THE SENSIBLE CODE COMPANY LTD

PDFTables.com

PDF Tables accurately extracts data from PDFs. It uses an AI algorithm which can see column shapes, and outputs spreadsheets. There is a web API so it can be automated.

Features

  • Algorithm automatically identifies tabular rows and columns in PDFs
  • Convert PDF to Excel, CSV, HTML or XML
  • Use from any web browser, without downloading software
  • Output is streamed as it is generated
  • End-to-end encryption with the same technology used by banks
  • API for integration and automation using any programming language

Benefits

  • Effortlessly convert PDF to a more useable format
  • Publish data without altering upstream process
  • Integrate data extraction into your current operations
  • Automate so data arrives as it is extracted
  • Replace manual document processing & save 000s of operational hours
  • Convert up to 12 PDF pages per second

Pricing

£800 to £3,750.00 a unit a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at aine@sensiblecode.io. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

7 0 9 3 6 3 9 2 7 6 7 6 8 1 2

Contact

THE SENSIBLE CODE COMPANY LTD Aine McGuire
Telephone: 0771 0377929
Email: aine@sensiblecode.io

Service scope

Software add-on or extension
No
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
None
System requirements
PDFTables requires Linux servers for private cloud deployments

User support

Email or online ticketing support
Email or online ticketing
Support response times
By end of next working day, but typically quicker.
User can manage status and priority of support tickets
No
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
Emergency 2hrs, Urgent 4hrs, Non-Urgent 2 days Incident escalation process available
Support available to third parties
Yes

Onboarding and offboarding

Getting started
We provide user documentation and examples for how to use the API.
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
Data is automatically provided by the service. Data is deleted after 30 days.
End-of-contract process
There are no additional costs to terminate and end the contract.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
User interface layout may be different for mobile.
Service interface
Yes
User support accessibility
WCAG 2.1 A
Description of service interface
Users can upload PDF documents using a web user interface and view or download the extracted data as HTML, CSV, XML or Excel.
Accessibility standards
None or don’t know
Description of accessibility
We aim for at least WCAG 2.1 A but have not conducted a specific evaluation.
Accessibility testing
None as yet.
API
Yes
What users can and can't do using the API
Users can use the full functionality of the service using the API.

Users authenticate their API requests using an API key obtained from the website.

No limitations.
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Buyers can post process data obtained through the API.

Scaling

Independence of resources
We monitor performance and scale our infrastructure to meet demand. We can commission independent hardware for specific customers if desired.

Analytics

Service usage metrics
No

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
Less than once a year
Penetration testing approach
In-house
Protecting data at rest
Encryption of all physical media
Data sanitisation process
No
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can download uploaded files in multiple file formats.
Data export formats
  • CSV
  • Other
Other data export formats
  • Excel
  • XML
Data import formats
Other
Other data import formats
PDF

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
99.99. We provide an SLA dependent on the needs of the customer. We also provide a refund model and dependent on the needs of the customer.
Approach to resilience
Our service always runs in multiple availability zones in Amazon Web Services EC2. Should an availability zone become unavailable, traffic is transparently routed to other zones.
Outage reporting
We have a public status dashboard available at http://status.sensiblecode.io/

Identity and authentication

User authentication needed
Yes
User authentication
Username or password
Access restrictions in management interfaces and support channels
Management interfaces are onto the Amazon Webservices (AWS) system where we follow all the recommended procedures of Multifactor Authentication using text messages and a token device. Management user accounts have been defined with limited and controlled access to the interface; the root account is not routinely used. Only three of the developers have access to the system, and ex-employees have had their login rights deleted.
Access restriction testing frequency
At least once a year
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for
Less than 1 month

Standards and certifications

ISO/IEC 27001 certification
No
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
No
Security governance approach
There is a senior employee with a special interest and expertise in the field of IT security with primary access to the Amazon Web Services infrastructure. He enforces Multi-Factor Authentication on all access to the AWS system (which itself has many levels of security and access logging) among the team, as well as policies to limit the retention of user data to as little as possible. To date there has been no known unauthorized access of any of the infrastructure.
Information security policies and processes
Our policies predominantly follow a the guidelines set out in the Amazon Web Services (AWS) documentation for its Identity and Access Management (IAM) system. These include defining users with controlled and limited access to the infrastructure and not using the root account for routine access, requiring Multifactor Authentication (MFA) using a token device, and using AWS CloudTrail to log all access events for review. The policies are thought to be appropriate given the size of the development team (4 persons).

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Infrastructure is managed entirely through configuration files. Changes are tracked in git. Before changes are deployed into production, they undergo a review process which includes considering potential security issues and typically involves multiple members of staff.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Threats to services were assessed at the architectural design phase, and on an ongoing basis as changes are made.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We respond promptly to security incidents. If there is a risk to customer data, customers are notified as soon as possible after the risk is understood. We are currently reviewing our processes for identifying potential compromises and we anticipate having something in place in the near future.
Incident management type
Supplier-defined controls
Incident management approach
Users can report incidents to security@sensiblecode.io.

There is no pre-defined process for common events, as incidents are very rare.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

The Sensible Code Company supports net zero carbon emissions by 2050.

Completed carbon reduction initiatives

- Low carbon office location
We've chosen to locate at Ormeau Baths, a technology innovation hub, in Belfast. Ormeau Baths is an 1850s retrofitted building repurposed as a low carbon office facility. As the building has no car parking, staff using the office travel there by walking, cycling or using public transport.

- We've been working from home since 2018
We implemented a full-time remote working policy for company personnel in 2018. 90% of staff work from home full-time. Staff meetings occur every quarter: we find a location that minimises staff travel and favour slow travel options where feasible.

- Reducing our carbon footprint
We published our carbon reduction plan in 2021 for the first time: https://sensiblecode.io/zero-emissions
Covid-19 recovery

Covid-19 recovery

The Sensible Code Company has had a 'remote first' policy since 2018. All of its staff are distributed across the UK. This meant that we were prepared for #COVID and software and support were 100% available and services were seamless throughout the pandemic.
Tackling economic inequality

Tackling economic inequality

The Sensible Code Company attracts and hires highly skilled software engineers and support personnel. We conduct regular reviews of market salaries and we maintain our staff by providing high salaries and flexible working and home office benefits.
Equal opportunity

Equal opportunity

The Sensible Code Company is an equal opportunity employer. We advertise positions open and fairly. We also offer training and development and to help our valued staff members to maintain their skills. We support staff members and when they wish to pursue professional qualifications.
Wellbeing

Wellbeing

The Sensible Code Company offers a combination of generous holidays 30 days plus bank holidays. It offers a 100% work from home policy and flexible working for staff who have family commitments. It also offers support where staff need training, development or other types of support and assistance.

Pricing

Price
£800 to £3,750.00 a unit a year
Discount for educational organisations
No
Free trial available
Yes
Description of free trial
The trial enables users to convert a limited number of pages for free.
Link to free trial
https://pdftables.com/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at aine@sensiblecode.io. Tell them what format you need. It will help if you say what assistive technology you use.