Security and compliance made simple for private practice
Secure document sharing
Share sensitive patient documents with verified contacts, ensuring privacy and protection.
Audit logs
Track every system interaction, make it easy to respond to CQC inspections and manage incidents effectively.
Roles based access controls
Define user permissions to limit access to only the data your team needs.
Two factor authentication
Add an extra layer of protection for user accounts.
Advanced security for large practices
Semble’s enterprise-level infrastructure delivers the highest levels of protection, scalability, and control.
| Single tenant infrastructure Dedicated environments to ensure optimal data isolation and security. |
|
| Single Sign On (SSO) Simplify user authentication while maintaining enterprise grade security. |
|
| Access groups Assign access levels to specific user groups for improved control over sensitive data. |

Semble is a safe haven for patient data”
Michael Wilshaw
Medical Director - Exroid
How we protect your data
01
We vet our sub-processors and partners to maintain our high security standards.
02
We conduct annual security audits and staff training.
03
We encrypt data in highly secure UK & EU data centres.
Dedicated expertise to keep your data safe
Meet Fay, our Head of IT security
Fay is focused on staying ahead of evolving threats and ensuring your clinic is always protected. She works tirelessly to monitor and implement the latest security updates and best practices, whilst ensuring Semble consistently exceeds industry standards for data protection and compliance.
With Semble, you’re backed by a team that prioritises your peace of mind and patient safety.
Meet Rose, our Head of Compliance
At Semble, we believe compliance isn’t just a checkbox. We believe it’s the robust foundation for safer healthcare outcomes. That’s why we’re proud to have Rose leading the charge in safeguarding your healthcare data.
Rose is focused on data security and compliance. You can rest assured Rose will proactively monitor changes in legislation to ensure we’re always one step ahead. This means you can have full confidence that Semble not only meets the legally required standard, but also sets a benchmark for reliability and integrity in healthcare technology.
See what makes Semble secure
Learn how we go above and beyond to protect your patient data. Visit our Trust Centre for compliance certificates, security controls, and more.
Frequently asked questions
We protect your data with multiple layers of security:
- Encryption: All data is encrypted at rest and in transit using industry-standard protocols.
- Access controls: Role-based access ensures only authorised users can access sensitive information.
- Regular audits: Our ISO 27001 certification means we follow globally recognised best practices for information security.
- Backups: Automated, encrypted backups ensure data can be restored quickly in emergencies.
Compliance forms the backbone of our patient data management system. In-built tools like access group management, audit trails and secure document sharing all align with CQC's requirements for protecting patient data.
We ensure GDPR compliance by:
- Encrypting patient data in transit and at rest to prevent unauthorised access.
- Implementing consent management tools to support patient rights.
- Enabling 2FA.
- Keeping data securely stored within UK and EU servers, in line with data residency requirements.
- Implementing GDPR compliant data retention policies and procedures.
- Enabling secure sharing of health documents.
You are in control of who you share patient data with, and we enable secure document sharing within Semble.
We carefully manage our sub-processors and partners to ensure that they meet Semble's high data security standards. Please see here for further information.
We have a comprehensive disaster recovery plan tested for robustness to mitigate data loss.
We use automated, encrypted, daily backups stored across multiple cloud locations to ensure your data is recoverable in case of an incident. Regular testing is conducted to verify the reliability of these backups.