The Lava Group (NI) Limited

Cell Point

Cell Point is a detainee welfare panel that offers an extension to traditional records management systems. It provides an interface for custody and support staff to record information and update custody logs in real time, locally at the cell.


  • Real time actions & interactions recorded between officers and detainees
  • Timed cell observations can be set up at pre-defined intervals
  • Observations cannot be retrospectively altered, ensuring report integrity isn't compromised
  • Single secure logon allows configurable access for different staff levels
  • User-friendly interface allows observations to be recorded quickly and effectively
  • Custody record management integration with third party software
  • Integrates with GPS clock ensuring observation times sync with CCTV
  • Real time reporting and audit trail
  • Power over Ethernet ensures cabling/installation is kelp to a minimum
  • Privilege based platform to maintain security


  • Time saved in data entry to record management system
  • Real time detainee record updates available at the cell
  • Provides protection against false accusation
  • Improves integrity of detainee record
  • Assists with prevention of a near-miss or death in custody
  • Rapidly resolves custody complaints of mistreatment
  • Each cell visit is logged giving complete history & intelligence
  • Efficient deployment of staff within the custody suite
  • Provides officers at cell with critical detainee information


£5,224 a unit

Service documents


G-Cloud 12

Service ID

2 3 4 1 5 1 6 1 6 6 3 2 6 5 9


The Lava Group (NI) Limited Joanne McMullan
Telephone: 02890722070

Service scope

Software add-on or extension
What software services is the service an extension to
Integration with police custody management systems
Cloud deployment model
Hybrid cloud
Service constraints
Lava provide solutions which are flexible to meet the needs of our clients and therefore place few constraints onto our customers. Our software is customisable depending on the requirements of the client. Types of customisation include, administration changes, system set-up, observation settings, timed access and site settings. Scheduled software updates and system downtime will be made available as agreed in partnership with the client and will be communicated well in advance. Maintenance arrangements for our customers are agreed
on a case-by-case basis ensuring our customers have access to services when they need it.
System requirements
  • Cell Point Licence per kiosk
  • Control and Management of access and responsibilities for authorised users
  • Contacts for system administration, data protection and security
  • Clients RMS must support a web service for data integration
  • Data Ownership - test data
  • Power connections available where system is installed
  • Network connectivity equipment

User support

Email or online ticketing support
Yes, at extra cost
Support response times
Help desk services will be delivered from our service desk by a team of service analysts who are dedicated to providing high level of service to our clients from 08:00 hrs to 18:00 hrs (GMT) Monday to Friday excluding Bank Holidays.

Extended support hours for out of office hours and weekends are available as an additional service management option.

Authorised users will be able to log a call 24 /7 and response to calls will be made within 1 hour.
User can manage status and priority of support tickets
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
As part of this service we will agree appropriate service levels for each identified priority level of incident. This includes: Critical / Major - the system is unavailable to all authorised users. Minor - access to one or more areas of functionality is unavailable to all authorised users.

A single point of contact for all incidents is managed through our service desk. The Service desk will contact the authorised user and conduct an initial analysis in order to try and resolve the operational issues. Where it is not possible to resolve the Support Request within the call, the authorised user will be notified and the support request will be escalated to the relevant technical team. Lava will use reasonable commercial endeavours to provide resolution in accordance with an agreed SLA agreement with the client.
Support available to third parties

Onboarding and offboarding

Getting started
Lava will provide comprehensive training to all user groups as required. This includes systems administration training and operation training. Our training is based on a Train the Trainer model to help create a team of onsite trainers who are capable of delivering a specific training program. These trainers are then equipped to train other staff users. As part of any consultancy engagement, Lava’s experienced consultants will endeavour to transfer extensive expertise utilising various "skills transfer" techniques. These techniques may be as follows:
• Open team discussions & brainstorming
• Q & A sessions covering all areas of the proposed service
• Custom technical manuals documenting all aspects of the service. This includes end user manuals, technical manuals and troubleshooting tips.
Service documentation
Documentation formats
End-of-contract data extraction
Only system configuration data is stored. This can be extracted if required.
End-of-contract process
The cost of Cell Point solution package is based on hosting, software licences to use and support the system. There is a resource element to this offering which has been highlighted in the SFIA document.

Using the service

Web browser interface
Application to install
Compatible operating systems
Designed for use on mobile devices
Service interface
Description of service interface
The Service interface enables Operational Custody/ Support Staff to record information and update real-time custody logs, locally at the cell. Its intuitive design allows operators to view detainee summary information.

Its touchscreen enabled allowing users to select icons directly, increasing speed of recording and completing observations. The use of ‘icons’ to identify detainee markers/ailments are kept simple to easily identify critical information stored against a detainee. The information displayed is fully configurable and additional information can be added through an onscreen-keyboard.

The system supports unique logon allowing configurable access for different staff levels to view personal details about the detainee.
Accessibility standards
None or don’t know
Description of accessibility
Designed to be used by Operational Custody/ Support Staff to assist in the recording of detainee’s observations and interactions in custody cells/secure medical wings.

The interface directly relates to the tasks which staff members perform. Its intuitive design allows staff to successfully complete tasks given the sequential nature of steps given. Language is kept simple. Users are given a clear and immediate indication showing success or failure of an action. Colour is applied alongside the use of thick borders, bold and italics text to visual convey information. Further visual focus is given when icons selected go from grey to green.
Accessibility testing
We have worked extensively with a number of custody teams and have taken into account their feedback during the product development phase of Cell Point, to ensure the specific needs of the UK police custody suites have been addressed. Further interface testing with users of assistive technology will be performed.
Customisation available
Description of customisation
The user interface is fully configurable and customisable via the system set-up section. The user interface features configurable predefined text buttons providing quicker data recording to frequently accessed observations / actions.

Administration users can configure several key areas:
"Observation Levels" - For instance officers must complete cell visits and checks at intervals that are in accordance with the appropriate levels of observation i.e. level 1 or level 2 checks.
"Detainee markers / ailments" - this is critical information stored against a detainee. Also "Common Actions" such as food and drink offered or medication given to a detainee are all configurable.


Independence of resources
Lava appreciates the importance of high performance and availability particularly given the nature of the environments we work in. Lava works closely with its clients to agree appropriate Service Levels Agreements (SLA). Our SLA is designed to ensure we meet the needs of our customers and it outlines what levels of service can be expected.


Service usage metrics


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
Protecting data at rest
Other data at rest protection approach
Security of data within the clients servers is the responsibility of the client.
Data sanitisation process
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Data may be archived off the database onto another storage device or exported from the database using a .csv file. In the same way data can be imported used using a csv file.
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
The following is an example of an SLA.

Major Incident - Example A major failure/problem with the service, or No access to Cell Point, or Central Management Console not working.
Response - An engineer remote connection within maximum of 4 hours.
SLA - 95% of calls will result in engineer remote connection within 4 hours. Applies to remote connection support and remote diagnostics/repair.
Response - Service restored to functioning status within maximum of 24 hours.
SLA - 95% of calls restored to functioning status within maximum of 24 hours. Applies to remote connection support and remote diagnostics/repair.

Minor Incident - Example A minor failure/problem with the service, or Single CellPoint Kiosk not working, or System administration tools.
Response - An engineer remote connection within a maximum of 24 hours.
SLA - 95% of calls will result in engineer remote connection within 24 hours. Applies to remote connection support and remote diagnostics/repair.
Response - Service restored to functioning status within maximum of 48 hours.
SLA - 95% of calls restored to functioning status within maximum of 48 hours. Applies to remote connection support and remote diagnostics/repair.

Financial recompense model in which Service levels are not met are negotiated directly with Lava.
Approach to resilience
This information is available upon request.
Outage reporting

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
Username and password along with permission groups.
Access restriction testing frequency
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Less than 1 month

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
At Lava we take a holistic approach to security governance by applying effective risk management and good governance throughout the company. Risks are made visible to the senior management team who direct activities and enable resources to mitigate them to an acceptable level. Critical and persistent problems identified in internal reviews are communicated to the team so that they are aware of any associated risks and they can also consider the allocation of mitigating resources.
Information security policies and processes
Our security policies and processes are in line with ISO 27001. These have not been accredited.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Lava's software development process for ISO 9001 incorporates key principles to the company's change management process. Changes to software are subject to review by a Senior Manager within the company. A procedure for communicating requirements, changes and functionality is documented. An audit trail of changes to software enables authorised staff to determine when a change was made, who made the change and the nature of the change. In addition consideration is taken on the potential security impact that some changes can have.
Vulnerability management type
Vulnerability management approach
Protective monitoring type
Protective monitoring approach
Incident management type
Incident management approach
Lava's incident management process involves the detection and registration of incidents, followed by triage (classifying, prioritising and assigning incidents), incident resolution, closing and post-analysis. All security incidents are reported to Business-Support who are responsible for logging each incident on our incident management log. A senior manager will investigate the incident to ensure that the extent of the incident is clearly identified and the log has been completed. They will then implement the necessary immediate corrective action and identify any preventive measures to be considered. The monitoring and analysis of these reports will be discussed during the next management review meeting.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£5,224 a unit
Discount for educational organisations
Free trial available

Service documents