top of page

OVERVIEW

 

The main purpose of this module is to serve graphic interfaces to facilitate the data capture of risk assessed areas and visually present them to endpoints connected to the UNITY core server, using a map platform.

 

Added features include system-wide notification blasts and automated real-time incident risk analysis to keep your people informed of the possible hazard areas field staff could face during an incident.

 

Software

 

The module comprises of the following sections:

  • Risk Assessment Capture

  • Automated Risk and Vulnerability Assessments

  • Administration

  • Data Sharing

  • Database REST Interface

  • User Management

  • Risk Alarm Management

  • Web Host

 

Risk Assessment Capture

 

The capture screen presents a desktop or mobile version to the users and gives them the following facilities:

  • Select and complete customized risk assessment forms.

  • Attach media to each assessment

  • Draw risk area boundaries on a map

  • Create GPS Markers

  • Edit/Remove Assessments (created by the user only)

  • Search risk assessed areas within a map view.

  • Map viewer with media playback

 

Automated Risk and Vulnerability Assessments

 

The module server constantly watches the core server for the type of incidents that get registered. Rules can be established to automatically mark an area as a hazard if more than a certain amount of incidents has occurred in the same geographic location. Furthermore, you can set Vulnerability marker distances to indicate what geographic area outside of the risk area can also be affected by an auto-detected risk.

Example: A fire risk can be marked as a single building but the vulnerability area can be 500m in all directions around that building it. The level of vulnerability is set by checking if objects like fire hydrants exist within the vulnerability area of risk.

Over time this module can indicate for instance an increase in crime related incidents in a particular area and help other government departments, like the police, to target these areas during protection duties. Or in the case of fires, help with preventative planning measures.

Administrators are notified each time the module has auto-identified a hazard area. These areas can be managed by admin users only.

 

Administration

 

Gives system administrators advanced configuration tools to change how the module works and what questions need to be presented to the data capturing GUI.

​

Available facilities:

 

  • Risk Assessment Approval

  • Edit/Remove Risk Areas (Created by anyone)

  • User access controls

  • Add/Edit/Remove datasets (risk types)

  • Map viewer with risk area overlays

  • Issue system-wide information blasts

  • Set alarm triggers per risk type/subtype

  • Questionnaire designer per risk subtype

 

Data Sharing

 

This portion of the software is fully automated. It manages communication between the UNITY core server and the administration module so that information can freely flow between the database, call taking, dispatch and mobile terminals. It is also the module that enables this software to run independently or as part of the core.

​

Database Interface

 

This is a REST API that is open to external interrogation to share risk assessed areas and associated data with third-party applications. API documentation is safeguarded and only handed out at the request of our clients.

 

User Management

 

This module uses the UNITY core to authenticate user logins. It separately gives access to users that is allowed to capture on/administrate the disaster management module. Any other module/user can only access the risk areas for viewing.

​

Risk Alarm Management

​

This section of the module listens in on all new incidents created on the UNITY core and checks to see if there are any risk areas close to the location of the incident. If the module determines that there are risk alarms, a notification will pop up on each terminal currently working on or viewing the incident on the system.

Alarm trigger distances can be configured for each risk-incident type correlation.

 

 

Example:

Trigger alarm WHEN (House Fire) IS CLOSER THAN (500m) FROM (CHEMICAL FIRE HAZARD)

Trigger alarm WHEN (House Fire) IS CLOSER THAN (1000m) FROM (DYNAMITE FIRE HAZARD)

Trigger alarm WHEN (MVA) IS CLOSER THAN (200m) FROM (CONGESTION TRAFFIC HAZARD)

Each of these trigger rules can send a specific programmed response to the dispatcher/call taker/viewer currently working on the incident that triggered the alarm.

 

Web Host

 

Responsible for accepting and storing file uploads and serving the GUI components to browser endpoints. This is a fully automated and invisible function that does not require any maintenance from your system administrators.

UNITYEDMS™ DISASTER MANAGEMENT

bottom of page