PRODUCT FEATURE GUIDE
Data analysis

Product Hero Image

Offender library & profiling
(inc. victims & witnesses)

It’s crucial to securely capture and document all involved parties and entities. This process not only aids in immediate response and resolution but also serves critical roles in analysis, audit, investigation, and for evidential purposes. Accurate and detailed recording of victims, witnesses and/or suspects/offenders personal details, actions, injuries, statements and observations of all participants, both internal and external, facilitates easy retrieval and analysis. Security measures are in place to protect sensitive information and compliance with relevant legal and regulatory standards.

In-depth analysis of captured data helps in identifying trends, linked incidents, root causes and systemic issues, enabling organisations to implement preventive measures against future occurrences. Moreover, when tackling domestic threats and crime against an organisation, it serves as vital central repository for analysts to link organised crime groups and prepare legal evidence.

 

Key benefits

  • Centralised ‘people’ management tool provides the capability to capture and categorise offenders/suspects, victims and witnesses.
  • Accurately and securely capture profiles of individuals with comprehensive detail.
  • Collate victims and witnesses
  • Build a library of offenders to help reduce risks, repeat incidents, investigate linked or potentially linked incidents and build banning registers.
  • Lookup tools to prevent duplication of information and use a merge tool to combine entries together.
Synapse Divider

INVOLVED PARTIES
Specification

Accuracy
Ensures precise, error-free information collection, vital for informed decision-making and analysis.

Prevention
Helps deter future incidents by understanding and addressing root causes and links effectively.

Evidence
Supporting investigation decisions, analysis and provides indisputable proof for legal proceedings.

Resolution
Facilitates quick, effective closure of investigation analysis through clear action paths.

Synapse Divider
Adding of involved parties

Adding involved parties (offenders/suspects, victims and witnesses) inside a workflow or outside a workflow (standalone).

Adding Offender/Suspects - Personal details, form of identification, contact details, characteristics/description (i.e. ethnicity etc.), notes, profile image, supporting images, ban/sanctions.

Adding Victims - Personal details, contact details, characteristics/description, notes, profile image, supporting images, injury details.

Adding Witnesses - Personal details, contact details, characteristics/description, notes, profile image, supporting images, witness statements details.

Analysis of involved parties

Add a custom data grid of involved parties (all or refined to a specfic filter)

List - Displays involved parties in a traditional list format for easy data review with preview and click-through to view the data. See 'Data grids' for further details.

Grid - Displays involved parties in a gallery format for visual data review with preview and click-through to view the data.

Map - standard, satellite and 3D imagery (if available in the area) displaying the involved parties on the map as heat-clusters or PINs with preview and click-through to view the data.

Count - Displays real-time numerical data count of involved parties, simple, effective visualisation tool with click-through to view the data within.

TV Mode to display on a TV or video wall.

Export the dashboard as a PDF.

Parent dashboard filter - refine the entire dashboard (tabs & widgets) to specific filters including by type, category, status, severity, priority, site and region.

Timeframe filter - available to instantly refine the dashboard down to a specific start and end date/time.

INVOLVED PARTIES
Frequently Asked Questions

Gathering the details of injured parties during an incident is crucial for several reasons, each contributing to effective incident management, legal compliance, and compassionate response. Collecting these details should be done sensitively and in compliance with privacy laws to respect the dignity and rights of the injured. Overall, the practice is not only a procedural necessity but also a cornerstone of ethical and effective incident management. Here’s a breakdown of why these details are essential:

Immediate Medical Response:

Collecting information about injuries allows first responders and medical teams to provide appropriate and timely medical care. Knowing the nature and severity of injuries helps prioritize treatment efforts, especially in large-scale incidents or emergencies.

Accurate Incident Reporting:

Detailed records of injuries contribute to the accuracy and comprehensiveness of incident reports. Such reports are vital for investigations, understanding how the incident occurred, and implementing measures to prevent future occurrences.

Legal and Insurance Purposes:

Information about injured parties is critical for insurance claims and legal proceedings. Detailed injury data can support claims for compensation and is often required for legal scrutiny and compliance with workplace safety regulations.

Health and Safety Compliance:

Organisations are generally required to follow health and safety laws that mandate reporting and documentation of any injuries occurring on their premises. Gathering detailed information helps in complying with these regulations and in conducting safety audits.

Future Safety Enhancements:

Data collected from incidents, including details about injuries, can be analyzed to identify trends or recurring safety issues. This analysis is crucial for improving safety protocols and preventing similar incidents in the future.

Psychological Support:

Knowing who has been injured, along with the extent of their injuries, helps in providing appropriate psychological support and counseling to victims and witnesses. This support is essential for their recovery and well-being.

Family and Community Communication:

Accurate and timely information about injuries is crucial for communicating with families and the community, especially in high-stress situations or disasters. It helps in managing the emotional and social impact of the incident.

Operational Continuity and Recovery:

In a workplace setting, understanding the impact of an incident on personnel allows for better management of staff shortages and operational disruptions. It aids in planning for temporary replacements or adjustments in operations.

 

An MG11 witness statement is a formal document used in the legal system of England and Wales. It records the evidence of a witness related to a criminal case. This document is an account of what the witness saw, heard, or experienced concerning the incident in question.

The MG11 witness statement is a foundational document in the justice process, providing crucial evidence and helping to ensure that the judicial system works transparently and fairly. An MG11 template is available into our platform. Here are some key aspects of the MG11 witness statement:

Purpose:

The primary purpose of the MG11 is to provide a detailed and accurate account of the witness's testimony, which can be used by the police, prosecutors, and the courts during criminal proceedings. It serves as an essential piece of evidence in building a case against the accused.

Format:

The MG11 is formatted to ensure consistency and comprehensiveness in witness testimonies. It includes the witness's personal details, the statement itself, and a declaration that the witness understands they are liable for prosecution if they are found to have lied in the statement.

Usage:

Once completed, the MG11 can be used by the prosecution as evidence in court. If the case goes to trial, the witness may be required to attend court to testify in person and confirm their statement under oath.

Voluntary Statement:

Typically, an MG11 is provided voluntarily by the witness. It is taken by a police officer or another authorised person, who will guide the witness to ensure all relevant details are included.

Confidentiality:

The details in the MG11 are handled with confidentiality but are shared with both the defence and prosecution as part of the evidence disclosure process. This ensures that the accused has a fair opportunity to review all evidence and prepare a defence.

Legal Significance:

Signing an MG11 is a serious matter. The witness's signature at the end of the statement confirms that they believe the information is true to the best of their knowledge and understanding, and they are aware of the penalties for making a false statement.

 

In essence, such a library is a fundamental tool that contributes to the security and operational efficiency of organisations dealing with critical events, enhancing their ability to manage risks and protect assets.

Building a library of suspects or offenders is crucial for several reasons:

Enhanced Preparedness and Response:

A library of known suspects or offenders allows for quicker identification when similar incidents occur. This enables a more tailored and swift response, potentially preventing escalation.

Pattern Recognition:

By maintaining a comprehensive database, organisations and law enforcement can identify patterns of behaviour and connections between different events. This is vital for predicting and preventing future crimes.

Resource Allocation:

With a detailed understanding of the individuals involved in past incidents, resources such as personnel and technology can be more effectively allocated based on the anticipated threat level and known tactics of these offenders.

Legal and Compliance:

Such libraries help in adhering to legal and compliance requirements by ensuring that all actions taken during and after an incident are well-documented and justifiable in a court of law if necessary.

Continuous Improvement:

Analysing past incidents and the offenders involved provides critical insights that can be used to strengthen security measures, training programs, and overall incident response strategies.

Public Safety:

For public safety organisations, having a well-maintained library helps in community policing efforts, aids in disseminating information to the public when necessary, and enhances the overall safety of the community.

Collaborative Efforts:

Sharing information about suspects or offenders with other agencies and organisations promotes a collaborative approach to managing and mitigating critical events, enhancing the effectiveness of collective security measures.

Historical Data Analysis:

Over time, the accumulated data can be analysed to understand long-term trends in criminal behaviour, the effectiveness of interventions, and the evolution of crime in response to societal changes.

 

Building an effective banning register for a location, such as a retail store, entertainment venue, corporate location, or community centre, involves several best practices to ensure it is lawful, efficient, and respectful of privacy. By adhering to these best practices, an organization can manage a banning register that not only enhances the security and safety of the location but also respects the rights and dignity of all individuals involved. Here’s a step-by-step approach:

Define Criteria for Banning:

Clearly outline the behaviours or actions that would lead to someone being added to the banning register. This might include theft, violent behaviour, harassment, or other specific conduct that threatens the safety or well-being of others.

Legal Compliance:

Ensure the register adheres to local and national data protection and privacy laws, such as the GDPR in Europe or the CCPA in California. Consult legal experts to align your practices with these regulations, especially regarding the collection, storage, and sharing of personal data.

Consistent Documentation:

Document incidents consistently and thoroughly before adding an individual to the banning register. This should include detailed descriptions of the incident, any witness statements, and outcomes of any initial interventions.

Privacy and Security:

Keep the register secure to protect personal information. Access to this information should be restricted to authorised personnel only, and it should be stored in a way that protects it from unauthorised access or breaches.

Clear Policies:

Establish clear policies regarding the length of time individuals remain on the register, how they can appeal a decision, and under what circumstances they might be removed from the register.

Transparency:

Inform individuals at the time of banning about their inclusion on the register, the reasons for it, their rights regarding data protection, and how they can appeal the decision if applicable.

Training Staff:

Train staff on how to handle incidents that may lead to banning, how to document these incidents properly, and how to use the banning register respectfully and legally.

Regular Reviews:

Regularly review the register to ensure it is up to date and that any data no longer necessary or relevant is removed. This also involves reviewing the policies and procedures related to the register to refine and improve them.

Integration with Other Systems:

If applicable, integrate the banning register with other security and management systems to streamline operations and enhance overall security measures.

Community and Stakeholder Engagement:

Engage with community leaders and stakeholders to align the register’s objectives with community safety goals and ensure it is seen as a fair and necessary tool.

 

Yes, using our APIs you can export involved parties into a 3rd party facial recognition system and update the record or create new face match workflow alert within our platform to notify security staff.

Integrating facial recognition technology with an suspect/offender gallery can be a powerful tool, aiding significantly in the identification and tracking of known offenders. Integration of facial recognition with an offender gallery can enhance the capabilities of law enforcement but needs careful implementation to balance effectiveness, ethics, and legal obligations. Here’s how such an integration can be approached and what considerations should be kept in mind:

Steps to Integrate Facial Recognition with our Offender Gallery

  1. Offender Gallery Setup: Establish a comprehensive and up-to-date database or gallery of known offenders, which includes high-quality images and relevant biographical data for each individual.
  2. Facial Recognition Technology: Choose a facial recognition software that meets the operational requirements and has proven accuracy and reliability. This technology should be capable of analysing, processing, and comparing facial features from various image sources.
  3. Integration: Integrate the facial recognition system with the offender gallery via our APIs. This involves ensuring the software can query the database and retrieve matches based on facial analysis.
  4. Data Input Sources: Implement systems to input live or recorded images from cameras or other image sources into the facial recognition system. This could include CCTV footage, body cameras, or photos taken during specific incidents.
  5. Processing: Set up the system to perform adhoc or real-time facial recognition/matching checks against the offender gallery, providing immediate alerts if a match is found. This feature is particularly useful in monitoring and surveillance operations.
  6. Verification and Alerts: Establish protocols for what happens when a match is detected. This should include steps for verification by trained human officers and subsequent actions, whether that's apprehending a suspect or further monitoring.
  7. Privacy and Legal Compliance: Ensure that the use of facial recognition technology complies with relevant privacy laws and regulations. This includes obtaining necessary permissions, conducting impact assessments, and implementing measures to protect personal data.
  8. Training and Policies: Train personnel in the proper use of the technology, including understanding its limitations and the handling of data. Also, develop clear policies regarding when and how this technology can be used to prevent misuse and protect civil liberties.

Considerations

  • Accuracy: Facial recognition technology is not infallible and can sometimes produce false positives. Ensuring the technology is as accurate as possible is crucial to its effectiveness and ethical use.
  • Ethical Concerns: There are significant ethical considerations and public concerns about privacy and surveillance related to the use of facial recognition technology. Transparent operation and clear communication with the public are essential.
  • Legal Restrictions: The legal landscape for facial recognition varies by country and jurisdiction. It’s important to comply with all relevant laws, which may include restrictions on the use of such technology.
  • Security: Secure the data and systems against unauthorised access to prevent breaches that could lead to misuse of sensitive information.

 

Zinc Synapse Suite