LearningBranch Inc

LearningBranch Language Portal

LearningBranch Provides a platform for the online and onsite delivery of customized language courses including authoring of language courses and assessments, and tracking and coaching of student work including audio, on any device.

Features

  • Full student audio tracking audio and text teaching feedback tools
  • Integrated Voice Recognition
  • Listening-Recording-Speaking practice tool for language learning.
  • Simultaneous listening and Recording for language learning.
  • Fully integrated multimedia authoring and automated publishing.
  • Works with smartphones, tablets or computers (macOS,WindowsOS,Andrroid ,IOS)
  • Assessment delivery platform with timed limited recording and playback.
  • All student work, including spoken-audio is stored in realtime.
  • Multi-lingual support for non-roman language.
  • Audio-Text Feebacks tool allows for multiple comments on student recordings.

Benefits

  • Manage, publish content and track from any device.
  • Scalable, secure and mobile-enabled integrated platform.
  • Platform desgined for language and communications courses.
  • Assessment delivery platform with proctoring features to ensure test integrity
  • Designed to create authentic and interactive elearning courses.
  • Optional AI modules allow for autmatic correction audio and text.
  • Integrated LMS and CMS into one language delivery platform.
  • Flexible registration features such as self, 1-click assessments, or passcode.
  • Easily manage users, content, courses, and groups from any device.

Pricing

£19.99 to £99.99 a user a year

  • Education pricing available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at stephane@learningbranch.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

4 7 9 3 0 6 6 2 2 3 5 4 3 9 3

Contact

LearningBranch Inc Stephane Rivard
Telephone: +15144844091
Email: stephane@learningbranch.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
The platform is mostly used as a standalone service with integrations available.
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
The platform is deployed on AWS and is hosted by LearningBranch as part of the service.
System requirements
Internet connected device using a modern browser.

User support

Email or online ticketing support
Email or online ticketing
Support response times
We typically respond within 5 minutes, Monday to Friday.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
No
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
We comply with the Web Content Accessibility Guidelines (WCAG) 2.1 Level AA.
Onsite support
Yes, at extra cost
Support levels
Effective support of in-scope services is a result of maintaining consistent service levels. The following sections provide relevant details on service availability, monitoring of in-scope services and related components.

Service Availability

End-User Support specific to the service(s) covered in this Agreement are as follows:

Chat support from 7:00 A.M. to 8:00 P.M. EST Monday - Friday
Emails received outside of office hours will be collected, however, action can not be guaranteed until the next working day.

Recruiter Support specific to the service(s) covered in this Agreement are as follows:

Chat and Email support from 7:00 A.M. to 8:00 P.M. EST Monday - Friday
Emails received outside of office hours will be collected, however, action can not be guaranteed until the next working day.
Customer Requirements
In support of services outlined in this Agreement, LearningBranch will respond to service-related incidents and/or requests submitted by the Customer within the following time frames:

0-2 hours (during business hours) for issues classified as Priority 1.
Within 24 hours for issues classified as Priority 2.
Within 5 working days for issues classified as Priority 3.

Definition
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide online training and user document through our help center:

https://help.learningbranch.com/en/
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Users can export various data in .csv or .json format.
End-of-contract process
We provide hosting, backups, updates and support during the contract period.

Using the service

Web browser interface
Yes
Supported browsers
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
None.
Service interface
No
User support accessibility
WCAG 2.1 AA or EN 301 549
API
No
Customisation available
Yes
Description of customisation
Administrators and Instructors can create or modify Courses, Groups, and Content.

Scaling

Independence of resources
Our platform is built with a modern framework using AWS and MongoDB scalable technology.

We use all reasonable efforts to make the services available with a Monthly Uptime Percentage (defined below) of at least 99.9%.

Analytics

Service usage metrics
Yes
Metrics types
Google Anaytics
Reporting types
  • Real-time dashboards
  • Reports on request

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
  • Physical access control, complying with another standard
  • Encryption of all physical media
  • Scale, obfuscating techniques, or data storage sharding
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
The platform has built export features for reports (.csv) and courses (.json).
Data export formats
  • CSV
  • Other
Other data export formats
Json
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
We use all reasonable efforts to make the services available with a Monthly Uptime Percentage (defined below) of at least 99.8%. If the Service Commitment is not met, the Customer will be eligible to receive a Service Credit to be applied as described below.

"Monthly Uptime Percentage" is calculated by subtracting the percentage of minutes during the month in which the Services were in the state of "Unavailable" (defined below) from 100%.
A Service environment is in the state of "Unavailable" if this environment does not receive any data from LearningAgents of this environment. Planned downtimes are announced by email and are not counted as an "Unavailable" state. Third-party issues, including AWS issues (typically announced at http://status.aws.amazon.com), or MongoDB Atlas issues (typically available at https://status.cloud.mongodb.com) provider issues affecting LearningBranch portals are not counted as "Unavailable" state.
Service Credits are calculated as a percentage of the monthly subscription fee for the affected LearningBranch environment for the month in which the unavailability occurred as follows:

(subscription fee) x (Service Commitment – Uptime Percentage) (e.g. $1,000 x (99.8% - 95%) = $48).

Service Credits are subject to a maximum of 10% of the total annual spend.
Approach to resilience
It's available upon request.
Outage reporting
Email Alerts.

Identity and authentication

User authentication needed
Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels
Access to the management console is defined via the Identity and Access Management (IAM) of AWS. We enforce the following password policies:

Passwords expire every 90 days
Passwords are required to have at least:
One uppercase letter
One lowercase letter
One number
One non-alphanumeric character

All administrators' accounts are required to have an MFA (Multi-Factor) Authentication. User access is defined via the policies/group approach as recommended by Amazon (http://docs.aws.amazon.com/IAM/latest/UserGuide/id_groups.html?icmpid=docs_iam_console)
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
SOC2 (in progres)

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
SOC2
Information security policies and processes
The security of all LearningBranch’s data, including our clients, our employees and our assets is paramount to us. It is imperative for us to ensure operational integrity and business continuity across our global infrastructure. LearningBranch shall endeavor to conduct all and any protective activities within international best management practices and statutory compliance while aiming to provide our clients with a 99.9% SLA.

The objective of data security is to safeguard the uninterrupted use of data systems and data networks that are important to us and our clients; to prevent unauthorized use of data and data systems, the unintentional or deliberate destruction or distortion of data, and to minimize damage caused. We also endeavor to safeguard operation data processing at normal time, and to prepare to deal with threats that might result in the suspension of uses and to quickly recover from such situations.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
We apply a systematic approach to managing change so that changes to customer-impacting services are thoroughly reviewed, tested, approved, and well-communicated. The change management process is designed to avoid unintended service disruptions and to maintain the integrity of service to the customer.

Overview of Security Processes Changes are pushed into production in a phased deployment starting with lowest impact areas. Deployments are tested on a single system and closely monitored .Our developers have a number of configurable metrics that measure the health of the service’s upstream dependencies. These metrics are monitored with thresholds and alarming in place (AWS Dashboards).
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Changes deployed into production environments are:

Reviewed – Peer reviews of the technical aspects of a change are required.

Tested – Changes being applied are tested to help ensure they will behave as expected and not adversely impact performance.

Approved – All changes must be authorized in order to provide appropriate oversight and understanding of business impact.

Developers have a number of configurable metrics that measure the health of the system. Metrics are closely monitored. Rollback procedures are documented.

Emergency changes to systems that require deviations from standard change management procedures are associated with an incident and approved as appropriate.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Periodically, we perform self-audits of changes to key services to monitor quality, maintain high standards, and facilitate continuous improvement of the change management process. Any exceptions are analyzed to determine the root cause, and appropriate actions are taken to bring the change into compliance or roll back the change if necessary. Actions are then taken to address and remediate the process or people issue.

We also use online monitoring tools such as Dectectify that monitors potential issues.

We respond to serious incidents as they develop.
Incident management type
Supplier-defined controls
Incident management approach
We have a pre-defined process, internal and external, to report and log incidents, from a ticketing platform is internal tools that log incidents. Incidents are classified then logged, addressed and corrected. Incident reports are communicated to our users by email.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Tackling economic inequality

Tackling economic inequality

We promote freedom of expression and open communication. But we expect all employees to follow our code of conduct. They should avoid offending, participating in serious disputes and disrupting our workplace. We also expect them to foster a well-organized, respectful and collaborative environment.

All employees must protect our company’s legality. They should comply with all environmental, safety and fair dealing laws. We expect employees to be ethical and responsible when dealing with our company’s finances, products, partnerships and public image.

All employees should respect their colleagues. We won’t allow any kind of discriminatory behavior, harassment or victimization. Employees should conform with our diversity and inclusion policy in all aspects of their work, from recruitment and performance evaluation to interpersonal relations.
Equal opportunity

Equal opportunity

All employees should respect their colleagues. We won’t allow any kind of discriminatory behavior, harassment or victimization. Employees should conform with our diversity and inclusion policy in all aspects of their work, from recruitment and performance evaluation to interpersonal relations.

Pricing

Price
£19.99 to £99.99 a user a year
Discount for educational organisations
Yes
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at stephane@learningbranch.com. Tell them what format you need. It will help if you say what assistive technology you use.