd Line Support Available Mon-Fri 9am - 5pm (ex Bank Holidays & Weekends)
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- Webchat developed by Zopim
- Onsite support
- Onsite support
- Support levels
-
All Lone Worker Protection Services are monitored 24/7/365, meaning 1st Line End-User Support is available 24/7/365.
This includes full solution Technical Support and Remote Diagnostic Assistance. 2nd Line Administrative Support is available via the Customer Service Desk 9am - 5pm Monday to Friday (exc Bank Holidays and Weekends).
This includes non-service critical Support, Change Management and Account Management. All Support is included with the package pricing. - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We provide a range of onboarding options from Fully-Managed to Self-Service and everything in between. Input of User Data can be done either by the customer via the Sentry Management Portal, or by our Customer Support Team using bulk upload templates. Our approach to implementation and deployment is to provide a bespoke service which best meets the needs and resources of the individual customer. Training options are flexible and can be carried out on-site or via Webinar. We also provide a full eLearning Module which is SCORM compliant. Service Users and End Users are also provided with User Guides and Training Video's. Our Training Video's are contextual as opposed to being purely function, which greatly assists with helping Users understand how our products and services operate both functionally but also practically in a day-to-day scenario. Training formats are also flexible. We can provide classroom training, tool-box talks and field-based training, as well as Train-The-Trainer and Lone Worker 'Champion' Training.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- ODF
- Other
- Other documentation formats
-
- SCORM eLearning
- Contextual Training Videos
- Tutorials
- User Guides
- All the above are also accessible via the web portal
- End-of-contract data extraction
- We can provide CSV export of all users records and zipped copies of all recordings in mp3 format.
- End-of-contract process
- If a customer chooses not to continue using the service then there are no additional charges once the service ends. For smartphone application customers, User Licenses will be removed from the system upon contract termination and will no longer be connected to the service. Users will be advised to the delete the application from their phones. For dedicated device customers, SIM Cards will be disconnected from the service upon contract termination and ALL contracted Devices must be returned to Orbis
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
The Orbis RedAlert Smartphone Applications are developed to run on Android and iOS operating systems.
The Sentry Management Portal is available on Desktop applications via a secure browser and is also optimised for use on Tablets - Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
-
The Sentry Management Portal is available via a secure https:// web interface.
Integrations are also available via a Secure XML SOAP Interface - Accessibility standards
- WCAG 2.1 AAA
- Accessibility testing
- 3rd Party Verification
- API
- Yes
- What users can and can't do using the API
-
Create, View, Modify and Remove Users and Devices
Create Events and Alarms
Exchange Data including Location, Date, Time, Event type, Unique ID - API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
The Sentry Management Portal provides Service User with the ability to customise some Portal, Device, App and API settings, including;
Portal - Customisable by Customer Administrator or Orbis Administrator
Access Permissions
Access Rights
Account Access Hierarchy
Add, Edit, Delete Permissions
Reporting Access
Devices - Customisable by Orbis Administrator ONLY
GPS Frequency
Amber Timer (on/off)
Amber Timer (frequency)
Fall Alert (on/off)
Fall Alert (sensitivity)
Smartphone Applications - Customisable by End User or Orbis Administrator
GPS Frequency
Amber Timer (on/off)
Amber Timer (frequency)
Fall Alert (on/off)
Fall Alert (sensitivity)
SOS Keypad Over-ride (on/off)
SOS Keypad Over-ride (sensitivity)
Scaling
- Independence of resources
- We actively manage the capacity of the system and use our 20 years of experience delivering the service to ensure that availability requirements are met. We regularly monitor call volumes and adjust staffing levels accordingly.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
Number of Active Instances
Device Utilisation
Alarm Volume
Alarm Type/Cause Analysis
Alarm Response Times
Last Known Location
Last Known Activity - Reporting types
-
- API access
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data can be exported via csv or pdf via our portal
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- Excel
- Data import formats
-
- CSV
- Other
- Other data import formats
- SQL
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Service availability is 99.9%. Any failure beyond this within a given month will result in a full month credit.
- Approach to resilience
- Available upon request
- Outage reporting
- Customers can access our Service Status website to see full live status updates. https://status.orbisprotect.com Service status reports are also made available via email upon request
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Access into management interfaces and support channels is both logically and physically seperated. Control of the systems is restricted to within secure controlled areas
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- Alcamus ISOQAR
- ISO/IEC 27001 accreditation date
- 21/07/2017
- What the ISO/IEC 27001 doesn’t cover
-
The scope is limited to
The Information Security Management System for the provision and management of remote security monitoring services and contact centre services at Orbis Protect Ltd, Dock Road South, Bromborough, Wirral CH62 4SQ in accordance with the Statement of Applicability.
This includes:
• All Physical and Information Assets owned by Orbis Protect Ltd
• Services and Support provided to Clients.
• Data provided for Clients.
• All Staff.
This scope takes account of the organisational context and needs and expectations of interested parties. - ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- BS5979 Cat II
- BS8484: 2016
- BS7858
- ISO27001: 2013
- ISO9001
- ISO14001
- ISO45001
- BS9518
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- Cyber Essentials Plus
- Information security policies and processes
-
The Company’s overall objective is to provide assurance to its existing and potential clients regarding its information security capabilities. In order to achieve this objective further, detailed Information Security Management System (ISMS) objectives are listed in DOC A3.
To achieve the stated objectives, the company has implemented an Information Security Management System (ISMS) in accordance with the international standard ISO/IEC 27001:2013.
The purpose of this policy is to protect Company’s information and related assets from all relevant threats, whether internal or external, deliberate or accidental.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
The following changes are considered routine or insignificant and are therefore not subject to this procedure:
• Malware updates
• Operating system vulnerability patching and hot fixes
• Other Third party software vulnerability patching and upgrades
Changes are identified on the Change Request form (REC 12.3). The Change request is then passed to the ISM where the details are logged using the Change Control log (REC 12.2).
The originator obtains sufficient information to complete the Change Request and obtains the Technical Manager’s approval for the change, taking into account any technical considerations, the costs of the exercise, the potential benefits. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Anti-Virus is set to be patched automatically by the centralised Antivirus management system.
Operating System patches are pushed down via ManageEngine, users are given the option to update. If the patch is critical an update is forced as well as forced restarts.
The technical department reviews the machines to ensure patches have been applied. Server patching is planned by Technical Manager and rolled out according to this plan.
The Technical Manager reviews software supplier sites as appropriate to ensure that technical vulnerabilities are understood.
Automatic updates for critical software are enabled as appropriate. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
The following are typical weaknesses and/or incidents that fall within the scope of this procedure:
• Personal accident
• Breach of Physical security
• Breach of information security
• Loss or theft of property
• Data/information missing, lost or incorrect
• Financial irregularities
• Violence, abuse or harassment
Information Security weaknesses, events and incidents are reported immediately they are seen or experienced to the Operations Manager, on form REC 16.1A which is kept on the internal network.
The Operations Manager ensures that the appropriate action is taken and recorded in the Incident Recording System (using form REC IRL1). - Incident management type
- Supplier-defined controls
- Incident management approach
-
The following are typical weaknesses and/or incidents that fall within the scope of this procedure:
• Personal accident
• Breach of Physical security
• Breach of information security
• Loss or theft of property
• Data/information missing, lost or incorrect
• Financial irregularities
• Violence, abuse or harassment
Information Security weaknesses, events and incidents are reported immediately they are seen or experienced to the Operations Manager, on form REC 16.1A which is kept on the Company internal network.
The person making the report will email a copy of the completed form to the Operations Manage
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
- Wellbeing
Fighting climate change
We are committed to helping improve the environments in which we work. We work collaboratively with colleagues, and other stakeholders, to deliver a range of initiatives including improving the utilisation of scarce resources, recycling and re-using materials and actively working with and support a range of local charities.
• Diverting Waste from Landfill - We have recycled or reused 4,297 tonnes of waste generated from our business activities which equates to 97% of our total waste being diverted from landfill.
• Use of environmentally friendly materials i.e., non-toxic and non-corrosive environmentally safe.
• Green Suppliers - The majority of products are sourced primarily on the basis of their green credentials from environmentally credible suppliers that have been approved via our rigorous vetting process.
• Green Fleet - Any new vehicles acquired meet the minimum mandatory standards for Co2 emissions for the relevant vehicle category based on Government Buying Standards.
• Travel Reduction - We employ staff members that live in regions that will be serviced under this contract.
• Utilisation of PDAs by operatives reduces vehicle travel and carbon emissions i.e., all job details are available electronically, therefore operatives do not have to return to the branch to pick up paperwork for the next job.
• Our Business planners plan work to reduce unnecessary travel locating jobs adjacent to each other.Equal opportunity
To ensure that equality and diversity is embedded within the Company, we have an Equal Opportunities Policy that is effectively implemented and communicated to all employees. We embrace sensible employment practices throughout the Company that promotes equality and diversity. We want to help by reducing inequalities and promote fairness in everything that we do.
In line with the agency workers regulations, any agency staff employed for 12 weeks or more on this contract would be entitled to the same pay, underlying employment terms and conditions, rewards and career development opportunities as those employed directly.Wellbeing
Our employees have access to range of health related services, which are available through our smart health services mobile app:
• Mental Health support – Support for employees on issues such as stress, anxiety, trauma, depression or bereavement
• 24/7 Virtual GP – Unlimited access to a GP, via phone or video call. Provision of medical advice, prescriptions and specialist referrals
• Health Checks – Online support to help manage health and lifestyle
• Nutritional consultations – Phone or online support from a team of specialist nutritionists, to give advice on matters such as weight loss, fertility, pregnancy and food intolerances
• Workout programmes – Online support to help create health and fitness goals through diet and exercise routines.
These measures demonstrate the commitment we have towards the well-being of our staff, and evidence the support we provide for the challenging circumstances our operatives have to work in.
Pricing
- Price
- £1.05 to £9.95 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
-
Our Trial Service provides organisations with the ability to review and assess our products and service before buying.
Trials include the full service provision and End Users are treated the same as Live customers Trial Setup and Training is provided.
Trial Analysis Reports and Review Meetings held throughout trial - Link to free trial
- https://redalert.orbisprotect.com/contact-us/