The Lava Group (NI) Limited

Cell Point

Cell Point is a detainee welfare panel that offers an extension to traditional records management systems. It provides an interface for custody and support staff to record information and update custody logs in real time, locally at the cell.

Features

  • Real time actions & interactions recorded between officers and detainees
  • Timed cell observations can be set up at pre-defined intervals
  • Observations cannot be retrospectively altered, ensuring report integrity isn't compromised
  • Single secure logon allows configurable access for different staff levels
  • User-friendly interface allows observations to be recorded quickly and effectively
  • Custody record management integration with third party software
  • Integrates with GPS clock ensuring observation times sync with CCTV
  • Real time reporting and audit trail
  • Power over Ethernet ensures cabling/installation is kelp to a minimum
  • Privilege based platform to maintain security

Benefits

  • Time saved in data entry to record management system
  • Real time detainee record updates available at the cell
  • Provides protection against false accusation
  • Improves integrity of detainee record
  • Assists with prevention of a near-miss or death in custody
  • Rapidly resolves custody complaints of mistreatment
  • Each cell visit is logged giving complete history & intelligence
  • Efficient deployment of staff within the custody suite
  • Provides officers at cell with critical detainee information

Pricing

£5224 per unit

Service documents

G-Cloud 11

313993444779195

The Lava Group (NI) Limited

Joanne McMullan

02890722070

j.mcmullan@thelavagroup.co.uk

Service scope

Service scope
Software add-on or extension Yes
What software services is the service an extension to Integration with police custody management systems
Cloud deployment model Hybrid cloud
Service constraints Lava provide solutions which are flexible to meet the needs of our clients and therefore place few constraints onto our customers. Our software is customisable depending on the requirements of the client. Types of customisation include, administration changes, system set-up, observation settings, timed access and site settings. Scheduled software updates and system downtime will be made available as agreed in partnership with the client and will be communicated well in advance. Maintenance arrangements for our customers are agreed
on a case-by-case basis ensuring our customers have access to services when they need it.
System requirements
  • Cell Point Licence per kiosk
  • Control and Management of access and responsibilities for authorised users
  • Contacts for system administration, data protection and security
  • Clients RMS must support a web service for data integration
  • Data Ownership - test data
  • Power connections available where system is installed
  • Network connectivity equipment

User support

User support
Email or online ticketing support Yes, at extra cost
Support response times Help desk services will be delivered from our service desk by a team of service analysts who are dedicated to providing high level of service to our clients from 08:00 hrs to 18:00 hrs (GMT) Monday to Friday excluding Bank Holidays.

Extended support hours for out of office hours and weekends are available as an additional service management option.

Authorised users will be able to log a call 24 /7 and response to calls will be made within 1 hour.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels As part of this service we will agree appropriate service levels for each identified priority level of incident. This includes: Critical / Major - the system is unavailable to all authorised users. Minor - access to one or more areas of functionality is unavailable to all authorised users.

A single point of contact for all incidents is managed through our service desk. The Service desk will contact the authorised user and conduct an initial analysis in order to try and resolve the operational issues. Where it is not possible to resolve the Support Request within the call, the authorised user will be notified and the support request will be escalated to the relevant technical team. Lava will use reasonable commercial endeavours to provide resolution in accordance with an agreed SLA agreement with the client.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Lava will provide comprehensive training to all user groups as required. This includes systems administration training and operation training. Our training is based on a Train the Trainer model to help create a team of onsite trainers who are capable of delivering a specific training program. These trainers are then equipped to train other staff users. As part of any consultancy engagement, Lava’s experienced consultants will endeavour to transfer extensive expertise utilising various "skills transfer" techniques. These techniques may be as follows:
• Open team discussions & brainstorming
• Q & A sessions covering all areas of the proposed service
• Custom technical manuals documenting all aspects of the service. This includes end user manuals, technical manuals and troubleshooting tips.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Only system configuration data is stored. This can be extracted if required.
End-of-contract process The cost of Cell Point solution package is based on hosting, software licences to use and support the system. There is a resource element to this offering which has been highlighted in the SFIA document.

Using the service

Using the service
Web browser interface No
Application to install Yes
Compatible operating systems Windows
Designed for use on mobile devices No
Accessibility standards None or don’t know
Description of accessibility Designed to be used by Operational Custody/ Support Staff to assist in the recording of detainee’s observations and interactions in custody cells/secure medical wings.

The interface directly relates to the tasks which staff members perform. Its intuitive design allows staff to successfully complete tasks given the sequential nature of steps given. Language is kept simple. Users are given a clear and immediate indication showing success or failure of an action. Colour is applied alongside the use of thick borders, bold and italics text to visual convey information. Further visual focus is given when icons selected go from grey to green.
Accessibility testing We have worked extensively with a number of custody teams and have taken into account their feedback during the product development phase of Cell Point, to ensure the specific needs of the UK police custody suites have been addressed. Further interface testing with users of assistive technology will be performed.
API No
Customisation available Yes
Description of customisation The user interface is fully configurable and customisable via the system set-up section. The user interface features configurable predefined text buttons providing quicker data recording to frequently accessed observations / actions.

Administration users can configure several key areas:
"Observation Levels" - For instance officers must complete cell visits and checks at intervals that are in accordance with the appropriate levels of observation i.e. level 1 or level 2 checks.
"Detainee markers / ailments" - this is critical information stored against a detainee. Also "Common Actions" such as food and drink offered or medication given to a detainee are all configurable.

Scaling

Scaling
Independence of resources Lava appreciates the importance of high performance and availability particularly given the nature of the environments we work in. Lava works closely with its clients to agree appropriate Service Levels Agreements (SLA). Our SLA is designed to ensure we meet the needs of our customers and it outlines what levels of service can be expected.

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Supplier-defined controls
Penetration testing frequency Never
Protecting data at rest Other
Other data at rest protection approach Security of data within the clients servers is the responsibility of the client.
Data sanitisation process No
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Data may be archived off the database onto another storage device or exported from the database using a .csv file. In the same way data can be imported used using a csv file.
Data export formats CSV
Data import formats CSV

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability The following is an example of an SLA.

Major Incident - Example A major failure/problem with the service, or No access to Cell Point, or Central Management Console not working.
Response - An engineer remote connection within maximum of 4 hours.
SLA - 95% of calls will result in engineer remote connection within 4 hours. Applies to remote connection support and remote diagnostics/repair.
Response - Service restored to functioning status within maximum of 24 hours.
SLA - 95% of calls restored to functioning status within maximum of 24 hours. Applies to remote connection support and remote diagnostics/repair.

Minor Incident - Example A minor failure/problem with the service, or Single CellPoint Kiosk not working, or System administration tools.
Response - An engineer remote connection within a maximum of 24 hours.
SLA - 95% of calls will result in engineer remote connection within 24 hours. Applies to remote connection support and remote diagnostics/repair.
Response - Service restored to functioning status within maximum of 48 hours.
SLA - 95% of calls restored to functioning status within maximum of 48 hours. Applies to remote connection support and remote diagnostics/repair.

Financial recompense model in which Service levels are not met are negotiated directly with Lava.
Approach to resilience This information is available upon request.
Outage reporting N/A

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels Username and password along with permission groups.
Access restriction testing frequency Never
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information No audit information available
How long system logs are stored for Less than 1 month

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach At Lava we take a holistic approach to security governance by applying effective risk management and good governance throughout the company. Risks are made visible to the senior management team who direct activities and enable resources to mitigate them to an acceptable level. Critical and persistent problems identified in internal reviews are communicated to the team so that they are aware of any associated risks and they can also consider the allocation of mitigating resources.
Information security policies and processes Our security policies and processes are in line with ISO 27001. These have not been accredited.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Lava's software development process for ISO 9001 incorporates key principles to the company's change management process. Changes to software are subject to review by a Senior Manager within the company. A procedure for communicating requirements, changes and functionality is documented. An audit trail of changes to software enables authorised staff to determine when a change was made, who made the change and the nature of the change. In addition consideration is taken on the potential security impact that some changes can have.
Vulnerability management type Undisclosed
Vulnerability management approach Undisclosed
Protective monitoring type Undisclosed
Protective monitoring approach Undisclosed
Incident management type Undisclosed
Incident management approach Lava's incident management process involves the detection and registration of incidents, followed by triage (classifying, prioritising and assigning incidents), incident resolution, closing and post-analysis. All security incidents are reported to Business-Support who are responsible for logging each incident on our incident management log. A senior manager will investigate the incident to ensure that the extent of the incident is clearly identified and the log has been completed. They will then implement the necessary immediate corrective action and identify any preventive measures to be considered. The monitoring and analysis of these reports will be discussed during the next management review meeting.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £5224 per unit
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑