Capterra and Software Advice
Get a demo Get a demo

Case
Management

The full picture - audited, documented, proven.

Build stronger cases with speed and confidence.

Streamline how you capture, organise, and connect evidence – linking people, statements, timeline, actions, media, and incidents into a single, verified case file that’s easy to review, analyse and share when it matters most.

Incident Evidence & Investigations

Trusted by teams who demand clarity, not guesswork.

22 Bishopsgate
The Crown Estate
Kingfisher Group
ISS & City of London Corporation
Amazon Studios
NEXT
Virgin Money
The City of London Police
Allied Universal
JLL
B&Q
Knight Frank
Graff Diamonds

Zinc Systems

Resolve the cases that matter, faster.

Incident Management

Effortless capture
Collect and log different types of evidence quickly, right from the scene.

Evidence & Investigations

Faster Resolution
Streamlined and structured investigations - close cases with greater speed.

Evidence & Investigations

Connected dots
Link offenders, witnesses, victims, and supporting data into one narrative.

Evidence & Investigations

Complete visibility
Create complete, audit-ready case files - no blind spots or zero gaps.

Key case management features

loader-icon

A complete framework for case management.

Build prosecution-ready case files from the moment an incident is logged.

  • Assign cases and track ownership end-to-end.
  • Centralise evidence, media, and documentation in one place.
  • Map & link incidents across locations for spatial analysis.
  • Log suspects, victims, witnesses, and all involved parties.
  • Record financial losses and operational impact.
  • Enforce structured approvals and manager sign-off.
  • Generate branded PDF investigation reports instantly.
  • Export professional packs for leadership, insurers, or police

Know who's targeting your sites - and stop them coming back.

Build an intelligence-led offender library. Track patterns. Protect your people.

  • Record personal details, physical characteristics, and identification.
  • Attach photos, CCTV footage, and supporting evidence.
  • Link individuals across multiple incidents and locations.
  • Monitor repeat offenders and escalating frequency.
  • Manage banning registers with full case evidence attached.
  • Map organised crime group connections and networks.
  • Control profile access by team, region, or external partner.
  • Maintain a complete audit trail of every interaction.

Reliable accounts. Captured correctly. Ready when it counts.

Record and manage witness statements that hold up - from investigation to case resolution.

  • Log witness details, role and contact information.
  • Capture MG11 statements, anonymous tips, and internal reports.
  • Record statements written or via voice-to-text on site.
  • Upload signed statements, media, and supporting documents.
  • Track follow-up actions and all communication history.
  • Control access rights for confidentiality and compliance.
  • Export witness packs ready for insurers or authorities.

Record every detail. Handle every case with care.

Capture injuries, impact and welfare needs - accurately and compliantly.

  • Log victim profiles with incident context and contact details.
  • Record physical and psychological injuries in full.
  • Add medical updates to track recovery over time.
  • Attach injury reports, images, and supporting documents.
  • Task welfare checks and follow-up support.
  • Note time off work, compensation status, and recovery progress.
  • Export compliant reports for HR, insurers, or authorities.

Know exactly what’s involved. Track it to resolution.

Log every vehicle and asset linked to a case - and follow it through.

  • Record vehicle details: registration (partial or full), type, and owner.
  • Log asset descriptions, serial numbers, and estimated value.
  • Link vehicles and assets directly to incidents and sites.
  • Upload damage reports, images, and documentation.
  • Flag stolen or missing items with priority alerts.
  • Track recovery progress through to resolution.
  • Export reports for insurers, police, or internal audits.

Quantify the impact. Build the case for recovery.

Track every loss - direct, indirect, and product-specific - with precision.

  • Log theft, damage, downtime, and recovered value.
  • Record product losses by category, brand, code, and quantity.
  • Calculate total financial impact from item-level data.
  • Capture indirect losses: lost sales, productivity, and reputation.
  • Upload receipts, repair estimates, and stock reports.
  • Track recovery from insurers, civil claims, or offenders.
  • Generate cost summaries for finance, budgeting and reporting.
  • Export detailed reports for civil recovery or authorities.

Surface the patterns your team can't see manually.

Turn case data into actionable intelligence - before the next incident.

  • Compare incidents across time, location, and type to identify trends.
  • Automatically connect related cases using AI and predictive modelling.
  • Visualise hotspots with interactive maps and risk overlays.
  • Identify peak risk windows using smart time-based matrices.
  • Trace incident sequences across multiple sites and timelines.
  • Detect high-risk movement corridors and geographic clusters.
  • Analyse cumulative financial loss by timeframe and product category.
  • Map offender networks and organised crime group connections.

Zinc Systems
Zinc Systems

Build collaborative investigations that drive faster resolution and real results.

  • Tackle any investigation – end-to-end.
    From organised theft, internal incidents to external threats.
  • Launch investigations instantly
    Move incidents, or intel into structured investigation & case files.
  • Collaborate across teams
    Add FM, H&S, AP, LP, or HR to each case with controlled access.
  • Assign, track, deliver
    Keep momentum with actions, deadlines & updates all in one place.
  • Centralise your case file
    Manage evidence, reports, photos, and files – always audit-ready.

Zinc Systems
Incident Management

Investigate smarter, act sooner.

  • Measure business impact
    Log losses, risks, and recovery across departments to demonstrate ROI.
  • Visualise key entities and relationships
    View people, vehicles, and locations to see relationships and patterns.
  • Connect the dots with AI
    Surface hidden links, patterns, and repeat offenders using AI analysis.
  • View the bigger picture
    Monitor site activity or cross-location issues on one interactive map.
  • Generate shareable branded reports
    Extract investigation templates for leadership, insurers, or authorities.
  • Track performance in real-time
    Use dashboards to monitor case load, resolution rates, and risk trends.
Zinc Systems

Our impact in numbers

93% Reduction in OCG-linked incidents
Disrupt repeat offenders and organised crime groups through connected intelligence.

64% Reduction in both potential & actual loss
Proactive response and prevention strategies drastically reduce business impact.

91% Incident quality control achieved
Maintain compliant, police-ready and insurance-approved records with zero gaps.

65% Faster case resolution
Accelerate investigations by streamlining evidence, collaboration, and workflows.

40% Reduction in investigation time
Save hours per case through automation, templates, and AI-assisted link analysis.

75% Lower admin burden
Instantly generate branded, audit-ready reports—no more manual compilation.

Zinc Systems

Case studies

22 Bishopsgate, London - Protected by Zinc
Media City, Salford UK
Paddington Square, London - Protected By Zinc
The City of London
Graff Diamonds
Next
Culver Studios, California
Virgin Money - protected by Zinc
Victoria Secrets - VS&Co

22 Bishopsgate is the tallest skyscraper in the City of London standing at 278 m (912 ft) tall with 62 storeys. It's game-changing workspace occupies a prominent site in the financial district.

As Britain's smartest building, Zinc's platform manages and controls all security, safety and risk events, as well as providing critical alerting to occupiers during fire evacuations.

Read more

With over 300 stores, B&Q is one of the largest multinational DIY and home improvement companies and have worked closely with Zinc over the last 10 years to evolve how to capture, analyse and report criminal incidents.

"Synapse allows our Crime Centre team to spend their time doing what they do best, engaging with stores, security and law enforcement to ensure we have the best possible chance of a successful prosecution.”

Read more

MediaCityUK is a 200-acre mixed-use property development on the banks of the Manchester Ship Canal and its principal tenants are media organisations such as ITV, BBC and also the Quayside MediaCityUK shopping centre.

Integrating Zinc into the MediaCity security team, is a significant step forward in safeguarding the vibrant hub where security is paramount in such dynamic environments.

Read more

A super-connected building situated above Paddington Station and is the only station in London with direct access to all mainland stations. The smart mixed-use building is home to major global companies offices, 40 shops and restaurants.

The team use Zinc to report, manage and analyse all critical events and activities, ensuring the highest levels of safety and security.

Read more

The City of London Corporation, officially the municipal governing body of the City of London is the historic centre of London and the location of much of the United Kingdom's financial sector.

Zinc has been rolled out across all property assets to report, investigate and analyse all critical events across the complex property portfolio.

Read more

Graff is a British multinational jeweller with global locations and home to the most fabulous diamonds and jewels in the world.

"We were looking for a global incident and intelligence platform to encompass all our requirements. Zinc allows us to analyse all global threats, which allows us to manage the risks and inform teams of all operational tasks & threats from one very easy to use platform."

Read more

Next plc is a multinational clothing, footwear and home products retailer with around 500 stores in UK & Eire and 206 franchised stores in 33 countries.

"Our vision… bringing all aspects of our operational company risk under one reporting and management model, applicable anywhere in our business from Store to Distribution Centre to Corporate Office. Having accurate and timely data, with sufficient context, allows myself and other Senior leadership to make sound judgements and risk-led decisions to protect our people, our consumers, and our profit."

Read more

Amazon Studios is an American television and film producer and distributor that is a subsidiary of Amazon. It specialises in developing television series and distributing and producing films in more than 240 countries and territories worldwide.

Zinc was awarded a contract to delivery command, control and communication for all incidents at premier film studios.

Read more

Virgin Money is a financial services company offering retail and business banking and part of the Virgin Group.

"What could have been a daunting and complex mobilisation, turned out to be seamless and enjoyable, we felt engaged every step of the way. SYNAPSE is a game-changing addition to our organisation; we continue to refine the system to our needs and the team have been open to our feedback in this regard. Been a smooth process all the way through." Physical & Personal Security Team

Read more

Victoria's Secret is the world's go-to label for giving women everywhere one-of-a-kind lingerie, sleep, beauty and accessories.

"Implementation of any system is a challenge in any business and aligning all departments and actions was no easy task - but the team at Zinc were on hand literally day & night to ensure we achieved success."

Read more
Zinc Systems

Why Zinc?

Join our growing community of world-leading customers and unlock rapid ROI with Zinc's innovative platform. Easily adaptable to your unique challenges, Zinc empowers your organisation to accelerate success and drive measurable impact.

Why Zinc? Loved by users

Loved by users
Outstanding usability and flexibility, ensuring a positive experience every time.

Why Zinc? World-class support

One unified platform
Expand at your own pace with an industry-leading and award winning modular platform.

Why Zinc? Reliable & secure

Reliable & secure
Highly trusted for reliability and robust security - providing complete peace of mind.

Why Zinc? Agile & Innovative

World-class support
Delivering exceptional rapid support, assistance - ensuring customer satisfaction.

Why Zinc? Join our community

Agile & innovative
Consistently delivering cutting-edge solutions evolving market and customer needs.

  • Tired of missing details in investigations?

  • BOOK DEMO

Explore our modules.

Incident Management software

Navigate Crises, Maintain Continuity

Incident
Management

Mass Notification system

Inform Quickly, Protect People

Mass
Notification

Case Management System

Secure Evidence, Connect The Dots

Case Management

Patrol Management system

Secure Operations, Ensure Compliance

Patrol
Management

Audits Checks Inspections

Get Compliance Right, Every time

Audits, Checks & Inspections

Task Management software

Get Things Done, The Right Way

Tasks &
Procedures

Daily Occurrence Book

Stay Agile, Ensure Resilience

Daily Occurrence Book

Keys & Asset Management

Smart tracking, protect assets

Key & Asset Management

Visitor Management

Smart, secure visitor experiences

Visitor Management

Postroom Management

Full traceability, track every parcel

Postroom Management

Threat Intelligence

Seamless, Actionable Intelligence

Threat
Intelligence

Data Analysis Software

Smarter Insights, Stronger Outcomes

Data Analysis & Reporting

Artificial Intelligence

The future, intelligently engineered

Artificial Intelligence

Admin Console

Configure Fast, Adapt Instantly

Administration
Portal

Integrations & APIs

Connect Systems, Scale Smarter

Integrations

Resources: Frequently Asked Questions

Gathering the details of injured parties during an incident is crucial for several reasons, each contributing to effective incident management, legal compliance, and compassionate response. Collecting these details should be done sensitively and in compliance with privacy laws to respect the dignity and rights of the injured. Overall, the practice is not only a procedural necessity but also a cornerstone of ethical and effective incident management. Here’s a breakdown of why these details are essential:

Immediate Medical Response:

Collecting information about injuries allows first responders and medical teams to provide appropriate and timely medical care. Knowing the nature and severity of injuries helps prioritize treatment efforts, especially in large-scale incidents or emergencies.

Accurate Incident Reporting:

Detailed records of injuries contribute to the accuracy and comprehensiveness of incident reports. Such reports are vital for investigations, understanding how the incident occurred, and implementing measures to prevent future occurrences.

Legal and Insurance Purposes:

Information about injured parties is critical for insurance claims and legal proceedings. Detailed injury data can support claims for compensation and is often required for legal scrutiny and compliance with workplace safety regulations.

Health and Safety Compliance:

Organisations are generally required to follow health and safety laws that mandate reporting and documentation of any injuries occurring on their premises. Gathering detailed information helps in complying with these regulations and in conducting safety audits.

Future Safety Enhancements:

Data collected from incidents, including details about injuries, can be analyzed to identify trends or recurring safety issues. This analysis is crucial for improving safety protocols and preventing similar incidents in the future.

Psychological Support:

Knowing who has been injured, along with the extent of their injuries, helps in providing appropriate psychological support and counseling to victims and witnesses. This support is essential for their recovery and well-being.

Family and Community Communication:

Accurate and timely information about injuries is crucial for communicating with families and the community, especially in high-stress situations or disasters. It helps in managing the emotional and social impact of the incident.

Operational Continuity and Recovery:

In a workplace setting, understanding the impact of an incident on personnel allows for better management of staff shortages and operational disruptions. It aids in planning for temporary replacements or adjustments in operations.

 

An MG11 witness statement is a formal document used in the legal system of England and Wales. It records the evidence of a witness related to a criminal case. This document is an account of what the witness saw, heard, or experienced concerning the incident in question.

The MG11 witness statement is a foundational document in the justice process, providing crucial evidence and helping to ensure that the judicial system works transparently and fairly. An MG11 template is available into our platform. Here are some key aspects of the MG11 witness statement:

Purpose:

The primary purpose of the MG11 is to provide a detailed and accurate account of the witness's testimony, which can be used by the police, prosecutors, and the courts during criminal proceedings. It serves as an essential piece of evidence in building a case against the accused.

Format:

The MG11 is formatted to ensure consistency and comprehensiveness in witness testimonies. It includes the witness's personal details, the statement itself, and a declaration that the witness understands they are liable for prosecution if they are found to have lied in the statement.

Usage:

Once completed, the MG11 can be used by the prosecution as evidence in court. If the case goes to trial, the witness may be required to attend court to testify in person and confirm their statement under oath.

Voluntary Statement:

Typically, an MG11 is provided voluntarily by the witness. It is taken by a police officer or another authorised person, who will guide the witness to ensure all relevant details are included.

Confidentiality:

The details in the MG11 are handled with confidentiality but are shared with both the defence and prosecution as part of the evidence disclosure process. This ensures that the accused has a fair opportunity to review all evidence and prepare a defence.

Legal Significance:

Signing an MG11 is a serious matter. The witness's signature at the end of the statement confirms that they believe the information is true to the best of their knowledge and understanding, and they are aware of the penalties for making a false statement.

 

In essence, such a library is a fundamental tool that contributes to the security and operational efficiency of organisations dealing with critical events, enhancing their ability to manage risks and protect assets.

Building a library of suspects or offenders is crucial for several reasons:

Enhanced Preparedness and Response:

A library of known suspects or offenders allows for quicker identification when similar incidents occur. This enables a more tailored and swift response, potentially preventing escalation.

Pattern Recognition:

By maintaining a comprehensive database, organisations and law enforcement can identify patterns of behaviour and connections between different events. This is vital for predicting and preventing future crimes.

Resource Allocation:

With a detailed understanding of the individuals involved in past incidents, resources such as personnel and technology can be more effectively allocated based on the anticipated threat level and known tactics of these offenders.

Legal and Compliance:

Such libraries help in adhering to legal and compliance requirements by ensuring that all actions taken during and after an incident are well-documented and justifiable in a court of law if necessary.

Continuous Improvement:

Analysing past incidents and the offenders involved provides critical insights that can be used to strengthen security measures, training programs, and overall incident response strategies.

Public Safety:

For public safety organisations, having a well-maintained library helps in community policing efforts, aids in disseminating information to the public when necessary, and enhances the overall safety of the community.

Collaborative Efforts:

Sharing information about suspects or offenders with other agencies and organisations promotes a collaborative approach to managing and mitigating critical events, enhancing the effectiveness of collective security measures.

Historical Data Analysis:

Over time, the accumulated data can be analysed to understand long-term trends in criminal behaviour, the effectiveness of interventions, and the evolution of crime in response to societal changes.

 

Building an effective banning register for a location, such as a retail store, entertainment venue, corporate location, or community centre, involves several best practices to ensure it is lawful, efficient, and respectful of privacy. By adhering to these best practices, an organization can manage a banning register that not only enhances the security and safety of the location but also respects the rights and dignity of all individuals involved. Here’s a step-by-step approach:

Define Criteria for Banning:

Clearly outline the behaviours or actions that would lead to someone being added to the banning register. This might include theft, violent behaviour, harassment, or other specific conduct that threatens the safety or well-being of others.

Legal Compliance:

Ensure the register adheres to local and national data protection and privacy laws, such as the GDPR in Europe or the CCPA in California. Consult legal experts to align your practices with these regulations, especially regarding the collection, storage, and sharing of personal data.

Consistent Documentation:

Document incidents consistently and thoroughly before adding an individual to the banning register. This should include detailed descriptions of the incident, any witness statements, and outcomes of any initial interventions.

Privacy and Security:

Keep the register secure to protect personal information. Access to this information should be restricted to authorised personnel only, and it should be stored in a way that protects it from unauthorised access or breaches.

Clear Policies:

Establish clear policies regarding the length of time individuals remain on the register, how they can appeal a decision, and under what circumstances they might be removed from the register.

Transparency:

Inform individuals at the time of banning about their inclusion on the register, the reasons for it, their rights regarding data protection, and how they can appeal the decision if applicable.

Training Staff:

Train staff on how to handle incidents that may lead to banning, how to document these incidents properly, and how to use the banning register respectfully and legally.

Regular Reviews:

Regularly review the register to ensure it is up to date and that any data no longer necessary or relevant is removed. This also involves reviewing the policies and procedures related to the register to refine and improve them.

Integration with Other Systems:

If applicable, integrate the banning register with other security and management systems to streamline operations and enhance overall security measures.

Community and Stakeholder Engagement:

Engage with community leaders and stakeholders to align the register’s objectives with community safety goals and ensure it is seen as a fair and necessary tool.

 

Yes, using our APIs you can export involved parties into a 3rd party facial recognition system and update the record or create new face match workflow alert within our platform to notify security staff.

Integrating facial recognition technology with an suspect/offender gallery can be a powerful tool, aiding significantly in the identification and tracking of known offenders. Integration of facial recognition with an offender gallery can enhance the capabilities of law enforcement but needs careful implementation to balance effectiveness, ethics, and legal obligations. Here’s how such an integration can be approached and what considerations should be kept in mind:

Steps to Integrate Facial Recognition with our Offender Gallery

  1. Offender Gallery Setup: Establish a comprehensive and up-to-date database or gallery of known offenders, which includes high-quality images and relevant biographical data for each individual.
  2. Facial Recognition Technology: Choose a facial recognition software that meets the operational requirements and has proven accuracy and reliability. This technology should be capable of analysing, processing, and comparing facial features from various image sources.
  3. Integration: Integrate the facial recognition system with the offender gallery via our APIs. This involves ensuring the software can query the database and retrieve matches based on facial analysis.
  4. Data Input Sources: Implement systems to input live or recorded images from cameras or other image sources into the facial recognition system. This could include CCTV footage, body cameras, or photos taken during specific incidents.
  5. Processing: Set up the system to perform adhoc or real-time facial recognition/matching checks against the offender gallery, providing immediate alerts if a match is found. This feature is particularly useful in monitoring and surveillance operations.
  6. Verification and Alerts: Establish protocols for what happens when a match is detected. This should include steps for verification by trained human officers and subsequent actions, whether that's apprehending a suspect or further monitoring.
  7. Privacy and Legal Compliance: Ensure that the use of facial recognition technology complies with relevant privacy laws and regulations. This includes obtaining necessary permissions, conducting impact assessments, and implementing measures to protect personal data.
  8. Training and Policies: Train personnel in the proper use of the technology, including understanding its limitations and the handling of data. Also, develop clear policies regarding when and how this technology can be used to prevent misuse and protect civil liberties.

Considerations

  • Accuracy: Facial recognition technology is not infallible and can sometimes produce false positives. Ensuring the technology is as accurate as possible is crucial to its effectiveness and ethical use.
  • Ethical Concerns: There are significant ethical considerations and public concerns about privacy and surveillance related to the use of facial recognition technology. Transparent operation and clear communication with the public are essential.
  • Legal Restrictions: The legal landscape for facial recognition varies by country and jurisdiction. It’s important to comply with all relevant laws, which may include restrictions on the use of such technology.
  • Security: Secure the data and systems against unauthorised access to prevent breaches that could lead to misuse of sensitive information.

 

You are In safe hands

  • ISO 27001 & Cyber Essentials
  • G-Cloud Government Framework Approved
  • Crown Commercial Service - CCS
  • Google Partner
  • AWS - Amazon Web Services Secure Hosting Infrastructure
  • SIA - Security Industry Authority
  • OWASP - The Open Worldwide Application Security Project
Request
Case Study