Tequ
Tequ is an e-portfolio learning and development delivery platform that supports training providers, businesses and educational institutions to move their learning and development into a digital space.
Features
- Remote Access
- Real -time learning and development
- Compliance checking
- Uploading of bespoke and accredited qualifications
- Progress Tracking
- Caseload Management
- User verification functionality
Benefits
- Distance Learning
- Digital storage solution
- Removes need for classroom environment
- 24 hour access
- Written feedback functionality
Pricing
£2,000 to £5,000 a licence a year
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
6 6 0 4 2 7 5 8 5 4 5 3 9 1 8
Contact
TEQU TRAINING AND LEARNING LIMITED
Jennifer Longden
Telephone: 07880547796
Email: info@tequ.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- We support latest versions of chrome, safari, Firefox and Microsoft edge. On mobile, we support modern versions on android and iOS.
- System requirements
-
- Modern Browser
- Internet enabled device or smart phone
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
-
For general questions, these will always be answered within the day. Users with fix or issue queries will also have a response within the working day regarding next steps and the level of which the issue has been classified. This will then be followed up by an estimated fix time.
Outside of standard SLA terms; eg: bank holidays- a response will take place at the first available date - User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Onsite support
- Support levels
-
We offer general technical support via a customer service team. This can be done over the phone or on a zoom/teams face to face meeting format.
This works on a service desk triage and prioritisation format and is passed onto a software development team.
Additional training/support can be added to contract for additional cost but support at the basic level is inclusive in contract terms - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- We offer initial onboarding training which includes but is not exclusive to- three onboarding training sessions for various users (eg: admin/superuser/teacher assessor) This training can be online and/or on site dependant on client need. We also have PDF user guides to support
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
-
Data can be extracted via API similar to that of the import process.
If further data or support is needed regarding this, requests can be made by the user directly to the support team who can then assist in the extraction of further data within GDPR regulations and guidelines - End-of-contract process
- As per the onboarding agreement, us as the supplier will support any user, most commonly the user with admin credentials to extract sufficient data and/or support in the API channels to send the data to relevant parties/other software.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Chrome
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
-
The mobile experience is delivered by responsive design
(PLEASE CHECK) - Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- Via API, users can transfer enrolment and onboarding data into the system using an excel spreadsheet format. This is to support the transfer of high volumes of data. As the format is editable, users can make changes within the excel format and transfer as appropriate.
- API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- No
Scaling
- Independence of resources
- Hardware is specified to be in excess of all user needs. We also have the ability to scale out at short notice if necessary to ensure continuous service for customer and user base
Analytics
- Service usage metrics
- No
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Baseline Personnel Security Standard (BPSS)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Data can be exported via standard exporting tools word/excel/PDF
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Under service level agreement, the system will be available unless due notice is given to user for planned maintenance or work. Such work will be scheduled outside of standard working hours (evenings or weekends) to ensure as little disruption for users as possible.
- Approach to resilience
- We make use of the resilience and failover solutions provided within AWS.
- Outage reporting
- We have a publicly available service status page. We also have an email alert service to inform customers in advance where possible or as soon as able that is sent directly to the superusers within organisations.
Identity and authentication
- User authentication needed
- Yes
- User authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Management interfaces are further restricted by IP addresses white lists.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- Username or password
- Other
- Description of management access authentication
- IP white list.
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- We follow the best practise as described in iSO 27001 but are not yet certified. An application is due to be made later in 2022/2023
- Information security policies and processes
- Annually, the company handbook is reviewed by the Board of Directors with all agreed amendments being ratified. All department leads are equipped with a current company handbook outlining all internal policies and procedures. From onboarding of clients we focus on information security and the established processes we have in place. At monthly board meetings, quality, H&S, and information security policies are considered, discussed, and where appropriate, modifications are agreed and communicated to all staff. A decision record and key event board minutes are recorded.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- We employ JIRA service management approval flows to track and process change management requests.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We use a number of tools to provide observability of potential vulnerabilities. 1) AWS CloudWatch 2) Sentry.io 3) SonarCloud 4) AWS Security Hub We then use the reports from the above set of tools to assess and prioritise remediation for any identified vulnerabilities. We undertake annual penetration testing as verification of our approach to security in addition we subscribe to various vulnerability alerts.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- We work in accordance with the named standard to ensure the following: There is robust helpdesk and issue management/tracking that ensures priorities are flagged and actioned. Customers have full transparency. Common helpdesk issues are responded to quickly and standard responses are provided. More complex issues are fully researched prior to issuing of responses. Also, SLA's are timely and clearly communicated.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- We work in accordance with the named standard to ensure the following: There is robust helpdesk and issue management/tracking that ensures priorities are flagged and actioned. Customers have full transparency. Common helpdesk issues are responded to quickly and standard responses are provided. More complex issues are fully researched prior to issuing of responses. Also, SLA's are timely and clearly communicated.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Full details on all relevant commitments and initiatives can be provided on request. - Covid-19 recovery
-
Covid-19 recovery
Full details on all relevant commitments and initiatives can be provided on request. - Tackling economic inequality
-
Tackling economic inequality
Full details on all relevant commitments and initiatives can be provided on request. - Equal opportunity
-
Equal opportunity
Full details on all relevant commitments and initiatives can be provided on request. - Wellbeing
-
Wellbeing
Full details on all relevant commitments and initiatives can be provided on request.
Pricing
- Price
- £2,000 to £5,000 a licence a year
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Test site availability to pilot a qualification. Data is not kept and is automatically removed after five working days.