VoiceScript Technologies Ltd.

PROFix - Secure - PACE compliant - Digital Interview Recording Solution

PROFix solution is an automated, PACE compliant, Digital Interview Recording solution. PROFix securely records a multi-person, multi-language meeting (Witness / Suspect) and provides a tamperproof, verbatim, and court-ready transcript. Each utterance is time-indexed and speaker tag-identified. Compliant to MG15 and ROTI standards.


  • Digital Interview Recording (PACE compliant)
  • Multi person recording, multi language translation, high degree of accuracy
  • Powerful recording features including attributable voice, video and notes
  • Real time note, bookmarking, ability to attach documents and links
  • Configure standard interviews and/or prompts to provide court ready transcripts
  • Cloud based software uses off-the-shelf hardware. Low Cost of Ownership
  • Numerous configurable reporting functions
  • Enhanced search facilities including linked interviews, Full Analytics Suite available.
  • Smart forms for interview capture processing, workflows automate content handling
  • Trend analysis, content co-referencing, proximity word searching, comparative sentiment analysis


  • Records conversations in multiple languages. Auto transcription and translation
  • Configurable SaaS. Conforms to ISO Standards. Secure. Tamperproof.
  • Secure setup. Easy to use and understand. PEACE/ ROTI Compliant.
  • Police and Criminal Evidence Act 1984 (PACE), court ready transcripts
  • Transcript includes: text and video clips, notes and reference documents
  • Complex searches find trends, related information and comparative sentiment analysis
  • Management interface can be tailored to your reporting requirments
  • Workflows, prompts and questions can be defined ensuring uniform interviewing
  • Off site recording possible
  • Fast and secure Digital Interview Recording with far ranging uses


£39.95 to £425.00 a licence a month

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Admin@voicescripttech.com. Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

6 1 9 4 2 4 0 3 7 0 7 9 2 8 2


VoiceScript Technologies Ltd. Customer Care Team
Telephone: 02033978426
Email: Admin@voicescripttech.com

Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
Users will receive a completed transcript with very high levels of accuracy with all original utterances embedded behind the text in the transcript.

The system is hardware agnostic and not tied to a specific vendor.

Windows (ver 10 preferred) device is the minimum specification requried.
System requirements
  • PC or laptop with Windows (10 preferred) for system usage
  • Off the shelf microphones and video cameras compatible
  • Secure connectivity to a Cloud service (SFTP, VPN, Encryption)
  • Can be ON-PREM (behind your firewall).
  • Unified UI usage - Training is easy and rapidly deployed
  • May be used on current hardware - no upgrading required.
  • Compliant to Industry Standards in Hosting and Security
  • Central monitoring on Secure Web-based Dashboard

User support

Email or online ticketing support
Email or online ticketing
Support response times
We respond as quickly as possible and usually within one day. Under our support contract our 24/7/365 service desk will resolve all urgent issues within 48 hours.

We have a comprehensive Service Level Agreement addendum to all Service Engagements that help to determine the severity of an issue - coupled with contracted response times and resolution windows.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Yes, at an extra cost
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
We have the ability to initiate a WEBCHAT from the secure Dashboard (accessible only by Customers).
Web chat accessibility testing
We have not tested this with assistive technology Users.

WEBCHAT providers offer many accessibility configuration choices - we foresee no issues on implementing this to any / all customers.
Onsite support
Yes, at extra cost
Support levels
An account manager is assigned to each client. They are extensively trained and ensure that technical support is provided rapidly and concisely. Their KPI measurement is focussed on getting the client's software working as quickly as possible. Should a complex issue arise we have skilled technicians who provide second level support.
Support available to third parties

Onboarding and offboarding

Getting started
VST will install the software quickly and to the client's convenience. Once installed, on site training is provided to the users and the system manager. There are prompts and support text within the software. This training is included within the system installation costs.
Service documentation
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
  • Prompts and support within the software
  • Online WEBHELP
  • Specific Web Portals with instruction videos
  • Custom PDF and PPT files for
  • Training materials in PowerPoint and PDF formats
  • Online classes and in-room classes
End-of-contract data extraction
Transcripts are saved on the client's database and become their property. The default format is PDF, MPG, MP3, TXT, MS Word, DOCX and JSON - that means it can be viewed without the VST software and may be extracted to an alternative application.
End-of-contract process
Access to the transcribing, reporting and search facilities are provided via the software on the PC that is in turn connected to our Cloud based software. At the end of the contract, access to this SaaS is removed. The client retains access to their previous transcripts that are stored on their client database.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 7
  • Internet Explorer 8
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Compatible operating systems
  • MacOS
  • Windows
  • Other
Designed for use on mobile devices
Differences between the mobile and desktop service
Operationally, our software is identical between mobile and fixed devices. There are small changes to the system to accommodate intermittent access (mobile 3G, 4G, 5G, LTE) on a mobile device.

Training is identical, so adoption rapid and the cost to operate is low
Service interface
Description of service interface
User interface is a feature rich "client" that captures audio, video, text, notes, snippets, photographs, images, CCTV footage and multiple audio channels (in different languages if so desired). During an interview a fully interactive workflow, (with Q&A, Minutes, Agenda, Actions) can be tracked as well as references to internal and external resources (Internal Policy Documents / External URL and Google pages). A full Reporting function provides complex situational searches, standard reports and customised searches and reports.
Accessibility standards
None or don’t know
Description of accessibility
Service accessed via a standard keyboard. Voice is captured via one or more, off the shelf microphones that are appropriate to the environment. Video is captured via one or more off the shelf video cameras. Data is transferred to the Cloud and is then transcripts automatically sent to the client's database where it is accessible via the management interface on the PC. The PC keyboard can be configured for accessibility by most users.
Accessibility testing
We have not had to undertake any interface testing.
What users can and can't do using the API
API access is via agreed upon data-sharing / application sharing parameters. Our software stack allows for several different and varied entry-points, as well as a "operate in isolation' mode as well.

Changes to data adhere to a strict data restriction model - as our system maintains a clear and tamper-proof evidence handling chain. Nonetheless, APIs can be used to trigger events, interrogate databases and provide top-level management dashboards with updated content.

The process to initiate and use an API is easy and requires minimal guidance from our in-house support team.
API documentation
API sandbox or test environment
Customisation available
Description of customisation
Clients can add the following to the interview capture: workflow, standard and/or required questions, prompts,customised forms notes and data links, participants, roles, note categories. To the reporting: standard and customisable reports, link interviews. To the searches: standard and customisable searches. To transcription: from multiple languages and speakers. To Translation: to/from over 60 languages. The system manager has complete and secure control over configurations and the content and its distribution.


Independence of resources
Each account is 'siloed' so that they have their own individual service. At the start of the service each client provides their anticipated volumes - The service automatically scales and monitors usage to ensure that any increase / reduction of service is efficiently processed by the underlying technology. Independent, Secure and Private Scale-On-Demand.


Service usage metrics
Metrics types
We monitor usage in a variety of cases;
- Duration of Meetings / Interviews
- Quantity of Meetings / Interviews
- Languages Spoken, Transcribed into, Translated to/from
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
All transcriptions are sent to the client's database in their preferred format. MP3, MPG, PDF, JSON and TEXT are the default formats. Other formats available - per customer request. Data is thus readily available outside of the VST software. Immediately after the Interview, the client may securely download the audio portion of the Interview and save it to a local device (USB Card / DVD Drive / Secure Folder / Public Folder / SFTP Service / Private Portal) or their own database.
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • MP3
  • PDF
  • MS Word
  • RTF
  • XML
  • MPG
  • JSON
  • ODF
  • CSV
  • User Defined
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
  • MP3
  • Ms Word - DOC, DOCX
  • Text (ASCII)
  • PDF
  • RTF
  • XML
  • JSON

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
We guarantee that Apps running in a customer subscription will be available 99.95% of the time.

If we do not achieve and maintain the Service Levels for each Service as described in agreed SLAs then users/organisation may be eligible for a credit towards a portion of their monthly service / hosting fees.

We will evaluate all information reasonably available to us and make a good faith determination of whether a Service Credit is owed. We will use commercially reasonable efforts to process claims during the subsequent month and within forty-five (45) days of receipt.

Certain Limitations Apply.

Monthly Uptime Percentage = (Maximum Available Minutes-Downtime)/(Maximum Available Minutes) x 100

If the Monthly Uptime Percentage is < 99.95% a service credit of 10% may apply.
If the Monthly Uptime Percentage is < 99% a service credit of 25% may apply.
Approach to resilience
Our solution (when hosted in an Azure datacenter) is considered High availability and we Maintain acceptable continuous performance despite temporary failures in services, hardware, datacenters, or fluctuations in load.

Protection against loss of an entire region through asynchronous replication for failover of virtual machines and data using services such as Azure Site Recovery and geo-redundant storage (GRS). Replication of virtual machines and data to one or more regions using Azure Backup.

Azure is certified under the first international standard to demonstrate the ability to prevent, mitigate, respond to and recover from disruptive incidents. (ISO-22301).
Outage reporting
We have a built-in Private Dashboard (per customer) that is maintained but us. We would receive notification (typically by email or service tickets) should there be any interruption of service detected.

An automated "polling for life" system could be implemented upon a Customers' special request.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Other user authentication
Access Control Lists
IP Lockdowns
Whitelisted and Blacklisted entry points
IPSec verification
Access restrictions in management interfaces and support channels
Access restrictions are managed by Role-Based / Group Enabled and User Definitions. Equally, these access methodologies may be subjected to IP filtering, IP-Block restrictions, NAT Translated Algorithms and IP Black- White-listing.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
  • Microsoft CSA STAR
  • Microsoft Azure 27001:2013
  • Microsoft Azure 27017:2015
  • Microsoft Azure 27018:2014
  • Microsoft Azure 20000-1:2011
  • Microsoft Azure 22301:2012
  • Microsoft Azure (not Govt) 9001:2015

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
Other security governance standards
We have an internal Governance model that manages and monitors security items relating to Data, Data-centres and Data Usage. Our company also has a on-staff Certified GDPR Practitioner for items pertaining to Data Governance, Ownership, DPO, SA, SD, DC, and DP items,
Information security policies and processes
We have 3 primary policies that govern our security measures. These are "VST Privacy Policy", "VST Remote Access Policy" and " VST Security and Response Plan Policy". each Policy is tied to a Board Member and each Board Member has a dedicated resource / resources to help affect ongoing monitoring and managing of these policies.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
All items / changes are subjected to testing and tracking via revision numbering. All items are tested (in addition to operational fitfulness) for their security impact.
Vulnerability management type
Vulnerability management approach
As a software company, we are completely focused on function, capability, and quality. To ensure that we deliver high-quality results (and meet the expected levels of Service and Standards our customers demand) we follow a 4 step process;
1. Internal peer review.
2. External audit.
3. Quality Control via a Disciplined Promotion Process: No software is released without it being subjected to a staging area and simulated delivery.
4. Roll-Back Run Books: If an issue is discovered, we have the ability to seamlessly roll our software back to a previous production status without jeopardising operation.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We have the following process that is adhered to identify potential problem areas;
1. Regression testing.
2. The potential issue is logged in our error tracker, along with identifiable details.
3. A historical check is conducted.
4. If the error is new, we will revisit the pre-existing test scripts.
5. Identification of the ‘problem area’ species is the next step.
6. The problem, once identified, is more easily fixed, tested, and redeployed. If it is not a critical error, we will hold the fix until our next schedule upgrade rota.
Incident management type
Incident management approach
We track all items (operational and User-initiated) via inbound trouble tickets or emails or calls.
Each item is logged on our ticketing system.
On a regular basis (defined by our SLAs or Customer request) we generate Incident reporting and closure statistics.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
Connected networks
  • Public Services Network (PSN)
  • Police National Network (PNN)
  • Other
Other public sector networks
  • MPN
  • MoDNET


£39.95 to £425.00 a licence a month
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Admin@voicescripttech.com. Tell them what format you need. It will help if you say what assistive technology you use.