With tuServ’s Biometrics module, officers can capture biometrics in two simple steps via two prints. Once captured and a quality rated established, a multiple system search will begin, resulting in matches with a confidence rating, providing assurance that the individual has been correctly identified.
- Biometrics; mobile identification authentication through quality rating on a fingerprint
- Connects to Home Office BSG for fingerprint results
- Processes to improve efficiency from officer through to back office
- Re-envisioning data capture, integrating with operational systems, re-using captured information
- Added results to the tuServ event dashboard for collaborative use
- Available on tuServ’s Android mobile application.
- Works with Integrated Biometrics and Cross Match fingerprint capture devices.
- Time and cost savings through less travel to the station
- Increasing officer visibility in the community
- Easy to use; saving hours of training time
- Information shared real-time with external services, resulting in quicker decisions
- Improved timeliness of stop and search process
- Fully audit trailed
£4 to £6 per licence per month
Black Marble Limited
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
|Service constraints||We require connectivity to on-premise systems, in order to extract and submit information, if that functionality is required.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
2 hours depending on criticality
Long term aim is 24/7, currently stands at 9 to 5.
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||WCAG 2.0 A|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Onsite support|
We provide a technical account manager. This support is included within the license cost.
The support arrangement has clearly defined timescales within which we have agreed to respond to a logged call . This does not imply a guarantee of a fix within this time.
Level 1 - The Software is entirely non-functional, response time 1 working hour from Acknowledgement.
Level 2 - The Software is functioning but an error exists which is preventing the use of a material component of the Software, response time is 4 working hours from Acknowledgement.
Level 3 - The Software is functioning but an error exists which is not preventing the use of a material component of the Software, response time is 7 working hours from Acknowledgement.
|Support available to third parties||No|
Onboarding and offboarding
* Technical assistance in the implementation of prerequisites and system requirements.
* Knowledge transfer for the management of the system.
* Training materials including documentation, videos.
* Train the trainer.
|End-of-contract data extraction||No customer data is stored within the system.|
|End-of-contract process||No customer data is stored within the system.|
Using the service
|Web browser interface||No|
|Application to install||Yes|
|Compatible operating systems||Android|
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||All versions of the client application have the same functionality. The UI is adaptive to support different screen sizes, but is consistent in look and feel.|
|Accessibility standards||None or don’t know|
|Description of accessibility||The application was developed in partnership with operational police forces, and has been tested to meet the operational needs of their officers.|
|Independence of resources||Currently each customer is provisioned in a dedicated tenant, and this is done for security and compliance reasons, but also means issues in one tenant cannot affect another.|
|Service usage metrics||No|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||Never|
|Protecting data at rest||Other|
|Other data at rest protection approach||TuServ does not store data at rest.|
|Data sanitisation process||No|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||We do not store any user data in tuServ.|
|Data export formats||Other|
|Other data export formats||We do not store operational data.|
|Data import formats||Other|
|Other data import formats||TuServ does not require bulk import of data.|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
Uptime of 99.99%.
Currently no financial penalties in place, but agree on a customer by customer basis.
|Approach to resilience||TuServ is provisioned using the Microsoft Azure public cloud. All provisioned services are deployed in line with Azure Best Practices for resilience.|
|Outage reporting||It is expected that tuServ will be deployed on an Azure subscription owned by the customer. As such, all the standard Azure alerting mechanisms for service degradation and outage are available.|
Identity and authentication
|User authentication needed||Yes|
|Other user authentication||TuServ integrates with ADFS and as such the customer has complete control of access restrictions, including MFA, Geographic sign-in restrictions etc.|
|Access restrictions in management interfaces and support channels||
Every user has their own login details.
All individual access.
|Access restriction testing frequency||At least once a year|
|Management access authentication||Other|
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users have access to real-time audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||No|
|Security governance certified||Yes|
|Security governance standards||Other|
|Other security governance standards||The standard of protection required varies with the level of protective marking, according to the Government Protective Marking Scheme (GPMS).|
|Information security policies and processes||
For documentation - The standard of protection required varies with the level of protective marking, according to the Government Protective Marking Scheme (GPMS).
Black Marble Information Security Procedural Guidelines.
IT Kit Disposal Process.
Security Incident Process.
Business Continuity Plan.
* Individuals report to a line manager, who reports to a member of the board.
* Regular meetings and electronic communications are used to disseminate information/policy & procedure updates to all staff.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||We use Microsoft Visual Studio Team Services and the Microsoft Secure Development Lifecycle for all of our development and work tracking.|
|Vulnerability management type||Undisclosed|
|Vulnerability management approach||TuServ would run on Microsoft Azure, and all the vulnerability management is carried out at the service provider level - we would adhere to all Microsoft SLAs, and guidance around dealing with threats and patches.|
|Protective monitoring type||Undisclosed|
|Protective monitoring approach||TuServ would run on Microsoft Azure, and all the protective monitoring is carried out at the service provider level - we would adhere to all industry standards, and Microsoft SLAs, and guidance around dealing with compromises and incidents.|
|Incident management type||Undisclosed|
|Incident management approach||TuServ would run on Microsoft Azure, and all the incident management is carried out at the service provider level - we would adhere to all industry standards, and Microsoft SLAs, and guidance around dealing with, and the management of, incidents.|
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||Yes|
|Price||£4 to £6 per licence per month|
|Discount for educational organisations||No|
|Free trial available||No|
|Pricing document||View uploaded document|
|Skills Framework for the Information Age rate card||View uploaded document|
|Service definition document||View uploaded document|
|Terms and conditions document||View uploaded document|