VoiceScript Technologies Ltd.

VoiceScript Technologies PROFix

VoiceScript Technologies' (VST) solution is an automated, multi-person, multi-language, transcription and translation system that records multiple people in a room/court setting, providing verbatim, court-ready transcripts. The are diarised, time-indexed and each speaker is identified against their utterances. Clicking on the utterance produces the speaker’s voice, video clips and real-time notes.


  • Digital Interview, Meeting and Discussion Recording
  • Multi person recording, multi language translation, high degree of accuracy
  • Powerful recording features including attributable voice, video and notes
  • Real time note, bookmarking, ability to attach documents and links
  • Configure standard interviews and/or prompts to provide court ready transcripts
  • Cloud based software uses off-the-shelf hardware
  • Numerous configurable reporting functions
  • Enhanced search facilities including linked interviews
  • Smart forms for interview capture processing, workflows automate content handling
  • Trend analysis, content co-referencing, proximity word searching, comparative sentiment analysis


  • Records conversations in multiple languages. Auto transcription and translation
  • Configurable SaaS. Conforms to ISO Standards.
  • Secure setup. Easy to use and understand. PEACE/ ROTI Compliant.
  • Police and Criminal Evidence Act 1984 (PACE), court ready transcripts
  • Transcript includes: text and video clips, notes and reference documents
  • Complex searches find trends, related information and comparative sentiment analysis
  • Management interface can be tailored to your reporting requirments
  • Workflows, prompts and questions can be defined ensuring uniform interviewing
  • Off site recording possible
  • Fast and secure Digital Interview Recording with far ranging uses


£795.00 per licence

  • Education pricing available

Service documents


G-Cloud 11

Service ID

3 2 8 4 5 2 1 7 5 2 6 7 9 1 3


VoiceScript Technologies Ltd.

Customer Care Team



Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
Users will receive a completed transcript with very high levels of accuracy with all original utterances embedded behind the text in the transcript.
System requirements
  • PC or laptop to use for system management
  • Off the shelf microphones and video cameras
  • Secure network and connectivity to a Cloud service
  • Can be ON-PREM (behind your firewall).

User support

Email or online ticketing support
Email or online ticketing
Support response times
We respond as quickly as possible and usually within one day. Under our support contract our 24/7/365 service desk will resolve all urgent issues within 48 hours
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Yes, at an extra cost
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
We have the ability to initiate a WEBCHAT from the secure Dashboard (accessible only by Customers).
Web chat accessibility testing
We have not tested this with assistive technology Users.
Onsite support
Yes, at extra cost
Support levels
An account manager is assigned to each client. They are charged with ensuring that all technical support is provided and the client's software is working as quickly as possible. Should a complex issue arise we have skilled technicians who provide second level support.
Support available to third parties

Onboarding and offboarding

Getting started
VST will install the software quickly and to the client's convenience. Once installed, on site training is provided to the users and the system manager. There are prompts and support text within the software. This training is included within the system installation costs.
Service documentation
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
  • Prompts and support within the software
  • Online WEBHELP
  • Specific "Videos" per customer accessible via their Secure Dashboards
  • Custom PDF and PPT files for "Train the Trainer" programmes.
End-of-contract data extraction
Transcripts are saved on the clients database and become their property. The default format is PDF, MPG, MP3 and JSON - that means it can be viewed without the VST software and may be extracted to an alternative application.
End-of-contract process
Access to the transcribing, reporting and search facilities are provided via the software on the PC that is in turn connected to our Cloud based software. At the end of the contract, access to this SaaS is removed. The client retains access to their previous transcripts that are stored on their client database.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Compatible operating systems
  • Android
  • IOS
  • Windows
  • Other
Designed for use on mobile devices
Service interface
Description of service interface
User interface is a feature rich "client" that captures audio, video, text, notes, snippets, photographs, images, CCTV footage and multiple audio channels (in different languages if so desired). During an interview a fully interactive workflow, (with Q&A, Minutes, Agenda, Actions) can be tracked as well as references to internal and external resources (Internal Policy Documents / External URL and Google pages). A full Reporting function provides complex situational searches, standard reports and customised searches and reports.
Accessibility standards
None or don’t know
Description of accessibility
Service accessed via a standard keyboard. Voice is captured via one or more, off the shelf microphones that are appropriate to the environment. Video is captured via one or more off the shelf video cameras. Data is transferred to the Cloud and is then transcripts automatically sent to the client's database where it is accessible via the management interface on the PC. The PC keyboard can be configured for accessibility by most users.
Accessibility testing
We have not had to undertake any interface testing.
Customisation available
Description of customisation
Clients can add the following to the interview capture: workflow, standard and/or required questions, prompts,customised forms notes and data links, participants, roles, note categories. To the reporting: standard and customisable reports, link interviews. To the searches: standard and customisable searches. To transcription: from multiple languages and speakers. To Translation: to/from over 60 languages. The system manager has complete and secure control over configurations and the content and its distribution.


Independence of resources
Each account is 'siloed' so that they have their own individual service. At the start of the service each client provides their anticipated volumes - The service automatically scales and monitors usage to ensure that any increase / reduction of service is efficiently processed by the underlying technology. Independent, Secure and Private Scale-On-Demand.


Service usage metrics
Metrics types
We monitor usage in a variety of cases;
- Duration of Meetings / Interviews
- Quantity of Meetings / Interviews
- Languages Spoken, Transcribed into, Translated to/from
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
All transcriptions are sent to the client's database in their preferred format. MP3, MPG, PDF, JSON and TEXT are the default formats. Other formats available - per customer request. Data is thus readily available outside of the VST software. Immediately after the Interview, the client may securely download the audio portion of the Interview and save it to a local device (USB Card / DVD Drive / Secure Folder / Public Folder / SFTP Service / Private Portal) or their own database.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • MP3
  • PDF
  • MS Word
  • RTF
  • XML
  • MPG
  • JSON
  • ODF
  • CSV
  • User Defined
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • MP3
  • Ms Word
  • Text
  • PDF
  • RTF
  • XML
  • JSON

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
We guarantee that Apps running in a customer subscription will be available 99.95% of the time.

If we do not achieve and maintain the Service Levels for each Service as described in agreed SLAs then users/organisation may be eligible for a credit towards a portion of their monthly service / hosting fees.

We will evaluate all information reasonably available to us and make a good faith determination of whether a Service Credit is owed. We will use commercially reasonable efforts to process claims during the subsequent month and within forty-five (45) days of receipt.

Certain Limitations Apply.

Monthly Uptime Percentage = (Maximum Available Minutes-Downtime)/(Maximum Available Minutes) x 100

If the Monthly Uptime Percentage is < 99.95% a service credit of 10% may apply.
If the Monthly Uptime Percentage is < 99% a service credit of 25% may apply.
Approach to resilience
Our solution (when hosted in an Azure datacenter) is considered High availability and we Maintain acceptable continuous performance despite temporary failures in services, hardware, datacenters, or fluctuations in load.

Protection against loss of an entire region through asynchronous replication for failover of virtual machines and data using services such as Azure Site Recovery and geo-redundant storage (GRS). Replication of virtual machines and data to one or more regions using Azure Backup.

Azure is certified under the first international standard to demonstrate the ability to prevent, mitigate, respond to and recover from disruptive incidents. (ISO-22301).
Outage reporting
We have a built-in Private Dashboard (per customer) that is maintained but us. We would receive notification (typically by email or service tickets) should there be any interruption of service detected.

An automated "polling for life" system could be implemented upon a Customers' special request.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Access restrictions are managed by Role-Based / Group Enabled and User Definitions. Equally, these access methodologies may be subjected to IP filtering and white-listing.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
  • Microsoft CSA STAR
  • Microsoft Azure 27001:2013
  • Microsoft Azure 27017:2015
  • Microsoft Azure 27018:2014
  • Microsoft Azure 20000-1:2011
  • Microsoft Azure 22301:2012
  • Microsoft Azure (not Govt) 9001:2015

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
Other security governance standards
We have an internal Governance model that manages and monitors security items relating to Data, Data-centres and Data Usage. Our company also has a on-staff Certified GDPR Practitioner for items pertaining to Data Governance, Ownership, DPO, SA, SD, DC, and DP items,
Information security policies and processes
We have 3 primary policies that govern our security measures. These are "VST Privacy Policy", "VST Remote Access Policy" and " VST Security and Response Plan Policy". each Policy is tied to a Board Member and each Board Member has a dedicated resource / resources to help affect ongoing monitoring and managing of these policies.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All items / changes are subjected to testing and tracking via revision numbering. All items are tested (in addition to operational fitfulness) for their security impact.
Vulnerability management type
Vulnerability management approach
As a software company, we are completely focused on function, capability, and quality. To ensure that we deliver high-quality results (and meet the expected levels of Service and Standards our customers demand) we follow a 4 step process;
1. Internal peer review.
2. External audit.
3. Quality Control via a Disciplined Promotion Process: No software is released without it being subjected to a staging area and simulated delivery.
4. Roll-Back Run Books: If an issue is discovered, we have the ability to seamlessly roll our software back to a previous production status without jeopardising operation.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We have the following process that is adhered to identify potential problem areas;
1. Regression testing.
2. The potential issue is logged in our error tracker, along with identifiable details.
3. A historical check is conducted.
4. If the error is new, we will revisit the pre-existing test scripts.
5. Identification of the ‘problem area’ species is the next step.
6. The problem, once identified, is more easily fixed, tested, and redeployed. If it is not a critical error, we will hold the fix until our next schedule upgrade rota.
Incident management type
Incident management approach
We track all items (operational and User-initiated) via inbound trouble tickets or emails or calls.
Each item is logged on our ticketing system.
On a regular basis (defined by our SLAs or Customer request) we generate Incident reporting and closure statistics.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
Connected networks
  • Public Services Network (PSN)
  • Police National Network (PNN)
  • Other
Other public sector networks
  • MPN
  • MoDNET


£795.00 per licence
Discount for educational organisations
Free trial available

Service documents

Return to top ↑