Capterra and Software Advice
Get a demo Get a demo

Case
Management

The full picture - audited, documented, proven.

Build stronger cases with speed and confidence.

Streamline how you capture, organise, and connect evidence – linking people, statements, timeline, actions, media, and incidents into a single, verified case file that’s easy to review, analyse and share when it matters most.

Incident Evidence & Investigations

Trusted by teams who demand clarity, not guesswork.

22 Bishopsgate
The Crown Estate
Kingfisher Group
ISS & City of London Corporation
Amazon Studios
NEXT
Virgin Money
The City of London Police
Allied Universal
JLL
B&Q
Knight Frank
Graff Diamonds

Zinc Systems

Resolve the cases that matter, faster.

Incident Management

Effortless capture
Collect and log different types of evidence quickly, right from the scene.

Evidence & Investigations

Faster Resolution
Streamlined and structured investigations - close cases with greater speed.

Evidence & Investigations

Connected dots
Link offenders, witnesses, victims, and supporting data into one narrative.

Evidence & Investigations

Complete visibility
Create complete, audit-ready case files - no blind spots or zero gaps.

Key case management features

loader-icon

A complete framework for case resolution.

Strengthen investigations with structured evidence management, ensuring accuracy and compliance.

  • Assign cases to individuals for follow-up.
  • Centrally collate and manage evidence.
  • Map & link incidents for spatial analysis.
  • Log suspects, victims, witnesses, and involved parties.
  • Capture financial and operational losses.
  • Enforce structured responses & manager approvals.
  • Enable rapid recovery with structured workflows.
  • Professional packs ready for leadership, insurers or authorities.
  • Generate professional investigation reports in PDF format.

A clear record of who’s involved - and who poses a risk.

Track repeat suspects & offenders, link incidents, and build intelligence to protect your sites and staff.

  • Record suspect personal details, identification & characteristics.
  • Add photos, CCTV, documents, and evidence files.
  • Link individuals to one or multiple incidents.
  • Track repeat offenders and incident frequency.
  • Restrict access to profiles securely with teams, regions, partners or authorities.
  • Maintain banning registers with supporting case evidence.
  • Manage offender libraries and organised crime group links.
  • Assign actions, monitoring tasks, or follow-up checks.
  • Maintain a full audit trail of all interactions.

Trusted accounts, captured with clarity.

Record, manage, and verify witness information and statements to support accurate investigations and case resolution.

  • Log full witness details with role and contact info.
  • Capture MG11 statements, disclosures, anonymous tips, and internal reports.
  • Capture written or voice-to-text statements on site.
  • Add key observations, quotes, or concerns for review.
  • Upload signed statements, media files, and supporting documents.
  • Track follow-up actions and communication history.
  • Assign access rights for confidentiality and compliance.
  • Export professional witness packs ready for insurers or authorities.

Support those affected - record every detail.

Capture victim details, injuries, and impact with care, accuracy, and compliance.

  • Log victim profiles with contact and incident details.
  • Record physical and psychological injuries with comprehensive detail.
  • Add multiple injury or medical updates to track recovery over time.
  • Attach images, medical/injury reports, and supporting documents.
  • Task welfare checks, follow-ups, and support provided.
  • Add notes on impact, recovery status, time-off-work or compensation.
  • Ensure data is handled securely and respectfully.
  • Export compliant reports for HR, insurance, or authorities.

Know what’s involved.

Track vehicles and assets linked to incidents for accountability, recovery, and risk reduction.

  • Log involved vehicles with registration (partial or full), type, and owner details.
  • Record asset descriptions, serial numbers, and estimated value.
  • Link vehicles and assets directly to incidents and locations.
  • Upload damage reports, images, and supporting documentation.
  • Flag stolen, missing, or damaged status with priority alerts.
  • Track recovery efforts and resolution progress.
  • Maintain a searchable log of all incident-related assets.
  • Export reports for insurers, police, or internal audits.

Understand the impact and recover faster.

Track financial losses and cost implications with clarity, consistency, and control.

  • Log direct costs including theft, damage, recovered and downtime.
  • Record product-specific losses by category, brand, code, and quantity.
  • Enter item values to calculate total financial impact.
  • Record indirect losses like lost sales or productivity.
  • Upload receipts, repair estimates, or stock reports.
  • Track recovery status from insurers, offenders, repairs or internal claims.
  • Categorise losses by incident type, location, or department.
  • Generate cost summaries for reporting and budgeting.
  • Export detailed reports for finance, civil recovery, insurers, or authorities.

Uncover Deeper Patterns, Connect Critical Dots

Gain actionable intelligence from your incident data to drive smarter interventions and prevent repeat occurrences.

  • Data comparison & correlation - Analyse incidents across time, location, and type to uncover trends.
  • Matched linking & prediction- Automatically connect related cases using AI and predictive modelling.
  • Geographic spread - Visualise incident hotspots with interactive location maps and risk overlays.
  • Timeframe risk patterns - Identify when and where incidents peak using smart risk matrices.
  • Location Flow & Timelines - Trace incident sequences and behaviours across multiple sites.
  • Travel corridors & clusters - Detect high-risk zones and movement patterns across regions.
  • Financial impact analysis - Understand cumulative and time-specific losses with compound cost metrics.
  • Loss matrix & targets - Pinpoint product categories, timeframes, and offenders linked to greatest loss.
  • Offender network mapping - Uncover connections, organised cells, and repeat offenders via network views.

Zinc Systems
Zinc Systems

Build collaborative investigations that drive faster resolution and real results.

  • Tackle any investigation – end-to-end.
    From organised theft, internal incidents to external threats.
  • Launch investigations instantly
    Move incidents, or intel into structured investigation & case files.
  • Collaborate across teams
    Add FM, H&S, AP, LP, or HR to each case with controlled access.
  • Assign, track, deliver
    Keep momentum with actions, deadlines & updates all in one place.
  • Centralise your case file
    Manage evidence, reports, photos, and files – always audit-ready.

Zinc Systems
Incident Management

Investigate smarter, act sooner.

  • Measure business impact
    Log losses, risks, and recovery across departments to demonstrate ROI.
  • Visualise key entities and relationships
    View people, vehicles, and locations to see relationships and patterns.
  • Connect the dots with AI
    Surface hidden links, patterns, and repeat offenders using AI analysis.
  • View the bigger picture
    Monitor site activity or cross-location issues on one interactive map.
  • Generate shareable branded reports
    Extract investigation templates for leadership, insurers, or authorities.
  • Track performance in real-time
    Use dashboards to monitor case load, resolution rates, and risk trends.
Zinc Systems

Our impact in numbers

93% Reduction in OCG-linked incidents
Disrupt repeat offenders and organised crime groups through connected intelligence.

64% Reduction in both potential & actual loss
Proactive response and prevention strategies drastically reduce business impact.

91% Incident quality control achieved
Maintain compliant, police-ready and insurance-approved records with zero gaps.

65% Faster case resolution
Accelerate investigations by streamlining evidence, collaboration, and workflows.

40% Reduction in investigation time
Save hours per case through automation, templates, and AI-assisted link analysis.

75% Lower admin burden
Instantly generate branded, audit-ready reports—no more manual compilation.

Zinc Systems

Case studies

22 Bishopsgate, London - Protected by Zinc
Media City, Salford UK
Paddington Square, London - Protected By Zinc
The City of London
Graff Diamonds
Next
Culver Studios, California
Virgin Money - protected by Zinc
Victoria Secrets - VS&Co

With over 300 stores, B&Q is one of the largest multinational DIY and home improvement companies and have worked closely with Zinc over the last 10 years to evolve how to capture, analyse and report criminal incidents.

"Synapse allows our Crime Centre team to spend their time doing what they do best, engaging with stores, security and law enforcement to ensure we have the best possible chance of a successful prosecution.”

Read more

22 Bishopsgate is the tallest skyscraper in the City of London standing at 278 m (912 ft) tall with 62 storeys. It's game-changing workspace occupies a prominent site in the financial district.

As Britain's smartest building, Zinc's platform manages and controls all security, safety and risk events, as well as providing critical alerting to occupiers during fire evacuations.

Read more

MediaCityUK is a 200-acre mixed-use property development on the banks of the Manchester Ship Canal and its principal tenants are media organisations such as ITV, BBC and also the Quayside MediaCityUK shopping centre.

Integrating Zinc into the MediaCity security team, is a significant step forward in safeguarding the vibrant hub where security is paramount in such dynamic environments.

Read more

A super-connected building situated above Paddington Station and is the only station in London with direct access to all mainland stations. The smart mixed-use building is home to major global companies offices, 40 shops and restaurants.

The team use Zinc to report, manage and analyse all critical events and activities, ensuring the highest levels of safety and security.

Read more

The City of London Corporation, officially the municipal governing body of the City of London is the historic centre of London and the location of much of the United Kingdom's financial sector.

Zinc has been rolled out across all property assets to report, investigate and analyse all critical events across the complex property portfolio.

Read more

Graff is a British multinational jeweller with global locations and home to the most fabulous diamonds and jewels in the world.

"We were looking for a global incident and intelligence platform to encompass all our requirements. Zinc allows us to analyse all global threats, which allows us to manage the risks and inform teams of all operational tasks & threats from one very easy to use platform."

Read more

Next plc is a multinational clothing, footwear and home products retailer with around 500 stores in UK & Eire and 206 franchised stores in 33 countries.

"Our vision… bringing all aspects of our operational company risk under one reporting and management model, applicable anywhere in our business from Store to Distribution Centre to Corporate Office. Having accurate and timely data, with sufficient context, allows myself and other Senior leadership to make sound judgements and risk-led decisions to protect our people, our consumers, and our profit."

Read more

Amazon Studios is an American television and film producer and distributor that is a subsidiary of Amazon. It specialises in developing television series and distributing and producing films in more than 240 countries and territories worldwide.

Zinc was awarded a contract to delivery command, control and communication for all incidents at premier film studios.

Read more

Virgin Money is a financial services company offering retail and business banking and part of the Virgin Group.

"What could have been a daunting and complex mobilisation, turned out to be seamless and enjoyable, we felt engaged every step of the way. SYNAPSE is a game-changing addition to our organisation; we continue to refine the system to our needs and the team have been open to our feedback in this regard. Been a smooth process all the way through." Physical & Personal Security Team

Read more

Victoria's Secret is the world's go-to label for giving women everywhere one-of-a-kind lingerie, sleep, beauty and accessories.

"Implementation of any system is a challenge in any business and aligning all departments and actions was no easy task - but the team at Zinc were on hand literally day & night to ensure we achieved success."

Read more
Zinc Systems

Why Zinc?

Join our growing community of world-leading customers and unlock rapid ROI with Zinc's innovative platform. Easily adaptable to your unique challenges, Zinc empowers your organisation to accelerate success and drive measurable impact.

Why Zinc? Loved by users

Loved by users
Outstanding usability and flexibility, ensuring a positive experience every time.

Why Zinc? World-class support

One unified platform
Expand at your own pace with an industry-leading and award winning modular platform.

Why Zinc? Reliable & secure

Reliable & secure
Highly trusted for reliability and robust security - providing complete peace of mind.

Why Zinc? Agile & Innovative

World-class support
Delivering exceptional rapid support, assistance - ensuring customer satisfaction.

Why Zinc? Join our community

Agile & innovative
Consistently delivering cutting-edge solutions evolving market and customer needs.

  • Tired of missing details in investigations?

  • BOOK DEMO

Explore our modules.

Incident Management Module

Navigate Crises, Maintain Continuity

Incident
Management

Evidence & Investigation

Secure Evidence, Connect The Dots

Case Management

Daily Occurrence Book (DOB)

Stay Agile, Ensure Resilience

Daily Occurrence Book

Mass Notification

Inform Quickly, Protect People

Mass
Notification

Patrol Management

Secure Operations, Ensure Compliance

Patrol
Management

Audits, Checks & Inspections

Get Compliance Right, Every time

Audits, Checks & Inspections

Tasks & Procedures

Get Things Done, The Right Way

Tasks &
Procedures

Incident Management Module

Promote Wellness, Prevent Hazards

Health & Safety Management

Data Reporting & Analytics

Smarter Insights, Stronger Outcomes

Data Analysis & Reporting

Threat Intelligence

Seamless, Actionable Intelligence

Threat
Intelligence

Administration Panel

Configure Fast, Adapt Instantly

Administration
Portal

Icon - Integrations-MicroApps

Connect Systems, Scale Smarter

Integrations

Resources: Frequently Asked Questions

Gathering the details of injured parties during an incident is crucial for several reasons, each contributing to effective incident management, legal compliance, and compassionate response. Collecting these details should be done sensitively and in compliance with privacy laws to respect the dignity and rights of the injured. Overall, the practice is not only a procedural necessity but also a cornerstone of ethical and effective incident management. Here’s a breakdown of why these details are essential:

Immediate Medical Response:

Collecting information about injuries allows first responders and medical teams to provide appropriate and timely medical care. Knowing the nature and severity of injuries helps prioritize treatment efforts, especially in large-scale incidents or emergencies.

Accurate Incident Reporting:

Detailed records of injuries contribute to the accuracy and comprehensiveness of incident reports. Such reports are vital for investigations, understanding how the incident occurred, and implementing measures to prevent future occurrences.

Legal and Insurance Purposes:

Information about injured parties is critical for insurance claims and legal proceedings. Detailed injury data can support claims for compensation and is often required for legal scrutiny and compliance with workplace safety regulations.

Health and Safety Compliance:

Organisations are generally required to follow health and safety laws that mandate reporting and documentation of any injuries occurring on their premises. Gathering detailed information helps in complying with these regulations and in conducting safety audits.

Future Safety Enhancements:

Data collected from incidents, including details about injuries, can be analyzed to identify trends or recurring safety issues. This analysis is crucial for improving safety protocols and preventing similar incidents in the future.

Psychological Support:

Knowing who has been injured, along with the extent of their injuries, helps in providing appropriate psychological support and counseling to victims and witnesses. This support is essential for their recovery and well-being.

Family and Community Communication:

Accurate and timely information about injuries is crucial for communicating with families and the community, especially in high-stress situations or disasters. It helps in managing the emotional and social impact of the incident.

Operational Continuity and Recovery:

In a workplace setting, understanding the impact of an incident on personnel allows for better management of staff shortages and operational disruptions. It aids in planning for temporary replacements or adjustments in operations.

 

An MG11 witness statement is a formal document used in the legal system of England and Wales. It records the evidence of a witness related to a criminal case. This document is an account of what the witness saw, heard, or experienced concerning the incident in question.

The MG11 witness statement is a foundational document in the justice process, providing crucial evidence and helping to ensure that the judicial system works transparently and fairly. An MG11 template is available into our platform. Here are some key aspects of the MG11 witness statement:

Purpose:

The primary purpose of the MG11 is to provide a detailed and accurate account of the witness's testimony, which can be used by the police, prosecutors, and the courts during criminal proceedings. It serves as an essential piece of evidence in building a case against the accused.

Format:

The MG11 is formatted to ensure consistency and comprehensiveness in witness testimonies. It includes the witness's personal details, the statement itself, and a declaration that the witness understands they are liable for prosecution if they are found to have lied in the statement.

Usage:

Once completed, the MG11 can be used by the prosecution as evidence in court. If the case goes to trial, the witness may be required to attend court to testify in person and confirm their statement under oath.

Voluntary Statement:

Typically, an MG11 is provided voluntarily by the witness. It is taken by a police officer or another authorised person, who will guide the witness to ensure all relevant details are included.

Confidentiality:

The details in the MG11 are handled with confidentiality but are shared with both the defence and prosecution as part of the evidence disclosure process. This ensures that the accused has a fair opportunity to review all evidence and prepare a defence.

Legal Significance:

Signing an MG11 is a serious matter. The witness's signature at the end of the statement confirms that they believe the information is true to the best of their knowledge and understanding, and they are aware of the penalties for making a false statement.

 

In essence, such a library is a fundamental tool that contributes to the security and operational efficiency of organisations dealing with critical events, enhancing their ability to manage risks and protect assets.

Building a library of suspects or offenders is crucial for several reasons:

Enhanced Preparedness and Response:

A library of known suspects or offenders allows for quicker identification when similar incidents occur. This enables a more tailored and swift response, potentially preventing escalation.

Pattern Recognition:

By maintaining a comprehensive database, organisations and law enforcement can identify patterns of behaviour and connections between different events. This is vital for predicting and preventing future crimes.

Resource Allocation:

With a detailed understanding of the individuals involved in past incidents, resources such as personnel and technology can be more effectively allocated based on the anticipated threat level and known tactics of these offenders.

Legal and Compliance:

Such libraries help in adhering to legal and compliance requirements by ensuring that all actions taken during and after an incident are well-documented and justifiable in a court of law if necessary.

Continuous Improvement:

Analysing past incidents and the offenders involved provides critical insights that can be used to strengthen security measures, training programs, and overall incident response strategies.

Public Safety:

For public safety organisations, having a well-maintained library helps in community policing efforts, aids in disseminating information to the public when necessary, and enhances the overall safety of the community.

Collaborative Efforts:

Sharing information about suspects or offenders with other agencies and organisations promotes a collaborative approach to managing and mitigating critical events, enhancing the effectiveness of collective security measures.

Historical Data Analysis:

Over time, the accumulated data can be analysed to understand long-term trends in criminal behaviour, the effectiveness of interventions, and the evolution of crime in response to societal changes.

 

Building an effective banning register for a location, such as a retail store, entertainment venue, corporate location, or community centre, involves several best practices to ensure it is lawful, efficient, and respectful of privacy. By adhering to these best practices, an organization can manage a banning register that not only enhances the security and safety of the location but also respects the rights and dignity of all individuals involved. Here’s a step-by-step approach:

Define Criteria for Banning:

Clearly outline the behaviours or actions that would lead to someone being added to the banning register. This might include theft, violent behaviour, harassment, or other specific conduct that threatens the safety or well-being of others.

Legal Compliance:

Ensure the register adheres to local and national data protection and privacy laws, such as the GDPR in Europe or the CCPA in California. Consult legal experts to align your practices with these regulations, especially regarding the collection, storage, and sharing of personal data.

Consistent Documentation:

Document incidents consistently and thoroughly before adding an individual to the banning register. This should include detailed descriptions of the incident, any witness statements, and outcomes of any initial interventions.

Privacy and Security:

Keep the register secure to protect personal information. Access to this information should be restricted to authorised personnel only, and it should be stored in a way that protects it from unauthorised access or breaches.

Clear Policies:

Establish clear policies regarding the length of time individuals remain on the register, how they can appeal a decision, and under what circumstances they might be removed from the register.

Transparency:

Inform individuals at the time of banning about their inclusion on the register, the reasons for it, their rights regarding data protection, and how they can appeal the decision if applicable.

Training Staff:

Train staff on how to handle incidents that may lead to banning, how to document these incidents properly, and how to use the banning register respectfully and legally.

Regular Reviews:

Regularly review the register to ensure it is up to date and that any data no longer necessary or relevant is removed. This also involves reviewing the policies and procedures related to the register to refine and improve them.

Integration with Other Systems:

If applicable, integrate the banning register with other security and management systems to streamline operations and enhance overall security measures.

Community and Stakeholder Engagement:

Engage with community leaders and stakeholders to align the register’s objectives with community safety goals and ensure it is seen as a fair and necessary tool.

 

Yes, using our APIs you can export involved parties into a 3rd party facial recognition system and update the record or create new face match workflow alert within our platform to notify security staff.

Integrating facial recognition technology with an suspect/offender gallery can be a powerful tool, aiding significantly in the identification and tracking of known offenders. Integration of facial recognition with an offender gallery can enhance the capabilities of law enforcement but needs careful implementation to balance effectiveness, ethics, and legal obligations. Here’s how such an integration can be approached and what considerations should be kept in mind:

Steps to Integrate Facial Recognition with our Offender Gallery

  1. Offender Gallery Setup: Establish a comprehensive and up-to-date database or gallery of known offenders, which includes high-quality images and relevant biographical data for each individual.
  2. Facial Recognition Technology: Choose a facial recognition software that meets the operational requirements and has proven accuracy and reliability. This technology should be capable of analysing, processing, and comparing facial features from various image sources.
  3. Integration: Integrate the facial recognition system with the offender gallery via our APIs. This involves ensuring the software can query the database and retrieve matches based on facial analysis.
  4. Data Input Sources: Implement systems to input live or recorded images from cameras or other image sources into the facial recognition system. This could include CCTV footage, body cameras, or photos taken during specific incidents.
  5. Processing: Set up the system to perform adhoc or real-time facial recognition/matching checks against the offender gallery, providing immediate alerts if a match is found. This feature is particularly useful in monitoring and surveillance operations.
  6. Verification and Alerts: Establish protocols for what happens when a match is detected. This should include steps for verification by trained human officers and subsequent actions, whether that's apprehending a suspect or further monitoring.
  7. Privacy and Legal Compliance: Ensure that the use of facial recognition technology complies with relevant privacy laws and regulations. This includes obtaining necessary permissions, conducting impact assessments, and implementing measures to protect personal data.
  8. Training and Policies: Train personnel in the proper use of the technology, including understanding its limitations and the handling of data. Also, develop clear policies regarding when and how this technology can be used to prevent misuse and protect civil liberties.

Considerations

  • Accuracy: Facial recognition technology is not infallible and can sometimes produce false positives. Ensuring the technology is as accurate as possible is crucial to its effectiveness and ethical use.
  • Ethical Concerns: There are significant ethical considerations and public concerns about privacy and surveillance related to the use of facial recognition technology. Transparent operation and clear communication with the public are essential.
  • Legal Restrictions: The legal landscape for facial recognition varies by country and jurisdiction. It’s important to comply with all relevant laws, which may include restrictions on the use of such technology.
  • Security: Secure the data and systems against unauthorised access to prevent breaches that could lead to misuse of sensitive information.

 

You are In safe hands

  • ISO 27001 & Cyber Essentials
  • G-Cloud Government Framework Approved
  • Crown Commercial Service - CCS
  • Google Partner
  • AWS - Amazon Web Services Secure Hosting Infrastructure
  • SIA - Security Industry Authority
  • OWASP - The Open Worldwide Application Security Project
Request
Case Study