NICE Investigate Digital Evidence Management Solution (SaaS)

NICE Investigate Public Safety Digital Evidence Management Solution provides a single view of all digital evidence (body-worn video, public submissions, crime scene photos, 999 recordings, interview room recording, RMS, CAD, CCTV, social media forensic information) enabling the officer to automate the collection, analysis and sharing of digital evidence.


  • Automatic collection of evidence from local data silos
  • Business Portal for community to register cameras, upload CCTV content
  • Automatic transcoding of video/audio recordings into a playable format
  • Interactive visualisation of evidence on maps and timelines
  • Media processing – redaction, transcoding, clips, highlights, and bookmarks
  • One-Click Case Sharing with registered partners (CPS, Coroners, Courts, etc)
  • Analytics Increasing Case Insights (incl. parsing of documents & forms)
  • Complete activity, chain of custody tracking & Audit logs
  • DETS & MOPI Future Proof
  • Collection from the Public incl. Appeals Portal and Mobile upload


  • Single sign-on and single view of all digital evidence
  • Quick ingestion of Public sourced digital evidence from Police Appeals
  • Helps with Disclosure & Improved admissibility of evidence in courts
  • Improved evidence acquisition and consistent import processes
  • Improved operational efficiency – digitisation of evidence transforms processes
  • Access digital case file from anywhere on any device
  • Time savings in the collection analysis investigation & sharing process
  • Media processing – redaction, transcoding, clips, highlights, and bookmarks
  • Provide users with 'Suggestions' for Digital evidence from data sources
  • Improves the citizen experience within the Criminal Justice Process


£17.50 to £25 per unit per year

  • Free trial available

Service documents

G-Cloud 10



Stephen Ware


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints None
System requirements Windows Server OS

User support

User support
Email or online ticketing support Email or online ticketing
Support response times NICE offers a variety of response times, depending upon the critical nature of the issue being reported and the contract terms. Depending on the impact of the issue, critical issues are responded to within one hour and then longer, lower impact issues within one business day. NICE offers contracts which have 24 x 7 support, Monday-Friday 0830 -1730 support and also the ability to tailor your own support contract.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support No
Support levels NICE provides 3 levels of support: * Standard (Monday - Friday, 0830 to 1730) * Comprehensive (24 x 7) * Tailored (where the client can design their own support package from NICE). Support is managed via the NICE Account Manager and NICE Technical Account Manager. Your NICE Account Manager will be happy to provide you with further information relating to the different levels of service and associated costs.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started We will provide, online training and/or 'train-the-Trainer' training, see separate services offering.
Service documentation Yes
Documentation formats HTML
End-of-contract data extraction We will provide an open standard data export on a physical media.
End-of-contract process Exit services are an add-on to the contract.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Chrome
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service The web-pages use reactive layout that auto adapts to the display.
Accessibility standards None or don’t know
Description of accessibility N/A
Accessibility testing N/A
What users can and can't do using the API The API supports integrations with on-premise local data sources.
API documentation Yes
API documentation formats Other
API sandbox or test environment No
Customisation available Yes
Description of customisation User can customize searches, tile lay-out, filters, display order, data fields, types and names.


Independence of resources Each user organisation is assigned ring-fenced resources for their sole use.


Service usage metrics Yes
Metrics types Users can have usage, activity, audit & storage reports
Reporting types Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Managed by a third party
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Explicit overwriting of storage before reallocation
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach SFTP is used to transfer data from the customer to Nice.
Data export formats
  • CSV
  • Other
Other data export formats Web compliant media formats
Data import formats Other
Other data import formats Users can upload files in any format

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability 99.9 excl planned down-time
Approach to resilience The service provides full duplication in a physically separate data center with a hot stand-by.
Outage reporting Email- alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels We use RBAC for maintenance and deployment services
Access restriction testing frequency At least every 6 months
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
  • Other

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 SII - Standards Institute of Israel
ISO/IEC 27001 accreditation date 18th June 2007
What the ISO/IEC 27001 doesn’t cover Our accreditation covers all elements
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications CJIS Ready

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes All information, security policies and controls are based on the ISO 27001 guidelines. NICE has a dedicated board member responsible for Governance.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach In-house configuration and change management procedure in compliance and audited to ISO 9001 & ISO 27001
Vulnerability management type Supplier-defined controls
Vulnerability management approach We have a process of monitoring security alerts from our suppliers and integrate their security as required and when available.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Delivered by Microsoft Azure protective monitoring process as well as supplier defined controls.
Incident management type Supplier-defined controls
Incident management approach NICE's Incident management policy is a detailed document and will be made available upon request. The scope of this policy is to provide guidelines for implementing cyber and information security incident response process to ensure a consistent, unified and effective approach to the management of incidents and adverse events with a negative consequence to NICE operation. The policy includes: * Incident response process of cyber and information security incidents *Incidents use cases and containment activities * Incident declaration The following use cases: * Data Breach/ leakages * Critical infrastructure denial of services * Malware attack * Ransomware * Physical events

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No


Price £17.50 to £25 per unit per year
Discount for educational organisations No
Free trial available Yes
Description of free trial Basic Service package for a limited period of 3 months, excludes any required start-up services.


Pricing document View uploaded document
Service definition document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑