Sypro Management Limited

Sypro NEC3/NEC4/FIDIC/JCT Contract Manager

Developers and providers of industry leading construction contract (NEC3/NEC4/JCT/FIDIC) management software solutions. Developed by industry experts & consultants.


  • Quick to implement, easy to use
  • Real-time view on all project critical contract communications
  • Provides complete contractual compliance
  • Single solution for the full suite of contracts (NEC3/4)
  • Graphical User Interface is simple to understand and use
  • Compliance by experts & NEC4 Drafter (S Kings)
  • Cross browser/platform compatible
  • Robust, secure, reliable


  • Instant communications
  • Reduce project meeting time spent discussing contract administration
  • Provides 'a single source of truth'.
  • Comprehensive management of contractual timescales
  • Reduce personal, professional and organisational risk
  • Clear understanding of the life cycle of risks and costs
  • Manage Time, Quality and Cost more effectively
  • Assign actions and responsibilities simply
  • Increase project team efficiencies


£25 to £65 per user per month

  • Education pricing available

Service documents


G-Cloud 11

Service ID

1 4 8 7 1 6 9 5 5 1 6 3 2 2 2


Sypro Management Limited

Simon Hunt


Service scope

Service scope
Software add-on or extension No
Cloud deployment model Hybrid cloud
Service constraints All Sypro Management Limited solutions are developed for quick on boarding and are full cross browser compatible when used in line with best practice IT protocols.
All planned maintenance and system upgrades, where necessary, are communicated to all users with a minimum of 30 days notice. All aspects of maintenance and upgrade work is performed outside of standard working hours and over the weekend.
System requirements
  • Access to the internet (mobile/wifi/network)
  • Up to date and current web browsers
  • No additional software plug-ins are required

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Monday - Friday 08:30 - 17:00 - acknowledged immediately, actioned within 60 minutes and resolved within 8 working hours.

Weekend/Bank Holidays - acknowledged immediately, actioned and resolved next working day.

Critical or complete system downtime would be actioned 24/7.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility WCAG 2.1 A
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels 1st and 2nd Line support is provided as part of our licence fee and does not carry an additional charge.

In the unlikely event of on-site being required, our Operations Manager would either present or delegate this task to a member of their Technical Team to resolve any issues. This event would be charged as per our SFIA rate card.

It is worth mentioning that we have never provided on site technical support as this has never been requested by any Client.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Following contract agreement, the on boarding process is as follows:
1. Set-Up & Implementation
2. User Acceptance
3. User Training - both onsite and online
4. System documentation and workflows are built into an intuitive knowledge base within the software. PDF copies are also available.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
  • Other
Other documentation formats In system Knowledge Base with FAQ's and Workflows
End-of-contract data extraction End of contract/project archiving is available to all users. This service an instant download, in pdf, with all data, documents and notes sorted by module and split into event folders.
End-of-contract process When a termination date has been agreed, and end of contract process that agrees responsibilities for both parties will exchanged and actioned. Our software solution is a pay as you go (PAYG) SaaS model therefore payments finish as the contract determines and there are no additional penalties upon termination.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 9
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
  • Opera
Application to install No
Designed for use on mobile devices Yes
Differences between the mobile and desktop service Optimised for mobile and handheld screen sizes and device functionalities.
Service interface No
Customisation available Yes
Description of customisation Due to the nature of the construction sector, contracts are regularly amended and customised. All of our solutions allow the Client to customise the parameters of the software to run in parallel to the contracts signed and agreed. In addition to these core changes, system dashboards, reports and other functionalities can also be customised.


Independence of resources Our hosting solution with Amazon Web Services (AWS) provides automatic and instantaneous upscaling of server requirements in-line with users access demands. During busy periods our hosting solutions maximise their architecture to ensure our users notice no difference in system performance.


Service usage metrics Yes
Metrics types All solutions have intuitive dashboards designed to provide analysis of compliance and adherence to the defined processes. These dashboard can be configured in line with the users' role in the project.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Conforms to BS7858:2012
Government security clearance Up to Baseline Personnel Security Standard (BPSS)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations Yes
Datacentre security standards Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with CSA CCM v3.0
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data importing and exporting
Data export approach Users can export all data on a module by module basis. This allows the user to specify exactly which aspect of the contract they wish to structure reporting on e.g. within NEC3/4 they may wish to look at ratios of Early Warnings to Compensation Events to understand their degree of compliance.

All data within our solutions can be exported in the following formats:
1. PDF
2. CSV
Data export formats
  • CSV
  • ODF
  • Other
Other data export formats HTML
Data import formats
  • CSV
  • ODF
  • Other
Other data import formats HTML

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks TLS (version 1.2 or above)
Data protection within supplier network TLS (version 1.2 or above)

Availability and resilience

Availability and resilience
Guaranteed availability All of our solutions are provisioned on an availability of 99.5% uptime. In a scenario where there has been an impactful outage, refunded downtime will be identified and paid back. This would exclude a scenario where withdrawal of service is planned due to system upgrade or maintenance. In these scenarios we provide all users with a contracted minimum of 30 days prior notice. In addition, these outages for essential work/upgrade are performed at weekend/bank holidays to reduce project impact.
Approach to resilience All data is held within a recognised, industry leading datacentre supported by robust Disaster Recovery solutions and full system backups every 15 minutes throughout the day (24 hours).

Further information is available upon request.
Outage reporting Any planned outages are scheduled and reported by:
1. In browser notification dashboard
2. User email alerts
3. Direct communication to organisational lead person

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
Access restrictions in management interfaces and support channels Access to company master accounts are restricted to department heads and the Board of Directors. This includes hosting provision, system configuration portals and software solution databases. These processes are protected by restricting access to specific IP addresses within our Head Office, doing this prevents any accidental or deliberate access attempts. All support channels can only be accessed by defined client users and the appropriate internal support manager.
Access restriction testing frequency At least every 6 months
Management access authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for User-defined
Access to supplier activity audit information Users have access to real-time audit information
How long supplier audit data is stored for User-defined
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications Yes
Any other security certifications Hosted by Amazon Web Services (AWS) meets all listed requirements

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach At present, Sypro Management Limited is engaged with an accreditation agency to assess and implement processes to achieve formal ISO27001 accreditation.
We believe this accreditation will be achieved because as as an organisation we have always adopted best practise and have established and robust processes in place.
Information security policies and processes Annually the company handbook is reviewed by the Board of Directors with all agreed amendments being ratified.
All department leads are equipped with a current company handbook outlining all company processes and procedures. Allied to this the on- boarding process of new starters focusses on information security and the established processes we have in place.
At monthly company board meetings, quality, H&S and information security policies are considered, discussed and where appropriate modifications are agreed and communicated to all staff. A decision record and key event board minutes are recorded.

Operational security

Operational security
Configuration and change management standard Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach Our internal processes and documentation have been assessed in accordance with the named standard to ensure the following: 1. Full visibility of the status, location and configuration of all service components. 2. Life cycle road map to ensure all components are tracked. 3. Our Agile development methodology ensures that changes/modifications when reviewed always consider potential security impacts.
Vulnerability management type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach Our internal processes and documentation have been assessed in accordance with the named standard to ensure the following: 1. Possible threats, vulnerabilities or related techniques are considered thoroughly through regular external conferences, peer learning and domain knowledge; this includes severity and priority. 2. Our Agile development methodology assesses vulnerabilities as part of the process, and we ensure any potential vulnerabilities are considered and appropriate preventative measures are set in place.
Protective monitoring type Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach Our internal processes and documentation have been assessed in accordance with the named standard to ensure the following: 1. Hardware and software alarm monitoring tools notify the development team of any suspicious network activity. 2. The development team can quickly react and prioritise accordingly and where necessary relevant action are immediately executed and any stakeholders informed.
Incident management type Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach Our internal processes and documentation have been assessed in accordance with the named standard to ensure the following: 1. There is robust help desk and issue management/tracking that ensures priorities are flagged and actioned, and customers have full transparency. 2. Common help desk issues are responded to quickly and standard responses are provided, and more complex issues are fully researched prior to issuing of responses. 3. SLA's are timely and clearly communicated.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Public sector networks

Public sector networks
Connection to public sector networks No


Price £25 to £65 per user per month
Discount for educational organisations Yes
Free trial available No

Service documents

Return to top ↑