LearningBranch Language Portal
LearningBranch Provides a platform for the online and onsite delivery of customized language courses including authoring of language courses and assessments, and tracking and coaching of student work including audio, on any device.
Features
- Full student audio tracking audio and text teaching feedback tools
- Integrated Voice Recognition
- Listening-Recording-Speaking practice tool for language learning.
- Simultaneous listening and Recording for language learning.
- Fully integrated multimedia authoring and automated publishing.
- Works with smartphones, tablets or computers (macOS,WindowsOS,Andrroid ,IOS)
- Assessment delivery platform with timed limited recording and playback.
- All student work, including spoken-audio is stored in realtime.
- Multi-lingual support for non-roman language.
- Audio-Text Feebacks tool allows for multiple comments on student recordings.
Benefits
- Manage, publish content and track from any device.
- Scalable, secure and mobile-enabled integrated platform.
- Platform desgined for language and communications courses.
- Assessment delivery platform with proctoring features to ensure test integrity
- Designed to create authentic and interactive elearning courses.
- Optional AI modules allow for autmatic correction audio and text.
- Integrated LMS and CMS into one language delivery platform.
- Flexible registration features such as self, 1-click assessments, or passcode.
- Easily manage users, content, courses, and groups from any device.
Pricing
£19.99 to £99.99 a user a year
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
4 7 9 3 0 6 6 2 2 3 5 4 3 9 3
Contact
LearningBranch Inc
Stephane Rivard
Telephone: +15144844091
Email: stephane@learningbranch.com
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
- The platform is mostly used as a standalone service with integrations available.
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- The platform is deployed on AWS and is hosted by LearningBranch as part of the service.
- System requirements
- Internet connected device using a modern browser.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We typically respond within 5 minutes, Monday to Friday.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- No
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- We comply with the Web Content Accessibility Guidelines (WCAG) 2.1 Level AA.
- Onsite support
- Yes, at extra cost
- Support levels
-
Effective support of in-scope services is a result of maintaining consistent service levels. The following sections provide relevant details on service availability, monitoring of in-scope services and related components.
Service Availability
End-User Support specific to the service(s) covered in this Agreement are as follows:
Chat support from 7:00 A.M. to 8:00 P.M. EST Monday - Friday
Emails received outside of office hours will be collected, however, action can not be guaranteed until the next working day.
Recruiter Support specific to the service(s) covered in this Agreement are as follows:
Chat and Email support from 7:00 A.M. to 8:00 P.M. EST Monday - Friday
Emails received outside of office hours will be collected, however, action can not be guaranteed until the next working day.
Customer Requirements
In support of services outlined in this Agreement, LearningBranch will respond to service-related incidents and/or requests submitted by the Customer within the following time frames:
0-2 hours (during business hours) for issues classified as Priority 1.
Within 24 hours for issues classified as Priority 2.
Within 5 working days for issues classified as Priority 3.
Definition - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
We provide online training and user document through our help center:
https://help.learningbranch.com/en/ - Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Users can export various data in .csv or .json format.
- End-of-contract process
- We provide hosting, backups, updates and support during the contract period.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- None.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AA or EN 301 549
- API
- No
- Customisation available
- Yes
- Description of customisation
- Administrators and Instructors can create or modify Courses, Groups, and Content.
Scaling
- Independence of resources
-
Our platform is built with a modern framework using AWS and MongoDB scalable technology.
We use all reasonable efforts to make the services available with a Monthly Uptime Percentage (defined below) of at least 99.9%.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Google Anaytics
- Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- European Economic Area (EEA)
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- The platform has built export features for reports (.csv) and courses (.json).
- Data export formats
-
- CSV
- Other
- Other data export formats
- Json
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
We use all reasonable efforts to make the services available with a Monthly Uptime Percentage (defined below) of at least 99.8%. If the Service Commitment is not met, the Customer will be eligible to receive a Service Credit to be applied as described below.
"Monthly Uptime Percentage" is calculated by subtracting the percentage of minutes during the month in which the Services were in the state of "Unavailable" (defined below) from 100%.
A Service environment is in the state of "Unavailable" if this environment does not receive any data from LearningAgents of this environment. Planned downtimes are announced by email and are not counted as an "Unavailable" state. Third-party issues, including AWS issues (typically announced at http://status.aws.amazon.com), or MongoDB Atlas issues (typically available at https://status.cloud.mongodb.com) provider issues affecting LearningBranch portals are not counted as "Unavailable" state.
Service Credits are calculated as a percentage of the monthly subscription fee for the affected LearningBranch environment for the month in which the unavailability occurred as follows:
(subscription fee) x (Service Commitment – Uptime Percentage) (e.g. $1,000 x (99.8% - 95%) = $48).
Service Credits are subject to a maximum of 10% of the total annual spend. - Approach to resilience
- It's available upon request.
- Outage reporting
- Email Alerts.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Public key authentication (including by TLS client certificate)
- Username or password
- Access restrictions in management interfaces and support channels
-
Access to the management console is defined via the Identity and Access Management (IAM) of AWS. We enforce the following password policies:
Passwords expire every 90 days
Passwords are required to have at least:
One uppercase letter
One lowercase letter
One number
One non-alphanumeric character
All administrators' accounts are required to have an MFA (Multi-Factor) Authentication. User access is defined via the policies/group approach as recommended by Amazon (http://docs.aws.amazon.com/IAM/latest/UserGuide/id_groups.html?icmpid=docs_iam_console) - Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- Between 1 month and 6 months
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- No
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
- SOC2 (in progres)
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- ISO/IEC 27001
- Other
- Other security governance standards
- SOC2
- Information security policies and processes
-
The security of all LearningBranch’s data, including our clients, our employees and our assets is paramount to us. It is imperative for us to ensure operational integrity and business continuity across our global infrastructure. LearningBranch shall endeavor to conduct all and any protective activities within international best management practices and statutory compliance while aiming to provide our clients with a 99.9% SLA.
The objective of data security is to safeguard the uninterrupted use of data systems and data networks that are important to us and our clients; to prevent unauthorized use of data and data systems, the unintentional or deliberate destruction or distortion of data, and to minimize damage caused. We also endeavor to safeguard operation data processing at normal time, and to prepare to deal with threats that might result in the suspension of uses and to quickly recover from such situations.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
We apply a systematic approach to managing change so that changes to customer-impacting services are thoroughly reviewed, tested, approved, and well-communicated. The change management process is designed to avoid unintended service disruptions and to maintain the integrity of service to the customer.
Overview of Security Processes Changes are pushed into production in a phased deployment starting with lowest impact areas. Deployments are tested on a single system and closely monitored .Our developers have a number of configurable metrics that measure the health of the service’s upstream dependencies. These metrics are monitored with thresholds and alarming in place (AWS Dashboards). - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Changes deployed into production environments are:
Reviewed – Peer reviews of the technical aspects of a change are required.
Tested – Changes being applied are tested to help ensure they will behave as expected and not adversely impact performance.
Approved – All changes must be authorized in order to provide appropriate oversight and understanding of business impact.
Developers have a number of configurable metrics that measure the health of the system. Metrics are closely monitored. Rollback procedures are documented.
Emergency changes to systems that require deviations from standard change management procedures are associated with an incident and approved as appropriate. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Periodically, we perform self-audits of changes to key services to monitor quality, maintain high standards, and facilitate continuous improvement of the change management process. Any exceptions are analyzed to determine the root cause, and appropriate actions are taken to bring the change into compliance or roll back the change if necessary. Actions are then taken to address and remediate the process or people issue.
We also use online monitoring tools such as Dectectify that monitors potential issues.
We respond to serious incidents as they develop. - Incident management type
- Supplier-defined controls
- Incident management approach
- We have a pre-defined process, internal and external, to report and log incidents, from a ticketing platform is internal tools that log incidents. Incidents are classified then logged, addressed and corrected. Incident reports are communicated to our users by email.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Tackling economic inequality
-
Tackling economic inequality
We promote freedom of expression and open communication. But we expect all employees to follow our code of conduct. They should avoid offending, participating in serious disputes and disrupting our workplace. We also expect them to foster a well-organized, respectful and collaborative environment.
All employees must protect our company’s legality. They should comply with all environmental, safety and fair dealing laws. We expect employees to be ethical and responsible when dealing with our company’s finances, products, partnerships and public image.
All employees should respect their colleagues. We won’t allow any kind of discriminatory behavior, harassment or victimization. Employees should conform with our diversity and inclusion policy in all aspects of their work, from recruitment and performance evaluation to interpersonal relations. - Equal opportunity
-
Equal opportunity
All employees should respect their colleagues. We won’t allow any kind of discriminatory behavior, harassment or victimization. Employees should conform with our diversity and inclusion policy in all aspects of their work, from recruitment and performance evaluation to interpersonal relations.
Pricing
- Price
- £19.99 to £99.99 a user a year
- Discount for educational organisations
- Yes
- Free trial available
- No