Recite Me Checker
Scan domains against latest version of the Web Content Accessibility Guidelines (WCAG) - specifically, those success criteria which can be scanned programmatically.
Tool provides dashboards on findings falling into each rating with suggestions on what to fix for the biggest improvements with resource hub of related information and reporting tools.
Features
- Scan for issues against Web Content Accessibility Guidelines
- Pinpoint the nature and location of issues against WCAG
- Provide guidance on how to fix WCAG issues
- Provide reporting over time to track improvement
- Provide rating (%) against WCAG
Benefits
- Help to meet WCAG (Web Content Accessibility Guidelines)
- Help to meet upcoming European Accessibility Act requirements
- Help to meet Public Sector Accessibility Regulations (2018)
Pricing
£1,200 to £100,000 a licence
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
1 1 6 8 7 4 8 2 9 6 5 3 2 6 5
Contact
Recite me Ltd
Sales Team
Telephone: 01914328092
Email: sales@reciteme.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- No
- System requirements
- Some whitelisting of our service in client security posture required
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 4 working hours
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
-
SLA incident categorisation
1. Trivial - Limited service impacting fault, full work around available
2. Medium - Service impacting fault, limited workaround available
3. High - Service impacting fault, no workaround available
4. Critical - Service outage or identified data breach
SLA Timescales
All incident reports should be submitted to the Supplier via means of the supported channels outlined in section 2(c) of this document. All issues will be triaged by Recite Me support staff within normal business hours and actioned in accordance with the SLA incident categorisation outlined in section 2(c) and the following timescales:
1. Trivial
First response: 48hrs
Time to resolution: 120hrs
2. Medium
First response: 12hrs
Time to resolution: 48hrs
3. High
First response: 12hrs
Time to resolution: 12hrs
4. Critical:
First response: 2hrs
Time to resolution: 8hrs - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Initial onboarding session
Training for up to 5 users
Support doing 1st scan
Ongoing Customer Success Management - Service documentation
- No
- End-of-contract data extraction
-
Users can request copies of their data.
Users can export reports showing progress against WCAG at any point in the process. - End-of-contract process
- Access to the system is revoked.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- No
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 AAA
- Description of service interface
- Users access the service with unique login credentials and land on their dashboard.
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- Internal human testing against WCAG using a variety of assitive technologies
- API
- No
- Customisation available
- No
Scaling
- Independence of resources
- We split our software between multiple servers to share the load.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Audit train of user activity
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
-
On request.
Users can create and export their own reports at any time showing progress against WCAG - Data export formats
-
- CSV
- Other
- Other data export formats
- Data import formats
- Other
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- SLA provides 99.9% uptime
- Approach to resilience
- Available on request
- Outage reporting
- We will monitor the Software on the relevant server and if at any time the Software is not fully accessible for 2 hours or more then the Supplier shall notify the Client immediately and the Supplier shall start correcting the problem immediately and shall continue working on it until it is remedied.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Role-Based Access Control on a least priveledge basis.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- Cyber Essentials Plus
- Information security policies and processes
- Our data is transferred over the WAN and LAN via SSL and data is encrypted at-rest is available. Our datacentres adopt a strict security control for access and adheres to ISO27001
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- Any change, including that of configuration, will be clearly broadcast to all customers and any anticipated periods of disruption will be highlighted.
- Vulnerability management type
- Undisclosed
- Vulnerability management approach
- Regular penetration testing and proactive monitoring help identity any imminent threats. Any detected threats are dealt with immediately and any security vulnerabilities which could affect customers data are clearly broadcast to them.
- Protective monitoring type
- Undisclosed
- Protective monitoring approach
- Our 24/7 proactive monitoring process allows us to respond to potential issues as they are flagged. We respond to incidents as described in our SLA
- Incident management type
- Undisclosed
- Incident management approach
- All incidents are clearly and securely documented and handled appropriately depending on their type and severity
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Equal opportunityEqual opportunity
Helping organisations to conform with WCAG creates better online equality
Pricing
- Price
- £1,200 to £100,000 a licence
- Discount for educational organisations
- Yes
- Free trial available
- No