Skip to main content

Help us improve the Digital Marketplace - send your feedback

Sypro Management Limited

Sypro Contract Manager (NEC3/NEC4/FIDIC/JCT/Bespoke) NEC Contract Management Software Solution

Developers and providers of industry leading construction contract and project (NEC3/NEC4/JCT/FIDIC/Bespoke) management software solutions. Developed by industry experts, consultants and NEC4 drafters.

Features

  • NEC3, NEC4, JCT, FIDIC & Bespoke contract types
  • Compliance by experts & NEC4 Drafter (Dr Stuart Kings)
  • Provides complete contractual compliance
  • Single solution for the full suite of contracts
  • Graphical User Interface is simple to understand and use
  • Quick and easy implementation
  • Full responsive application
  • ISO 27001, 9001 & CyberEssentials+ Accredited
  • PowerBI Reporting Integration & API's
  • Integration to CDE platforms such as Trimble Viewpoint for Projects

Benefits

  • Instant communications
  • Reduce project meeting time spent discussing contract administration
  • Provides 'a single source of truth'.
  • Comprehensive management of contractual timescales
  • Reduce personal, professional and organisational risk
  • Clear understanding of the life cycle of risks and costs
  • Manage Time, Quality and Cost more effectively
  • Assign actions and responsibilities simply
  • Increase project team efficiencies
  • Integrate into eDMS and CDE systems

Pricing

£25.00 to £65.00 a user a month

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at simon.hunt@sypro.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

6 2 3 4 4 9 7 1 3 0 1 8 7 1 4

Contact

Sypro Management Limited Simon Hunt
Telephone: 07970699193
Email: simon.hunt@sypro.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Hybrid cloud
Service constraints
All Sypro Management Limited solutions are developed for quick on boarding and are full cross browser compatible when used in line with best practice IT protocols.
All planned maintenance and system upgrades, where necessary, are communicated to all users with a minimum of 30 days notice. All aspects of maintenance and upgrade work is performed outside of standard working hours and over the weekend.
System requirements
  • Access to the internet (mobile/wifi/network)
  • Up to date and current web browsers
  • No additional software plug-ins are required

User support

Email or online ticketing support
Email or online ticketing
Support response times
Monday - Friday 08:30 - 17:00 - acknowledged immediately, actioned within 60 minutes and resolved within 8 working hours.

Weekend/Bank Holidays - acknowledged immediately, actioned and resolved next working day.

Critical or complete system downtime would be actioned 24/7.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 A
Phone support
Yes
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
1st and 2nd Line support is provided as part of our licence fee and does not carry an additional charge.

In the unlikely event of on-site being required, our Operations Manager would either present or delegate this task to a member of their Technical Team to resolve any issues. This event would be charged as per our SFIA rate card.

It is worth mentioning that we have never provided on site technical support as this has never been requested by any Client.
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Customers on-boarding following commercials agreement provides the following support:

User Training - web or on site

Training Documentation - hard copy, video and digital content
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats
Video Content
End-of-contract data extraction
At the end of a contract period, the user can archive their project data either within SyproCM or via raising a support ticket. Project data is then provided to the user via a password controlled link and presented in a logically ordered pdf structure including all notified events and additional attachments.
End-of-contract process
Included within the fees are on-boarding costs, user subscriptions and training, customer support and system maintenance and upgrades.

Not included within the standard fees are any customer specific system changes or developments, non standard branding or non system specific support.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Optimised for mobile and handheld screen sizes and device functionalities.
Service interface
No
User support accessibility
WCAG 2.1 A
API
Yes
What users can and can't do using the API
API developed for push/pill data sharing. Additionally PowerBI API also available to enhance customer data reporting and metrics management.
API documentation
Yes
API documentation formats
Open API (also known as Swagger)
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
User dashboards can be customised to reflect the users preferred view of the contract and the data it shows. Additionally, users can add corporate logos and branding to the systems and reporting.

Scaling

Independence of resources
Our hosting solution with MS Azure platform, provides automatic and instantaneous upscaling of server requirements in-line with users access demands. During busy periods our hosting solutions maximise their architecture to ensure our users notice no difference in system performance.

Analytics

Service usage metrics
Yes
Metrics types
All solutions have intuitive dashboards designed to provide analysis of compliance and adherence to the defined processes. These dashboard can be configured in line with the users' role in the project.
Reporting types
  • API access
  • Real-time dashboards

Resellers

Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
  • United Kingdom
  • European Economic Area (EEA)
User control over data storage and processing locations
Yes
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Physical access control, complying with SSAE-16 / ISAE 3402
Data sanitisation process
Yes
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Users can export all data on a module by module basis. This allows the user to specify exactly which aspect of the contract they wish to structure reporting on e.g. within NEC3/4 they may wish to look at ratios of Early Warnings to Compensation Events to understand their degree of compliance.

All data within our solutions can be exported in the following formats:
1. PDF
2. CSV
3. HTML
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
HTML
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats
HTML

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
All of our solutions are provisioned on an availability of 99.5% uptime. In a scenario where there has been an impactful outage, refunded downtime will be identified and paid back. This would exclude a scenario where withdrawal of service is planned due to system upgrade or maintenance. In these scenarios we provide all users with a contracted minimum of 30 days prior notice. In addition, these outages for essential work/upgrade are performed at weekend/bank holidays to reduce project impact.
Approach to resilience
All data is held within a recognised, industry leading datacentre supported by robust Disaster Recovery solutions and full system backups every 15 minutes throughout the day (24 hours) and dual server fail over.

Further information is available upon request.
Outage reporting
Any planned outages are scheduled and reported by:
1. In browser notification dashboard
2. User email alerts
3. Direct communication to organisational lead person

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels
Access to company master accounts are restricted to department heads and the Board of Directors. This includes hosting provision, system configuration portals and software solution databases. These processes are protected by restricting access to specific IP addresses within our Head Office, doing this prevents any accidental or deliberate access attempts. All support channels can only be accessed by defined client users and the appropriate internal support manager.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
British Assessment Bureau
ISO/IEC 27001 accreditation date
7th March 2024
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
No
PCI certification
No
Cyber essentials
No
Cyber essentials plus
Yes
Other security certifications
Yes
Any other security certifications
CHECK IT

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Annually the company handbook is reviewed by the Board of Directors with all agreed amendments being ratified.
All department leads are equipped with a current company handbook outlining all company processes and procedures. Allied to this the on- boarding process of new starters focusses on information security and the established processes we have in place.
At monthly company board meetings, quality, H&S and information security policies are considered, discussed and where appropriate modifications are agreed and communicated to all staff. A decision record and key event board minutes are recorded.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Our internal processes and documentation have been assessed in accordance with the named standard to ensure the following: 1. Full visibility of the status, location and configuration of all service components. 2. Life cycle road map to ensure all components are tracked. 3. Our Agile development methodology ensures that changes/modifications when reviewed always consider potential security impacts.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Our internal processes and documentation have been assessed in accordance with the named standard to ensure the following: 1. Possible threats, vulnerabilities or related techniques are considered thoroughly through regular external conferences, peer learning and domain knowledge; this includes severity and priority. 2. Our Agile development methodology assesses vulnerabilities as part of the process, and we ensure any potential vulnerabilities are considered and appropriate preventative measures are set in place.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Our internal processes and documentation have been assessed in accordance with the named standard to ensure the following: 1. Hardware and software alarm monitoring tools notify the development team of any suspicious network activity. 2. The development team can quickly react and prioritise accordingly and where necessary relevant action are immediately executed and any stakeholders informed
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Our internal processes and documentation have been assessed in accordance with the named standard to ensure the following: 1. There is robust help desk and issue management/tracking that ensures priorities are flagged and actioned, and customers have full transparency. 2. Common help desk issues are responded to quickly and standard responses are provided, and more complex issues are fully researched prior to issuing of responses. 3. SLA's are timely and clearly communicated.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

  • Fighting climate change
  • Tackling economic inequality
  • Wellbeing

Fighting climate change

Sypro Contract Manager allows geographically dispersed teams to manage complicated projects remotely therefore reducing the necessity to travel long distances for face to face meetings.

Tackling economic inequality

Sypro Contract Manager allows users from economically disadvantaged areas to access work opportunities in better funded parts of the UK.

Wellbeing

Providing a robust contract management platform reduces the likelihood of contract errors, provides greater corporate protections and aids in the positive mental health & wellbeing of our users.

Pricing

Price
£25.00 to £65.00 a user a month
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Full systems access for a limited testing period.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at simon.hunt@sypro.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.