TipSubmit is designed to facilitate open and efficient communication between law enforcement personnel and citizens. TipSubmit enables community members to easily submit non-emergency tips to participating agencies, either anonymously or by creating a personal profile. This then allows the agency personnel to work in a more efficient manner.


  • Reporting
  • Tip filtering
  • Generate a link / transfer ownership of a tip
  • History of a tip
  • Live 2 way chat between citizen and agency
  • View of media files submitted from citizen
  • Archive/Spam tips


  • Quickly manage content
  • Quickly follow up with citizens with 2 way chat
  • Easily download a csv file based on tip data
  • Quickly disseminate tips
  • Easily share tip information with other agencies and key people


£0 to £645 per person per year

Service documents


G-Cloud 11

Service ID

3 4 4 1 2 3 2 9 5 8 2 4 7 4 8



Andy Glover


Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
There is an integration with CommandCentral Aware and CommandCentral Vault
Cloud deployment model
Public cloud
Service constraints
For certain updates or planned maintenance that could interrupt the service users will be notified in advance via email.
System requirements
Accessed by web browser on suitable desktop computer

User support

Email or online ticketing support
Email or online ticketing
Support response times
Support response times

Standard support is included with the service. Users may raise a case 24/7 via helpdesk. Customers may also contact their Business Relationship Manager. Resolver groups for faults 24/7. Resolver groups for changes and requests Mon - Fri 9-5. Response target within 2 working days.
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Support levels
Response target within 2 working days.
Support available to third parties

Onboarding and offboarding

Getting started
A welcome email will be sent out to the new user explaining how to set up their account. In addition support will enable them on the backend.
Service documentation
Documentation formats
End-of-contract data extraction
Motorola will extract available user data at the end of contract
End-of-contract process
- User accounts will be disabled
- Citizens will be unable to submit new tips

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
The UI for the website was designed mobile first. Therefore a mobile experience was prioritised during the design phase.
Service interface
Customisation available
Description of customisation
Buyers can customize the incident type that will be visible to citizens when they fill out the tip form


Independence of resources
Our architecture is dynamically scalable and continuously monitored to assure that the service is unaffected by variances in demand.


Service usage metrics
Metrics types
We currently use google analytics to track user interaction with the citizen page:


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
Less than once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
Data sanitisation process
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can export a csv file with basic tip info data
Data export formats
Data import formats
Other data import formats
  • PDF up to 100MB
  • DOC up to 100MB
  • Any other image or media file up to 100MB

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
Commercially reasonable efforts will be made to ensure monthly availability of 99.9%. This is not guaranteed due to other components of the solution impacting availability.
Approach to resilience
Available on request
Outage reporting
Support will send out an email alert to the customer base

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Users of the tipmanager side need to have a log in and password in order to access
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
Lloyd's Register Quality Assurance Limited
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
No exclusions
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
We have our own internal business and process security policies supporting the ISO/IEC 27001 standard

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Configure, Audit, Validate, Report exceptions, Investigate exceptions, Resolve.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Identify vulnerability through IT health checks or vendor supplied information, conduct risk analysis, implement security controls, monitor effectiveness of controls
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Collect events, Look for pattern anomalies, Report, Manage through incident management
Incident management type
Supplier-defined controls
Incident management approach
Categorise, Prioritise, Triage, Diagnose, Resolve, Resolution and recovery, Close incident

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£0 to £645 per person per year
Discount for educational organisations
Free trial available

Service documents

Return to top ↑