Epiq Europe Ltd

Electronic Presentation of Evidence Cloud Software

Epiq provides evidence presentation software to electronically present evidence at a hearing. The software allows documents to be manipulated on screen without altering the original file. The evidence presentation software provides a wide range of manipulation tools, including: Annotate; Enlarge; Highlight; Crop; Expand; Compare up to four documents on screen.


  • Annotate evidence documents
  • Enlarge evidence documents
  • Highlight evidence documents
  • Crop and cut evidence documents
  • Expand evidence documents
  • Compare up to four documents on screen at any time


  • Makes case presentation much easier to follow
  • Can save one third of court costs in complex trials
  • Can save one third of court time in complex trials
  • Makes case presentation much more compelling and focused


£7 a unit a day

Service documents


G-Cloud 12

Service ID

2 7 9 0 3 9 1 5 7 8 6 5 4 9 6


Epiq Europe Ltd Sandeep Patel
Telephone: 020 7367 9173
Email: contracts@epiqglobal.com

Service scope

Software add-on or extension
Cloud deployment model
Private cloud
Service constraints
Not available on Android
System requirements
Windows or Mac operating systems

User support

Email or online ticketing support
Email or online ticketing
Support response times
We aim to respond to all emails received within standard working hours (9am to 5.30pm, Monday to Friday) within one hour. We provide an emergency email address for queries received outside standard working hours. We aim to respond to these emails within two hours.
User can manage status and priority of support tickets
Phone support
Phone support availability
24 hours, 7 days a week
Web chat support
Onsite support
Onsite support
Support levels
Support is provided on-site by a fully trained technician. Additional support is available via phone and email by the allocated Project Manager for the hearing.
Support available to third parties

Onboarding and offboarding

Getting started
Each client is supported by an account manager and project management team. The project management team will be able to troubleshoot and resolve most day-to-day issues. The project support team is also assisted by a technical support desk, who are able to address more complex functionality questions. If necessary, the project management team and project support team will engage additional technical support to answer client queries. Onsite training, online training and user documentation can all be provided.
Service documentation
Documentation formats
End-of-contract data extraction
Data can be extracted and provided at the end of the contract by the Project Manager for the case.
End-of-contract process
At the end of the contract, access to the software is removed. All data is extracted from the software and either returned to the client or securely deleted, according to the client's preference. No additional costs are incurred by the client.

Using the service

Web browser interface
Application to install
Compatible operating systems
  • MacOS
  • Windows
Designed for use on mobile devices
Differences between the mobile and desktop service
The software can be used on an iPad by using a fully-native iOS iPad application which empowers users to effectively display documents, photos, and video clips for basic presentations. Additionally, integration features with the desktop service allow the user to work with a large case data set and then easily export a smaller subset to the mobile application for quick, yet effective courtroom and arbitration presentations. The mobile application is meant to be a companion application to the desktop service, which allows users to present condensed versions of trial presentations quickly and efficiently.
Service interface
Description of service interface
The software has a simple, easy-to-use interface. All required programs are incorporated into one running application. Instead of opening another program, you can use convenient tabs located within the program window to access the Case Library (master view), Document Manager, Transcript Manager, and Coding. Selecting a tab opens the corresponding window views.
Accessibility standards
None or don’t know
Description of accessibility
The service interface: - uses simple colours; - is written in plain English; - uses simple sentences and bullet points; - has descriptive buttons; - uses good contrasts and a readable font size; - uses a combination of colour, shapes and text; - follows a linear, logical layout and is visible when text is magnified to 200%. All non-text content that is presented to the user has a text alternative that serves the equivalent purpose.
Accessibility testing
We have not done any interface testing with users of assistive technology.
Customisation available


Independence of resources
Clients are supported by a dedicated Project Manager and project management team. The software is only utilised by the client for the duration of the trial and its availability is not affected by the demand that other clients place on our services.


Service usage metrics


Supplier type
Reseller providing extra features and support
Organisation whose services are being resold
Ipro Tech, LLC

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
There are multiple ways to export data. Users can export data to a script file, to a volume or to a PDF file. The on-site technician can export data for users or full training to clients can be provided.
Data export formats
Other data export formats
  • Load file (.oll)
  • Database file (.mdb)
  • Windows Media Video (.wmv)
  • Tagged Image Format (.TIF)
  • Adobe Acrobat (.PDF)
Data import formats
Other data import formats
  • Format Notes and Recommendations Adobe Acrobat (.PDF)
  • Tagged Image Format (.TIF)
  • Joint Photographic Experts Group (.JPG)
  • Portable Network Graphics (.PNG)
  • H.264 (.MP4, .M4V and .MOV)
  • MPEG-4 (.MP4, .M4V and .MOV)
  • MPEG Audio Layer III (.MP3)
  • PCM Wave (.WAV)
  • Advanced Audio Coding (.AAC)
  • Audio Interchange File Format (.AIFF)

Data-in-transit protection

Data protection between buyer and supplier networks
Private network or public sector network
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
We train staff to answer phones within three rings, acknowledge emails within one hour and escalate all unusual queries to their manager. We maintain a formal policy for handling queries and all personnel are trained in our escalation process. Specific service level agreements for availability are agreed with clients on a case-by-case basis.
Approach to resilience
The physical protection of all data centres encompasses multiple layers including 24x7 onsite staff, strict personnel access controls utilising badge and/or biometric access and mantraps, and 24x7x365 video surveillance both inside and outside the facility. Hardware, servers, and network devices are maintained on raised flooring and are secured in locked cabinets. Visitors must be escorted at all times, sign in, and be assigned an electronic photo ID badge that does not grant access to any raised floor areas. Further information is available on request.
Outage reporting
Email alerts are sent directly to the IT support team who will then investigate and report back to clients confirming the start and end times for any outage, our analysis of the cause of the outage and how the issue was resolved. Reports will also include recommendations for any future changes or upgrades if these are required.

Identity and authentication

User authentication needed
User authentication
2-factor authentication
Access restrictions in management interfaces and support channels
Access to data within the system is based on a tiered hierarchy configured to match the specific roles and responsibilities of team members. Based on information provided by the client, Epiq's IT team will configure user access to data, as well as functions they are able to perform within the system. Administration and audit history features are deployed via specific tabs and commands, which are only visible to users authorised to access these features.
Access restriction testing frequency
At least once a year
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users contact the support team to get audit information
How long user audit data is stored for
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
British Standards Institute (BSI)
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
Services outside our core services which are Legal Services and Court Reporting. A statement of applicability can be provided on request.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
ISO/IEC 27001
Information security policies and processes
Information security is managed through a dedicated information security team who are responsible for designing and updating polices relating to user access, physical controls, network storage, appropriate use of systems and compliance with existing legislation. Policies are reviewed and updated and mandatory training on security issues is provided to all employees when they join the company and at least annually during their tenure. Our data centre and operations centre have been accredited to IS27001 standard and as part of this certification we are regularly interviewed and audited by an external accreditor, a process that evaluates our policies and practices to identify and resolve potential vulnerabilities.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
The progress of the project will be tracked throughout its life-cycle by the Project Manager utilising Epiq’s bespoke database. Computer assets are recorded in an IT equipment inventory database including capturing asset tags, serial numbers of PCs, servers and network equipment. Computer assets are monitored throughout a project, fully checked at the end of a project and wiped of all client data. Project Managers and IT staff are vigilant to any changes which may have a potential security impact. If any incident were to occur, the client would be advised immediately and a full investigation would take place.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Our Information Security Officer and information security management team ensure that we keep up-to-date with security alerts and advice through multiple information sources (newsletters, ISMS networks, clients, etc). If the threat is something that requires immediate attention, it will lead to an immediate change in the configuration of our technology or our operational procedures. Threat intelligence, such as information on viruses or phishing scams, is shared immediately with employees via email alerts. Information on security threats also feeds into updated security training, which is mandatory for all employees.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Compromises may be identified by staff, clients or other external sources. If a compromise is identified, the client will be advised immediately. A full investigation will ensue and a written report will be provided to the client within 24 hours, detailing the compromise, the security implications and any counter-measures that have been implemented to avoid a recurrence.
Incident management type
Supplier-defined controls
Incident management approach
We maintain an Incident Response Plan, which sets out our approach to reporting and responding to security incidents. Employees report incidents to the information security team using a standard format document and the team is responsible for investigating the reported activity in a timely manner and reporting findings to the client, management and any appropriate external authorities as necessary. Incident reports are usually provided by secure email. Our information security team subscribes to various industry alert services to keep abreast of relevant threats, vulnerabilities or alerts from actual incidents.

Secure development

Approach to secure software development best practice
Supplier-defined process

Public sector networks

Connection to public sector networks


£7 a unit a day
Discount for educational organisations
Free trial available

Service documents