Digital Learning Content

Bespoke eLearning developed by a highly experienced team of multimedia professionals and instructional designers. Using only industry standard authoring tools, our bespoke eLearning fully complies with recognised accessibility standards. Ready-to-use solutions include off-the-shelf financial conduct authority courses and an extensive library of general off-the-shelf courses and micro-learning eBytes.


  • Any size (small to large) projects professionally managed/delivered in house
  • Multi-language capability - text and voice over translation projects welcome
  • Three levels of production designed for different project types/budgets
  • Creation of accessible e-learning to recognised standards
  • SCORM and/or AICC compliant content creation
  • Animated graphics, video and voice-over production/insertion
  • Uplifting/conversion of existing content
  • Script writing including dilemmas and scenarios
  • Creation of engaging content with a choice of authoring tool
  • Specific options for development of responsive content development,


  • Tailor made courses meet your exact requirements
  • Engaging and effective content changes behaviours and improves performance
  • Accessible e-learning ensures development of all, including those with disabilities
  • Once delivered, customers who want to can manage/update courses themselves
  • Dilemmas and scenarios reflect real life/work to increase retention
  • Fun, enjoyable courses promote uptake and strengthen training compliance
  • Delivering training online ensures consistency and clarity of messaging
  • Mobile responsive content supports modern working/learning practices
  • Works brilliantly in support of classroom training


£400 to £1,000 a person a day

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

9 0 3 0 0 2 6 6 4 4 0 3 6 4 2

Contact Limited Sarah Lambie
Telephone: 01908 508777

Service scope

Software add-on or extension
Yes, but can also be used as a standalone service
What software services is the service an extension to
This service is often provided as an extension to implementation of our learning management system (LMS) which has specific functionality for managing training compliance including live training compliance reporting.
Cloud deployment model
Private cloud
Service constraints
Clients should also consider how they are going to deploy and track completion of their e-learning, the recommendation being to use an instance of Traineasy LMS, an affordable platform with the added benefit of enabling them to manage rules for training compliance and produce live (real time) training compliance reports. For the creation of e-learning, clients should be aware that we need reasonable access to key stakeholders, relevant documents and information pertinent to the project.
System requirements
  • SCORM- or AICC-compliant learning management system
  • A modern browser with popups enabled
  • A stable internet connection

User support

Email or online ticketing support
Phone support
Web chat support
Onsite support
Support levels
As well as having their own dedicated account manager who is always available by email and phone, a project co-coordinator acts as liaison between the customer and the project team - including external translation agencies if these have been employed - throughout the project from concept to delivery. This person also coordinates the QA and UAT testing and final sign off. Once e-learning has been delivered to the customer, no further support is required; it is uploaded to their LMS and deployed to the end users. However, the client is still able to contact their account manager to discuss any queries that might arise on deployment or at any future time.
Support available to third parties

Onboarding and offboarding

Getting started
A project initiation meeting (PIM) is held on customer site to discuss every aspect of the requirement, from target audience, to required production levels to deployment timescales. This may be followed by a workshop where stakeholders and/or subject matter experts meet with our development lead as a minimum to decide on course structure, scope, look & feel, and so on. A content development Agreement is then drawn up describing the scope of the work and the process to be followed .
Service documentation
Documentation formats
End-of-contract data extraction
There is no data as such to extract. However, clients can keep the SCORM file and project documentation and indefinitely.
End-of-contract process
On sign-off of the e-learning, it is delivered to the customer by secure FTP and the project is closed.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
E-Learning content may be built specifically using responsive design. This enables course viewing windows re-size and present differently depending on which mobile device is in use.
Service interface
Customisation available
Description of customisation
The service is essentially to create custom e-learning. Once developed and delivered customers may alter the look, feel and content as they wish by using the same industry-recognised authoring tool as used to build the course initially.


Independence of resources
We schedule and plan projects such that they are always appropriately resourced. If required, we can call on partners with whom we have long standing relationships for certain services such as script writing and course testing.


Service usage metrics
Metrics types
Traineasy LMS captures e-learning attempts, completions, grades (if the e-learning contains a graded assessment) and it will also calculate compliance with training against rules such as whether the e-learning has been completed in the last year or not.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
Protecting data at rest
Other data at rest protection approach
Data sanitisation process
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
In this context, the 'data' relates to completion records for the e-learning. This is available to extract from the LMS, whether this is hosted by Traineasy, the client or a third party.
Data export formats
Data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
Other protection between networks
We use secure FTP for transferring developed courses and related documentation.
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Approach to resilience
Outage reporting

Identity and authentication

User authentication needed
User authentication
Other user authentication
Client's LMS will require username and password authentication
Access restrictions in management interfaces and support channels
Once deployed, access to the materials in the e-learning course can be restricted to those who need it by using a combination of enrolment and administration tools in the LMS.
Access restriction testing frequency
At least every 6 months
Management access authentication
Username or password

Audit information for users

Access to user activity audit information
No audit information available
Access to supplier activity audit information
No audit information available
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance approach
Information security policies and processes
Traineasy's Information Security Policy supports the 7 Caldicott principles and 10 data security standards and is supported by specific technical security, operational security and security management policies. Information Security and the appropriate protection of information assets is the responsibility of everyone. All staff remain accountable for their actions in relation to confidential information and information systems. Employees are responsible for ensuring they understand their roles and responsibilities, and this is reinforced by yearly mandatory training. Failure to comply with IS policies may result in disciplinary action. The Senior Information Risk Owner (SIRO) is accountable for information risk within Traineasy and advises the Board on the effectiveness of information risk management across the organisation. Within Traineasy the SIRO is also Chief Information Security Officer and is responsible for the day-to-day operational effectiveness of the IS policy, and its associated policies and processes. Traineasy's Data Protection Officer is responsible for ensuring that the company and its constituent business areas remain compliant at all times with Data Protection, Privacy & Electronic Communications Regulations, Freedom of Information Act and the Environmental Information Regulations. The Information Asset Owners (IAOs) are the responsible individuals involved in running the business area.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
As a general principle, Traineasy systems are locked down as much as possible without inhibiting business requirements. This includes "Least Privilege" as well as a "Secure Configuration Approach" where Traineasy controlled systems and are assessed to determine exactly what business functionality is required; all unnecessary functionality is removed and default configurations updated. The configuration management database is kept up-to-date and always represents the live environment. The process we use is to record and review all requests for change, If accepted, requests for change are categorised and assessed, before being authorised, implemented, evaluated and closed.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Our vulnerability management program is a continuous process that helps us better manage our vulnerabilities in the long run. It comprises the following components which are continually repeated: Asset Inventory, Information Management, Risk Assessment, Vulnerability Assessment, Reporting & Remediation, Response Planning.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Our protective monitoring approach provides visibility and understanding of who is accessing data. All of our systems capture logs with accurate time stamps together with the ID and IP address of the individual and the actions they are performing, such as logging in, deleting data, and so on. System statistics about data access are collated and represented graphically on our systems' dashboards.
Incident management type
Supplier-defined controls
Incident management approach
Our Information Security Incident Policy is used to produce, implement, test and manage our information security incident management processes. The Policy covers both IT incidents and suspected data loss/breaches whether electronic or physical.

Our information security incident management processes are fully documented and enable us to handle different types of information security incident, including managing incidents affecting confidential information assets, from identification and analysis, through to response, resolution and recovery. We use a simple reporting form for incident reporting. The reporting form is easily available via the Traineasy intranet/IT system and it is designed to capture the required information,

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks


£400 to £1,000 a person a day
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.