Texthelp Ltd

Read&Write for Microsoft Edge

Read&Write for Microsoft Edge provides support tools for the web and common file types accessed through Google Drive. The easy to use toolbar helps employees with everyday digital tasks - from composing emails to writing reports, proofing lengthy documents or searching for information on the web.


  • Text-to-speech: Allows text to be read aloud
  • Dictionary: Assists with understanding the definitions and context of words
  • Picture Dictionary: Added support of visual representation for unfamiliar words
  • Screen Masking: Tinted background improving focus and reducing visual stress
  • Research Tools: Allows user to highlight areas in four colours
  • Website Simplify: removes clutter from screen, such as adverts
  • Word Prediction: Learns user writing style to allow text prediction


  • Company policies and procedures can be provided in alternative formats
  • Supports enhanced career and professional development
  • Improved workplace communication and integration
  • Helps to boost staff retention
  • Helps staff to meet their full potential
  • Helps the organisation in supporting accessibility best practice
  • Reduces time/costs involved in reasonable adjustments
  • Helps to reduce the use of paper in organisations
  • Provides a more inclusive and accessible recruitment process


£817 to £24,042 a licence a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at l.mcquillan@texthelp.com. Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

7 3 8 7 8 8 0 0 5 1 0 9 3 4 3


Texthelp Ltd Louise McQuillan
Telephone: 02894428105
Email: l.mcquillan@texthelp.com

Service scope

Software add-on or extension
What software services is the service an extension to
Microsoft Edge
Cloud deployment model
Private cloud
Service constraints
System requirements
A current version of internet browser Microsoft Edge

User support

Email or online ticketing support
Email or online ticketing
Support response times
Our KPI is to respond in 24 hours, excluding weekends
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Support levels
We offer free Technical Support via phone or email for all our products. There is no difference in our support for different products. We do not offer technical account managers or support engineers.
Support available to third parties

Onboarding and offboarding

Getting started
Once onboard, customers are provided with a Read&Write for Microsoft Edge Welcome Pack. This pack includes:
Detailed Product Overview and instructions on installing Read&Write

Customers are also assigned an account manager whose responsibility it is to ensure the Read&Write license runs smoothly and the customer receives all the necessary support and training throughout their subscription period. Account managers can also provide face-to-face demonstrations to take the customer through the features and benefits of Read&Write.

CIPD certified training is also available upon request at an additional charge.

Also we have support articles on our support website to help with any issues.
Service documentation
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
End-of-contract data extraction
On request Texthelp will return or destroy all customer data.
End-of-contract process
The price stated in the contract is the final price for the term of the contract. No other charges apply.

Using the service

Web browser interface
Supported browsers
Microsoft Edge
Application to install
Compatible operating systems
Designed for use on mobile devices
Service interface
Description of service interface
Toolbar with buttons
Accessibility standards
None or don’t know
Description of accessibility
It is keyboard accessible
Accessibility testing
Full testing is carried out by an in-house team trained in the requirements for users of assistive technology.
Customisation available


Independence of resources
Speech services are load balanced, spread across multiple geographic locations and scale depending on load. All other services such as prediction also scale based on server load.


Service usage metrics


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
EU-US Privacy Shield agreement locations
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Protecting data at rest
Other data at rest protection approach
Other data at rest protection approach
Data is encrypted at rest after being de-identified.
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
There is no user data to export from the products. Capita's billing and contact info can be deleted on request after termination of the contract.
Data export formats
Other data export formats
There is no data to export
Data import formats
Other data import formats
Not applicable

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
99.99% uptime in any calendar month. Credits are applied to customer accounts where this target is not met.
Approach to resilience
Services are hosted by Google, Amazon AWS and Sugar CRM all of which guarantee uptime. Other information may be available on request.
Outage reporting
Monitors and scheduled automated tests running twice per day. Automatic notifications are sent by both monitors and automated tests if results are not as expected.

Identity and authentication

User authentication needed
User authentication
Username or password
Access restrictions in management interfaces and support channels
Access Control Policy
Access restriction testing frequency
At least once a year
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
British Standards Institute (BSI)
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
As above, the company offices in Antrim NI and Woburn MA are within scope of the certificate and have been certified, by BSI, to ISO 27001. An Australian subsidiary 'Texthelp PTY' is currently not in scope although the infrastructure and staff in that office are required to comply with company security policies. The certification is not product specific but covers the security posture of the entire company. All design, development, testing, marketing and selling of RW is subject to the same security controls.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Texthelp has a number of security policies satisfying the requirements of ISO 27001. Information Security Policy, Access Control Policy, Acceptable Use Policy, Mobile and Teleworking Policy, Secure Development Policy, Infrastructure Hardening Policy, Network Security Policy, Business Continuity and Disaster Recovery Plans.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Texthelp operates an Agile methodology. At the beginning of each agile sprint any security implications of changes we plan are considered and suitable mitigating actions are taken. Any changes that may impact the confidentiality, integrity or availability of Texthelp’s data or of the personal data of interested parties held by Texthelp must be thoroughly planned, preferably in isolation, prior to the changes being made. Risk assessment as defined in the company's Quality/ISMS Manual shall be carried out when changes are planned. Risks will be identified and recorded in The Risk Register and a treatment plan will be defined and implemented.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Texthelp's approach involves ensuring we identify, assess, and remediate information technology (IT) vulnerabilities, weaknesses, or exposures in IT resources or processes that may lead to a security or business risk. Our policy identifies Texthelp’s vulnerability management practice which includes the roles and responsibility of staff, the vulnerability management process and procedures followed, and risk assessment and prioritisation of vulnerabilities. Security vulnerability scanning technologies Whitesource and Tenable are used to assess our services and to identify potential threats.

How quickly the company deploys patches depends on the threat to a particular service. Any threats will be evaluated, prioritised and actioned accordingly.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
The quality assurance department manage a suite of in-house automated tests that monitor the integrity of the company's services on a twice daily schedule. A test fail resulting from evidence of a breach will result in the service automatically being taken offline immediately. For any test fail senior project management staff are automatically notified by email so immediate action can be taken where necessary. 24/7 cover is provided for this.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
‘Notification List' of customers that are to be notified is created. Identification of the Data
Entity that was compromised.
The corresponding Products that use this Data Entity are identified, and for each product that is impacted:
A List of customers, Technical Contacts and Data Security Contacts at those accounts will be added to the Notification List.
Data Security Incident Response document is created.
Customers on the Notification List are made aware of:
Extent of incident
If personal data was accessed
Steps taken to mitigate the impact and to prevent recurrence.
Downtime/Security Event logged using guidance in the Information Security Policy.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£817 to £24,042 a licence a year
Discount for educational organisations
Free trial available
Description of free trial
Free 30 day trial available including step by step installation guide available on our website and technical support.
Users will have full access to all Read&Write features for the trial period.
Link to free trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at l.mcquillan@texthelp.com. Tell them what format you need. It will help if you say what assistive technology you use.