Texthelp Ltd


Browsealoud is an innovative support software which adds speech, reading and translation to websites facilitating access and participation for people with dyslexia, low literacy, mild visual impairments and those who speak English as a second language.


  • Text-to-Speech: improves comprehension and understanding
  • Written Translation: Translates webpages into a wide range of languages
  • Spoken Translation: Speaks translated text aloud in many languages
  • Text Magnification: allows users to access even the smallest text
  • MP3 Generation: Text can be saved and listened to later
  • Screen Mask: Blocks online clutter and helps elevate visual stress
  • Webpage Simplifier: Removes Distracting content and displays the main text
  • Customisable Options: Tailor and save settings to suit individual needs
  • Reads PDF Documents: Without altering the look and feel
  • Picture Dictionary: Dictionary definition in the form of an image


  • Expand your website’s appeal to a wider audience
  • Give confidence to site visitors who lack digital skills
  • Help more people browse, buy and access your services online
  • Make your content easily accessible
  • Extend your website’s appeal to non-native speakers
  • Comply with legal obligations for website accessibility
  • Demonstrate greater social responsibility


£1,495.00 to £7,995.00 a licence a year

Service documents


G-Cloud 12

Service ID

1 8 1 5 3 5 5 4 0 1 5 8 1 6 1


Texthelp Ltd Louise McQuillan
Telephone: 02894428105
Email: l.mcquillan@texthelp.com

Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
System requirements
  • PC: Internet Explorer version 11 and MS Edge
  • PC: Firefox (latest release)
  • PC: Chrome (latest release)
  • Mac: Safari (latest release)
  • Chromebook: Latest release Mobile
  • IOS: Safari (iPad, iPhone, iPod Touch (latest release)
  • Android: Chrome (Android v3 and greater)

User support

Email or online ticketing support
Email or online ticketing
Support response times
Our KPI is to respond in 24 hours, excluding weekends.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Support levels
We offer free Technical Support via phone or email for all our products. There is no difference in our support for different products. We do not offer technical account managers or support engineers.
Support available to third parties

Onboarding and offboarding

Getting started
Once onboard, customers are provided with a Browsealoud Welcome Pack. This pack includes, Detailed Product Overview, Instructions on Adding Browsealoud to a Website and Recommended Text for Customer Website explaining what Browsealoud is.

Customers are also assigned an account manager whose responsibility it is to ensure the Browsealoud integration runs smoothly and the customer receives all the necessary support and training throughout their integration and subscription period. Account managers can also provide a short online webinar to take the customer through the features and benefits of Browsealoud.
Service documentation
Documentation formats
  • HTML
  • Other
Other documentation formats
End-of-contract data extraction
On request Texthelp will return or destroy all customer data.
End-of-contract process
The price stated in the contract is the final price for the term of the contract. No other charges apply.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
While the desktop version offers 9 features on the toolbar, the mobile version offers 2: Hover to Speak and Translate Page.
Service interface
Description of service interface
Toolbar with buttons
Accessibility standards
None or don’t know
Description of accessibility
Users can use the text-to-speech function by hovering over text so there is no need for text selection. Each features works at a click of a button and translation of text also relates to instructions within Browsealoud.
Accessibility testing
Full testing is carried out by an in-house team trained in the requirements for users of assistive technology.
Customisation available
Description of customisation
Website owners who install Browsealoud on their site have some control over the appearance and location of the toolbar, and also can hide and show certain features. Furthermore, they can select the icon that appears on their launchpad. End users can control basic settings such as colours and appearance to best suit their needs, while also choosing the voice speed for the read aloud function, text size for the magnification function and colour of screen mask. Browsealoud also offers version control.


Independence of resources
Speech services are load balanced, and spread across multiple geographic locations. Servers scale up to meet demand, CDN with scalable file storage is used for static content.


Service usage metrics
Metrics types
General usage by customers/buyers of the software in a visual style report on a monthly basis or on request.
Reporting types
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
There is no user data to export from the products. Billing and contact info can be deleted on request after termination of the contract.
Data export formats
Other data export formats
There is no data to export.
Data import formats
Other data import formats
Not applicable.

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
99.99% uptime in any calendar month. Credits are applied to customer accounts where this target is not met.
Approach to resilience
A Secure Development Policy enforces security to be designed into the product. Vulnerability scanning is performed on all files. Services are hosted by Google, Amazon AWS and Sugar CRM all of which guarantee uptime. Other information may be available on request.
Outage reporting
Monitors and Scheduled automated tests running twice per day. Automatic notifications are sent by both monitors and automated tests if results are not as expected.

Identity and authentication

User authentication needed
Access restrictions in management interfaces and support channels
Access Control Policy
Access restriction testing frequency
At least once a year
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
British Standards Institute (BSI)
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
There are no exclusions contained within our statement of applicability.

As above, the company has been certified, by BSI, to ISO 27001. The certification is not product specific but covers the security posture of Texthelp LTD and Texthelp INC that are both in the scope of the certification. Texthelp PTY is not currently in scope but employees there are required to comply with the same policies.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Texthelp has a number of security policies satisfying the requirements of ISO 27001. Information Security Policy, Access Control Policy, Acceptable Use Policy, Mobile and Teleworking Policy, Secure Development Policy, Infrastructure Hardening Policy, Network Security Policy, Business Continuity and Disaster Recovery Plans.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Texthelp operates an Agile methodology. At the beginning of each agile sprint any security implications of changes we plan are considered and suitable mitigating actions are taken. Any changes that may impact the confidentiality, integrity or availability of Texthelp’s data or of the personal data of interested parties held by Texthelp must be thoroughly planned, preferably in isolation, prior to the changes being made. Risk assessment as defined in the company's Quality/ISMS Manual shall be carried out when changes are planned. Risks will be identified and recorded in The Risk Register and a treatment plan will be defined and implemented.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Texthelp's approach involves ensuring we identify, assess, and remediate information technology (IT) vulnerabilities, weaknesses, or exposures in IT resources or processes that may lead to a security or business risk. Our policy identifies Texthelp’s vulnerability management practice which includes the roles and responsibility of staff, the vulnerability management process and procedures followed, and risk assessment and prioritisation of vulnerabilities. Security vulnerability scanning technologies Whitesource and Tenable are used to assess our services and to identify potential threats.

How quickly the company deploys patches depends on the threat to a particular service. Any threats will be evaluated, prioritised and actioned accordingly.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
The quality assurance department manage a suite of in-house automated tests that monitor the integrity of the company's services on a twice daily schedule. A test fail resulting from evidence of a breach will result in the service automatically being taken offline immediately. For any test fail senior project management staff are automatically notified by email so immediate action can be taken where necessary. 24/7 cover is provided for this.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
‘Notification List' of customers that are to be notified is created. Identification of the Data Entity that was compromised.
The corresponding Products that use this Data Entity are identified, and for each product that is impacted:
A List of customers, Technical Contacts and Data Security Contacts at those accounts will be added to the Notification List.
Data Security Incident Response document is created.
Customers on the Notification List are made aware of:
Extent of incident
If personal data was accessed
Steps taken to mitigate the impact and to prevent recurrence.
Downtime/Security Event logged using guidance in the Information Security Policy.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£1,495.00 to £7,995.00 a licence a year
Discount for educational organisations
Free trial available
Description of free trial
Free trial available for 90 days, includes step by step guide available from website, technical support and usage statistics.
The trial period gives full access to all features of Browsealoud.
Link to free trial

Service documents