📢 We're moving our documentation to a new system on July 1. Check out the new version now. 📢
Slack

SensusAccess allows anyone at Middlebury to translate files into other more useful types of media. You can turn text into audio books for your commute. You can translate files so they work on Kindle and other eReaders. You can make documents more accessible and create Braille versions of content. Use SensusAccess to get the kind of media that best meets your needs. You can learn more about SensusAccess on the CTLR site.

You can use the self-service web form to submit files and it will walk you through various options. The service emails you when the file has been created and no record is kept.  For convenience, we’ve embedded the form below but you can also reach it directly here.

SensusAccess is developed and operated by Sensus. Use of SensusAccess does not require users to sign up for the service, and Sensus does not collect personal information from users.

The SensusAccess document conversion process is entirely automated with no human interaction. Source documents are received on the SensusAccess reception server, processed by one or more processing agents, and the result returned to the user in an email. The source document is subsequently deleted from the servers. Target documents, available through coded links, are kept on SensusAccess delivery servers for up to seven days and then deleted.

Communication between service forms and the back-end reception server may be open or encrypted via SSL.

SensusAccess does not use cookies to track, collect or store users or user preferences. SensusAccess uses cookies only to manage anonymous session data.

Anonymised transaction records are kept by Sensus for statistical and managerial purposes.

The SensusAccess service is hosted on servers in Sensus’ own data center in Denmark. The facility is monitored and access restricted to authorised staff. All servers are installed with state-of-the-art malware protection and patched to the latest security level. Conversion requests submitted through email may be caught, processed and stored in spam filtres and other malware-protection systems.