Speech-i Ltd.

ASR - Automatic Speech Recognition

The Automatic Speech Recognition (ASR) system, operates on cloud which could be the Speech-i's cloud, customer's cloud, and/or third-party cloud infrastructure. It handles transcriptions of audio sources (recording, direct audio, audio/video, etc.), can handle real-time (audio in streaming) or batch, with or without subtitling. Available in over 20 languages.

Features

  • Real-time or batch Automatic Speech Recognition
  • Digital recording and/or streaming with ASR
  • Cloud based / on-premise / hybrid architecture
  • Archiving indexing and search of AV files synchronised with text
  • Live subtitling
  • Open API's for full integration with exisiting systems
  • Audio segmentation and transcriptions
  • Workflow management of all the reporting activities
  • Multilingual (including British English, US English, Italian, Spanish, French, German)
  • Acoustic/Language models could be tuned according to customer needs.

Benefits

  • Improve the efficiency in parliamentary and local authority reporting
  • Simplify and automate the reporting workflow in Public Sector
  • Time saving, increased productivity & employee satisfaction, cost reduction
  • Customisable reporting process for any Public Administration
  • Supporting different Language Models, Acoustic Models, accents
  • Full indexing and search capabilities to retrieve contents
  • Workforce automation and optimization of the resources
  • Reduce the time to deliver for verbalisation of the meetings
  • Inclusion and accessibility to the reporting activities
  • Archiving and indexing solution for better access to content

Pricing

£0.00 to £2 a unit a minute

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at s.gray@speech-i.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

5 8 0 2 5 1 3 3 9 9 8 8 9 9 0

Contact

Speech-i Ltd. Selena Gray
Telephone: +44 7383 477888
Email: s.gray@speech-i.com

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
Recording devices, any software that needs real time or batch transcriptions of Audio/video file Speech to text. (i.e., call centres, voice chatbots, meeting services, lectures, training, media & broadcasting program transcriptions, etc.)
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
There are no specific constraints.
System requirements
Nothing specific

User support

Email or online ticketing support
Email or online ticketing
Support response times
SLA can vary from real-time to deferred support, if real-time 24x7 extra cost could be applied. No additional cost for working days office hours. Ad-hoc SLA's are designed for each customer's needs.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Onsite support
Support levels
The assistance and technical support will be carried out by Speech-i employees, organised in shifts that will guarantee a 24x7 coverage, according to the SLA agreed with the final customer.
Support is delivered via phone, email, and on-site. The protocol is as follow:
The Helpdesk will open the ticket according to the following scheme:
• Telephone/email assistance - includes the set of anomalies and reports that can be resolved within the same call/email.
• First level assistance - includes the intervention of a technician at the headquarters and is related to ordinary maintenance.
• Second Level assistance - includes the intervention of a specialised technician on the open issue, which will intervene on site.
A priority is assigned according to the urgency and impact of the support case.
The urgency level is determined depending on how many functionalities are impacted
The impact level is determined depending on the number of impacted users.
The Client's staff can open a ticket directly through the trouble ticketing service or call the toll-free number or send an email.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide on-site and/or remote training online. We provide a full set of documentation. We are available for on-site consulting prior to the acquisition.
Service documentation
Yes
Documentation formats
  • PDF
  • Other
Other documentation formats
Website
End-of-contract data extraction
Via APIs all the data are downloaded in real-time or batch as they happen. If other architectures are agreed, we will define the most suitable method to return the data to the customer.
End-of-contract process
There are license terms expiration and all the access to the platform will be deactivated unless agreed differently with the customer. If customers have selected the archiving feature, additional costs could be expected.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
No difference
Service interface
No
User support accessibility
WCAG 2.1 AAA
API
Yes
What users can and can't do using the API
All APIs are documented at https://developer.speech-i.com/v1/ the users can upload an retrieve files through APIs
API documentation
Yes
API documentation formats
  • Open API (also known as Swagger)
  • HTML
  • PDF
  • Other
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
The entire workflow management reporting system can be customised using the interface
Acoustic and Language Models are customisable in cooperation with the Speech-i's Linguistic Team.
User Interface (UI) can be customised
APIs can be customised
The entire process can be customised

Scaling

Independence of resources
Separated at a software level, we have a multiplatform dedicated service to handle load balancing and scalable infrastructure

Analytics

Service usage metrics
Yes
Metrics types
We have a specific file that stores metrics, about volumes, time stamping, and any other information related to the provided services .
Reporting types
  • API access
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller (no extras)
Organisation whose services are being resold
Cedat85

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least once a year
Penetration testing approach
In-house
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Via API's or FTP
Data export formats
  • CSV
  • Other
Other data export formats
  • XML
  • SRT
  • PDF
  • TXT
  • WORD
  • Json
Data import formats
  • CSV
  • Other
Other data import formats
  • XML
  • JSON
  • Audio Formats

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
- Power and Cooling Datacentre (PDC) 99,8%
- Datacentre and Backbone Network (SDC) 99,5%
- Internet Access (BI) 99%

The availability and operational continuity of the services will be guaranteed 24x24x7x7.

The architectures are redundant and scalable.

The Data Centre has conformity certifications in accordance with ISO/IEC 27001:2013, 27017:2015 and 27018:2014. The certifications are approved by independent third-party control entities.

Security is entrusted to specific enterprise firewalls, configured in Full Meshed High Availability mode, with fully redundant network architecture without any single point of failure (SPOF).

The redundant power supply, the dual UPSs in active-active configuration located in a separate room from the main data centre and the dedicated electrical generator guarantee full autonomy even in the event of long power outages.
To respond promptly in case of fire, two VESDA (Very Early Smoke Detection Alarm) systems are active, for smoke and dust detection.

The percentage of availability is calculated as follows: the total number of minutes in the contract year, minus the total number of minutes of service Inactivity in the contract year, divided by the total number of minutes in the contract year.
Availability Penalty
Less than 99,95% 10%
Less than 99,90% 25%
Approach to resilience
It is available on request.
Outage reporting
Through email alerts and APIs

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Depends on the platform, every user has their own roles, so the system administrator define where users can access.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
Between 1 month and 6 months
How long system logs are stored for
Between 6 months and 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
IMQ
ISO/IEC 27001 accreditation date
19/04/2019
What the ISO/IEC 27001 doesn’t cover
The certification covers the full process managed by Automatic Speech Recognition
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
Spanish National Security Scheme Certification (ENS)

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Security is entrusted to specific enterprise firewalls, configured in Full Meshed High Availability mode, with fully redundant network architecture without any single point of failure (SPOF).
The redundant power supply, the dual UPSs in active-active configuration located in a separate room from the main data centre and the dedicated electrical generator guarantee full autonomy even in the event of long power outages.
To respond promptly in case of fire, two VESDA (Very Early Smoke Detection Alarm) systems are active, for smoke and dust detection.
The backbone is configured on redundant fibre optic connections and routing, certified on different devices to increase the resilience of the infrastructure, and is interconnected directly to CN RUPAR SPC.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Actually not defined, but customisable according to the specific project needs.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We have a unique platform that collects every log (not all) and define which actions to take. Afterwards we classify the threat and create rules for mitigating that one.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We have a monitoring system that sends several alerts on services or hosts. Afterwards we fix the problem with different priority/SLA.
Incident management type
Supplier-defined controls
Incident management approach
A priority is assigned according to the urgency and impact.

Urgency: depending on losses of critical functionalities and how they impact the system.

High - Total/severe loss of business functionality, complete section/department affected potential major risk.
Medium - Partial loss of business functionality.
Low - Minor issue that does not impact business functionality.

Impact:
Impact level is determined depending on the number of users affected
High - Whole organisation, trust, site or multiple sites; single large/multiple business units impacted.
Medium - Group of users or one site affected.
Low - One user affected

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Equal opportunity

Equal opportunity

1 EQUAL OPPORTUNITIES STATEMENT
Speech-i Limited is committed to promoting equal opportunities in employment. Any job applicants will receive equal treatment regardless of age, disability, gender reassignment, marital or civil partner status, pregnancy or maternity, race, colour, nationality, ethnic or national origin, religion or belief, sex or sexual orientation (Protected Characteristics).
2 ABOUT THIS POLICY
2.1 Our policy sets out our approach to equal opportunities and the avoidance of discrimination at work.
2.2 Managing Director is responsible for this policy and any necessary training on equal opportunities.
2.3 This policy does not form part of any employee's contract of employment and we may amend it at any time.
3 DISCRIMINATION
3.1 The following forms of discrimination are prohibited under this policy and are unlawful:
3.1.1 Direct discrimination
3.1.2 Indirect discrimination
3.1.3 Harassment
3.1.4 Victimisation
3.1.5 Disability discrimination
4 RECRUITMENT AND SELECTION
4.1 Recruitment and promotion will be conducted on the basis of merit, against objective criteria.
4.2 Vacancies generally advertised to a diverse section of the labour market, avoiding stereotyping or using wording that may discourage particular groups from applying.
5 DISABILITIES
If you are disabled or become disabled, we encourage you to tell us about your condition so that we can consider what reasonable adjustments or support may be appropriate.
6 PART-TIME AND FIXED-TERM WORK
Part-time and fixed-term employees should be treated the same as comparable full-time or permanent employees.
7 BREACHES OF THIS POLICY
7.1 We take a strict approach to breaches of this policy, which will be dealt with in accordance with our Disciplinary Procedure.
7.2 Employees that suffered discrimination can raise the matter through our Grievance Procedure or Anti-harassment and Bullying Policy.
7.3 Making a false allegation deliberately and in bad faith will be treated as misconduct and dealt with under our Disciplinary Procedure.
Wellbeing

Wellbeing

We are committed to protecting the health, safety and wellbeing of our staff. We recognise the importance of identifying and tackling the causes of work-related stress, and personal stress, while unrelated to the workplace, can adversely affect the wellbeing of staff at work. Our policy sets out the measures we have in place to support the mental wellbeing of all our staff. This policy applies to all employees, officers, consultants, self-employed contractors, casual workers, agency workers, volunteers, and interns. We have a legal duty to take reasonable care to ensure that your health is not put at risk by excessive pressures or demands arising from the way work is organised. This policy takes account of our obligations under the Health and Safety at Work etc Act 1974, Management of Health and Safety at Work Regulations 1999, Employment Rights Act 1996, Protection from Harassment Act 1997, Working Time Regulations 1998 and Equality Act 2010. We recognise that individuals react to similar situations in different ways and that what triggers stress and poor mental health varies from person to person. Our company promotes a culture of open communication by providing both formal and informal channels through which staff can raise concerns. We take account of stress and mental wellbeing when planning and allocating workloads.
Information about stress, mental health and mental wellbeing is highly sensitive. Every member of staff is responsible for observing the high level of confidentiality that is required when dealing with information about stress or mental health. Staff who report that they are suffering from work-related stress or mental ill health, who support a colleague in making such a report or who participate in any investigation connected with this policy in good faith will be protected from any form of intimidation or victimisation.

Pricing

Price
£0.00 to £2 a unit a minute
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Testing the ASR.
The entire testing platform is excluded from a free trial, but we work case by case

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at s.gray@speech-i.com. Tell them what format you need. It will help if you say what assistive technology you use.