NEC Rego

NEC Rego is an integrated referral management platform that is proven to reduce pressures on secondary care and improve efficiencies by triaging patients to the right care, first time and providing hospitals with a single system view of outpatient activity.


  • Single system view of all referrals in one place
  • Dashboards view outpatient activity and track referrals in real time
  • Tracks referrals in real time
  • Triages patients to the right care at the right time
  • Adapts easily and safely to changes in hospitals’ systems
  • Easily configures to specific requirements of hospital specialties


  • Easier to manage referrals in one place
  • View of potential bottlenecks
  • Improved ability to manage demand and improve efficiencies
  • Patients receive the right care, first time
  • Eliminates manual processes saving time
  • Changes in organisations’ systems easily made, with minimal costs
  • Consultants can focus on expertise


£0.61 a unit

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 13

Service ID

3 4 5 6 8 7 7 6 8 0 2 0 2 8 6


Telephone: 07852 936231

Service scope

Software add-on or extension
Cloud deployment model
Hybrid cloud
Service constraints
This is dependent on the modules used and system configuration. For example, if e-RS integration is required, a PC running the latest version of Microsoft EDGE will be required, otherwise any modern PC or MAC with the latest version of Chrome or EDGE would suffice.
System requirements
Access to the service must be through industry standard browsers

User support

Email or online ticketing support
Email or online ticketing
Support response times
LiveChat is instant. We aim to respond to messages/email within the hour.
User can manage status and priority of support tickets
Online ticketing support accessibility
WCAG 2.1 A
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Web chat
Web chat support availability
9 to 5 (UK time), Monday to Friday
Web chat support accessibility standard
None or don’t know
How the web chat support is accessible
Once logged into the portal, users have access to a LiveChat. If agents are online the chats go through. If no agent is online, the user will be prompted to leave a message.
Web chat accessibility testing
Not applicable.
Onsite support
Yes, at extra cost
Support levels
Support response is available 09:00 - 17:30 each Business Day. Users have access to the help desk through direct calls, emails, LiveChat or via our online dynamic forms. The help desk will provide advice, guidance, trouble shooting and problem solving to users to identify and rectify any problems or queries they have relating to the service. All user support is included within the service charge.
Support available to third parties

Onboarding and offboarding

Getting started
User details are provided along with training guides/material.
Service documentation
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction
The Supplier will support the migration of data (including all Authority Personal Data) to any replacement system at an additional reasonable cost to the Authority or any replacement Supplier. The Supplier will provide such data in an industry standard format.

The timetable for data migration will be agreed by the Supplier and the Authority. The Authority will give the Supplier a minimum of 3 months’ notice of delivery of a data migration download.

Should the Authority wish the Supplier to provide more than one download then the Supplier will be entitled to recover its additional reasonable costs from the Authority.

The Authority must check and is responsible for ensuring that the data provided by the Supplier is complete and without error prior to issuing it to its replacement service provider.
End-of-contract process
The Supplier and the Authority will meet the obligations stated in the Contract in the event of termination or expiry of the Contract relating to such expiry or termination.

The Supplier will render reasonable assistance to the Authority and its replacement Supplier, if requested, to the extent necessary to effect an orderly assumption by a replacement Supplier of services similar to the Managed Services performed previously by the Supplier. The Supplier will charge reasonable rates for time and materials in relation to this work.

On termination of the Managed Services in part the obligations under this Schedule will be construed mutatis mutandis. Any associated costs with end of contract activities will be based on the NEC SFIA Rate Card.

Using the service

Web browser interface
Supported browsers
  • Microsoft Edge
  • Chrome
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Resolution may be affected when accessing via mobile.
Service interface
User support accessibility
None or don’t know
What users can and can't do using the API
Enable users of third-party system suppliers to initiate a referral in patient context from within their patient record system.

HL7 / FHIR interface for bidirectional messaging between Rego and Hospital EPR / PAS.
API documentation
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Customisation available
Description of customisation
Some aspects, such as workflows can be customised out-of-the box by the user, others may require bespoke customisation per user requirements.


Independence of resources
Our team and systems are equipped to deal with growth accordingly.

NEC is structured to provide support to a large number of existing clients across many technology and product sets. Therefore we are confident our operations can be scaled to ensure users are not affected by the demand other users place on our services.
NEC Rego is scalable to connect all practices that require access. Our helpdesk has vast experience in rapidly registering and implementing the system to hundreds of ‘out of area’ or private practices that needed to refer patients to NHS services.


Service usage metrics
Metrics types
In NEC Rego, every click is a datapoint and so we are able to report any activity, with unprecedented granularity. Example report types include: Usage, heatmaps, benchmark reports, activity, performance, etc.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
NEC Rego includes a customisable dashboard module. The dashboard was designed as per the trust requirements and includes details of referral activity that can be viewed by all relevant stakeholders. Data available in the dashboard refreshes every 6 hours and can be extracted in a CSV, Excel, Google Sheets format. On request, the pdf reports can be provided.
Data export formats
  • CSV
  • Other
Other data export formats
  • Excel
  • PDF
  • XML
  • Google Sheets
Data import formats
  • CSV
  • Other
Other data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Other
Other protection between networks
Via API - set or services offered by a programming library can be made use of by another application.
HL7, FHIR. APIs are documented and third parties have reasonable access to connect.
NEC Rego software is written in PHP, JavaScript and Java languages utilising the Codeigniter framework. Operates on Linux operating system and MySQL database. Platform is regularly penetration tested and protected by ClamAV virus and access protection software.
There is a full audit train maintained for all activities.
Prior to each release of the software NEC perform: technical testing, functional testing and regression testing of software to be released.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Guaranteed availability
We guarantee the availability of our hosted solutions to meet contracted levels.
Approach to resilience
Servers are housed on CCSP platform. This platform has been architectured as highly available platform built using latest technology hypervisor running VMware VSphere with HA virtualisation software. Included within virtualisation software, VMotion provides automated migration capability that should, for example, host fault develop, the service will automatically be re-provisioned to minimise loss of service.

Front end servers are connected to resilient SAN infrastructure providing high degree of fault tolerance. Utilising EMC PowerPath software integrates multiple path i/o capabilities, load balancing and path failover for server platform to storage systems. Tier 1 storage assigned to servers which is primary fast, resilient platform utilising enterprise disks in a resilient RAID format.

Resilience is built into infrastructure at every level. N3/HSCN and internet connections, network switches, firewalls and the platform itself . Multi-GB internet connectivity is provided on diverse routes from independent providers and N3 connectivity is 50 Mbps resilient data centre connection from BT. Switches are in resilient configurations with redundancy built in and HA firewalls run as redundant pairs.

In addition, dual site resiliency is available utilising the following data centres: Telehouse, Docklands and Equinix, Heathrow. Both data centres are Tier 4, ISO 27001 accredited. Ideal for speed, reliability and reach.
Outage reporting
Any outage is reported to us by our hosting provider using Nagios reporting tool. If the outage would affect end user access, we inform our clients (Commissioners) by email and by the pop up on the front page. Any scheduled maintenance work is communicated to the end users well in advance by utilising pop-up notifications on the system and to Commissioners by email.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Username or password
  • Other
Other user authentication
Username and password + one time passkey or
Username and password + Smartcard
Access restrictions in management interfaces and support channels
Management interfaces – 2 factor authentication.
Support can only be accessed once user is in the system and has been authenticated.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password
  • Other
Description of management access authentication
Username + password + one time passphrase.

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
07/06/2021; valid until June 2024. Certificate IS 598449.
What the ISO/IEC 27001 doesn’t cover
The NEC Information Security Management System (ISMS) is registered to ISO 27001:2013 and therefore audited by BSI at least annually. All NEC staff are required to comply with the ISMS.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Cyber essentials
Cyber essentials plus
Other security certifications
Any other security certifications
Cyber Essentials Plus

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
All of our services and processes are carried out in compliance with our ISO27001:2013 certified Information Security Management System (ISMS). The ISMS is supported by a comprehensive set of standards and policies. All staff undertake mandatory annual security and data protection awareness training to ensure they are familiar at all times of the importance of operating in a secure manner and of the policies in place.
The NEC Senior Information Risk Owner (SIRO) operates at board level and has overall responsibility and accountability for all aspect of security governance. The SIRO is supported by an Information Security Steering Group (ISSG) which is headed by the Security Director and has representatives from all areas within the organisation. The ISSG is responsible for agreeing policies with the SIRO and ensuring they are implemented across the business.
An operational Security Working Group (SWG) is responsible for managing any incidents that may occur and in an advisory capacity to provide advice and guidance to the organisation

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
NEC subscribes to a fully documented change management process. The Change Process Acceptance form incorporates all stated requirements, including (but not exclusively): •Communication Plan including timelines and key contacts to be utilised during the process •Identification of files to be backed up prior to change process •A step-by-step testing plan, pre and post, including details of the environments to be utilised. In accordance with standard process and in line with the Trust's requirements, any changes need to be authorised and documented by both the Trust and NEC primary stakeholders to proceed in the test and live environments independently.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Vulnerability Management forms part of our ISO 27001 certification. A continuous Vulnerability Assessment process is in place along with routine scanning of environments to identify and mitigate vulnerabilities.

Monitoring a variety of external channels and internal devices for awareness of emerging threats.

Annual Check Approved Penetration Testing of our internal and external networks and infrastructure and complete remedial follow up actions where required.

Where the hosting’s provider Information Security team has classified a patch as an emergency they initiate our Emergency Change process and have the ability to deploy the patch immediately, at the discretion of our Information Security Officer.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Protective Monitoring forms part of our hosting provider’s ISO 27001 certification and is the responsibility of their Information Security team.

Potential compromises are identified by the active monitoring of a range of logs, audits, reports and alerts provided by network boundary devices and internal network and server activity.

Security Incidents are assigned to their Information Security team by Service Desk. The Information Security team will assess the impact and work with technical operations to mitigate and take remedial action.

A security compromise would have the highest priority and be responded to in less than 30 minutes.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Incident Management is part of our ISO20000:2018 certified Service Management system.
All incidents are handled within the same process. Users report incidents through the Service Desk, and a Security Incident document is then raised. This is reviewed by the Security Team and is managed in accordance with the Incident Management Process.
At regular times Incident Reports are provided to the user, and once the Incident is closed a full report is produced which is used to identify any lessons learnt.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
Connected networks
Health and Social Care Network (HSCN)

Social Value

Fighting climate change

Fighting climate change

NEC has committed to being Net Zero by 2030. We project our carbon emissions will reduce by 50% from our baseline by 2026.
We have implemented a multitude of initiatives to support this:
• Appointing an Environmental Manager and Environmental Champions.
• Successfully obtaining certification for and implementing ISO14001:2015 Environmental Management System (EMS).
• Developing a Carbon Reduction Plan, which is published on our website and an Environmental Strategy.
• Maintaining an Environmental Aspect and Impact Register (down to site level) through which to capture elements of our operating practices which could negatively impact the environment.
• Working with government accredited consultants to understand environmental impact and using outputs to inform future improvement activities.
• Collaborative activities to influence customers, supply chain partners and employees.
Specific initiatives applicable to our contract delivery approach include:
• Energy used on the contract will be from green energy sources.
Business travel will reduce where possible through utilisation of technology such as:
• Video conferencing.
• Sharing documents.
• Conference call facilities.
• Working from home/flexible working arrangements.
• Approval controls in place for commercial flights.
• Use of environmentally friendly data centres.
Our Environmental Policy objectives, relevant to the contract include:
• Meeting all relevant legal requirements and monitoring our compliance.
• Minimising our environmental impacts for the life cycle (including disposal) of work equipment and other physical assets under our control.
• Demonstrating efficient use of energy, water, and other natural resources.
• Maximising opportunities to minimise our waste by reusing or recycling waste, where practical.
• Ensuring our supply chain is aware of our environmental policy and our commitment to ensuring its effective implementation.
• Increasing environmental awareness and commitment amongst colleagues through training and briefings.
Continuing to identify opportunities to improve our environmental performance through clear objectives, plans and targets.
Covid-19 recovery

Covid-19 recovery

Since the emergence of Covid-19 as a global health crisis, we have supported our customers and the local communities they serve to adapt to the challenges posed by the pandemic. As a supplier of software and services to the public sector, this has included rapid development and deployment of software solutions to enable the efficient and effective delivery of new government schemes and changes in legislation, such as provision of Test and Trace Support Payments and new hospitality sector licensing requirements.
Initiatives we have implemented to support the policy outcomes include:
• Increasing our pre-pandemic workforce numbers through recruitment of an additional 250 UK based roles, many of whom were unemployed following redundancy from other sectors such as hospitality.
• Re-training and redeploying temporarily displaced colleagues rather than imposing redundancies or taking advantage of the furlough scheme.
• Commitment to investing over £400,000 in training and apprenticeships.
• Working collaboratively with customers to introduce new ways of working.
• Delivering community based social value through donations in kind to voluntary sector organisations impacted by the pandemic.
As part of our response to the pandemic we invested in and introduced several initiatives and workplace adaptations to protect employee health and safety, including:
• Introducing wider use of remote and flexible working, including making additional allowances for those caring for young children.
• Enhancing office safety, including installing sanitising stations, hygiene screens and digital thermometers.
• Increasing the frequency of colleague communications, with a focus on provision of mental health support and reducing the risks of isolation/loneliness.
• Providing all employees with free access to additional specialist resources, including 24x7 counselling and mental health services.
Tackling economic inequality

Tackling economic inequality

We recognise the expertise, innovation and value that can be gained from having a diverse supply chain and providing all suppliers with a fair and equal opportunity to become suppliers to us and our customers. We operate openly and transparently to enable this collaboration with third-party suppliers including large enterprises, sub-contractors, SMEs, VCSEs, mutuals and social enterprise organisations.
Additionally, we are committed to nurturing new and existing talent and creating a sustainable learning and development culture, equipping our staff with the appropriate skills, knowledge and processes so the company continues to deliver innovative, industry leading solutions.
Processes and practices we have adopted to tackle economic inequality include:
• Using outcome-based specifications and co-design methods to encourage suppliers, communities, users and third sector organisations to collaborate and propose solutions based upon end user requirements, rather than being prescriptive.
• Advertising supply chain opportunities openly and always operating transparently.
• Including modules covering anti-bribery and corruption, whistleblowing, equality and diversity in our all-colleague compulsory Annual Compliance Training.
• Having policies and operating practices that support effective supply chain relationships through fair selection and responsible management. For example, only flowing down appropriate contract terms.
• Paying at least 95% of all invoices within agreed terms and agreeing to reduced payment terms for SMEs and subcontractors.
• Never deducting sums from payments as a charge for remaining on our supplier list.
• Investing in new jobs and training opportunities through an active Apprenticeship scheme.
• Creating opportunities for career progression and investing in reward and recognition initiatives that support employee retention.
• Following the foundational principles of the Good Work Plan in respect of employee satisfaction, fair pay, well-being and safety, career progression, voice, and autonomy.
• Having appropriate controls in place to mitigate cyber security risks.
Equal opportunity

Equal opportunity

We want to be an employer of choice for people of all backgrounds, regardless of sexuality, disability, nationality, race, gender or religion. We are committed to ensuring workers either directly employed or employed within our supply chains are treated fairly, humanely, and equitably.
To encourage a diverse and varied workforce our approach to equal opportunity includes:
• Ensuring job adverts reach a diverse audience, including utilising job sites which encourage interest from disadvantaged and Black, Asian and Minority Ethnic (BAME) groups.
• Inclusive and accessible recruitment practices, supporting candidates with disabilities through provision of supportive technology and/or changes to working practices.
• Collecting, analysing and senior reporting of equality and diversity data obtained during recruitment activities.
• Making appointments on the grounds of selecting the most suitable candidate for the post.
• Gender-neutral role definitions.
• Ensuring policies and employee communications promote respect and equality for all.
Other activities supporting equal opportunity within the workforce include:
• Tackling gender pay gap, through annual audits. Women now comprise over a third of our leadership team, including our Chief Executive.
• Compliance with Modern Slavery Act 2015 and 9 core principles of Ethical Trading Initiative Base Code.
• Ensuring effective controls are in place to mitigate and manage risks of exploitation within the supply chain, including supplier questionnaires and evidence requirements.
• Provision of appropriate channels for colleagues to have an effective voice, such as our Employee Steering Group.
• Investment in workforce development and training, including an active Apprenticeship and Graduate Recruitment programme.
• No use of zero hours contracts or fire and rehire practices.
• Being a Real Living Wage Employer.
• Flexible working practices.
• Transparent and structured promotion, pay and reward processes.
• Senior level sponsorship at board level supporting and promoting equal opportunity beyond basic statutory requirements.


Physical Fitness and Mental Stability is one of our sustainable development goals.
Our approach to supporting good health and wellbeing which will be applicable to the contract workforce includes:
• Providing employees with free and confidential access to specialist resources 24x7, including counselling and mental health services through our Employee Assistance Programme.
• Providing private healthcare cover for employees. Cover includes Doctor at Hand service to provide employees with fast and convenient access to advice, assistance and medical treatment, GP appointments anytime and anywhere.
• Maintaining compliance with the six standards of the Mental Health at Work commitment and a dedicated module to promote health and wellbeing as part of our all-colleague compulsory compliance training.
• Accommodating workplace adjustments, such as supportive technology for those with a disability or health condition.
• Encouraging good physical health by providing discounted corporate gym membership over 3,300 participating gyms through our employee GymFlex scheme.
We incorporate national health and wellbeing campaigns within our communications calendar, raising employee awareness and signpost to useful support pathways. Our 2022/23 calendar include raising awareness of the following nationally recognised campaigns:
• Stress Awareness Day.
• Mental Health Awareness week.
• World Menopause Day.
• National Eye Health week.
• World Diabetes Day.
• Stress Awareness Month.
• Suicide Prevention Day.
• Men's Health week.
Within one of our acquired businesses, we have Mental Health First Aiders who have trained to spot signs of mental ill health and provide early support for colleagues who may be developing a mental health issue.
Supporting employee health and wellbeing is underpinned by clear action plans for improvement and several Human Resources policies, such as our:
• Health and Safety Policy
• Alcohol, Drugs & Solvent Abuse Policy
• Menopause Policy
• Absence Policy
• Flexible Working Policy
• Gender Reassignment Policy.


£0.61 a unit
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.