Accipio Ltd

Moodle Workplace (Enterprise LMS)

Accipio supplies the enterprise version of the worlds most popular learning management system - Moodle Workplace. Moodle Workplace has an incredibility rich set of functionality, and we work with you to make it the “backbone” of building learning and performance culture. Moodle offers significant cost savings compared with other platforms.


  • Create and manage eLearning delivery and assessment
  • Wide mix of supported media (SCORM, Interactive Documents, HVP, Video)
  • Enables social learning, collaboration, social networking and knowledge sharing
  • Customisable branded Themes and Dashboards different types of audiences
  • Personal development plans for targeted training, and full competency/goal management
  • 360 degree feedback management
  • Integrated interactive performance Dashboards for Corporate performance management
  • Detailed reporting
  • Integrate with third party authentication/HR systems, and OpenBadges
  • Extend with the Accipio One plugin eco-system


  • Easily manage users, and track completion / competence / certification
  • Provide access to interactive and engaging learning 24/7
  • Manage classroom sessions for blended learning
  • View real-time usage and completion monitoring
  • No “vendor lock-in” and significant savings
  • Managers can assign learning, and view completion data
  • See what percentage has completed compliance training
  • Manage performance
  • Deploy a beautifully branded site learners want to visit
  • Access the Accipio One plugin eco-system


£0.60 a user a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 13

Service ID

7 3 6 9 0 6 2 1 2 5 6 8 3 4 9


Accipio Ltd Sascha Benson-Cooper
Telephone: 02071172690

Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Private cloud
  • Community cloud
  • Hybrid cloud
Service constraints
System requirements
Modern browser (compatible with IE9 and above)

User support

Email or online ticketing support
Email or online ticketing
Support response times
Normally within an hour. Our SLA is 24 hours, and much more rapidly for more urgent matters. This includes weekends.
User can manage status and priority of support tickets
Online ticketing support accessibility
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
We have three support packages:

1) Pay as you go. This is a credit based support system, and covers advice and task delivery. 10 credits cost £950 ex VAT and last for 3 months. Each credit is worth up to 1 hour of work.

2) All you can eat. This is for unlimited "advice" on front end configuration for the named administrator.

3) Bespoke and end user support. We can create a bespoke support package to meet your needs. This could include on-site support, complete service management and training. Our fees start at £750 per day ex VAT.
Support available to third parties

Onboarding and offboarding

Getting started
We recommend a two day practitioner course which we can deliver at your offices or as part of an open programmes. There is comprehensive online documentation.
Service documentation
Documentation formats
End-of-contract data extraction
We will provide a copy of key data at the end of the contract. Data can be extracted via course backups and csv exports for example.
End-of-contract process
We can provide key data on a USB drive. The costs is £200 ex VAT.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Our sites are fully responsive. We can also deploy a standalone App if required.
Service interface
User support accessibility
WCAG 2.1 AA or EN 301 549
What users can and can't do using the API
RESTful and SOAP

Our team can work with you to develop any bespoke changes.
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
Clients can customise key parts of the theme, and all front-end configuration. This includes user processes, courses, learning plans, hierarchies, positions and much more.

We would need to be involved in any back-end bespoke enhancements.


Independence of resources
Each client has a dedicated server.

We normally configure the server so that 10% of users can be on the platform at the same time. In reality, the server can cope with a much higher load.

We can deploy a second load balancing instance on request for larger sites.


Service usage metrics
Metrics types
We use a combination of Moodle Workplace custom reports and Google Analytics to report on the platform.

We can report on most things, from usage per day to most popular courses.

We even embed feedback surveys to capture qualitative data about courses and the platform.
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Other security clearance
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a CHECK service provider
Protecting data at rest
Physical access control, complying with CSA CCM v3.0
Data sanitisation process
Data sanitisation type
Deleted data can’t be directly accessed
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
There are a number of ways to export user data. The main method is CSV. Full documentation can be found here:
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats
  • Excel
  • HTML table
  • XML
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Our standard SLA includes:
- First-Call Resolution - 70% of incoming enquires resolved on first contact;
- Turn-Around Time - 80% of administrative and technical issues resolved completed within 24 hours;
- Scheduled maintenance windows - Weekends and after 16:00 during week days with prior written permission; and

For critical issues (those impacting all users):
- Response within 4 hours with estimated resolution time (with acknowledgement of Critical status)
- Resolution within 2 working days before escalation

For non – critical issues:
- Response within 24 hours
- Resolution within 4 working days

Escalated issues:
- Daily update
- Resolution within 3 working days
- Supply of bespoke reports
- Acknowledgement of request within 6 hours with estimated delivery time and cost
- Delivery of business critical reports within 7 working days

- No more than 5% downtime during office hours within 1 year (19 hours falling between 9am and 5pm, Monday – Friday which is 2 working days)

We will provide support credit if we do not meet the above SLA. This is calculated 10% of support credits paid for the year for each time we do not meet one of the above criteria.
Approach to resilience
Available on request
Outage reporting
Email alerts

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels
2-factor authentication
Username and password
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
The British Assessment Bureau
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
Everything is covered.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Cyber essentials
Cyber essentials plus
Other security certifications

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Accipio takes measures to protect from loss or corruption, unauthorized access and modification. We follow the eight principles of the Data Protection Act 1998, and the broad outline of ISO 17799 guidelines for information security.

All staff will report any suspected security breaches to a Director who will log in the security breech log. A Director will maintain,
monitor and report on any security incidents which may result in further investigation and action if required.

Accipio maintains a register of all employees who are allowed access to all parts of the system containing electronic data. All staff must agree to written terms and conditions covering use of IT when they are employed at the company.

Our Information Security policy is available on request.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our cloud hosting is provided by AWS - a leading cloud hosting provider trusted by the largest brands in the world. They manage the cloud infrastructure. We run two EC2 instances for each client - one for the live site, and one for a development and testing. Changes made to the development site are tracked, and once tested, rolled out to the live site. We use Github for code management and versioning. Totara/Moodle releases updates which we deploy. These are tracked and managed by Totara/Moodle.
Vulnerability management type
Vulnerability management approach
We perform vulnerability assessments on a monthly basis. We also follow the latest Totara/Moodle security alerts, and notifications from AWS. We run scans and keep current with the latest insights from the industry. Our configured alarms and penetration testing help to threats. We have a vulnerability triage group which meets once a vulnerability assessment has been performed. We assess the severity and likelihood of the threat, and use a Common Vulnerability Scoring System. New vulnerabilities reported by Totara/Moodle normally result in a patch being generated rapidly. We would install this within one day in most cases.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
We have measures in place to detect attacks and unauthorised activity on the service. We have configured various alarms and audit logs to identify suspicious activity. We have high levels of security for access. Events are analysed to identify potential compromises or inappropriate use of our service. If we find a potential compromise, we take swift and appropriate action (normally within hours).
Incident management type
Supplier-defined controls
Incident management approach
We have an incident management process which is deployed in response to security incidents. The response depends on the type of incident or attack. We report all incidents to the Director in charge, and where appropriate, the client as soon as practicable. This is normally in the form of electronic incident reports sent via email. A follow up phone call is normally made as well for clients.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks

Social Value

Fighting climate change

Fighting climate change

We are in the process of becoming a carbon neutral organisation. We aim to only work with suppliers who are environmentally conscious.
Covid-19 recovery

Covid-19 recovery

We provide free retraining (leadership, management and personal effectiveness) for those left unemployed by COVID-19.
Tackling economic inequality

Tackling economic inequality

We provide free training (leadership, management and personal effectiveness) for entrepreneurs (including helping new businesses) and those that face barriers to employment and/or who are located in deprived areas.
Equal opportunity

Equal opportunity

As an employer, we seek to reduce the disability
employment gap and tackle workforce inequality.


We provide free online wellbeing training to improve health and
wellbeing. As an employer, we give our people extra time off work to foster a work-life balance.


£0.60 a user a year
Discount for educational organisations
Free trial available
Description of free trial
Our free trail includes a simple branded site with admin login. The site is live for 2 weeks.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.