How secure is the iPad with our data?

The iOS (the operating system that runs the iPad) was designed with data security in mind. Data is encrypted, protected, and the applications on the OS do not have access to data from each other. (More details are available on the iOS Security White Paper (May 2012) that is provided with this document.) Note, we strongly recommend that you require all devices to have the numeric keypad lock enabled. This provides a double layer of protection and encryption in the event that a device is lost or stolen.

How does my data get to your server?

Data should be uploaded to our secured servers via HTTPS or SFTP. We suggest that you set up an automated process that exports the
new data at regular intervals.

Can I host this on my own server?

We do not allow our application to run on servers that are being used for other activities. So yes, you can host this on your own server on your own premises if necessary, but there will be an additional cost to configure this server. Furthermore, we will need to be granted access to this server for software updates and for monitoring.

What kind of security is on your server?

This is dependent on the security requirements of each client. But at a minimum, we are compliant with various industry- recognized standards and certifications. Our servers are routinely audited for physical and electronic access, with third party security firms performing penetration and vulnerability testing. More details are available upon request.

Do you ever write to my database?

No, we never have the need to interface with your servers or databases. We do provide access to your cleaned data so that you can use it in other analyses.

Do you need to install anything on my servers?

No, there’s no need to install anything on your servers. If your team wishes to create an automated export process from your database, we can provide guidance for this.

How do we get updates in the software?

Updates are delivered through the App Store in the same way as any other iOS app.

How long does implementation take?

Deployment time depends on a number of factors, notably the cleanliness and completeness of the data you provide. In our initial setup, we need your station locations, service area, road network files, and call data. Typical implementation time is in the order of one to two weeks.

Where is your server located?

Our servers are located in a number of geographically distributed locations throughout North America. Depending on the needs of
our clients, we provide Canadian-only or U.S.-only secured data storage.

What steps do you go through in cleaning data?

Understanding that data integrity drives the quality of business decisions, Darkhorse has invested heavily in a robust process of data cleaning and standardization. In fact, what happens “behind the curtain” is far more complex than what appears on the iPad. Our proprietary process flags spatial and temporal outliers so that those records are not included in some calculations, but are available to others. This includes a very robust drive-time estimation and comparison, multi-pass geocoding, and the identification of common “button press” issues whereby a responder either forgets to note a time stamp, or notes two in quick succession. We do not delete records unless they are clearly duplicates or indecipherable.

What CAD vendors do you work with?

We’re CAD agnostic. We work with any vendors call data as long as it’s in electronic format.

What are my responsibilities as IT?

Your IT responsibilities are minimal. You should ensure that your users abide by your security policies – and we strongly recommend that you enable your numeric passcode on all devices. Secondly, you will need to develop the means to export your data at regular intervals.