StarTraq Dome Environmental Enforcement Solution
A fully hosted enforcement platform that streamlines and automates your environmental enforcement operation. Manage your environmental crime cases such as littering and fly tipping from cradle to grave – issuing Fixed Penalty Notices (FPNS), Community Protection Notices (CPNS), Statutory notices, reminder letters, payments and court file generation.
Features
- Automated and configurable workflow
- Full document management
- Sophisticated reporting
- Will work with any phone hardware
- Processes any environmental offence type
- Case history available online
- Microsoft Office integration
- User friendly interface
- Capture offence and offender information on a mobile device
- Browser based
Benefits
- Issue tickets electronically ensuring consistency across your enforcement team
- Precise GPS recording of where the ticket is issued
- Improved efficiency through automation
- Automated ticket printing from the roadside
- Workflow changeable to meet new regulations and legislative requirements
- Payment portal for online and telephone payments
- Easy to integrate with 3rd party systems
- Future proofed by being developed with the latest technology
- Provides real time management information
- Provides huge productivity savings and reduces risk of human error
Pricing
£8.00 a transaction
Service documents
Request an accessible format
Framework
G-Cloud 10
Service ID
3 4 8 7 2 9 5 9 4 4 4 7 2 3 2
Contact
StarTraq Limited
Billy Kennedy
Telephone: 441295273000
Email: tenders@startraq.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- None
- System requirements
-
- Windows Server software and licence, preferably 2012 +
- Windows SQL software and licence, preferably 2012 +
- Internet Information Service (IIS) 7.5 +
- .NET Framework 4.5
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- StarTraq aim to provide and initial response to high priority cases within 60 minutes, medium priority cases within 120 minutes and low priority cases within 240 minutes.The support desk is open Monday to Friday 8:30am until 17:00pm (excluding weekends or UK bank holidays)
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- StarTraq aim to provide and initial response to high priority cases within 60 minutes, medium priority cases within 120 minutes and low priority cases within 240 minutes.The support desk is open Monday to Friday 8:30am until 17:00pm (excluding weekends or UK bank holidays)
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Upon engagement, a full project plan will be drawn up and milestones will be agreed between both parties. Once the service has been installed, a UAT environment will be created. A full training plan will be delivered to the customer. Training will be delivered onsite again with agreed milestones with each team member.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Data will be exported at the end of the contract and sent via a secure method to the users.
- End-of-contract process
- All data held will be returned to the customer. Once the contract ends and there is no extension required, our software licence will expire and our services will not be available. Once data has been returned to the customer it will be permanently deleted from any StarTraq systems.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- Our mobile solution allows users to issues tickets via a smartphone application that links directly into StarTraq Dome.
- Accessibility standards
- None or don’t know
- Description of accessibility
- Images and documents can be viewed through our web-based application.
- Accessibility testing
- None
- API
- Yes
- What users can and can't do using the API
- Our API is provided through a webservice. Most actions required in our systems are managed through our API, such as, users being able to insert data, update data and delete data. Data is encrypted when using our recommend setup. All API functions are documented and can be provided upon request.
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- Our application can be customised to: 1. Process different offence types 2. Provide users and permission groups with different levels of access 3. Display the status of cases at different stages in the offence process 4. Provide automatic case progression and document generation using our customisable workflow builder 5. Generate many different forms, fines, correspondence, letters, e-mails and notices which need to be produced as templates StarTraq provide up to 15 hours per annum of customisation with no charge. Ordinarily our staff will make these customisations for the end user although it is possible the users can make these customisations themselves with the appropriate permissions and training.
Scaling
- Independence of resources
- Our software uses scalability and elasticity to increase the workload of the service when the demand is necessary.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Real-time dashboards and custom reporting tools on number of offences processed for example.
- Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- EU-US Privacy Shield agreement locations
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Within our software, we have a dedicated section for exporting data. There is the availability to export any field from our system. We can either develop the communication to export to your system requirements or we simply can export the data via CSV.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- Please see terms and conditions for full service level agreement.
- Approach to resilience
- Available upon request.
- Outage reporting
- Email alerts and dashboard for further investigation.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Individual permission rules and groups can be set per user to restrict access to management interfaces, such as reporting and dashboard graphs and support channels.
- Access restriction testing frequency
- At least once a year
- Management access authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- LRQA
- ISO/IEC 27001 accreditation date
- 25/08/2015
- What the ISO/IEC 27001 doesn’t cover
- NA
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- Yes
- Any other security certifications
-
- BIP 0008
- ISO 9001:2015
- Cyber Essentials
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- StarTraq are ISO 27001 certified. Within this, we are constructed various policies which our teams adhere to, consisting of : - Network access - Acceptable Use, - Physical Security - Change Management - Secure Development These can be made available upon request. Policies are approved by top management who are responsible for setting top level policies, establishing objectives and for evaluating monitoring results to ensure systems are effective and are delivering intended outcomes.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- StarTraq Ltd have recognised the importance of effective change control (and the risks associated with ineffective change control) and have therefore formulated a Change Control Policy and set of procedures in order to address the opportunities and associated risks. This policy will ensure the implementation of change management and control strategies to mitigate associated risks such as: • Information being corrupted and/or destroyed • Network performance being disrupted and/or degraded • Productivity losses being incurred • Exposure to reputational risk Each change is documented and approved before the change is implemented.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- StarTraq use cloud based network monitoring tools to perform detailed technical vulnerability scans of all network attached workstations, laptops, servers and virtual environments. Scans are conducted at planned intervals, consisting of: • Application patch and service pack levels • OS patches and service pack levels When detected, remediation is prioritised according to the potential impact of a vulnerability being exploited, the importance of the device or system affected and balanced against the operational need for little or no disruption.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- StarTraq consider it to be vitally important to both proactively monitor our systems in order to respond quickly to new vulnerabilities and to record incidents and events via logs to enable us to investigate what went wrong and determine responsibility for incidents. When detected, remediation is prioritised according to the potential impact of a vulnerability being exploited, the importance of the device or system affected and balanced against the operational need for little or no disruption.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- StarTraq have a policy to manage incident reporting. The policy outlines quick detection of security events and weaknesses and quick reaction and response to security incidents along with a pre-defined approach to common events. StarTraq use a CRM ticketing system to report incidents. Management review the incidents for reporting purposes.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £8.00 a transaction
- Discount for educational organisations
- No
- Free trial available
- No