Cell Point is a detainee welfare panel that offers an extension to traditional records management systems. It provides an interface for custody and support staff to record information and update custody logs in real time, locally at the cell.
- Real time actions & interactions recorded between officers and detainees
- Timed cell observations can be set up at pre-defined intervals
- Observations cannot be retrospectively altered, ensuring report integrity isn't compromised
- Single secure logon allows configurable access for different staff levels
- User-friendly interface allows observations to be recorded quickly and effectively
- Custody record management integration with third party software
- Integrates with GPS clock ensuring observation times sync with CCTV
- Real time reporting and audit trail
- Power over Ethernet ensures cabling/installation is kelp to a minimum
- Privilege based platform to maintain security
- Time saved in data entry to record management system
- Real time detainee record updates available at the cell
- Provides protection against false accusation
- Improves integrity of detainee record
- Assists with prevention of a near-miss or death in custody
- Rapidly resolves custody complaints of mistreatment
- Each cell visit is logged giving complete history & intelligence
- Efficient deployment of staff within the custody suite
- Provides officers at cell with critical detainee information
£5224 per unit
- Pricing document
- Skills Framework for the Information Age rate card
- Service definition document
- Terms and conditions
The Lava Group (NI) Limited
|Software add-on or extension||Yes|
|What software services is the service an extension to||Integration with police custody management systems|
|Cloud deployment model||Hybrid cloud|
Lava provide solutions which are flexible to meet the needs of our clients and therefore place few constraints onto our customers. Our software is customisable depending on the requirements of the client. Types of customisation include, administration changes, system set-up, observation settings, timed access and site settings. Scheduled software updates and system downtime will be made available as agreed in partnership with the client and will be communicated well in advance. Maintenance arrangements for our customers are agreed
on a case-by-case basis ensuring our customers have access to services when they need it.
|Email or online ticketing support||Yes, at extra cost|
|Support response times||
Help desk services will be delivered from our service desk by a team of service analysts who are dedicated to providing high level of service to our clients from 08:00 hrs to 18:00 hrs (GMT) Monday to Friday excluding Bank Holidays.
Extended support hours for out of office hours and weekends are available as an additional service management option.
Authorised users will be able to log a call 24 /7 and response to calls will be made within 1 hour.
|User can manage status and priority of support tickets||No|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||No|
|Onsite support||Yes, at extra cost|
As part of this service we will agree appropriate service levels for each identified priority level of incident. This includes: Critical / Major - the system is unavailable to all authorised users. Minor - access to one or more areas of functionality is unavailable to all authorised users.
A single point of contact for all incidents is managed through our service desk. The Service desk will contact the authorised user and conduct an initial analysis in order to try and resolve the operational issues. Where it is not possible to resolve the Support Request within the call, the authorised user will be notified and the support request will be escalated to the relevant technical team. Lava will use reasonable commercial endeavours to provide resolution in accordance with an agreed SLA agreement with the client.
|Support available to third parties||Yes|
Onboarding and offboarding
Lava will provide comprehensive training to all user groups as required. This includes systems administration training and operation training. Our training is based on a Train the Trainer model to help create a team of onsite trainers who are capable of delivering a specific training program. These trainers are then equipped to train other staff users. As part of any consultancy engagement, Lava’s experienced consultants will endeavour to transfer extensive expertise utilising various "skills transfer" techniques. These techniques may be as follows:
• Open team discussions & brainstorming
• Q & A sessions covering all areas of the proposed service
• Custom technical manuals documenting all aspects of the service. This includes end user manuals, technical manuals and troubleshooting tips.
|End-of-contract data extraction||Only system configuration data is stored. This can be extracted if required.|
|End-of-contract process||The cost of Cell Point solution package is based on hosting, software licences to use and support the system. There is a resource element to this offering which has been highlighted in the SFIA document.|
Using the service
|Web browser interface||No|
|Application to install||Yes|
|Compatible operating systems||Windows|
|Designed for use on mobile devices||No|
|Accessibility standards||None or don’t know|
|Description of accessibility||
Designed to be used by Operational Custody/ Support Staff to assist in the recording of detainee’s observations and interactions in custody cells/secure medical wings.
The interface directly relates to the tasks which staff members perform. Its intuitive design allows staff to successfully complete tasks given the sequential nature of steps given. Language is kept simple. Users are given a clear and immediate indication showing success or failure of an action. Colour is applied alongside the use of thick borders, bold and italics text to visual convey information. Further visual focus is given when icons selected go from grey to green.
|Accessibility testing||We have worked extensively with a number of custody teams and have taken into account their feedback during the product development phase of Cell Point, to ensure the specific needs of the UK police custody suites have been addressed. Further interface testing with users of assistive technology will be performed.|
|Description of customisation||
The user interface is fully configurable and customisable via the system set-up section. The user interface features configurable predefined text buttons providing quicker data recording to frequently accessed observations / actions.
Administration users can configure several key areas:
"Observation Levels" - For instance officers must complete cell visits and checks at intervals that are in accordance with the appropriate levels of observation i.e. level 1 or level 2 checks.
"Detainee markers / ailments" - this is critical information stored against a detainee. Also "Common Actions" such as food and drink offered or medication given to a detainee are all configurable.
|Independence of resources||Lava appreciates the importance of high performance and availability particularly given the nature of the environments we work in. Lava works closely with its clients to agree appropriate Service Levels Agreements (SLA). Our SLA is designed to ensure we meet the needs of our customers and it outlines what levels of service can be expected.|
|Service usage metrics||No|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||No|
|Datacentre security standards||Supplier-defined controls|
|Penetration testing frequency||Never|
|Protecting data at rest||Other|
|Other data at rest protection approach||Security of data within the clients servers is the responsibility of the client.|
|Data sanitisation process||No|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||Data may be archived off the database onto another storage device or exported from the database using a .csv file. In the same way data can be imported used using a csv file.|
|Data export formats||CSV|
|Data import formats||CSV|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
The following is an example of an SLA.
Major Incident - Example A major failure/problem with the service, or No access to Cell Point, or Central Management Console not working.
Response - An engineer remote connection within maximum of 4 hours.
SLA - 95% of calls will result in engineer remote connection within 4 hours. Applies to remote connection support and remote diagnostics/repair.
Response - Service restored to functioning status within maximum of 24 hours.
SLA - 95% of calls restored to functioning status within maximum of 24 hours. Applies to remote connection support and remote diagnostics/repair.
Minor Incident - Example A minor failure/problem with the service, or Single CellPoint Kiosk not working, or System administration tools.
Response - An engineer remote connection within a maximum of 24 hours.
SLA - 95% of calls will result in engineer remote connection within 24 hours. Applies to remote connection support and remote diagnostics/repair.
Response - Service restored to functioning status within maximum of 48 hours.
SLA - 95% of calls restored to functioning status within maximum of 48 hours. Applies to remote connection support and remote diagnostics/repair.
Financial recompense model in which Service levels are not met are negotiated directly with Lava.
|Approach to resilience||This information is available upon request.|
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||Username and password along with permission groups.|
|Access restriction testing frequency||Never|
|Management access authentication||
Audit information for users
|Access to user activity audit information||No audit information available|
|Access to supplier activity audit information||No audit information available|
|How long system logs are stored for||Less than 1 month|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||No|
|Named board-level person responsible for service security||Yes|
|Security governance certified||No|
|Security governance approach||At Lava we take a holistic approach to security governance by applying effective risk management and good governance throughout the company. Risks are made visible to the senior management team who direct activities and enable resources to mitigate them to an acceptable level. Critical and persistent problems identified in internal reviews are communicated to the team so that they are aware of any associated risks and they can also consider the allocation of mitigating resources.|
|Information security policies and processes||Our security policies and processes are in line with ISO 27001. These have not been accredited.|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||Lava's software development process for ISO 9001 incorporates key principles to the company's change management process. Changes to software are subject to review by a Senior Manager within the company. A procedure for communicating requirements, changes and functionality is documented. An audit trail of changes to software enables authorised staff to determine when a change was made, who made the change and the nature of the change. In addition consideration is taken on the potential security impact that some changes can have.|
|Vulnerability management type||Undisclosed|
|Vulnerability management approach||Undisclosed|
|Protective monitoring type||Undisclosed|
|Protective monitoring approach||Undisclosed|
|Incident management type||Undisclosed|
|Incident management approach||Lava's incident management process involves the detection and registration of incidents, followed by triage (classifying, prioritising and assigning incidents), incident resolution, closing and post-analysis. All security incidents are reported to Business-Support who are responsible for logging each incident on our incident management log. A senior manager will investigate the incident to ensure that the extent of the incident is clearly identified and the log has been completed. They will then implement the necessary immediate corrective action and identify any preventive measures to be considered. The monitoring and analysis of these reports will be discussed during the next management review meeting.|
|Approach to secure software development best practice||Supplier-defined process|
Public sector networks
|Connection to public sector networks||No|
|Price||£5224 per unit|
|Discount for educational organisations||No|
|Free trial available||No|