Anexsys Ltd


Using the world’s leading eDiscovery/eDisclosure platform, our experts will support you through document review techniques for civil, criminal, regulatory, and investigative matters. In addition to Relativity’s standard analytics functionality, we provide a unique range of proprietary enhancements to Relativity's open standards platform, including redaction products and audio transcription features.


  • Intuitive document review interface
  • Fully scalable worldwide cloud hosting service
  • Supports advanced analytics and traditional data reduction techniques
  • Automatic redactions provided via Anexsys’ application, Mask-it
  • Secure electronic bundle builds via Anexsys’ application, Exhibit
  • Customisable security options, secure access and auditable log of actions
  • Flexible and customisable workflows and integrations to support review needs
  • Productions and disclosures adapted to your needs and practice directions
  • Full EDRM project management delivered by a certified RelativityOne partner
  • Multiple languages supported at processing and review stages


  • Access to digital forensic experts (data collection to witness reporting)
  • Easy digitisation of documents using in-house printing and scanning teams
  • Expert advice on document processing and data reduction techniques
  • Analytics features provided at no extra cost to optimise reviews
  • Review efficiency savings of 20% from our proprietary platform enhancements
  • Access to bespoke legal-tech solutions from our in-house software team
  • Customer self sufficiency achieved through Anexsys training plans
  • No charge for sub-15 minute tasks, typically saving 15% fees
  • Multi-territory support enabling standardisation of process and training across countries
  • Service underpinned by UK-based team of security-cleared consultants and developers


£15 a gigabyte a month

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

4 1 4 1 3 1 7 1 1 9 1 5 7 4 3


Anexsys Ltd Rob Crowley
Telephone: 020 3217 0300

Service scope

Software add-on or extension
Cloud deployment model
Public cloud
Service constraints
System requirements
  • Min. 4 cores and 8GB of RAM for optimum performance
  • Windows 7+ running IE 11+
  • Windows 7+ running Google Chrome
  • Windows 7+ running Firefox
  • Mac OS X 10.9+ supporting Safari
  • Mac OS X 1 0.9+ supporting Chrome
  • Mac OS X 10.9+ supporting Firefox

User support

Email or online ticketing support
Email or online ticketing
Support response times
Support/office hours - Monday - Friday - 08:30 to 18:30.
Ticketing facility to log support requests - Available 24/7. Outside office hours we will provide an initial response to support requests within three hours. Enhanced support hours - weekend, bank holidays - by prior arrangement.
User can manage status and priority of support tickets
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
Our team will support your project from the first stages of scoping and data collection, continuing through the processing, review and the production stages. Our full onboarding process ensures we understand your review needs from the outset. You will have direct access to our security-cleared technical project managers, who all have extensive experience and are supported by a large technical team. Our support team can assist with more complex tasks such as creating layouts, search term reports, applying analytics functionality, and creating productions. With more complex work, your approval is sought for any additional costs associated with those tasks.
Support available to third parties

Onboarding and offboarding

Getting started
Our onboarding process starts with a kick-off meeting where we agree the ordering/engagement process, key contacts, timelines, design templates and workflows, define security arrangements and agree milestones. We also analyse existing skills within your team and determine what levels of training will be required. Online or face to face training is then arranged accordingly using dummy data. All training is supported by user guide documentation.
Each case will also have its own engagement process. With any new case, a scoping call will be required to determine data sources, sizes, whereabouts, and requirements specific to the case, such as de-duplication and search criteria. Previously agreed bespoke templates will be used to set up the new workspace, applying case-specific adjustments as required. Further training on the specific workspace is also given at this stage so reviewers are introduced to their case-specific data and workflows.
Service documentation
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
We offer various closure options. We can export the entire database including all the files. This export is provided on an encrypted hard drive and data can be restored in the future if required. We can export the documents with agreed metadata. With this option, a single export is provided on an encrypted hard drive. Finally, we can delete all Relativity data. We also have options for the source data that was originally supplied to us for processing. This source data can be stored for an agreed period, copied and returned, or deleted from our systems. We will only delete the data from our servers once you have confirmed you can access your archive. We use forensically sound deletion processes, so rendering data irretrievable.
End-of-contract process
Deleting data is carried out free of charge. We do not charge for returning physical evidence within the UK. Quotes for restoring cases from a full Relativity archive are provided on a case by case basis. Our case closure letter outlines upfront the associated costs for each option and options are priced on a sliding scale, depending on case size. Once archive instructions have been actioned, project data is deleted from our systems and a certificate of destruction is issued.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Designed for use on mobile devices
Service interface
Description of service interface
RelativityOne is a fully cloud-hosted platform, supporting document reviews around the world, from large inquiries and complex legal cases to smaller document reviews such as Data Subject Access Requests (DSAR) and Freedom of Information Act Requests (FOIA). Your workspaces and workflows can be customised to suit the needs of each review and full reviewer training is provided from basic to super-user levels. The interface is intuitive and designed with the needs of non-technical operators in mind, with easy to use document viewing and coding panels, together with batching functionality that presents prioritised queues of documents to the reviewing team.
Accessibility standards
WCAG 2.1 A
Accessibility testing
All browser-level accessibility features are supported within RelativityOne. In addition, Relativity use a Web Content Accessibility Guidelines (WCAG) Checklist to test accessibility standards following any development activity. All our proprietary features are fully integrated within the RelativityOne interface and so as accessible as the core RelativityOne product.
What users can and can't do using the API
Relativity is the only review platform that has open and extensible API. API-access is supported through our in-house software development team. We create custom solutions that integrate into the RelativityOne platform. We are the only UK owned eDisclosure service provider with a dedicated software development team, and we are a Relativity development partner, meaning that we are uniquely positioned to take advantage of the extensibility features of the Relativity platform. We have developed a number of integrations with Relativity that form part of our standard Relativity offering. These include: Mask-it - Mask-It allows users to easily redact native versions of various document types within RelativityOne including Excel, Email, Word, PDF and many more. Mask-It saves time and cost when performing redactions by enabling users to automatically apply redactions made to one document to all of its duplicates. It also has the ability to generate redaction schedules.
RTK message - RTK message is used to import data from social media sites such as Facebook to Relativity and review them in a user-friendly manner. Our UK based SC cleared software development team frequently works with Government and private sector clients providing solutions to very individual requirements.
API documentation
API sandbox or test environment
Customisation available
Description of customisation
The RelativityOne platform provides flexibility to enhance and customise the application. This capability, from building unique workflows to supporting structured and unstructured datasets, and embedding of other technology platforms, ensures that the platform can continue to meet ever more complex use cases. Beyond core RelativityOne, we are able to provide a range of proprietary enhancements to the platform. During the onboarding process, we work with you to determine what "standard" workspace layouts and workflows should look like, what tagging and coding options are required. Our experts will be on hand to adjust workspaces to adapt as the case progresses. Levels of security are a huge feature of the platform and these can be customised to user, folder and even document level.


Independence of resources
RelativityOne offers great elasticity and burstable capacity. Relativity commits to keeping up with performance during peak times by increasing server capacity and adapting their own infrastructure. The software is designed to support thousands of simultaneous users without any degradation of performance.
This complete SaaS product is built on the Microsoft Azure cloud which benefits from elasticity, scalability and security, giving you significant efficiency and performance advantages over on-premise solutions. Relativity has committed that its users will always have the latest, most up-to-date software from a service, functionality and security measures standpoint, running on a vast global infrastructure.


Service usage metrics
Metrics types
We are able to create customised reports to meet all requirements. This includes broad project statistics such as the volumes of data processed/hosted and the number of documents in review, down to granular metrics such as the average number of pages reviewed per reviewer per hour, or the percentage of review decisions overturned per reviewer. This can then be presented both graphically and numerically through dashboards. Our experts can also write bespoke scripts to gather information and present it in a user-friendly fashion via alerts and dashboards.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Reseller providing extra features and support
Organisation whose services are being resold

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with CSA CCM v3.0
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Downloading and printing of documents is tightly controlled by user permissions, and explicit permission by case managers is sought before enabling this functionality.

Standard large data exports are completed by our team in accordance with your individual case requirements.
Data export formats
  • CSV
  • Other
Other data export formats
  • PDF
  • Concordance DAT file (standard legal export)
  • Natives
  • Text files
  • Images
Data import formats
  • CSV
  • Other
Other data import formats
  • PDF files
  • Standard files typically found on a computer (eg. Word, Excel)
  • Concordance DAT file (Native, text and metadata files)
  • Raw unstructured data (eg. PST files, AD1 images, ZIP files)
  • OPT file (Images)

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
RelativityOne review platform availability - 99.75% of the total number of minutes in a given calendar month outside of planned maintenance windows. Support hours (Mon-Fri) 08:30am-18:30pm following initial acknowledgment you can expect a full response to queries within the following timescales: Low urgency – 4 business hours, Medium / routine urgency – 2 business hours, High urgency – 1 hour (24/7, not limited to business hours).
Approach to resilience
RelativityOne is built on Microsoft Azure for the most comprehensive compliance coverage including ISO 27001 and SOC 2 compliance. Relativity's security team conduct proactive threat intelligence, hunting, and investigations and commit to constant security innovations and updates, so you always benefit from the most secure version.
Anexsys is an ISO 27001, ISO 9001 and Cyber Essentials accredited organisation. Processes and security arrangements that are in place, protecting both physical and digital assets are regularly audited for compliance, internally and externally.
Both Anexsys and Relativity have documented disaster recovery and business continuity procedures, available to view on request.
Outage reporting
In the event of RelativityOne downtime our own infrastructure team will be informed and in turn will email you with the details and expected duration.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Username or password
Access restrictions in management interfaces and support channels
User access is configured to match the job roles of employees and clients. Permissions are highly granular and flexible. Permissions can control which databases and data can be accessed, which functions of the application can be used, and access to the administrator interface.
Access restriction testing frequency
At least every 6 months
Management access authentication
  • 2-factor authentication
  • Username or password

Audit information for users

Access to user activity audit information
You control when users can access audit information
How long user audit data is stored for
Access to supplier activity audit information
You control when users can access audit information
How long supplier audit data is stored for
How long system logs are stored for

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
ISO/IEC 27001 accreditation date
7th April 2017
What the ISO/IEC 27001 doesn’t cover
All of our services are covered by our accreditation
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
Cyber Essentials
Information security policies and processes
Complying with ISO standards ensures that we are committed to meeting your needs together with protecting our information and your data. This is a mechanism for us to show that we are continually improving and learning by completing regular internal and external audits of our quality and information security management systems.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Changes to operational software, system upgrades, application module upgrades, vendor-supplied software, product enhancements and patches are controlled through our change management procedure detailed in our Information Security Management System. Any changes are requested through a ticketing system with full details and risk assessment for approval. The approval of a member of our management team is required if there is a possible alteration to any security controls, a financial cost or where a third party approval is required. Once approved the infrastructure team follows a specific implementation procedure which includes planning, testing, taking backups and version control.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
Relativity's security team is responsible for vulnerability management.
Weekly maintenance is conducted on the platform to apply OS and application patches.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
Relativity has built its own custom monitoring solution within the Microsoft Azure platform. User activity is logged, and audit logs are retained even if the user is disabled from the system.
Incident management type
Supplier-defined controls
Incident management approach
In the event of a verified information security incident, we will inform you at the earliest possible opportunity. From that point on, all communication will be handled by the Incident Manager. We will provide a substantive update (e.g. nature of the incident, and affected data) within 24 hours, and updates every 24 hours thereafter until the incident is resolved.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£15 a gigabyte a month
Discount for educational organisations
Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.