Evidence Management Platform

Concentrate evidence and court documents into a single hub, create an audit trail that tracks and records changes in court documents.

Please review all requirements. Your solution must meet all 🔴 mandatory requirements to qualify.

S/No.
Requirements

10.01🔴

Does your solution allow for cloud-based, mobile-based and/or web-based usage?

10.02🔴

Does your solution allow users to annotate, highlight, comment on, and tag documents?

10.03

Does your solution automatically collate evidence into bundles, sequence and paginate bundles, remove duplicated evidence, and update bundles when new documents are added?

10.04🔴

Does your solution provide an audit trail to track all actions and changes taken on evidence items with username, dates, and time stamps?

10.05🔴

Does your solution allow users to add hyperlinks to relevant paragraphs or documents?

10.06🔴

Does your solution allow users to search for documents based on their text, tag, notes, key persons or events, affidavit, or bundle?

10.07

Does your solution allow users to narrow down their search results using filters or search parameters?

10.08🔴

Does your solution allow documents to be shared with and edited by multiple users concurrently?

10.09🔴

Does your solution allow electronic presentation of evidence during in-person and virtual hearings?

10.10

Does your solution support integration with other systems such as case management systems, document management systems or other software?

10.11🔴

Has your company engaged a qualified 3rd party to conduct a security vulnerability assessment of your solution in the last 12 months? If you are a reseller of the solution, please verify with your product principal that they have conducted a security vulnerability assessment of their solution by a qualified 3rd party in the last 12 months. If Yes, please indicate the name of the 3rd party assessor and date of the assessment test in the comment field. Note: [1] Qualified 3rd party include Cybersecurity companies accredited under Accreditation@SGD Programme; CREST-Certified companies or companies with equivalent certifications. Examples of equivalent certifications can include but are not limited to: Offensive Security Certified Professional (OSCP); EC-Council Certified Security Analyst (ESCA [V10]); GIAC Penetration Tester (GPEN) [2] Vendors need to submit vulnerability assessment report (dated maximum 1 year ago from checklist submission date) in the online submission portal. The submission will be rejected if vendors are unable to provide this documentation within 1 month from checklist submission date. [3] Vendors who cannot fulfil point [1] and [2] will be rejected

10.12

Does your solution come with AI features, such as: - Ability to utilise Natural Language Processing (“NLP”) to classify and tag evidence documents based on content, keywords, and relevance, making it easier to search and retrieve specific pieces of evidence - Ability to utilise OCR for image recognition such that images are searchable - Others, please specify

Preparing for submission?

Your submission should contain screenshots and write-ups that clearly demonstrate compliance with each mandatory requirement sub-point. Contact us if you need help.

Last updated