Frequently asked questions

Got questions? This way.

FAQs, quick fixes, and official info on every product.
Can't find your question here  contact us.

General questions:

We understand that choosing and implementing new software for your agency is a significant decision. We've compiled a list of frequently asked questions to help you better understand our products, services, and how we can support your agency's mission to enhance public safety and community well-being.

If you don't see your specific question addressed here, please don't hesitate to reach out to our dedicated support team. We're always ready to provide you with the information you need to make an informed decision about partnering with Licit Systems.

 

Our products are designed for law enforcement agencies, social services departments, correctional facilities, community outreach organizations, and public safety units of all sizes.

We employ bank-level encryption, multi-factor authentication, and regular security audits. Our systems comply with CJIS, HIPAA, and other relevant security standards.

Yes, our products are designed with open APIs for seamless integration with most existing systems, including RMS, CAD, and national databases.

It centralizes all case information, automates workflows, enables collaboration, and provides analytical tools, typically improving efficiency by 30-40%.

Absolutely. Our platform is highly customizable to meet specific jurisdictional requirements and workflows.

It streamlines data entry, automates alerts, coordinates resources, and utilizes AI for facial recognition and predictive analytics, often reducing initial response time by up to 50%.

We use end-to-end encryption, role-based access controls, and offer options for anonymized data collection. All systems are HIPAA compliant.

Yes, the app is available on both platforms and is regularly updated to ensure compatibility with the latest operating systems.

We release major updates quarterly and security patches as needed. All updates are included in the subscription at no additional cost.

Implementation typically takes 2-12 weeks, depending on the size of the agency and the complexity of the integration.

Our legal team continuously monitors changes in laws and regulations, and we update our software accordingly. We also provide regular compliance reports.

Yes, our systems feature secure inter-agency collaboration tools, allowing authorized sharing of information and resources.

Our products include customizable dashboards, automated report generation, and data visualization tools for comprehensive and flexible reporting.

Our AI-driven predictive analytics use historical data and machine learning to forecast trends, identify patterns, and suggest proactive measures across all our products.

Our experienced data migration team creates a customized plan to ensure all historical data is accurately transferred and validated.

We offer comprehensive onboarding, regular training webinars, a extensive online knowledge base, and 24/7 dedicated support.

Yes, all our products have mobile-responsive designs and dedicated apps for field use, with offline capabilities for areas with limited connectivity.

We offer flexible, subscription-based pricing scaled to the size of the agency and the modules selected. Please contact our sales team for a customized quote.

We employ multiple layers of security including firewalls, intrusion detection systems, regular penetration testing, and continuous monitoring for potential threats.

Yes, we offer a 14-day free trial for most of our products. This allows agencies to experience the software's capabilities firsthand before making a commitment.

Absolutely. We offer white-labeling options for all our products, allowing you to incorporate your agency's logo, color scheme, and terminology.

Our system uses granular permission settings, allowing agencies to precisely control what data is shared. All shared data is logged and auditable.

Our AI features include facial recognition predictive analytics, natural language processing for report writing, anomaly detection in data patterns, and machine learning models for risk assessment.