VoiceScript Technologies PROFix
VoiceScript Technologies' (VST) solution is an automated, multi-person, multi-language, transcription and translation system that records multiple people in a room/court setting, providing verbatim, court-ready transcripts. The are diarised, time-indexed and each speaker is identified against their utterances. Clicking on the utterance produces the speaker’s voice, video clips and real-time notes.
- Digital Interview, Meeting and Discussion Recording
- Multi person recording, multi language translation, high degree of accuracy
- Powerful recording features including attributable voice, video and notes
- Real time note, bookmarking, ability to attach documents and links
- Configure standard interviews and/or prompts to provide court ready transcripts
- Cloud based software uses off-the-shelf hardware
- Numerous configurable reporting functions
- Enhanced search facilities including linked interviews
- Smart forms for interview capture processing, workflows automate content handling
- Trend analysis, content co-referencing, proximity word searching, comparative sentiment analysis
- Records conversations in multiple languages. Auto transcription and translation
- Configurable SaaS. Conforms to ISO Standards.
- Secure setup. Easy to use and understand. PEACE/ ROTI Compliant.
- Police and Criminal Evidence Act 1984 (PACE), court ready transcripts
- Transcript includes: text and video clips, notes and reference documents
- Complex searches find trends, related information and comparative sentiment analysis
- Management interface can be tailored to your reporting requirments
- Workflows, prompts and questions can be defined ensuring uniform interviewing
- Off site recording possible
- Fast and secure Digital Interview Recording with far ranging uses
£795.00 per licence
- Education pricing available
VoiceScript Technologies Ltd.
|Software add-on or extension||No|
|Cloud deployment model||
|Service constraints||Users will receive a completed transcript with very high levels of accuracy with all original utterances embedded behind the text in the transcript.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||We respond as quickly as possible and usually within one day. Under our support contract our 24/7/365 service desk will resolve all urgent issues within 48 hours|
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||None or don’t know|
|Phone support availability||24 hours, 7 days a week|
|Web chat support||Yes, at an extra cost|
|Web chat support availability||24 hours, 7 days a week|
|Web chat support accessibility standard||None or don’t know|
|How the web chat support is accessible||We have the ability to initiate a WEBCHAT from the secure Dashboard (accessible only by Customers).|
|Web chat accessibility testing||We have not tested this with assistive technology Users.|
|Onsite support||Yes, at extra cost|
|Support levels||An account manager is assigned to each client. They are charged with ensuring that all technical support is provided and the client's software is working as quickly as possible. Should a complex issue arise we have skilled technicians who provide second level support.|
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||VST will install the software quickly and to the client's convenience. Once installed, on site training is provided to the users and the system manager. There are prompts and support text within the software. This training is included within the system installation costs.|
|Other documentation formats||
|End-of-contract data extraction||Transcripts are saved on the clients database and become their property. The default format is PDF, MPG, MP3 and JSON - that means it can be viewed without the VST software and may be extracted to an alternative application.|
|End-of-contract process||Access to the transcribing, reporting and search facilities are provided via the software on the PC that is in turn connected to our Cloud based software. At the end of the contract, access to this SaaS is removed. The client retains access to their previous transcripts that are stored on their client database.|
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||
|Designed for use on mobile devices||No|
|Description of service interface||User interface is a feature rich "client" that captures audio, video, text, notes, snippets, photographs, images, CCTV footage and multiple audio channels (in different languages if so desired). During an interview a fully interactive workflow, (with Q&A, Minutes, Agenda, Actions) can be tracked as well as references to internal and external resources (Internal Policy Documents / External URL and Google pages). A full Reporting function provides complex situational searches, standard reports and customised searches and reports.|
|Accessibility standards||None or don’t know|
|Description of accessibility||Service accessed via a standard keyboard. Voice is captured via one or more, off the shelf microphones that are appropriate to the environment. Video is captured via one or more off the shelf video cameras. Data is transferred to the Cloud and is then transcripts automatically sent to the client's database where it is accessible via the management interface on the PC. The PC keyboard can be configured for accessibility by most users.|
|Accessibility testing||We have not had to undertake any interface testing.|
|Description of customisation||Clients can add the following to the interview capture: workflow, standard and/or required questions, prompts,customised forms notes and data links, participants, roles, note categories. To the reporting: standard and customisable reports, link interviews. To the searches: standard and customisable searches. To transcription: from multiple languages and speakers. To Translation: to/from over 60 languages. The system manager has complete and secure control over configurations and the content and its distribution.|
|Independence of resources||Each account is 'siloed' so that they have their own individual service. At the start of the service each client provides their anticipated volumes - The service automatically scales and monitors usage to ensure that any increase / reduction of service is efficiently processed by the underlying technology. Independent, Secure and Private Scale-On-Demand.|
|Service usage metrics||Yes|
We monitor usage in a variety of cases;
- Duration of Meetings / Interviews
- Quantity of Meetings / Interviews
- Languages Spoken, Transcribed into, Translated to/from
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||Explicit overwriting of storage before reallocation|
|Equipment disposal approach||In-house destruction process|
Data importing and exporting
|Data export approach||All transcriptions are sent to the client's database in their preferred format. MP3, MPG, PDF, JSON and TEXT are the default formats. Other formats available - per customer request. Data is thus readily available outside of the VST software. Immediately after the Interview, the client may securely download the audio portion of the Interview and save it to a local device (USB Card / DVD Drive / Secure Folder / Public Folder / SFTP Service / Private Portal) or their own database.|
|Data export formats||
|Other data export formats||
|Data import formats||
|Other data import formats||
|Data protection between buyer and supplier networks||
|Data protection within supplier network||
Availability and resilience
We guarantee that Apps running in a customer subscription will be available 99.95% of the time.
If we do not achieve and maintain the Service Levels for each Service as described in agreed SLAs then users/organisation may be eligible for a credit towards a portion of their monthly service / hosting fees.
We will evaluate all information reasonably available to us and make a good faith determination of whether a Service Credit is owed. We will use commercially reasonable efforts to process claims during the subsequent month and within forty-five (45) days of receipt.
Certain Limitations Apply.
Monthly Uptime Percentage = (Maximum Available Minutes-Downtime)/(Maximum Available Minutes) x 100
If the Monthly Uptime Percentage is < 99.95% a service credit of 10% may apply.
If the Monthly Uptime Percentage is < 99% a service credit of 25% may apply.
|Approach to resilience||
Our solution (when hosted in an Azure datacenter) is considered High availability and we Maintain acceptable continuous performance despite temporary failures in services, hardware, datacenters, or fluctuations in load.
Protection against loss of an entire region through asynchronous replication for failover of virtual machines and data using services such as Azure Site Recovery and geo-redundant storage (GRS). Replication of virtual machines and data to one or more regions using Azure Backup.
Azure is certified under the first international standard to demonstrate the ability to prevent, mitigate, respond to and recover from disruptive incidents. (ISO-22301).
We have a built-in Private Dashboard (per customer) that is maintained but us. We would receive notification (typically by email or service tickets) should there be any interruption of service detected.
An automated "polling for life" system could be implemented upon a Customers' special request.
Identity and authentication
|User authentication needed||Yes|
|Access restrictions in management interfaces and support channels||Access restrictions are managed by Role-Based / Group Enabled and User Definitions. Equally, these access methodologies may be subjected to IP filtering and white-listing.|
|Access restriction testing frequency||At least once a year|
|Management access authentication||
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||
|Named board-level person responsible for service security||Yes|
|Security governance certified||Yes|
|Security governance standards||Other|
|Other security governance standards||We have an internal Governance model that manages and monitors security items relating to Data, Data-centres and Data Usage. Our company also has a on-staff Certified GDPR Practitioner for items pertaining to Data Governance, Ownership, DPO, SA, SD, DC, and DP items,|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||All items / changes are subjected to testing and tracking via revision numbering. All items are tested (in addition to operational fitfulness) for their security impact.|
|Vulnerability management type||Undisclosed|
|Vulnerability management approach||
As a software company, we are completely focused on function, capability, and quality. To ensure that we deliver high-quality results (and meet the expected levels of Service and Standards our customers demand) we follow a 4 step process;
1. Internal peer review.
2. External audit.
3. Quality Control via a Disciplined Promotion Process: No software is released without it being subjected to a staging area and simulated delivery.
4. Roll-Back Run Books: If an issue is discovered, we have the ability to seamlessly roll our software back to a previous production status without jeopardising operation.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
We have the following process that is adhered to identify potential problem areas;
1. Regression testing.
2. The potential issue is logged in our error tracker, along with identifiable details.
3. A historical check is conducted.
4. If the error is new, we will revisit the pre-existing test scripts.
5. Identification of the ‘problem area’ species is the next step.
6. The problem, once identified, is more easily fixed, tested, and redeployed. If it is not a critical error, we will hold the fix until our next schedule upgrade rota.
|Incident management type||Undisclosed|
|Incident management approach||
We track all items (operational and User-initiated) via inbound trouble tickets or emails or calls.
Each item is logged on our ticketing system.
On a regular basis (defined by our SLAs or Customer request) we generate Incident reporting and closure statistics.
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||Yes|
|Other public sector networks||
|Price||£795.00 per licence|
|Discount for educational organisations||Yes|
|Free trial available||No|