Trust Portal

Epro is an AI-driven clinical platform that provides digital inpatient and outpatient tools including speech recognition, which are proven to optimise workflows and capture outcomes in real-time at the point of care.

As a trusted partner to the NHS for 20 years, our software supports over 60,000 users across 11 NHS Trusts; supporting clinicians to make better decisions, increase hospital productivity and improve patient care through our highly secure, cloud-hosted solution.

This portal aims to provide a concise overview of certifications, accreditations and the good governance that drive our day to day activities at Epro.

Controls

Infrastructure Security

Control

Status

Data retention procedures established

Epro has formal retention and disposal procedures in place to guide the secure retention and disposal of company and customer data.

Service infrastructure maintained

Epro has infrastructure supporting the service patched as a part of routine maintenance and as a result of identified vulnerabilities to help ensure that servers supporting the service are hardened against security threats.

Continuity and Disaster Recovery plans established

Epro has Business Continuity and Disaster Recovery Plans in place that outline communication plans in order to maintain information security continuity in the event of the unavailability of key personnel.

Production data backups conducted

Epro performs periodic backups for production data. Data is backed up to a different location than the production system.

Application and data criticality analysed

Epro assesses the relative criticality of specific applications and data in support of other contingency plan components.

Infrastructure performance monitored

An infrastructure monitoring tool is utilised to monitor systems, infrastructure, and performance and generates alerts when specific predefined thresholds are met.

Security awareness training implemented

Epro requires employees to complete security awareness training within thirty days of hire and at least annually thereafter.

Segregation in virtual computing environments

A cloud service customer's virtual environment running on a cloud service are protected from other cloud service customers and unauthorised persons.

Remote access MFA enforced

Epro's production systems can only be remotely accessed by authorized employees possessing a valid multi-factor authentication (MFA) method.

Production network application access restricted

System access restricted to authorised access only.

Encryption key access restricted

Epro restricts privileged access to encryption keys to authorised users with a business need.

Unique account authentication enforced

Epro requires authentication to systems and applications to use unique username and password or authorised Secure Socket Shell (SSH) keys.

Access control procedures established

Epro's access control policy documents the requirements for the following access control functions:

adding new users;

modifying users; and/or

removing an existing user's access.

Organisational Security

Control

Status

Confidentiality Agreement acknowledged by contractors

Epro requires contractors to sign a confidentiality agreement at the time of engagement.

Confidentiality Agreement acknowledged by employees

Epro requires employees to sign a confidentiality agreement during onboarding.

Employee background checks performed

Where a role requires access to client data, comprehensive DBS Enhanced checks are performed on new employees.

Anti-malware technology utilised

The company deploys anti-malware technology to environments commonly susceptible to malicious attacks and configures this to be updated routinely, logged, and installed on all relevant systems.

Return of assets

Personnel and other interested parties as appropriate shall return all the organisation’s assets in their possession upon change or termination of their employment, contract or agreement.

Asset disposal procedures utilised

Epro has electronic media containing confidential information purged or destroyed in accordance with best practices, and certificates of destruction are issued for each device destroyed.

Data & Privacy

Control

Status

Privacy policy established

Epro has a privacy policy in place that documents and clearly communicates to individuals the extent of personal information collected, the company's obligations, the individual's rights to access, update, or erase their personal information, and an up-to-date point of contact where individuals can direct their questions, requests or concerns.

Privacy policy reviewed

Epro reviews the privacy policy as needed or when changes occur and updates it accordingly to ensure it is consistent with the applicable laws, regulations, and appropriate standards.

Privacy policy available

Epro has a privacy policy available to customers, employees, and/or relevant third parties who need them before and/or at the time information is collected from the individual.

Data retention procedures established

Epro has formal retention and disposal procedures in place to guide the secure retention and disposal of company and customer data.

Service infrastructure maintained

Epro has infrastructure supporting the service patched as a part of routine maintenance and as a result of identified vulnerabilities to help ensure that servers supporting the service are hardened against security threats.

Continuity and Disaster Recovery plans established

Epro has Business Continuity and Disaster Recovery Plans in place that outline communication plans in order to maintain information security continuity in the event of the unavailability of key personnel.

Product Security

Control

Status

Penetration testing performed

Epro's penetration testing is performed annually by a CREST accredited Third Party . A remediation plan is developed and changes are implemented to remediate vulnerabilities in accordance with SLAs.

Data encryption utilised

Epro uses secure data transmission protocols to encrypt confidential and sensitive data when transmitted.

Data transmission encrypted

Epro uses secure data transmission protocols to encrypt confidential and sensitive data when transmitted.

Vulnerability and system monitoring procedures established

The company's formal policies outline the requirements for the following functions related to IT security

Internal Security Procedures

Control

Status

Service description communicated

Epro provides a description of its products and services to internal and external users.

Security policies established and reviewed

Epro's information security policies and procedures are documented and reviewed at least annually.

Support system available

Epro has an external-facing support system in place (Jira) that allows users to report system information on failures, incidents, concerns, and other complaints to appropriate personnel.

Roles and responsibilities specified

Roles and responsibilities for the design, development, implementation, operation, maintenance, and monitoring of information security controls are formally assigned in job descriptions and/or the Roles and Responsibilities policy.

Remote access processes established

Epro has processes in place for granting, changing, and terminating access to data centers based on an authorisation from control owners.

Third-party agreements established

Epro has written agreements in place with vendors and related third-parties. These agreements include confidentiality and privacy commitments applicable to that entity.

Cybersecurity insurance maintained

Epro holds cybersecurity insurance to mitigate the financial impact of business disruptions.

Incident management procedures followed

Epro's security and privacy incidents are logged, tracked, resolved, and communicated to affected or relevant parties by management according to the company's security incident response policy and procedures.

System capacity reviewed

Epro evaluates system capacity on an ongoing basis, and system changes are implemented to help ensure that processing capacity can meet demand.

Development lifecycle established

Epro has a formal systems development life cycle (SDLC) methodology in place that governs the development, acquisition, implementation, changes (including emergency changes), and maintenance of information systems and related technology requirements.

Incident response policies established

Epro has security and privacy incident response policies and procedures that are documented and communicated to authorised users.

Vendor management program established

Epro has a vendor management program in place. Components of this program include:

critical third-party vendor inventory;

vendor's security and privacy requirements; and

review of critical third-party vendors at least annually.

Production deployment access restricted

Epro restricts access to migrate changes to production to authorised personnel.

AI Security & Compliance

Control

Status

Processes for responsible use of AI

Epro defines and documents the processes for the responsible use of AI systems.

Objectives for responsible use of AI

Epro identifies and documents objectives to guide the responsible use of AI systems.

Support system available

Epro has an external-facing support system in place (Jira) that allows users to report system information on failures, incidents, concerns, and other complaints to appropriate personnel.

Suppliers

Epro has establish a process to ensure that its usage of services, products or materials provided by suppliers aligns with the organisation’s approach to the responsible development and use of AI systems.

Infrastructure performance monitored

An infrastructure monitoring tool is utilized to monitor systems, infrastructure, and performance and generates alerts when specific predefined thresholds are met.

Production application access restricted

System access restricted to authorised access only

Log management utilised

Epro utilises a logs to identify events that may have a potential impact on the company's ability to achieve its security objectives.

Firewall access restricted

Epro restricts privileged access to the firewall to authorized users with a business need.

AI policy

Epro has a document a policy for the development or use of AI systems.

Intended use of the AI system

Epro ensures that the AI system is used according to the intended uses of the AI system and its accompanying documentation.

Resource documentation

Epro should identify and document relevant resources required for the activities at given AI system life cycle stages and other AI-related activities relevant for the organisation.

Review of the AI policy

The AI policy should be reviewed at planned intervals or additionally as needed to ensure its continuing suitability, adequacy and effectiveness.

Tooling resources

As part of resource identification, the organisation should document information about the tooling resources utilised for the AI system.

System documentation and information

Epro has determined and provided the necessary information to users of the system.

Trust Portal

Epro is an AI-driven clinical platform that provides digital inpatient and outpatient tools including speech recognition, which are proven to optimise workflows and capture outcomes in real-time at the point of care.

As a trusted partner to the NHS for 20 years, our software supports over 60,000 users across 11 NHS Trusts; supporting clinicians to make better decisions, increase hospital productivity and improve patient care through our highly secure, cloud-hosted solution.

This portal aims to provide a concise overview of certifications, accreditations and the good governance that drive our day to day activities at Epro.

Controls

Infrastructure Security

Control

Status

Data retention procedures established

Epro has formal retention and disposal procedures in place to guide the secure retention and disposal of company and customer data.

Service infrastructure maintained

Epro has infrastructure supporting the service patched as a part of routine maintenance and as a result of identified vulnerabilities to help ensure that servers supporting the service are hardened against security threats.

Continuity and Disaster Recovery plans established

Epro has Business Continuity and Disaster Recovery Plans in place that outline communication plans in order to maintain information security continuity in the event of the unavailability of key personnel.

Production data backups conducted

Epro performs periodic backups for production data. Data is backed up to a different location than the production system.

Application and data criticality analysed

Epro assesses the relative criticality of specific applications and data in support of other contingency plan components.

Infrastructure performance monitored

An infrastructure monitoring tool is utilised to monitor systems, infrastructure, and performance and generates alerts when specific predefined thresholds are met.

Security awareness training implemented

Epro requires employees to complete security awareness training within thirty days of hire and at least annually thereafter.

Segregation in virtual computing environments

A cloud service customer's virtual environment running on a cloud service are protected from other cloud service customers and unauthorised persons.

Remote access MFA enforced

Epro's production systems can only be remotely accessed by authorized employees possessing a valid multi-factor authentication (MFA) method.

Production network application access restricted

System access restricted to authorised access only.

Encryption key access restricted

Epro restricts privileged access to encryption keys to authorised users with a business need.

Unique account authentication enforced

Epro requires authentication to systems and applications to use unique username and password or authorised Secure Socket Shell (SSH) keys.

Access control procedures established

Epro's access control policy documents the requirements for the following access control functions:

adding new users;

modifying users; and/or

removing an existing user's access.

Organisational Security

Control

Status

Confidentiality Agreement acknowledged by contractors

Epro requires contractors to sign a confidentiality agreement at the time of engagement.

Confidentiality Agreement acknowledged by employees

Epro requires employees to sign a confidentiality agreement during onboarding.

Employee background checks performed

Where a role requires access to client data, comprehensive DBS Enhanced checks are performed on new employees.

Anti-malware technology utilised

The company deploys anti-malware technology to environments commonly susceptible to malicious attacks and configures this to be updated routinely, logged, and installed on all relevant systems.

Return of assets

Personnel and other interested parties as appropriate shall return all the organisation’s assets in their possession upon change or termination of their employment, contract or agreement.

Asset disposal procedures utilised

Epro has electronic media containing confidential information purged or destroyed in accordance with best practices, and certificates of destruction are issued for each device destroyed.

Data & Privacy

Control

Status

Privacy policy established

Epro has a privacy policy in place that documents and clearly communicates to individuals the extent of personal information collected, the company's obligations, the individual's rights to access, update, or erase their personal information, and an up-to-date point of contact where individuals can direct their questions, requests or concerns.

Privacy policy reviewed

Epro reviews the privacy policy as needed or when changes occur and updates it accordingly to ensure it is consistent with the applicable laws, regulations, and appropriate standards.

Privacy policy available

Epro has a privacy policy available to customers, employees, and/or relevant third parties who need them before and/or at the time information is collected from the individual.

Data retention procedures established

Epro has formal retention and disposal procedures in place to guide the secure retention and disposal of company and customer data.

Service infrastructure maintained

Epro has infrastructure supporting the service patched as a part of routine maintenance and as a result of identified vulnerabilities to help ensure that servers supporting the service are hardened against security threats.

Continuity and Disaster Recovery plans established

Epro has Business Continuity and Disaster Recovery Plans in place that outline communication plans in order to maintain information security continuity in the event of the unavailability of key personnel.

Product Security

Control

Status

Penetration testing performed

Epro's penetration testing is performed annually by a CREST accredited Third Party . A remediation plan is developed and changes are implemented to remediate vulnerabilities in accordance with SLAs.

Data encryption utilised

Epro uses secure data transmission protocols to encrypt confidential and sensitive data when transmitted.

Data transmission encrypted

Epro uses secure data transmission protocols to encrypt confidential and sensitive data when transmitted.

Vulnerability and system monitoring procedures established

The company's formal policies outline the requirements for the following functions related to IT security

Internal Security Procedures

Control

Status

Service description communicated

Epro provides a description of its products and services to internal and external users.

Security policies established and reviewed

Epro's information security policies and procedures are documented and reviewed at least annually.

Support system available

Epro has an external-facing support system in place (Jira) that allows users to report system information on failures, incidents, concerns, and other complaints to appropriate personnel.

Roles and responsibilities specified

Roles and responsibilities for the design, development, implementation, operation, maintenance, and monitoring of information security controls are formally assigned in job descriptions and/or the Roles and Responsibilities policy.

Remote access processes established

Epro has processes in place for granting, changing, and terminating access to data centers based on an authorisation from control owners.

Third-party agreements established

Epro has written agreements in place with vendors and related third-parties. These agreements include confidentiality and privacy commitments applicable to that entity.

Cybersecurity insurance maintained

Epro holds cybersecurity insurance to mitigate the financial impact of business disruptions.

Incident management procedures followed

Epro's security and privacy incidents are logged, tracked, resolved, and communicated to affected or relevant parties by management according to the company's security incident response policy and procedures.

System capacity reviewed

Epro evaluates system capacity on an ongoing basis, and system changes are implemented to help ensure that processing capacity can meet demand.

Development lifecycle established

Epro has a formal systems development life cycle (SDLC) methodology in place that governs the development, acquisition, implementation, changes (including emergency changes), and maintenance of information systems and related technology requirements.

Incident response policies established

Epro has security and privacy incident response policies and procedures that are documented and communicated to authorised users.

Vendor management program established

Epro has a vendor management program in place. Components of this program include:

critical third-party vendor inventory;

vendor's security and privacy requirements; and

review of critical third-party vendors at least annually.

Production deployment access restricted

Epro restricts access to migrate changes to production to authorised personnel.

AI Security & Compliance

Control

Status

Processes for responsible use of AI

Epro defines and documents the processes for the responsible use of AI systems.

Objectives for responsible use of AI

Epro identifies and documents objectives to guide the responsible use of AI systems.

Support system available

Epro has an external-facing support system in place (Jira) that allows users to report system information on failures, incidents, concerns, and other complaints to appropriate personnel.

Suppliers

Epro has establish a process to ensure that its usage of services, products or materials provided by suppliers aligns with the organisation’s approach to the responsible development and use of AI systems.

Infrastructure performance monitored

An infrastructure monitoring tool is utilized to monitor systems, infrastructure, and performance and generates alerts when specific predefined thresholds are met.

Production application access restricted

System access restricted to authorised access only

Log management utilised

Epro utilises a logs to identify events that may have a potential impact on the company's ability to achieve its security objectives.

Firewall access restricted

Epro restricts privileged access to the firewall to authorized users with a business need.

AI policy

Epro has a document a policy for the development or use of AI systems.

Intended use of the AI system

Epro ensures that the AI system is used according to the intended uses of the AI system and its accompanying documentation.

Resource documentation

Epro should identify and document relevant resources required for the activities at given AI system life cycle stages and other AI-related activities relevant for the organisation.

Review of the AI policy

The AI policy should be reviewed at planned intervals or additionally as needed to ensure its continuing suitability, adequacy and effectiveness.

Tooling resources

As part of resource identification, the organisation should document information about the tooling resources utilised for the AI system.

System documentation and information

Epro has determined and provided the necessary information to users of the system.

Trust Portal

Epro is an AI-driven clinical platform that provides digital inpatient and outpatient tools including speech recognition, which are proven to optimise workflows and capture outcomes in real-time at the point of care.

As a trusted partner to the NHS for 20 years, our software supports over 60,000 users across 11 NHS Trusts; supporting clinicians to make better decisions, increase hospital productivity and improve patient care through our highly secure, cloud-hosted solution.

This portal aims to provide a concise overview of certifications, accreditations and the good governance that drive our day to day activities at Epro.

Controls

Infrastructure Security

Control

Status

Data retention procedures established

Epro has formal retention and disposal procedures in place to guide the secure retention and disposal of company and customer data.

Service infrastructure maintained

Epro has infrastructure supporting the service patched as a part of routine maintenance and as a result of identified vulnerabilities to help ensure that servers supporting the service are hardened against security threats.

Continuity and Disaster Recovery plans established

Epro has Business Continuity and Disaster Recovery Plans in place that outline communication plans in order to maintain information security continuity in the event of the unavailability of key personnel.

Production data backups conducted

Epro performs periodic backups for production data. Data is backed up to a different location than the production system.

Application and data criticality analysed

Epro assesses the relative criticality of specific applications and data in support of other contingency plan components.

Infrastructure performance monitored

An infrastructure monitoring tool is utilised to monitor systems, infrastructure, and performance and generates alerts when specific predefined thresholds are met.

Security awareness training implemented

Epro requires employees to complete security awareness training within thirty days of hire and at least annually thereafter.

Segregation in virtual computing environments

A cloud service customer's virtual environment running on a cloud service are protected from other cloud service customers and unauthorised persons.

Remote access MFA enforced

Epro's production systems can only be remotely accessed by authorized employees possessing a valid multi-factor authentication (MFA) method.

Production network application access restricted

System access restricted to authorised access only.

Encryption key access restricted

Epro restricts privileged access to encryption keys to authorised users with a business need.

Unique account authentication enforced

Epro requires authentication to systems and applications to use unique username and password or authorised Secure Socket Shell (SSH) keys.

Access control procedures established

Epro's access control policy documents the requirements for the following access control functions:

adding new users;

modifying users; and/or

removing an existing user's access.

Organisational Security

Control

Status

Confidentiality Agreement acknowledged by contractors

Epro requires contractors to sign a confidentiality agreement at the time of engagement.

Confidentiality Agreement acknowledged by employees

Epro requires employees to sign a confidentiality agreement during onboarding.

Employee background checks performed

Where a role requires access to client data, comprehensive DBS Enhanced checks are performed on new employees.

Anti-malware technology utilised

The company deploys anti-malware technology to environments commonly susceptible to malicious attacks and configures this to be updated routinely, logged, and installed on all relevant systems.

Return of assets

Personnel and other interested parties as appropriate shall return all the organisation’s assets in their possession upon change or termination of their employment, contract or agreement.

Asset disposal procedures utilised

Epro has electronic media containing confidential information purged or destroyed in accordance with best practices, and certificates of destruction are issued for each device destroyed.

Data & Privacy

Control

Status

Privacy policy established

Epro has a privacy policy in place that documents and clearly communicates to individuals the extent of personal information collected, the company's obligations, the individual's rights to access, update, or erase their personal information, and an up-to-date point of contact where individuals can direct their questions, requests or concerns.

Privacy policy reviewed

Epro reviews the privacy policy as needed or when changes occur and updates it accordingly to ensure it is consistent with the applicable laws, regulations, and appropriate standards.

Privacy policy available

Epro has a privacy policy available to customers, employees, and/or relevant third parties who need them before and/or at the time information is collected from the individual.

Data retention procedures established

Epro has formal retention and disposal procedures in place to guide the secure retention and disposal of company and customer data.

Service infrastructure maintained

Epro has infrastructure supporting the service patched as a part of routine maintenance and as a result of identified vulnerabilities to help ensure that servers supporting the service are hardened against security threats.

Continuity and Disaster Recovery plans established

Epro has Business Continuity and Disaster Recovery Plans in place that outline communication plans in order to maintain information security continuity in the event of the unavailability of key personnel.

Product Security

Control

Status

Penetration testing performed

Epro's penetration testing is performed annually by a CREST accredited Third Party . A remediation plan is developed and changes are implemented to remediate vulnerabilities in accordance with SLAs.

Data encryption utilised

Epro uses secure data transmission protocols to encrypt confidential and sensitive data when transmitted.

Data transmission encrypted

Epro uses secure data transmission protocols to encrypt confidential and sensitive data when transmitted.

Vulnerability and system monitoring procedures established

The company's formal policies outline the requirements for the following functions related to IT security

Internal Security Procedures

Control

Status

Service description communicated

Epro provides a description of its products and services to internal and external users.

Security policies established and reviewed

Epro's information security policies and procedures are documented and reviewed at least annually.

Support system available

Epro has an external-facing support system in place (Jira) that allows users to report system information on failures, incidents, concerns, and other complaints to appropriate personnel.

Roles and responsibilities specified

Roles and responsibilities for the design, development, implementation, operation, maintenance, and monitoring of information security controls are formally assigned in job descriptions and/or the Roles and Responsibilities policy.

Remote access processes established

Epro has processes in place for granting, changing, and terminating access to data centers based on an authorisation from control owners.

Third-party agreements established

Epro has written agreements in place with vendors and related third-parties. These agreements include confidentiality and privacy commitments applicable to that entity.

Cybersecurity insurance maintained

Epro holds cybersecurity insurance to mitigate the financial impact of business disruptions.

Incident management procedures followed

Epro's security and privacy incidents are logged, tracked, resolved, and communicated to affected or relevant parties by management according to the company's security incident response policy and procedures.

System capacity reviewed

Epro evaluates system capacity on an ongoing basis, and system changes are implemented to help ensure that processing capacity can meet demand.

Development lifecycle established

Epro has a formal systems development life cycle (SDLC) methodology in place that governs the development, acquisition, implementation, changes (including emergency changes), and maintenance of information systems and related technology requirements.

Incident response policies established

Epro has security and privacy incident response policies and procedures that are documented and communicated to authorised users.

Vendor management program established

Epro has a vendor management program in place. Components of this program include:

critical third-party vendor inventory;

vendor's security and privacy requirements; and

review of critical third-party vendors at least annually.

Production deployment access restricted

Epro restricts access to migrate changes to production to authorised personnel.

AI Security & Compliance

Control

Status

Processes for responsible use of AI

Epro defines and documents the processes for the responsible use of AI systems.

Objectives for responsible use of AI

Epro identifies and documents objectives to guide the responsible use of AI systems.

Support system available

Epro has an external-facing support system in place (Jira) that allows users to report system information on failures, incidents, concerns, and other complaints to appropriate personnel.

Suppliers

Epro has establish a process to ensure that its usage of services, products or materials provided by suppliers aligns with the organisation’s approach to the responsible development and use of AI systems.

Infrastructure performance monitored

An infrastructure monitoring tool is utilized to monitor systems, infrastructure, and performance and generates alerts when specific predefined thresholds are met.

Production application access restricted

System access restricted to authorised access only

Log management utilised

Epro utilises a logs to identify events that may have a potential impact on the company's ability to achieve its security objectives.

Firewall access restricted

Epro restricts privileged access to the firewall to authorized users with a business need.

AI policy

Epro has a document a policy for the development or use of AI systems.

Intended use of the AI system

Epro ensures that the AI system is used according to the intended uses of the AI system and its accompanying documentation.

Resource documentation

Epro should identify and document relevant resources required for the activities at given AI system life cycle stages and other AI-related activities relevant for the organisation.

Review of the AI policy

The AI policy should be reviewed at planned intervals or additionally as needed to ensure its continuing suitability, adequacy and effectiveness.

Tooling resources

As part of resource identification, the organisation should document information about the tooling resources utilised for the AI system.

System documentation and information

Epro has determined and provided the necessary information to users of the system.