Virtual College Ltd

Bespoke Content Development

Our bespoke team create learning solutions to change behaviours and influence organisational culture change. The content we develop ranges from e-learning / elearning slide decks to downloadable resources to innovative gamified digital solutions, meaning we are able to create different levels of interactive content depending on the client's needs.

Features

  • Content mapped to the client's brief
  • Content published in the client's preferred format (E.g. SCORM)
  • Bespoke graphics
  • 3D imagery
  • Animated and interactive video
  • Live action video
  • Information slides
  • Course assessments and evaluations
  • Full project management
  • A learning strategy

Benefits

  • Designed to engage and inspire learners
  • Targeted to capture unique training objectives and requirements
  • Built to support or replace an existing face-to-face training solutions
  • Aligns with specific policies, processes, branding and tone
  • Additional hosting services available
  • Use of different digital interventions; catering to more learning styles
  • Designed with the learner at the heart
  • A highly experienced content development team
  • Different specialities within the team
  • Consultancy on roll-out and organisational change

Pricing

£250 per transaction

  • Education pricing available

Service documents

G-Cloud 11

977972405851958

Virtual College Ltd

Felicity Bagshaw

01943 605976

contracts@virtual-college.co.uk

Service scope

Service scope
Software add-on or extension Yes
What software services is the service an extension to In most cases a system will be needed to host the content, such as a learning management system. Alternately some files can be published in HTML format and be accessed as web pages.
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints Content must be hosted in a platform such as a learning management system. The host system may also dictate the file format of the content (e.g. SCORM).
System requirements Access to a hosting platform

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Full email support is available to all our users, including system administrators and individual users. This service is available from 8.30am to 5.30pm, Monday to Friday, via our help and support team. In addition we have an out of hours service; where urgent e-mail enquiries are checked, allocated and responded to and calls are answered within out service level agreements. Our response standards are within two hours of receipt or next working day if received outside working hours. 80% of all support emails are answered within 2 hours and 95% of emails are resolved without the use of further correspondence.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support No
Onsite support Yes, at extra cost
Support levels We offer relationship, project management and content development support.

Relationship support is provided an Account/Relationship Manager. They are they primary contact during the development and keep our clients informed on the development process as well as facilitating regular catch-up calls and meetings. Consultancy services can also be provided should a client require support.

All our bespoke projects have a dedicated project manager who produces project documentation (including a learning strategy document) and manages our internal resource. They ensure that the content we produce is done so inline with the client's timescales, as well as working directly with the client.

The content development team feature a huge range of roles; from graphic and instructional designers to storyboarders and proofreaders. The team support the client in interpreting the brief and bringing it to life in the way the client has envisaged.

All support services are included in the project costs and will vary depending on the level of involvement required.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Each project begins with a scoping session, where we take the time to understand the aims and outcomes of the project as well as your preferred ways of working. Through this session we look to define your overall vision for the project and how best to embed this in the content and how the content can be used to support the wider programme.

At these events we aim to fully scope the course programme and cover areas such as:
Current challenges and issues
Aims and objectives in delivery of a course / programme Key learning outcomes
Target audience
Level and scope of content
Level of interactivity
Design, look and feel
Challenges, quizzes and tests
Pre and post course assessment
Evaluation and feedback
Certification, accreditation and qualification

We would also work with you to form an implementation plan for the modules, advising on how best to promote uptake and create a real interest in them. The product development manager ensures that everyone involved in the production of the course agree and understand the resultant specification for the course to include:
Target audience
Learning outcomes
How learning outcomes map to the programme
Course content and outline structure
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction The client will be sent the source file of for each module developed upon the completion of the contract.
End-of-contract process Upon completion of the contract the client will have access to all the resources we have developed for them. The source files are securely transferred to the client along with any additional content.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service All the content we produce can be used on mobile devices. In most instances the content will appear on the mobile device as it does on a desktop.

In certain instances we may use authoring tools specifically designed for creating "mobile first" content, should mobile devices be the primary delivery method. Again, the content would appear the same whether viewed on a desktop or mobile, however it would include features (such as the ability to scroll through the content) that would be more appropriate for these kinds of devices.
Accessibility standards WCAG 2.1 AAA
Accessibility testing We test all our content on Internet Explorer 11, Firefox, Android, Google Chrome, Safari and Edge as well as on our own learning management system.
API No
Customisation available Yes
Description of customisation If a customer has access to the authoring tool used to design the content then they are able to customise any aspect of the content as they wish.

Our content development team can also customise content on behalf of a client should their expertise be preferred. There would be costs associated with this.

Scaling

Scaling
Independence of resources Each allocation of the module via a host platform is separate, meaning that one user going through a piece of content cannot affect another.

Analytics

Analytics
Service usage metrics Yes
Metrics types As part of the project we will develop a project plan and service level agreement against which our clients are able to track the progress of the project.

SCORM compliant systems will also be able to track SCORM files they host.
Reporting types
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Staff screening not performed
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency Never
Protecting data at rest Other
Other data at rest protection approach TLS (Version 1.0 and above)
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach If the module is produced in SCORM format then any host SCORM platform will be able to track completion statistics for the content.
Data export formats Other
Other data export formats SCORM data
Data import formats Other
Other data import formats Text input

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Other
Other protection between networks All the client requires for this service is the source file, therefore they are not reliant on any of our systems to run the content. Should the client use our host platform the LMS would be dealt with separately.
Data protection within supplier network Other
Other protection within supplier network We supply the source file, meaning our clients are not reliant on anything within our network to run the content.

Availability and resilience

Availability and resilience
Guaranteed availability SLAs for our bespoke development services depend on the particular project due variables such as timescales, resource, amount of content to be developed etc. therefore we produce a bespoke SLA for that particular project.
Approach to resilience This information is available on request.
Outage reporting Any delays to delays to the project or outages during bespoke projects are communicated to the client via their relationship manager.

Identity and authentication

Identity and authentication
User authentication needed No
Access restrictions in management interfaces and support channels We transfer the source file to our clients upon completion of the development to a staff member nominated by the client. This ensures that only the nominated individual has access to the source file in the first instance and they are then able to decree how the file is access themselves.
Access restriction testing frequency At least once a year
Management access authentication Other
Description of management access authentication Management access to the source file is controlled by transferring the file only to an individual named by the client upon completion of the development. It is then for them to distribute access as they see fit.

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Cyber Essentials

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified Yes
Security governance standards Other
Other security governance standards Cyber Essentials
Information security policies and processes Virtual College takes its data management responsibilities seriously. We encourage all colleagues to identify and report all potential risks so that we can take positive measures to eliminate or control these risks whilst working within the data management principles. We are proactive in providing information, training and supervision so that all those associated with the organisation can take reasonable care of their own and other people’s information and feel able to report any situations in line with our Data Protection and Confidentiality Policy. These high standards are applied to any staff member processing your data so you can be sure that whilst user data is being uploaded to the system, and throughout the ongoing support, it will remain strictly confidential at all times.

Virtual College complies with all aspects of data protection and we train all our staff on what this means in practice. We work with an independent consultant in the continuous improvement of our approach and undertake regular audits in order to ensure all staff work within our policies and procedures. Our registration number is Z7723545.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach We have a strictly defined quality process which is managed as part of our ISO9001 accredited quality management policy. A copy of this policy is available on request.
Vulnerability management type Supplier-defined controls
Vulnerability management approach We have a strictly defined quality process which is managed as part of our ISO9001 accredited quality management policy. A copy of this policy is available on request.
Protective monitoring type Supplier-defined controls
Protective monitoring approach We have a strictly defined quality process which is managed as part of our ISO9001 accredited quality management policy. A copy of this policy is available on request.
Incident management type Supplier-defined controls
Incident management approach We have a strictly defined quality process which is managed as part of our ISO9001 accredited quality management policy. A copy of this policy is available on request.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £250 per transaction
Discount for educational organisations Yes
Free trial available No

Service documents

pdf document: Pricing document pdf document: Service definition document pdf document: Terms and conditions
Service documents
Return to top ↑