top of page
site-background.jpg

Investigative Case Management FAQs

Investigations and Case Management have traditionally been a painstaking and daunting manual process due to the many procedural and administrative activities required. While the general principles and methodologies remain unchanged, each organisation and industry have certain criteria and legal requirements which need to be met for the investigation to be considered legally compliant. With the compliance requirement, increase in volume, and scrutiny placed on these practices ever increasing, the manual approach necessitated change.

​CiiMS Intel, has been designed over more than 20 years with input from industry experts to set the standard in Investigation Case Management. The application ensures that investigations are completed in line with industry and client specific requirements as CiiMS Intel allows for bespoke configuration.

There are key objectives when conducting an investigation with CiiMS Intel which need to be considered:

  • Docket Management including the ability to add Statements, Correspondence and  Investigation Diaries (Section A, B and C)

  • Disciplinary & Prosecution Management

  • Police Case Management

  • Investigative Compliance such as Docket Inspection

  • Management of Standard Operating Procedures and Service Level Agreements linked to Investigation Complexity

  • Informant Handling and Management

  • Profiling Capability

  • Work- and Process Flow

  • Correspondence and Liaison

What is Incident Case Management Software?

Incident Case Management software is a tool that helps organisations capture, log, categorise and track incidents in real time. CiiMS Intel enables teams to document structured incident data: such as date, time, location, type, and severity. This allows users to quickly assess trends, manage response protocols and reduce operational risks.

How does Investigation Case Management Differ from Incident Case Management?

While Incident Management deals with the initial capture and resolution of events, Investigation Case Management goes further. Investigation Case Management allows for root cause analysis, suspect profiling and detailed evidence management. CiiMS Intel supports both, ensuring seamless transition from logged incidents to formal investigations when required.

What are the Benefits of Using CiiMS Intel for Incident Case Management?

CiiMS Intel streamlines the entire incident lifecycle, offering:

- Centralised digital logging of incidents

- Geo-tagged location and time stamps

- Categorisation and classification

- Dashboard alerts for rapid response

- Trend analysis for preventive planning

This ensures timely interventions and improved situational awareness across all sites.

Can I Escalate an Incident into an Investigation?

Absolutely. CiiMS Intel allows incidents to be escalated into formal investigations, preserving initial details while opening up investigative tools like digital dockets, profiling and case assignment.

What Can Users Track in an Investigation Case Management Software Like CiiMS Intel?

You can manage the full case lifecycle, including:

- Digital docket creation

- Evidence and witness management

- Task allocation and team tracking

- SOP and SLA compliance

- Informant management

- Disciplinary and prosecution support

These features are critical for ensuring that investigations meet legal, procedural and compliance standards.

How Does CiiMS Intel Optimise Investigation Case Management Workflows

CiiMS Intel enhances investigative workflows by digitising each stage, from initial case intake to final resolution. It offers:

- Chain-of-custody tracking

- Section A/B/C diary entries

- Searchable case records

- Integration with SOPs and SLAs

- Profiling of suspects, vehicles and organisations

It’s built to scale with complex investigative teams and reduce administrative overload.

Who Should Use Investigation Case Management Software?

CiiMS Intel is ideal for:

- Corporate security teams

- Retail loss prevention units

- Private investigators

- Compliance officers

- Risk managers

- Law enforcement and public safety departments

Any organisation handling structured investigations and requiring audit-ready evidence trails will benefit from this software.

Is CiiMS Intel Legally Compliant?

Yes. CiiMS Intel is designed in collaboration with industry experts to ensure alignment with sector-specific legal requirements, investigative procedures and compliance frameworks. It supports SOP-linked workflows and inspection-ready case files.

What Types of Reports can I Generate?

Users can export:

- Investigation timelines

- Category breakdowns

- Financial loss summaries

- Case status and KPIs

- Graphs, charts, and multiple format-ready exports

CiiMS Intel helps users stay ready for board reports, compliance audits and internal reviews.

Is CiiMS Intel Configurable for Different Industries?

Yes. CiiMS Intel is modular and configurable, making it suitable for various industries with unique requirements including petroleum, finance, education, healthcare and logistics.

How does CiiMS Intel Support Multi-Site Incident Management?

The platform supports multi-location deployments, allowing central teams to track and manage incidents from various sites via Dashboards, filtered views, and consolidated reporting.

Can CiiMS Intel Support Intelligence-Led Investigations?

Yes. Features like link analysis, profiling and historical case search allow analysts to detect patterns, identify repeat offenders and uncover syndicate links which support proactive, intelligence-driven operations.

Can CiiMS Intel Integrate with Third-Party Systems Like HR, CCTV and Access Control?


Yes. CiiMS Intel offers integration capabilities through APIs and custom connectors. This allows seamless syncing with HR systems, surveillance platforms and access control logs to enhance investigative depth and contextual incident linking.

Does CiiMS Intel Support Audit Trails and Digital Chain of Custody?


Absolutely. Every action within the system is logged within the audit trail for traceability. The platform supports chain of custody tracking for documents, evidence and all user actions which critical for maintaining evidentiary integrity during prosecutions or audits.

Can We Customise Fields and Workflows in CiiMS Intel?


Yes. The platform is highly configurable. Organisations can adapt workflows, user roles, field labels, escalation protocols and SLA timers to reflect their internal policies and industry regulations. The system is also available in multiple languages.

How Does CiiMS Intel Support Proactive Risk Mitigation?


CiiMS Intel helps identify recurring issues, high-risk locations, and chronic offenders through heatmaps, link analysis and dashboards—empowering risk managers to take pre-emptive action. This is at its most effective when paired with a CiiMS Risk license.

Can We Run Intelligence Operations Based on Case Data?


Yes. The profiling and link analysis modules allow users to build cases around syndicates, identify patterns and launch targeted intelligence-led interventions. These features are used by both private-sector risk teams and public safety authorities.

Is Training Provided for Teams Using CiiMS Intel?


Yes. Online Intelligence offers structured onboarding, system training, and refresher sessions. Training includes incident logging, investigation workflows, dashboard setup and reporting best practices. Book training today!

Can We Tailor the System for Our Investigation Grading and Classification System?


Yes. CiiMS Intel allows you to define and apply custom classifications via system Categories (e.g. internal fraud, health & safety breaches, high-risk priority levels), aligned to your operational policies.

Where Is Our Investigation and Incident Data Stored?


CiiMS Intel is hosted in secure environments compliant with international data security standards. Clients can choose local or cloud-based hosting, and our team ensures data integrity and access control.

How Is Access Controlled Across Multiple Teams?


The platform supports role-based access control (RBAC), allowing administrators to manage visibility and actions based on department, seniority or investigation type. This protects sensitive information while ensuring operational flow.

If you have any other questions, please feel free to contact us.

bottom of page