Cloud-based document management and electronic bundling tool, integrating Realtime transcription and evidence display.
Ability to annotate and hyperlink documents in the hearing bundle and transcripts. Live collaboration across entire team on a secure cloud-based platform.
- Annotation and collaboration across case content, documents and transcripts.
- Hyperlink between key documents and referenced material in transcripts.
- Realtime transcription and audio synchronisation.
- Electronic Presentation of Evidence to display material in the hearing.
- Chronology tool to centralise case timeline.
- Remote access to all content including real-time transcripts.
- Search material for key words and phrases,
- Compartmentalise agreed documents into custom bundles.
- User administered document and note level tagging.
- Export material with or without user work product.
- Access documents and transcripts from anywhere in the world.
- Centralise case preparation and user annotations.
- Reduce duration of hearing with streamlined presentation of evidence.
- Easily update hearing bundle without manually changing multiple sets.
- Avoid unnecessary printing and distribution costs.
- Store case materials on one secure server.
- Two-factor authentication to securely access content.
- Avoid wasted lawyer time by efficiently working electronically.
- Easily export documents if necessary.
- Realtime and final transcript fully hyperlinked with days evidence.
£2500 to £13500 per licence per month
2 2 9 3 3 7 9 5 1 6 1 8 1 9 9
Opus 2 International
|Software add-on or extension||No|
|Cloud deployment model||Public cloud|
|System requirements||None, browser based software.|
|Email or online ticketing support||Email or online ticketing|
|Support response times||
Target response time 30 mins to 1 hour (business hours)
Target response time 4 hours (non-business hours)
|User can manage status and priority of support tickets||No|
|Phone support availability||9 to 5 (UK time), Monday to Friday|
|Web chat support||No|
|Onsite support||Onsite support|
Dedicated Project Manager, supported by a Project Lead to oversee and administer the use of Magnum software for a specific case.
Second line software engineering support to troubleshoot technical issues.
Dedicated Case Manager to organise all hearing room services.
|Support available to third parties||Yes|
Onboarding and offboarding
|Getting started||Online or onsite training in London. User guide provided to all users upon access. Ongoing phone support and further training where required by the users.|
|End-of-contract data extraction||Offline PDF export to encrypted USB or secure file transfer site. Work product across the data set can also be extracted.|
Extraction charges vary depending on quantity of data.
Archiving of data charges depend on quantity of data.
Deletion of data free of charge.
Using the service
|Web browser interface||Yes|
|Application to install||No|
|Designed for use on mobile devices||No|
|Independence of resources||All clients are placed on separate servers so there is no problem with increased demand by other users.|
|Service usage metrics||No|
|Supplier type||Not a reseller|
|Staff security clearance||Other security clearance|
|Government security clearance||Up to Security Clearance (SC)|
|Knowledge of data storage and processing locations||Yes|
|Data storage and processing locations||United Kingdom|
|User control over data storage and processing locations||Yes|
|Datacentre security standards||Complies with a recognised standard (for example CSA CCM version 3.0)|
|Penetration testing frequency||At least once a year|
|Penetration testing approach||Another external penetration testing organisation|
|Protecting data at rest||
|Data sanitisation process||Yes|
|Data sanitisation type||
|Equipment disposal approach||Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001|
Data importing and exporting
|Data export approach||Download selected material and work product to a users local machine in PDF or word format (and native where necessary).|
|Data export formats||
|Other data export formats|
|Data import formats||
|Other data import formats|
|Data protection between buyer and supplier networks||TLS (version 1.2 or above)|
|Data protection within supplier network||Other|
|Other protection within supplier network||Data in transit within the network is not protected|
Availability and resilience
Reasonable commercial efforts taken to make Magnum available at least 98% of the time in the aggregate in any Week, net of Permitted Downtime and net of other circumstances not reasonably in the control of Opus 2 (the “SLA”). “Permitted downtime” means scheduled, emergency or other reasonable maintenance which results in periodic service downtime. Opus 2 cannot and does not guarantee that access to the Website and/or the Magnum Software will be continuous or error free. Opus 2 will use reasonable commercial efforts to provide Customer and End Users with advance notice of any scheduled maintenance and to implement Permitted Downtime during off-peak hours. Opus 2 shall not be liable for any loss suffered as a result of the Website and/or the Magnum Software being unavailable (including, without limitation, as a result of Permitted Downtime).
98% or more: None
95% to 98%: 10% of the weekly Magnum Access Fee
90% to 95%: 20%
Below 90%: 50%
Service Credits have no cash value; must be claimed through written notice to Opus 2 delivered within the calendar month after the month in which the SLA is not met; and will be applied (if timely claimed) against future Opus 2 invoice.
|Approach to resilience||The service is designed to be able to be brought up in a secondary region in order to deal with downtime in the primary data-center region (we use AWS so we get their resilience on top of design considerations). Data is copied to the secondary region every ten minutes. Typical service availability for AWS is 99.999%.|
|Outage reporting||Email alerts.|
Identity and authentication
|User authentication needed||Yes|
|Other user authentication||Email address, password, memorable word, and 2-factor authentication (if required) needed to access the platform.|
|Access restrictions in management interfaces and support channels||
Access to management interfaces is done via a central console .
Support channels happen via bastion hosts with only key based authentication allowed.
|Access restriction testing frequency||At least every 6 months|
|Management access authentication||
|Description of management access authentication||Email address, password, memorable word, and 2 factor authentication required to login.|
Audit information for users
|Access to user activity audit information||Users contact the support team to get audit information|
|How long user audit data is stored for||User-defined|
|Access to supplier activity audit information||Users contact the support team to get audit information|
|How long supplier audit data is stored for||User-defined|
|How long system logs are stored for||User-defined|
Standards and certifications
|ISO/IEC 27001 certification||Yes|
|Who accredited the ISO/IEC 27001||BSI Group|
|ISO/IEC 27001 accreditation date||03/03/2018|
|What the ISO/IEC 27001 doesn’t cover||Edinburgh and Singapore offices.|
|ISO 28000:2007 certification||No|
|CSA STAR certification||No|
|Other security certifications||Yes|
|Any other security certifications||Cyber Essentials Plus|
|Named board-level person responsible for service security||No|
|Security governance certified||Yes|
|Security governance standards||
|Other security governance standards||Cyber Essentials Plus|
|Information security policies and processes||Opus 2 International maintains an ISO27001 certified information security management system. All staff receive security awareness training upon onboarding and yearly refresher training. Opus 2 CISO reports to the Opus 2 COO and owns all aspects of the security program. Internal audits across all departments are performed on a quarterly schedule.|
|Configuration and change management standard||Supplier-defined controls|
|Configuration and change management approach||We do not follow a strict change management program internally.|
|Vulnerability management type||Supplier-defined controls|
|Vulnerability management approach||
Regular vulnerability scanning with direct communications to IT or Operations for patching as required.
We can usually deploy patches within 24hours but risks are reviewed prior this this happening.
Threat Intelligence comes from various sources.
|Protective monitoring type||Supplier-defined controls|
|Protective monitoring approach||
Agent based software reports to a central console for correlation and alerting.
The Incident Response policy will be followed in the case of a potential compromise.
Incidents are alerted in near realtime and will be responded to in less than 60 minutes.
|Incident management type||Supplier-defined controls|
|Incident management approach||
We have pre-defined processes for all common security events.
Users can report via email, text or instant messaging.
Monthly reports are provided to senior management and kept on record.
|Approach to secure software development best practice||Conforms to a recognised standard, but self-assessed|
Public sector networks
|Connection to public sector networks||No|
|Price||£2500 to £13500 per licence per month|
|Discount for educational organisations||No|
|Free trial available||No|