eDiscovery Tool
Scan and analyse large volumes of electronic data, such as emails, documents, databases and more, to identify information relevant to a case or contract via intelligent search functions.
Please review all requirements. Your solution must meet all 🔴 mandatory requirements to qualify.
7.01🔴
Can your solution allow for cloud-based, mobile-based and/or web-based usage?
7.02🔴
Data Ingestion Can your solution support the ingestion and processing of a wide range of electronic data types and file formats commonly used in business and legal contexts?
7.03
Can your solution import data directly from commonly used third-party platforms (e.g. OneDrive, Microsoft Teams)?
7.04🔴
Search Index & Interface Does your solution possess full search capabilities (e.g. concept search, facet search, fuzzy search, Boolean search) which enable users to do keyword search across large quantities of documents, attachments, metadata, document IDs and codes at one time such that users can remove duplicates and identify relevant documents?
7.05🔴
Collaboration and Review Does your solution facilitate collaboration among legal teams and reviewers, by allowing annotation, tagging, and categorisation of documents for review?
7.06
Audit Trail Does your solution maintain an audit trail and provide a clear chain of custody for all processed data?
7.07
Audio Transcription Is your solution able to create text transcripts of audio or video files, allowing those files to be searched with text-based queries?
7.08
Optical Character Recognition (OCR) Is your solution able to perform Optical Character Recognition (OCR) such that images are searchable?
7.09🔴
Email Threading Does your solution have an email review function which allows each email to be grouped with its attachments and with other emails in the “chain” to which the email belongs, as well as quickly identify spam?
7.10🔴
Predictive Coding or Technology Assisted Review Is your solution able to perform “Technology Assisted Review” which will analyse the content of the documents and rank or group them based on how relevant they are to the case thereby allowing users to locate them faster?
7.11🔴
Data Visualisation Does your solution include integrated analytics functions such that users can apply data visualisations and analysis to find key facts and fact patterns more quickly?
7.12
Integrated Analytics Does your solution have an intuitive user interface which will allow users to analyse the scope of the case and develop their case strategy effectively?
7.13🔴
Is your solution able to design and customise case reports?
7.14🔴
Version Control and Audit Trail Does your solution maintain version control and provide an audit trail for all activities to track changes and ensure accountability?
7.15🔴
Legal Hold Does your solution allow legal hold management to impose legal holds on pertinent data to prevent alteration or deletion during ongoing eDiscovery processes, and to oversee the lifecycle of legal holds?
7.16
Case Management Does your solution include features for organising and managing eDiscovery projects, such as case creation, task assignment to team members and deadline tracking?
7.17
Integration Can your solution integrate with other systems such as document management, document review systems, or case management tools?
7.18🔴
Export and Delivery Options Does your solution offer options for exporting assembled documents in different formats, such as PDF, Word, or HTML, as well as support delivery methods like email or direct printing?
7.19🔴
Has your company engaged a qualified 3rd party to conduct a security vulnerability assessment of your solution in the last 12 months? If you are a reseller of the solution, please verify with your product principal that they have conducted a security vulnerability assessment of their solution by a qualified 3rd party in the last 12 months. If Yes, please indicate the name of the 3rd party assessor and date of the assessment test in the comment field. Note: [1] Qualified 3rd party include Cybersecurity companies accredited under Accreditation@SGD Programme; CREST-Certified companies or companies with equivalent certifications. Examples of equivalent certifications can include but are not limited to: Offensive Security Certified Professional (OSCP); EC-Council Certified Security Analyst (ESCA [V10]); GIAC Penetration Tester (GPEN) [2] Vendors need to submit vulnerability assessment report (dated maximum 1 year ago from checklist submission date) in the online submission portal. The submission will be rejected if vendors are unable to provide this documentation within 1 month from checklist submission date. [3] Vendors who cannot fulfil point [1] and [2] will be rejected
Last updated