Motorola Solutions UK Limited


TipSubmit is designed to facilitate open and efficient communication between law enforcement personnel and citizens.

TipSubmit enables community members to easily submit non-emergency tips to participating agencies, either anonymously or by creating a personal profile. This then allows the agency personnel to work in a more efficient manner.


  • Reporting
  • Tip filtering
  • Generate a link / transfer ownership of a tip
  • History of a tip
  • Live 2 way chat between citizen and agency
  • View of media files submitted from citizen
  • Archive/Spam tips


  • Quickly manage content
  • Quickly follow up with citizens with 2 way chat
  • Easily download a csv file based on tip data
  • Quickly disseminate tips
  • Easily share tip information with other agencies and key people


£0 to £645 per user per year

Service documents


G-Cloud 11

Service ID

5 9 0 0 9 5 1 4 0 2 1 8 3 8 3


Motorola Solutions UK Limited

Andy Glover


Service scope

Service scope
Software add-on or extension Yes, but can also be used as a standalone service
What software services is the service an extension to There is an integration with CommandCentral Aware and CommandCentral Vault
Cloud deployment model Public cloud
Service constraints For certain updates or planned maintenance that could interrupt the service users will be notified in advance via email.
System requirements Accessed by web browser on suitable desktop computer

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Response times depend on the severity of the issue
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support No
Support levels Response target within 2 working days.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started A welcome email will be sent out to the new user explaining how to set up their account. In addition support will enable them on the backend.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction Motorola will extract available user data at the end of contract
End-of-contract process - User accounts will be disabled
- Citizens will be unable to submit new tips

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The UI for the website was designed mobile first. Therefore a mobile experience was prioritsed during the design phase.
Service interface No
Customisation available Yes
Description of customisation Buyers can customize the incident type that will be visible to citizens when they fill out the tip form


Independence of resources Our architecture is dynamically scalable and continuously monitored to assure that the service is unaffected by variances in demand.


Service usage metrics Yes
Metrics types We currently use google analytics to track user interaction with the citizen page:


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency Less than once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
Data sanitisation process No
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Users can export a csv file with basic tip info data
Data export formats CSV
Data import formats Other
Other data import formats
  • PDF up to 100MB
  • DOC up to 100MB
  • Any other image or media file up to 100MB

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Availability and resilience
Guaranteed availability Commercially reasonable efforts will be made to ensure monthly availability of 99.9%. This is not guaranteed due to other components of the solution impacting availability.
Approach to resilience Available on request
Outage reporting Support will send out an email alert to the customer base

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication Username or password
Access restrictions in management interfaces and support channels Users of the tipmanager side need to have a log in and password in order to access
Access restriction testing frequency At least once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information No audit information available
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Conforms to ISO27000 standard
Information security policies and processes We have our own internal business and process security policies supporting the ISO/IEC 27001 standard

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Configure, Audit, Validate, Report exceptions, Investigate exceptions, Resolve
Vulnerability management type Supplier-defined controls
Vulnerability management approach Identify vulnerability through IT health checks or vendor supplied information, conduct risk analysis, implement security controls, monitor effectiveness of controls
Protective monitoring type Supplier-defined controls
Protective monitoring approach Collect events, Look for pattern anomalies, Report, Manage through incident management
Incident management type Supplier-defined controls
Incident management approach Categorise, Prioritise, Triage, Diagnose, Resolve, Resolution and recovery, Close incident

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No


Price £0 to £645 per user per year
Discount for educational organisations No
Free trial available No

Service documents

Return to top ↑