Texthelp Ltd

Read&Write for Google Chrome

Provides support tools for the web and common file types accessed through Google Drive. Read&Write supports a number of different learning styles encouraging further development of literacy skills and can help to increase confidence. Furthermore, users are able to customise certain elements to their preference.


  • Text-to-Speech : Allows text to be read aloud
  • Dictionary: Aids understanding of definitions and context of words
  • Picture Dictionary: Added support of visual representation for unfamiliar words
  • Word Prediction: Learns user writing style to allow text prediction
  • Screen masking: Tinted background improving focus and reducing visual stress
  • Audio Maker: Converts text to audio files creating accessible formats
  • Talk&Type: Speech converted to text, saving time and increasing productivity
  • Screenshot Reader: Enables text within pictures to be read aloud
  • Vocabulary: Gives meaning and visual representation of words within documents


  • Company policies and procedures can be provided in alternative formats
  • Supports enhanced career and professional development
  • Improved workplace communication and integration
  • Helps to boost staff retention
  • Help staff to meet their full potential
  • Helps the organisation in supporting accessibility best practice
  • Reduces time/costs involved in reasonable adjustments
  • Helps to reduce the use of paper in organisations
  • Provides a more inclusive and accessible recruitment process


£1463 to £25500 per licence per year

Service documents


G-Cloud 11

Service ID

4 7 4 3 5 1 7 9 8 2 2 4 8 9 7


Texthelp Ltd

Louise McQuillan



Service scope

Software add-on or extension
What software services is the service an extension to
Google Chrome
Cloud deployment model
Private cloud
Service constraints
System requirements
A current version of internet browser Google Chrome

User support

Email or online ticketing support
Email or online ticketing
Support response times
Our KPI is to respond in 24 hours, excluding weekends
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Support levels
We offer free Technical Support via phone or email for all our products. There is no difference in our support for different products. We do not offer technical account managers or support engineers.
Support available to third parties

Onboarding and offboarding

Getting started
Once onboard, customers are provided with a Read&Write for Google Chrome Welcome Pack. This pack includes:
Detailed Product Overview and
Instructions on installing Read&Write

Customers are also assigned an account manager whose responsibility it is to ensure the Read&Write license runs smoothly and the customer receives all the necessary support and training throughout their subscription period. Account managers can also provide face-to-face demonstrations to take the customer through the features and benefits of Read&Write.

CIPD certified training is also available upon request at an additional charge.

Also we have support articles on our support website to help with any issues.
Service documentation
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
End-of-contract data extraction
On request Texthelp will return or destroy all customer data.
End-of-contract process
The price stated in the contract is the final price for the term of the contract. No other charges apply.

Using the service

Web browser interface
Supported browsers
Application to install
Compatible operating systems
  • MacOS
  • Windows
  • Other
Designed for use on mobile devices
Service interface
Description of service interface
Toolbar with buttons
Accessibility standards
None or don’t know
Description of accessibility
It is keyboard accessible
Accessibility testing
Customisation available


Independence of resources
Speech services are load balanced, spread across multiple geographic locations and scale depending on load. All other services such as prediction also scale based on server load.


Service usage metrics
Metrics types
General usage of the software for each licence on request.
Reporting types
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
There is no user data to export from the products. Capita's billing and contact info can be deleted on request after termination of the contract.
Data export formats
Other data export formats
There is no data to export
Data import formats
Other data import formats
Not applicable

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
99.99% uptime in any calendar month. Credits are applied to customer accounts where this target is not met.
Approach to resilience
Services are hosted by Google, Amazon AWS and Sugar CRM all of which guarantee uptime. Other information may be available on request.
Outage reporting
Monitors and Scheduled automated tests running twice per day. Automatic notifications are sent by both monitors and automated tests if results are not as expected.

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Access Control Policy
Access restriction testing frequency
At least once a year
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
British Standards Institute (BSI)
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
As above, the company offices in Antrim NI and Woburn MA are within scope of the certificate and have been certified, by BSI, to ISO 27001. An Australian subsidiary 'Texthelp PTY' is currently not in scope although the infrastructure and staff in that office are required to comply with company security policies. The certification is not product specific but covers the security posture of the entire company. All design, development, testing, marketing and selling of RW is subject to the same security controls.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Texthelp has a number of security policies satisfying the requirements of ISO 27001. Information Security Policy, Access Control Policy, Acceptable Use Policy, Mobile and Teleworking Policy, Secure Development Policy, Infrastructure Hardening Policy, Network Security Policy, Business Continuity and Disaster Recovery Plans.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Texthelp operates an Agile methodology. At the beginning of each agile sprint any security implications of changes we plan are considered and suitable mitigating actions are taken. Any changes that may impact the confidentiality, integrity or availability of Texthelp’s data or of the personal data of interested parties held by Texthelp must be thoroughly planned, preferably in isolation, prior to the changes being made. Risk assessment as defined in the company's Quality/ISMS Manual shall be carried out when changes are planned. Risks will be identified and recorded in The Risk Register and a treatment plan will be defined and implemented.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Texthelp's approach to vulnerability management involves ensuring we identify, assess, and remediate information technology (IT) vulnerabilities, weaknesses, or exposures in IT resources or processes that may lead to a security or business risk. Our policy identifies Texthelp’s vulnerability management practice which includes the roles and responsibility of staff, the vulnerability management process and procedures followed, and the risk assessment and prioritisation of vulnerabilities.

How quickly the company deploys patches depends on the threat to a particular service. Any threats will be evaluated, prioritised and actioned accordingly.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
The quality assurance department manage a suite of in-house automated tests that monitor the integrity of the company's services on a twice daily schedule. A test fail resulting from evidence of a breach will result in the service automatically being taken offline immediately. For any test fail senior project management staff are automatically notified by email so immediate action can be taken where necessary. 24/7 cover is provided for this.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
‘Notification List' of customers that are to be notified is created. Identification of the Data Entity that was compromised.
The corresponding Products that use this Data Entity are identified, and for each product that is impacted:
A List of customers, Technical Contacts and Data Security Contacts at those accounts will be added to the Notification List.
Data Security Incident Response document is created.
Customers on the Notification List are made aware of:
Extent of incident
If personal data was accessed
Steps taken to mitigate the impact and to prevent recurrence.
Downtime/Security Event logged using guidance in the Information Security Policy.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£1463 to £25500 per licence per year
Discount for educational organisations
Free trial available
Description of free trial
Free trial available for 30 days including step by step installation process and technical support if necessary.
For the duration of the trial period, users will have full access to all features of Read&Write.
Link to free trial

Service documents

Return to top ↑