Video Analytics for Safety & Security

Equip surveillance systems with video analytics, centre leaders can receive alerts on potential risks or hazards, such as children who are left on their own without adult supervision in classrooms and intrusion. Preschool operators may also leverage data collected to identify areas for improvement in centre operations for enhanced safety and security measures.

Instructions

  • This page helps you prepare "Solution Requirements" section in Vendor Management Portal and you will see the exact questions and flow.

  • 🔴 Mandatory questions: Must answer "Yes" to continue

  • 🟡 Preferred questions: Can answer either way and continue

  • Follow the question flow as indicated

Q1 🔴 Mandatory - Video Management

Main Question: Can your solution provide video management capabilities, such as:

Core Video Management Features: a. Enable on-site monitoring through IP-enabled video cameras b. Enable clients to manage and store video footage from cameras, handle large amounts of data, provide real-time monitoring, and allow for easy retrieval and analysis of footage c. Support Secure Sockets Layer (SSL) or other encrypted communication layers between the video cameras and the video camera gateway d. Provide editing functions for video footage, such as the extraction of video clips from a specific time frame, removal of audio, and other similar functions e. Allow for zooming in on video footage during playback or review f. Provide a video search function to facilitate the review of surveillance footage

🔴 Answer: ○ Yes [Next: Q2] ○ No [⚠️ Cannot Proceed]


Q2 🔴 Mandatory - Video Analytics

Main Question: Can your solution provide video analytics capabilities, such as:

Core Analytics Features: a. Intrusion/threat/loitering detection module - allow for the definition of zones that require greater surveillance and trigger automated alerts when intrusion, threat, or loitering is detected. b. Face indexing/facial recognition module - analyse video for human faces captured and stored according to time and duration, trigger alerts when blacklisted individuals enter the area or when children are left unsupervised in the absence of adults?

🔴 Answer: ○ Yes [Next: Q3] ○ No [⚠️ Cannot Proceed]


Q3 🟡 Preferred - Other Features (Video Management)

Main Question: Does your solution include a masking of faces feature, which allows for selective masking of faces in footage that needs to be shared with third parties, to protect the identities and privacy of staff, children, and visitors?

🟡 Answer: ○ Yes [Next: Q4] ○ No [Next: Q4]


Q4 🟡 Preferred - Other Features (Video Analytics)

Main Question: Can your solution provide other video analytics capabilities, such as:

Advanced Analytics Features: a. Provide an anti-tampering module that ensures cameras, and sensors are functioning optimally by triggering alerts if views are blocked or cameras are out of focus, to ensure consistent surveillance b. Send out real-time alerts triggered by pre-defined video events, such as falls, rough handling of children, or liquid spillage c. Provide reports with machine learning/analytics capabilities, such as safety breaches, threat detection, and traffic flow insights, in various formats (such as graphs and tables)

🟡 Answer: ○ Yes [Next: Q5] ○ No [Next: Q5]


Q5 🔴 Mandatory - CCTV Cameras

Main Question: Does your solution provide high-quality cameras that capture clear and detailed video footage, such as CCTV cameras with a minimum resolution of 1080P, footage in colour, and a minimum of 30 frames per second?

🔴 Answer: ○ Yes [Next: Q6] ○ No [⚠️ Cannot Proceed]


Q6 🔴 Mandatory - Video Storage Management

Main Question: Does your solution provide both local and/or cloud storage options for footage (refer to 1.5 on footage requirement) collected during the centre's operational hours (at least 12 hours per day) for a minimum of 30 days?

🔴 Answer: ○ Yes [Next: Q7] ○ No [⚠️ Cannot Proceed]


Q7 🔴 Mandatory - Secure Network Infrastructure

Main Question: Does your solution provide a robust and secure network infrastructure that is necessary to ensure that video footage can be transmitted and accessed quickly and securely?

Please provide a brief description on the infrastructure setup.

Click "Yes" to confirm you have completed the instructions.

🔴 Answer: ○ Yes [Next: Q8] ○ No [⚠️ Cannot Proceed]

Text Elaboration Required: [Text Box for Description/Details]


Q8 🔴 Mandatory - Personal Data and Cybersecurity

Main Question: Can your solution provide personal data and cybersecurity measures, such as:

Security Requirements: a. Have strict access controls in place to ensure that only authorised users can access the recorded footage, including measures such as multi-factor authentication and role-based access controls b. Allow encryption of video footage that can only be accessed by authorised users c. Conduct regular data backup to ensure data recovery in the event of a system failure or other disaster d. Comply with relevant data protection and privacy regulations, such as the General Data Protection Regulation (GDPR) and the Personal Data Protection Act (PDPA)

🔴 Answer: ○ Yes [Next: Q9] ○ No [⚠️ Cannot Proceed]


Q9 🔴 Mandatory - Professional Services

Main Question: Do you provide support services to assist preschools with the above requirements, such as technical support and hardware installation?

🔴 Answer: ○ Yes [Next: Q10] ○ No [⚠️ Cannot Proceed]


Q10 🟡 Preferred - System Integration and Connectivity

Main Question: Can your solution be integrated with the pre-schools' existing IT systems or any other management systems?

If yes, please provide a brief description of the integrations currently available with the pre-schools' IT systems.

🟡 Answer: ○ Yes [Next: Q11] ○ No [Next: Q12]

--

Q11 🔴 Mandatory Follow-up - System Integration and Connectivity - Elaboration

This question appears only if you answered "Yes" to Q10

Main Question: Please provide a brief description of the integrations currently available with the pre-schools' IT systems.

Click "Yes" to confirm you have completed the instructions.

🔴 Answer: ○ Yes [Next: Q12] ○ No [⚠️ Cannot Proceed]

Text Elaboration Required: [Text Box for Description/Details]


Q12 🔴 Mandatory - Dashboards and Reports

Main Question: Can your solution provide dashboards and reporting capabilities to track key metrics, user interactions, operational performance, or other relevant data insights across your digital solution?

Technical Requirements: Your digital solution should have one or more dashboards that provide an at-a-glance overview of key metrics/indicators with at least 4 charts/graphs to help users analyse data through data visualisation.

Interactive Features Required: The dashboard must include at least one of the following interactive features: Option 1: Interactive charts/graphs that allow users to interact with one chart and apply that interaction as a filter to other charts on the dashboard, and vice versa Option 2: At least three common filters/slicers applicable to ALL charts/graphs on the same dashboard

🔴 Answer: ○ Yes [Next: Q13] ○ No [⚠️ Cannot Proceed]


Q13 🟡 Preferred - AI Features

Main Question: Does your solution incorporate AI in your core features and functions?

🟡 Answer: ○ Yes [Next: Q14] ○ No [Next: Q15]

--

Q14 🔴 Mandatory Follow-up - AI Features - Elaboration

This question appears only if you answered "Yes" to Q13

Main Question: Describe your AI feature and its benefits. Examples are:

Examples: a. Generate output, identify items, or provide recommendations based on training models to improve decision-making b. Recognise text, images to shorten time taken for manual inputs of forms c. Others, please specify

Click "Yes" to confirm you have completed the instructions.

🔴 Answer: ○ Yes [Next: Q15] ○ No [⚠️ Cannot Proceed]

Text Elaboration Required: [Text Box for Description/Details]


Q15 🔴 Mandatory - Business Data Extraction

Main Question: Can your solution enable SMEs to efficiently extract business data in various discrete formats such as CSV, XLSX, XML, and TSV?

🔴 Answer: ○ Yes [Next: Q16] ○ No [⚠️ Cannot Proceed]


Q16 🟡 Preferred - Personal Data Collection

Main Question: Does your digital solution collect, use, disclose, process or dispose personal data?

🟡 Answer: ○ Yes [Next: Q17] ○ No [Next: Q19]

--

Q17 🔴 Mandatory Follow-up - Personal Data Protection

This question appears only if you answered "Yes" to Q16

Main Question: Can your solution demonstrate compliance with the following Personal Data Protection requirements?

Compliance Requirements: Digital solutions that collect, use, disclose, process or dispose personal data should incorporate features that support the obligations under the Personal Data Protection Act (2020).

To comply with this requirement, you MUST complete the Personal Data Protection Requirements form at https://go.gov.sg/pdp.

🔴 Answer: ○ Yes [Next: Q18] ○ No [⚠️ Cannot Proceed]


Q18 🔴 Mandatory - Vulnerability Assessment/Penetration Testing (VA/PT)

Main Question: Has your solution undergone a comprehensive security vulnerability assessment/penetration testing (VA/PT) conducted by a qualified third-party within the last 12 months? The scope of the VA/PT must cover network security; application security; data protection measures and access control (if applicable); API security testing (if applicable); Cloud security configuration review (if applicable). Specifically, for web application security, the scope must cover minimally all OWASP Top 10 vulnerabilities.

Submission Requirements: Please submit the VA/PT report (dated maximum 1 year from the checklist submission date). The VA/PT Report must include Executive summary; Detailed findings and risk ratings; Remediation recommendations; Evidence of vulnerability fixes or mitigation plans; Testing methodology used; Scope of assessment; Assessor's qualifications and certifications.

If you are the reseller of the solution, please obtain the VA/PT report from your product principal. SOC 2 Type II report can be accepted if the detailed technical vulnerability assessment results are part of the SOC2 Type II scope.

Note: [1] Qualified third-party refers to: CREST-certified companies [ https://www.crest-approved.org/members/] or companies with security professional with relevant CREST certifications; Security professionals with recognised certifications such as: Offensive Security Certified Professional (OSCP); EC-Council Certified Penetration Testing Professional (CPENT); GIAC Penetration Tester (GPEN); or other equivalent industry-recognised certifications.

Click "Yes" to confirm you have completed the instructions.

🔴 Answer: ○ Yes [Next: Q19] ○ No [⚠️ Cannot Proceed]

Date of Issue Required: [Date Field] Upload Supporting Document Required: [File Upload]


Q19 🟡 Preferred - Cybersecurity Compliance - Cyber Essentials Mark (CEM)

Main Question: Are you the Product Principal of the solution that you are submitting for pre-approval?

🟡 Answer: ○ Yes [Next: Q20] ○ No [Next: Q22]


Q20 🟡 Preferred - CEM for Product Principal

Main Question: Has your organisation achieved CSA Cyber Essentials for ICT Vendor Mark certification or equivalent recognised cybersecurity certifications (including but not limited to Cyber Trust Mark or ISO27001) that validate the implementation of appropriate security controls against common cyber threats in your organisation and the solution you are submitting for pre-approval?

Additional Information: Vendors are encouraged to comply at application and are required to meet this requirement by the Annual Review, where it will be assessed as mandatory.

Note: For more information on Cyber Essentials mark, please refer to https://www.csa.gov.sg/cyber-essentials/

🟡 Answer: ○ Yes [Next: Q21] ○ No [Assessment Finished]

--

Q21 🔴 Mandatory Follow-up - CEM for Product Principal - Elaboration

This question appears only if you answered "Yes" to Q20

Main Question: Please specify the following information:

Required Information: i. The certificate demonstrating your organisation has attained Cyber Essentials for ICT Vendors ii. The cybersecurity certification the organisation has met iii. The scope of the certification

Please also upload a copy of the Certification and indicate the Certification Issuance Date in the date field.

Click "Yes" to confirm you have completed the instructions.

🔴 Answer: ○ Yes [Assessment Finished] ○ No [⚠️ Cannot Proceed]

Date of Issue Required: [Date Field] Upload Supporting Document Required: [File Upload]


Q22 🟡 Preferred - CEM for Resellers

Main Question: Has your organisation achieved CSA Cyber Essentials Mark certification or equivalent recognised cybersecurity certifications (including but not limited to Cyber Trust Mark or ISO27001) that validate the implementation of appropriate security controls against common cyber threats in your organisation and the solution you are submitting for pre-approval?

Additional Information: Vendors are encouraged to comply at application and are required to meet this requirement by the Annual Review, where it will be assessed as mandatory.

Note: For more information on Cyber Essentials mark, please refer to https://www.csa.gov.sg/cyber-essentials/

🟡 Answer: ○ Yes [Next: Q23] ○ No [Assessment Finished]

--

Q23 🔴 Mandatory Follow-up - CEM for Resellers - Elaboration

This question appears only if you answered "Yes" to Q22

Main Question: Please specify the following information:

Required Information: i. The cybersecurity certification the organisation has met ii. The scope of the certification

Please also upload a copy of the Certification and indicate the Certification Issuance Date in the date field.

Click "Yes" to confirm you have completed the instructions.

🔴 Answer: ○ Yes [Assessment Finished] ○ No [⚠️ Cannot Proceed]

Date of Issue Required: [Date Field] Upload Supporting Document Required: [File Upload]

circle-info

Preparing for submission?

Your submission should contain screenshots and write-ups that clearly demonstrate compliance with each mandatory requirement sub-point. Contact usarrow-up-right if you need help.

Last updated