Virtual College Ltd

Bespoke Content Development

Our bespoke team create learning solutions to change behaviours and influence organisational culture change. The content we develop ranges from e-learning / elearning slide decks to downloadable resources to innovative gamified digital solutions, meaning we are able to create different levels of interactive content depending on the client's needs.


  • Content mapped to the client's brief
  • Content published in the client's preferred format (E.g. SCORM)
  • Bespoke graphics
  • 3D imagery
  • Animated and interactive video
  • Live action video
  • Information slides
  • Course assessments and evaluations
  • Full project management
  • A learning strategy


  • Designed to engage and inspire learners
  • Targeted to capture unique training objectives and requirements
  • Built to support or replace an existing face-to-face training solutions
  • Aligns with specific policies, processes, branding and tone
  • Additional hosting services available
  • Use of different digital interventions; catering to more learning styles
  • Designed with the learner at the heart
  • A highly experienced content development team
  • Different specialities within the team
  • Consultancy on roll-out and organisational change


£250 per transaction

  • Education pricing available

Service documents


G-Cloud 11

Service ID

9 7 7 9 7 2 4 0 5 8 5 1 9 5 8


Virtual College Ltd

Felicity Fiore

01943 605976

Service scope

Software add-on or extension
What software services is the service an extension to
In most cases a system will be needed to host the content, such as a learning management system. Alternately some files can be published in HTML format and be accessed as web pages.
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
Content must be hosted in a platform such as a learning management system. The host system may also dictate the file format of the content (e.g. SCORM).
System requirements
Access to a hosting platform

User support

Email or online ticketing support
Email or online ticketing
Support response times
Full email support is available to all our users, including system administrators and individual users. This service is available from 8.30am to 5.30pm, Monday to Friday, via our help and support team. In addition we have an out of hours service; where urgent e-mail enquiries are checked, allocated and responded to and calls are answered within out service level agreements. Our response standards are within two hours of receipt or next working day if received outside working hours. 80% of all support emails are answered within 2 hours and 95% of emails are resolved without the use of further correspondence.
User can manage status and priority of support tickets
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Yes, at extra cost
Support levels
We offer relationship, project management and content development support.

Relationship support is provided an Account/Relationship Manager. They are they primary contact during the development and keep our clients informed on the development process as well as facilitating regular catch-up calls and meetings. Consultancy services can also be provided should a client require support.

All our bespoke projects have a dedicated project manager who produces project documentation (including a learning strategy document) and manages our internal resource. They ensure that the content we produce is done so inline with the client's timescales, as well as working directly with the client.

The content development team feature a huge range of roles; from graphic and instructional designers to storyboarders and proofreaders. The team support the client in interpreting the brief and bringing it to life in the way the client has envisaged.

All support services are included in the project costs and will vary depending on the level of involvement required.
Support available to third parties

Onboarding and offboarding

Getting started
Each project begins with a scoping session, where we take the time to understand the aims and outcomes of the project as well as your preferred ways of working. Through this session we look to define your overall vision for the project and how best to embed this in the content and how the content can be used to support the wider programme.

At these events we aim to fully scope the course programme and cover areas such as:
Current challenges and issues
Aims and objectives in delivery of a course / programme Key learning outcomes
Target audience
Level and scope of content
Level of interactivity
Design, look and feel
Challenges, quizzes and tests
Pre and post course assessment
Evaluation and feedback
Certification, accreditation and qualification

We would also work with you to form an implementation plan for the modules, advising on how best to promote uptake and create a real interest in them. The product development manager ensures that everyone involved in the production of the course agree and understand the resultant specification for the course to include:
Target audience
Learning outcomes
How learning outcomes map to the programme
Course content and outline structure
Service documentation
Documentation formats
End-of-contract data extraction
The client will be sent the source file of for each module developed upon the completion of the contract.
End-of-contract process
Upon completion of the contract the client will have access to all the resources we have developed for them. The source files are securely transferred to the client along with any additional content.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
All the content we produce can be used on mobile devices. In most instances the content will appear on the mobile device as it does on a desktop.

In certain instances we may use authoring tools specifically designed for creating "mobile first" content, should mobile devices be the primary delivery method. Again, the content would appear the same whether viewed on a desktop or mobile, however it would include features (such as the ability to scroll through the content) that would be more appropriate for these kinds of devices.
Service interface
Description of service interface
The design of the course interface is dependent on the client's brief, however we also include elements such as clearly labelled text, narration, keyboard navigation and other accessibility features (such as compatibility with screen readers) to ensure the content can be viewed by a wide learner base.
Accessibility standards
Accessibility testing
We test all our content on Internet Explorer 11, Firefox, Android, Google Chrome, Safari and Edge as well as on our own learning management system.
Customisation available
Description of customisation
If a customer has access to the authoring tool used to design the content then they are able to customise any aspect of the content as they wish.

Our content development team can also customise content on behalf of a client should their expertise be preferred. There would be costs associated with this.


Independence of resources
Each allocation of the module via a host platform is separate, meaning that one user going through a piece of content cannot affect another.


Service usage metrics
Metrics types
As part of the project we will develop a project plan and service level agreement against which our clients are able to track the progress of the project.

SCORM compliant systems will also be able to track SCORM files they host.
Reporting types
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Staff screening not performed
Government security clearance

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Managed by a third party
Penetration testing frequency
Protecting data at rest
Other data at rest protection approach
TLS (Version 1.0 and above)
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
If the module is produced in SCORM format then any host SCORM platform will be able to track completion statistics for the content.
Data export formats
Other data export formats
SCORM data
Data import formats
Other data import formats
Text input

Data-in-transit protection

Data protection between buyer and supplier networks
Other protection between networks
All the client requires for this service is the source file, therefore they are not reliant on any of our systems to run the content. Should the client use our host platform the LMS would be dealt with separately.
Data protection within supplier network
Other protection within supplier network
We supply the source file, meaning our clients are not reliant on anything within our network to run the content.

Availability and resilience

Guaranteed availability
SLAs for our bespoke development services depend on the particular project due variables such as timescales, resource, amount of content to be developed etc. therefore we produce a bespoke SLA for that particular project.
Approach to resilience
This information is available on request.
Outage reporting
Any delays to delays to the project or outages during bespoke projects are communicated to the client via their relationship manager.

Identity and authentication

User authentication needed
Access restrictions in management interfaces and support channels
We transfer the source file to our clients upon completion of the development to a staff member nominated by the client. This ensures that only the nominated individual has access to the source file in the first instance and they are then able to decree how the file is access themselves.
Access restriction testing frequency
At least once a year
Management access authentication
Description of management access authentication
Management access to the source file is controlled by transferring the file only to an individual named by the client upon completion of the development. It is then for them to distribute access as they see fit.

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
Other security governance standards
Cyber Essentials
Information security policies and processes
Virtual College takes its data management responsibilities seriously. We encourage all colleagues to identify and report all potential risks so that we can take positive measures to eliminate or control these risks whilst working within the data management principles. We are proactive in providing information, training and supervision so that all those associated with the organisation can take reasonable care of their own and other people’s information and feel able to report any situations in line with our Data Protection and Confidentiality Policy. These high standards are applied to any staff member processing your data so you can be sure that whilst user data is being uploaded to the system, and throughout the ongoing support, it will remain strictly confidential at all times.

Virtual College complies with all aspects of data protection and we train all our staff on what this means in practice. We work with an independent consultant in the continuous improvement of our approach and undertake regular audits in order to ensure all staff work within our policies and procedures. Our registration number is Z7723545.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
We have a strictly defined quality process which is managed as part of our ISO9001 accredited quality management policy. A copy of this policy is available on request.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
We have a strictly defined quality process which is managed as part of our ISO9001 accredited quality management policy. A copy of this policy is available on request.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We have a strictly defined quality process which is managed as part of our ISO9001 accredited quality management policy. A copy of this policy is available on request.
Incident management type
Supplier-defined controls
Incident management approach
We have a strictly defined quality process which is managed as part of our ISO9001 accredited quality management policy. A copy of this policy is available on request.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£250 per transaction
Discount for educational organisations
Free trial available

Service documents

Return to top ↑