VoiceScript Technologies Ltd.

VoiceScript Technologies PROFix

VoiceScript Technologies' (VST) solution is an automated, multi-person, multi-language, transcription and translation system that records multiple people in a room/court setting, providing verbatim, court-ready transcripts. The are diarised, time-indexed and each speaker is identified against their utterances. Clicking on the utterance produces the speaker’s voice, video clips and real-time notes.

Features

  • Digital Interview, Meeting and Discussion Recording
  • Multi person recording, multi language translation, high degree of accuracy
  • Powerful recording features including attributable voice, video and notes
  • Real time note, bookmarking, ability to attach documents and links
  • Configure standard interviews and/or prompts to provide court ready transcripts
  • Cloud based software uses off-the-shelf hardware
  • Numerous configurable reporting functions
  • Enhanced search facilities including linked interviews
  • Smart forms for interview capture processing, workflows automate content handling
  • Trend analysis, content co-referencing, proximity word searching, comparative sentiment analysis

Benefits

  • Records conversations in multiple languages. Auto transcription and translation
  • Configurable SaaS. Conforms to ISO Standards.
  • Secure setup. Easy to use and understand. PEACE/ ROTI Compliant.
  • Police and Criminal Evidence Act 1984 (PACE), court ready transcripts
  • Transcript includes: text and video clips, notes and reference documents
  • Complex searches find trends, related information and comparative sentiment analysis
  • Management interface can be tailored to your reporting requirments
  • Workflows, prompts and questions can be defined ensuring uniform interviewing
  • Off site recording possible
  • Fast and secure Digital Interview Recording with far ranging uses

Pricing

£795.00 per licence

  • Education pricing available

Service documents

G-Cloud 11

328452175267913

VoiceScript Technologies Ltd.

Andrew Levine

02033978426

andrew.levine@voicescripttech.com

Service scope

Service scope
Software add-on or extension No
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints Users will receive a completed transcript with very high levels of accuracy with all original utterances embedded behind the text in the transcript.
System requirements
  • PC or laptop to use for system management
  • Off the shelf microphones and video cameras
  • Secure network and connectivity to a Cloud service
  • Can be ON-PREM (behind your firewall).

User support

User support
Email or online ticketing support Email or online ticketing
Support response times We respond as quickly as possible and usually within one day. Under our support contract our 24/7/365 service desk will resolve all urgent issues within 48 hours
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support Yes, at an extra cost
Web chat support availability 24 hours, 7 days a week
Web chat support accessibility standard None or don’t know
How the web chat support is accessible We have the ability to initiate a WEBCHAT from the secure Dashboard (accessible only by Customers).
Web chat accessibility testing We have not tested this with assistive technology Users.
Onsite support Yes, at extra cost
Support levels An account manager is assigned to each client. They are charged with ensuring that all technical support is provided and the client's software is working as quickly as possible. Should a complex issue arise we have skilled technicians who provide second level support.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started VST will install the software quickly and to the client's convenience. Once installed, on site training is provided to the users and the system manager. There are prompts and support text within the software. This training is included within the system installation costs.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
  • Prompts and support within the software
  • Online WEBHELP
  • Specific "Videos" per customer accessible via their Secure Dashboards
  • Custom PDF and PPT files for "Train the Trainer" programmes.
End-of-contract data extraction Transcripts are saved on the clients database and become their property. The default format is PDF, MPG, MP3 and JSON - that means it can be viewed without the VST software and may be extracted to an alternative application.
End-of-contract process Access to the transcribing, reporting and search facilities are provided via the software on the PC that is in turn connected to our Cloud based software. At the end of the contract, access to this SaaS is removed. The client retains access to their previous transcripts that are stored on their client database.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install Yes
Compatible operating systems
  • Android
  • IOS
  • Windows
  • Other
Designed for use on mobile devices No
Accessibility standards None or don’t know
Description of accessibility Service accessed via a standard keyboard. Voice is captured via one or more, off the shelf microphones that are appropriate to the environment. Video is captured via one or more off the shelf video cameras. Data is transferred to the Cloud and is then transcripts automatically sent to the client's database where it is accessible via the management interface on the PC. The PC keyboard can be configured for accessibility by most users.
Accessibility testing We have not had to undertake any interface testing.
API No
Customisation available Yes
Description of customisation Clients can add the following to the interview capture: workflow, standard and/or required questions, prompts,customised forms notes and data links, participants, roles, note categories. To the reporting: standard and customisable reports, link interviews. To the searches: standard and customisable searches. To transcription: from multiple languages and speakers. To Translation: to/from over 60 languages. The system manager has complete and secure control over configurations and the content and its distribution.

Scaling

Scaling
Independence of resources Each account is 'siloed' so that they have their own individual service. At the start of the service each client provides their anticipated volumes - The service automatically scales and monitors usage to ensure that any increase / reduction of service is efficiently processed by the underlying technology. Independent, Secure and Private Scale-On-Demand.

Analytics

Analytics
Service usage metrics Yes
Metrics types We monitor usage in a variety of cases;
- Duration of Meetings / Interviews
- Quantity of Meetings / Interviews
- Languages Spoken, Transcribed into, Translated to/from
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach All transcriptions are sent to the client's database in their preferred format. MP3, MPG, PDF, JSON and TEXT are the default formats. Other formats available - per customer request. Data is thus readily available outside of the VST software. Immediately after the Interview, the client may securely download the audio portion of the Interview and save it to a local device (USB Card / DVD Drive / Secure Folder / Public Folder / SFTP Service / Private Portal) or their own database.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • MP3
  • PDF
  • MS Word
  • RTF
  • XML
  • MPG
  • JSON
  • ODF
  • CSV
  • User Defined
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • MP3
  • Ms Word
  • Text
  • PDF
  • RTF
  • XML
  • JSON

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability We guarantee that Apps running in a customer subscription will be available 99.95% of the time.

If we do not achieve and maintain the Service Levels for each Service as described in agreed SLAs then users/organisation may be eligible for a credit towards a portion of their monthly service / hosting fees.

We will evaluate all information reasonably available to us and make a good faith determination of whether a Service Credit is owed. We will use commercially reasonable efforts to process claims during the subsequent month and within forty-five (45) days of receipt.

Certain Limitations Apply.

Monthly Uptime Percentage = (Maximum Available Minutes-Downtime)/(Maximum Available Minutes) x 100

If the Monthly Uptime Percentage is < 99.95% a service credit of 10% may apply.
If the Monthly Uptime Percentage is < 99% a service credit of 25% may apply.
Approach to resilience Our solution (when hosted in an Azure datacenter) is considered High availability and we Maintain acceptable continuous performance despite temporary failures in services, hardware, datacenters, or fluctuations in load.

Protection against loss of an entire region through asynchronous replication for failover of virtual machines and data using services such as Azure Site Recovery and geo-redundant storage (GRS). Replication of virtual machines and data to one or more regions using Azure Backup.

Azure is certified under the first international standard to demonstrate the ability to prevent, mitigate, respond to and recover from disruptive incidents. (ISO-22301).
Outage reporting We have a built-in Private Dashboard (per customer) that is maintained but us. We would receive notification (typically by email or service tickets) should there be any interruption of service detected.

An automated "polling for life" system could be implemented upon a Customers' special request.

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Access restrictions are managed by Role-Based / Group Enabled and User Definitions. Equally, these access methodologies may be subjected to IP filtering and white-listing.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications
  • Microsoft CSA STAR
  • Microsoft Azure 27001:2013
  • Microsoft Azure 27017:2015
  • Microsoft Azure 27018:2014
  • Microsoft Azure 20000-1:2011
  • Microsoft Azure 22301:2012
  • Microsoft Azure (not Govt) 9001:2015

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards Other
Other security governance standards We have an internal Governance model that manages and monitors security items relating to Data, Data-centres and Data Usage. Our company also has a on-staff Certified GDPR Practitioner for items pertaining to Data Governance, Ownership, DPO, SA, SD, DC, and DP items,
Information security policies and processes We have 3 primary policies that govern our security measures. These are "VST Privacy Policy", "VST Remote Access Policy" and " VST Security and Response Plan Policy". each Policy is tied to a Board Member and each Board Member has a dedicated resource / resources to help affect ongoing monitoring and managing of these policies.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach All items / changes are subjected to testing and tracking via revision numbering. All items are tested (in addition to operational fitfulness) for their security impact.
Vulnerability management type Undisclosed
Vulnerability management approach As a software company, we are completely focused on function, capability, and quality. To ensure that we deliver high-quality results (and meet the expected levels of Service and Standards our customers demand) we follow a 4 step process;
1. Internal peer review.
2. External audit.
3. Quality Control via a Disciplined Promotion Process: No software is released without it being subjected to a staging area and simulated delivery.
4. Roll-Back Run Books: If an issue is discovered, we have the ability to seamlessly roll our software back to a previous production status without jeopardising operation.
Protective monitoring type Supplier-defined controls
Protective monitoring approach We have the following process that is adhered to identify potential problem areas;
1. Regression testing.
2. The potential issue is logged in our error tracker, along with identifiable details.
3. A historical check is conducted.
4. If the error is new, we will revisit the pre-existing test scripts.
5. Identification of the ‘problem area’ species is the next step.
6. The problem, once identified, is more easily fixed, tested, and redeployed. If it is not a critical error, we will hold the fix until our next schedule upgrade rota.
Incident management type Undisclosed
Incident management approach We track all items (operational and User-initiated) via inbound trouble tickets or emails or calls.
Each item is logged on our ticketing system.
On a regular basis (defined by our SLAs or Customer request) we generate Incident reporting and closure statistics.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks Yes
Connected networks
  • Public Services Network (PSN)
  • Police National Network (PNN)
  • Other
Other public sector networks
  • MPN
  • MoDNET

Pricing

Pricing
Price £795.00 per licence
Discount for educational organisations Yes
Free trial available No

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Terms and conditions
Service documents
Return to top ↑