Disinformation Countermeasures
A suite of tools including fact checking, open-source intelligence and AI to investigate specific domains and platforms, and track the spread of disinformation and misinformation campaigns. Logically identify campaigns on both open and closed networks; detecting problematic content and deploying countermeasures to mitigate the risks posed by such content.
Features
- Fact-checking
- Platform Co-ordination
- Issuance of Takedowns and Notices
- Communications Campaigns - early warning and retrospective
Benefits
- Combat problematic content on social Networks
- Identification of influence operations on Social network
- Combat problematic content on closed networks
Pricing
£8,000 to £500,000 a unit a month
Service documents
Request an accessible format
Framework
G-Cloud 12
Service ID
1 0 1 2 6 6 7 3 8 4 3 6 0 2 2
Contact
THELOGICALLY LTD
Lyric Jain
Telephone: 01484725440
Email: lyric@logically.co.uk
Service scope
- Software add-on or extension
- Yes, but can also be used as a standalone service
- What software services is the service an extension to
-
- Disinformation Countermeasures
- Disinformation Detection
- Information Integrity Threat Identification and Mitigation
- Veracity Assessment
- Credibility Assessment
- Misinformation Detection - Cloud deployment model
- Public cloud
- Service constraints
- The primary consideration when it comes to limitations is access to raw data. Some Logically capabilities are language agnostic, however more complex natural language models such as stance comparison are at present limited to english.
- System requirements
-
- Internet Access is Required
- Must meet pre-defined Browser Requirements
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 24 hours hours - 7 Days a week
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AA or EN 301 549
- Phone support
- No
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support accessibility standard
- WCAG 2.1 AA or EN 301 549
- Web chat accessibility testing
- N/A
- Onsite support
- Yes, at extra cost
- Support levels
- Logically employs a wide array of domain experts that strive to provide both intellectual and technical support to our customers proactively. With Logically’s Managed services full support is offered to ensure customer success while our Cloud-hosted solutions come with on-boarding and maintenance support and implementation and analysis workshops
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Training and on-boarding package is available to any new customer; this process typically takes 1-5 days, depending on the scope of the project.
Logically employs a wide array of domain experts that strive to provide both intellectual and technical support to our customers proactively. With Logically’s Managed services full support is offered to ensure customer success while our Cloud-hosted solutions come with on-boarding and maintenance support and implementation and analysis workshops - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Upon request Logically will provide a data download user data in secure CSV Format
- End-of-contract process
- Either the end-user customer renews the service or we terminate the service on the contract expiry date and delete any customer related account information . The contract covers product access and support up until the date of expiry.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 10
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari 9+
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- No differentiation between Mobile and desktop services as our Models have been tailor made for distillation on Edge Hardware as well as desktop.
- Service interface
- Yes
- Description of service interface
- Self-service web application with dashboard, Browser Extensions available for certain use cases
- Accessibility standards
- WCAG 2.1 AA or EN 301 549
- Accessibility testing
- We conduct regular Usability and accessibility research and User interviews including with screen reading technology to ensure our products and services meet industry standard guidelines.
- API
- Yes
- What users can and can't do using the API
- Logically's systems are designed with extreme flexibility in mind. Our core system architecture is platform-agnostic. It provides the ability to ingest external, sensitive, or proprietary data sources in a plug-and-play configuration and output raw and processed data via encrypted endpoints integrated into existing systems.
- API documentation
- Yes
- API documentation formats
-
- HTML
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
- When creating a new account or setting up a new project, we can offer a plug and play customisation service for our customer's requirements, as well as through platform settings. Custom capabilities such as novel data sources and threat types can be added in 1-4 weeks depending on the complexity of the integrations.
Scaling
- Independence of resources
- Logically's systems are not limited by scale. We use cutting edge infrastructure to ensure our services are available on any scale.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Depending on the services customers require, we can provide KPIs based on outcomes, information detail, events, and threats identified: from counts of unique fact-checks, credibility assessments, and threats. We can also use Latency as a measurable: time from a user request or threat origination to response or threat flagging as well as Accuracy in the form of correct classifications.
- Reporting types
-
- Real-time dashboards
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- EU-US Privacy Shield agreement locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with another standard
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Data is available for export in through the API as well as Manual data exports from the user interface, all data is provided in CSV format.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- 99.9% Uptime Availability
- Approach to resilience
- Available on request
- Outage reporting
- Automated Customer Email Alerts and Service Availability Dashboard
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Management and configuration of the service requires Logically administrative privileges for the customer account. Support channels require a Logically account.
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Identity federation with existing provider (for example Google Apps)
- Username or password
Audit information for users
- Access to user activity audit information
- No audit information available
- Access to supplier activity audit information
- No audit information available
- How long system logs are stored for
- Less than 1 month
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- Logically follows industry standard security governance procedures and is in the process of complying to ISO/IEC 27001, we use a combination of high levels of encryption, trained staff, and information security policies and technical and Ethical safeguards to protect our customers’ data.
- Information security policies and processes
- Logically uses a combination of high levels of encryption, trained staff, and information security policies and technical and Ethical safeguards to protect our customers’ data.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
All new features follow our rigorous planning processes. Any new feature or changes to an existing one are described from a use case perspective and a solution is documented.
Jira is used for tracking all development tasks form start to finish. All features are reviewed and signed off by the security team and Ethic board. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- Logically uses a combination of Internal and third party teams to detect vulnerabilities in our services as well a continuous Pen Tests (minimum once per year) and offers bug bounties for non critical parts of our service. Logically uses Google Cloud infrastructure who perform regular testing for vulnerabilities.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- Any Potential compromises will follow our defined security guidelines. We monitor 24/7 and all critical incidents are acted upon immediately.
- Incident management type
- Supplier-defined controls
- Incident management approach
-
The Logically Information Security Team will evaluate and determine a response strategy and:
- Confirm Scope of Incident
- Confirm, Catalog and Confirm Damage to Data/Property
- Confirm Impact to the Business
- Categorize Incident (Malware, Intrusion, Damage etc.)
- Determine Response and Remediation Timeline both Internally & Externally
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Pricing
- Price
- £8,000 to £500,000 a unit a month
- Discount for educational organisations
- No
- Free trial available
- No