Linea Group Ltd

Translation Services

We can deliver first-class translation services to you and we operate in both the private and public sector, in over 450 languages and dialects. We have a 100% fill rate and a track record of providing translators at short notice for urgent requests.

Features

  • Gist Translation
  • Transcription
  • Multilingual SEO
  • Desktop Publishing

Benefits

  • Dedicated Project Managers
  • Quality Assured
  • Competitive Rates
  • Highly qualified native translators
  • Qualified Industry translators

Pricing

£1.50 per instance

Service documents

G-Cloud 11

636649147102882

Linea Group Ltd

Claire Schneider-Williams

07950130067

claire.schneider@lineagroup.net

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints None
System requirements None

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Within 24 hours
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Onsite support
Support levels Silver - Support is provided during core hours (9 - 5) 5 Days per week Bronze - Support is provided during core hours (9 - 5) 7 days per week Platinum - Support is provided 24 hours per day, 7 days per week. Support costs are dependent upon the size of the organisation and dispersion of its sites. We provide technical account management support.
Support available to third parties No

Onboarding and offboarding

Onboarding and offboarding
Getting started The service comprises two aspects: 1. The platform which provides the visual management system, standard metrics, approach and support. 2. Consultancy support, which isn't essential but is recommended with complex deployments and in situations where organisations require support in defining simplifying and managing their metric and associated operational performance.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction All data is extracted from the system by Linea and presented to the client as part of the programme exit process.
End-of-contract process All data is extracted from the system by Linea and presented to the client as part of the programme exit process. This service is provided as part of the annual subscription service. The information is extracted, saved in a secure and safe location and passed over to the client.

Using the service

Using the service
Web browser interface No
Application to install No
Designed for use on mobile devices No
API No
Customisation available No

Scaling

Scaling
Independence of resources Dedicated typists are assigned to each individual client

Analytics

Analytics
Service usage metrics No

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least once a year
Penetration testing approach In-house
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Data importing and exporting

Data importing and exporting
Data export approach All data is exported from the system by Linea and presented to the client. This service is provided as part of the annual subscription service. The information is extracted, saved in a secure and safe location and passed over to the client.
Data export formats
  • CSV
  • Other
Other data export formats
  • Excel
  • Word
Data import formats
  • CSV
  • Other
Other data import formats
  • Audio Recordings
  • Word
  • Excel
  • PDF

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • Bonded fibre optic connections
Data protection within supplier network Other
Other protection within supplier network Staff and clients are regularly trained in data protection and advised how to ensure data integrity. Passwords are regularly required to be updated. New starters need to have completed system overview course before being issued with a password and Login and passwords are deleted immediately upon leaving an organisation. Our customer service team also regularly review suspicious activity and failed login attempts.

Availability and resilience

Availability and resilience
Guaranteed availability Support is consistently assessed against specific SLA's. Support is provided to clients in line with the agreed system requirements and clients extras as part of the programme. Any issues regarding this process will can be escalated to the account manager who will take the appropriate action to ensure SLA achievement and compensate the client in situation where this is deemed appropriate and necessary.
Approach to resilience Available on Request
Outage reporting Dashboard, supported by email and SMS alerts.

Identity and authentication

Identity and authentication
User authentication needed No
Access restrictions in management interfaces and support channels Access to management interfaces and support channels are restricted through individual delegation, supported by accessibility passwords, which are carefully control and regularly reviewed and updated.
Access restriction testing frequency At least once a year
Management access authentication Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users receive audit information on a regular basis
How long user audit data is stored for User-defined
Access to supplier activity audit information Users receive audit information on a regular basis
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification Yes
Who accredited the ISO/IEC 27001 TBA
ISO/IEC 27001 accreditation date TBA
What the ISO/IEC 27001 doesn’t cover TBA
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards ISO/IEC 27001
Information security policies and processes Our reporting structure is dependent upon the type and complexity of the programme, however a typical structure comprises: Programme Director - working in partnership with the client SRO Programme Manager Programme Team - comprising various skills sets, experience and hierarchical levels. We ensure policy adherence through adoption and management of robust ISO procedures

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach Change Acceptance Process (CAP) Sustainable programme success is dependent upon our ability to go beyond training clients in new skills sets & develop people as change agents. We utilise CAP to develop change culture. CAP is a 9 step process to manage change. It’s fundamental in embedding change in the culture of organisations: 1. Set-up for success 2. Clarify the vision 3. Clarify the need 4. Evaluate potential resistance 5. Communicate & convince 6. Delivery early benefits 7. Remove obstacles 8. Embed in the organisation 9. Embed in the Culture.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Five phase process: 1.) Preparation Understanding: Size, scope, and geographic dispersion of infrastructure, Number of applications and devices on the network at all times. Critical assets (financial data & sensitive information). 2.) Discovery Low-risk assets are scanned at least quarterly. High risk assets are scanned daily. Patches are released in line with this schedule. 3.) Analysis We analyse and review high value information that each scan yields. 4.) Reporting Reports, focus on threat analysis, SLA status, compliance, and exceptions are reviewed to assess the required actions. 5.) Remediation This is undertaken both remotely and locally, with the benefit of contingencies.
Protective monitoring type Supplier-defined controls
Protective monitoring approach Our service includes: Comprehensive monitoring & alerting. We collect log data on the activities of users, and review/audit it. Coupled with intelligent baselining & effective prioritisation, enabling critical alerts to be raised to the right people at the right time. Knowledgeable analysts. understand and remediate possible attacks and incidents. Deciphering the information generated through monitoring. We provide regular reports/reviews to ensure the service continues to deliver at expected levels. This means no issues are missed, and alerts can be analysed/understood after the event. Our flexible process isn't tied to specific design so the service can evolve based changes to GPG13.
Incident management type Supplier-defined controls
Incident management approach Security incidents are inevitable and they will vary in their business impact. All incidents need to be effectively managed, particularly those that invoke the organisation’s disaster recovery and business continuity plans. How risk are managed? Obtain senior management approval and backing. Establish an incident response capability. Provide specialist training Define the required roles and responsibilities Establish a data recovery capability Test the incident management plans Decide what information will be shared and with whom Collect and analyse post-incident evidence Conduct a lessons learned review Educate users and maintain their awareness Report criminal incidents to Law Enforcement.

Secure development

Secure development
Approach to secure software development best practice Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £1.50 per instance
Discount for educational organisations No
Free trial available No

Service documents

pdf document: Pricing document pdf document: Skills Framework for the Information Age rate card pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑