Digital software solution for frontline police to access and update secure data systems from a unified interface. A responsive mobile application including Notebook and offline capability that integrates existing national and local systems. Driving efficiency, reducing costs, and empowering officers with real-time information and collaboration. (includes Windows, Android, phone, tablet)
- Electronic Notebook to replace paper and reduce costs.
- Event Dashboard to create and review real time events.
- Around Me provides dynamic and visual situational awareness.
- Security of data; security of system; fully auditable content. Scalable.
- Collaboration; enables officers to work on same events in real-time.
- Extensive offline functionality.
- Ability to gather multi media content (video, audio, text, drawing).
- Connects to existing Policing systems including Athena, Niche, PCN.
- Searchable content.
- Forms, including Stop & Search, Statement, Intelligence, Investigation.
- Increased patrol time, removal of re-keying data.
- Saves time from upwards of 30minutes per officer per day.
- Reduces overheads.
- Increased officer visibility in the community.
- Effective and extensive offline functionality.
- Improves quality of input data.
- Reduces unnecessary travel time.
- Information provided sooner, resulting in quicker decision making.
£30 to £30 per licence per month
Black Marble Limited
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
|Service constraints||We require connectivity to on-premise systems, in order to extract and submit information, if that functionality is required.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
2 hours depending on criticality
Long term aim is 24/7, currently stands at 9 to 5.
|User can manage status and priority of support tickets||Yes|
|Online ticketing support accessibility||WCAG 2.0 A|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Onsite support|
We provide a technical account manager. This support is included within the license cost.
The support arrangement has clearly defined timescales within which we have agreed to respond to a logged call . This does not imply a guarantee of a fix within this time.
Level 1 - The Software is entirely non-functional, response time 1 working hour from Acknowledgement.
Level 2 - The Software is functioning but an error exists which is preventing the use of a material component of the Software, response time is 4 working hours from Acknowledgement.
Level 3 - The Software is functioning but an error exists which is not preventing the use of a material component of the Software, response time is 7 working hours from Acknowledgement.
|Support available to third parties||No|
Onboarding and offboarding
* Technical assistance in the implementation of prerequisites and system requirements.
* Knowledge transfer for the management of the system.
* Training materials including documentation, videos.
* Train the trainer.
|End-of-contract data extraction||TuServ does not store operational data, and acts merely as a collaborative interface and conduit to other systems.|
|End-of-contract process||As we store no client data, once the contract ends, there are no actions. Support will end.|
Using the service
|Web browser interface||Yes|
|Application to install||Yes|
|Compatible operating systems||
|Designed for use on mobile devices||Yes|
|Differences between the mobile and desktop service||All versions of the client application have the same functionality. The UI is adaptive to support different screen sizes, but is consistent in look and feel.|
|Accessibility standards||None or don’t know|
|Description of accessibility||The application was developed in partnership with operational police forces, and has been tested to meet the operational needs of their officers.|
|Description of customisation||
We can customise to meet specific requirements for individual forces. These include:
Process - we can create specific changes to the system for specific processes and procedures for that force.
System - integration with police and Line of Business systems, to extract and process data.
These are development customisations done by the supplier, and not by the user.
|Independence of resources||Currently each customer is provisioned in a dedicated tenant, and this is done for security and compliance reasons, but also means issues in one tenant cannot affect another.|
|Service usage metrics||No|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Developed Vetting (DV)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Managed by a third party|
|Penetration testing frequency||Never|
|Protecting data at rest||Other|
|Other data at rest protection approach||TuServ does not store data at rest.|
|Data sanitisation process||No|
|Equipment disposal approach||A third-party destruction service|
Data importing and exporting
|Data export approach||We do not store any user data in tuServ.|
|Data export formats||Other|
|Other data export formats||We do not store operational data.|
|Data import formats||Other|
|Other data import formats||TuServ does not require bulk import of data.|
|Data protection between buyer and supplier networks||
|Data protection within supplier network||TLS (version 1.2 or above)|
Availability and resilience
Uptime of 99.99%.
Currently no financial penalties in place, but agree on a customer by customer basis.
|Approach to resilience||TuServ is provisioned using the Microsoft Azure public cloud. All provisioned services are deployed in line with Azure Best Practices for resilience.|
|Outage reporting||It is expected that tuServ will be deployed on an Azure subscription owned by the customer. As such, all the standard Azure alerting mechanisms for service degradation and outage are available.|
Identity and authentication
|User authentication needed||Yes|
|Other user authentication||TuServ integrates with ADFS and as such the customer has complete control of access restrictions, including MFA, Geographic sign-in restrictions etc.|
|Access restrictions in management interfaces and support channels||
Every user has their own login details.
All individual access.
|Access restriction testing frequency||At least once a year|
|Management access authentication||Other|
Audit information for users
|Access to user activity audit information||Users have access to real-time audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users have access to real-time audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||No|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security accreditations||No|
|Named board-level person responsible for service security||No|
|Security governance accreditation||Yes|
|Security governance standards||Other|
|Other security governance standards||The standard of protection required varies with the level of protective marking, according to the Government Protective Marking Scheme (GPMS).|
|Information security policies and processes||
For documentation - The standard of protection required varies with the level of protective marking, according to the Government Protective Marking Scheme (GPMS).
Black Marble Information Security Procedural Guidelines.
IT Kit Disposal Process.
Security Incident Process.
Business Continuity Plan.
* Individuals report to a line manager, who reports to a member of the board.
* Regular meetings and electronic communications are used to disseminate information/policy & procedure updates to all staff.
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||We use Microsoft Visual Studio Team Services and the Microsoft Secure Development Lifecycle for all of our development and work tracking.|
|Vulnerability management type||Undisclosed|
|Vulnerability management approach||TuServ would run on Microsoft Azure, and all the vulnerability management is carried out at the service provider level - we would adhere to all Microsoft SLAs, and guidance around dealing with threats and patches.|
|Protective monitoring type||Undisclosed|
|Protective monitoring approach||TuServ would run on Microsoft Azure, and all the protective monitoring is carried out at the service provider level - we would adhere to all industry standards, and Microsoft SLAs, and guidance around dealing with compromises and incidents.|
|Incident management type||Undisclosed|
|Incident management approach||TuServ would run on Microsoft Azure, and all the incident management is carried out at the service provider level - we would adhere to all industry standards, and Microsoft SLAs, and guidance around dealing with, and the management of, incidents.|
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||Yes|
|Price||£30 to £30 per licence per month|
|Discount for educational organisations||No|
|Free trial available||No|
|Pricing document||View uploaded document|
|Terms and conditions document||View uploaded document|