Legis Solutions

Legis Solutions

Providing cost effective Case Management Systems for Professional Regulatory bodies and in-house Legal teams. This incorporates Workflows, Document Management, Portal, Dashboard, MS Office integration, email integration and MI Reporting.

Features

  • Case Management
  • Document Management
  • MI Reporting
  • Workflows
  • Document Production
  • Remote Access

Benefits

  • Office effiency
  • Time Management
  • Compliance
  • Process Management

Pricing

£100 to £125 per user per month

Service documents

G-Cloud 10

563251035907358

Legis Solutions

Stephen Woods

01489 580 290

steve.woods@legissolutions.co.uk

Service scope

Service scope
Software add-on or extension No
Cloud deployment model Private cloud
Service constraints Support available 9.00am to 5.30pm Monday to Friday unless specifically ageed with Client
System requirements
  • Remote Desktop Connection or Internet access
  • Licenced by User

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Generally within 2 hours. No weekend support until specifically agreed with Client
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 9 to 5 (UK time), Monday to Friday
Web chat support No
Onsite support Yes, at extra cost
Support levels Remote support
On site support will be charged at a daily rate
We will provide a technical account manager
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Both Onsite and online training are offered, together with training documentation. Floor walking is also available.
Service documentation Yes
Documentation formats PDF
End-of-contract data extraction The data is stored in industry standard MS SQL tables and can be extracted with industry standard tools. Documents and Images are also stored in industry standard formats such as Word, Excel and PDF
End-of-contract process Assistance will be given to other sofware providers to explain the structure and assist in the transfer the data.

If Legis Solutions are required to carry out the data conversion there will be an additional cost.

Using the service

Using the service
Web browser interface Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install No
Designed for use on mobile devices No
Accessibility standards None or don’t know
Description of accessibility Either by Remote Desktop Services or Web link
Accessibility testing None
API No
Customisation available Yes
Description of customisation Letters and Documents, via a Wizard.
Generally super users

Scaling

Scaling
Independence of resources It has never been an issue. Careful planning and adequate staffing levels ensure we offer a quality service to all clients

Analytics

Analytics
Service usage metrics Yes
Metrics types Real time dashboards
Excel spreadsheet
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Security Clearance (SC)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations United Kingdom
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency Less than once a year
Penetration testing approach In-house
Protecting data at rest Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach A third-party destruction service

Data importing and exporting

Data importing and exporting
Data export approach Z
Data export formats
  • CSV
  • Other
Other data export formats Excel
Data import formats
  • CSV
  • Other
Other data import formats
  • Excel
  • HTML

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks Private network or public sector network
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability The system is guaranteed to be accessable for 99% uptime between 9.00am and 5.30pm Mon- Fri.
Approach to resilience Available on request
Outage reporting Email alerts

Identity and authentication

Identity and authentication
User authentication needed Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
  • Other
Other user authentication Other options can be provided if essential
Access restrictions in management interfaces and support channels The system can be configured to offer up to 10 access levels
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
  • Other

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for At least 12 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security certifications No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance certified No
Security governance approach Use of industry best practices when installing + configuring operating systems + applications/services. EG: No un-necessary software running; OS Security Patches/Updates applied on regular basis; User credentials restrict access based on usage; Firewall set to deny all then specific ports opened.
Information security policies and processes Compliant with Data Protection Act, and other policies as required by region.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach All code changes reviewed and tracked within full version control system (including rollback mechanisms). Approval required prior to deployment to production system.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Vulnerabilities given priority based on assessment of potential impact, number of users affected. SLAs agreed regarding deployment of patches at each priority level.
Protective monitoring type Supplier-defined controls
Protective monitoring approach We have 24/7 monitoring of services + network infrastructure, and bandwidth usage is closely monitored. Software agents are deployed on Servers to monitor event logs + server performance/usage, with alerts generated and manually checked in the event of unusual behaviors being detected.
In the event of a potential compromise being detected or notified, a senior engineer would be tasked with investigation & remediation of the issue as a priority based on it's impact. The triage + investigation of an incident would start within 1 business day of the incident being logged.
Incident management type Supplier-defined controls
Incident management approach Ticketing system for reporting incidents.

Incidents reported via dedicated email and support line.

Incident reports available on request, mulitple formats available.

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Public sector networks

Public sector networks
Connection to public sector networks No

Pricing

Pricing
Price £100 to £125 per user per month
Discount for educational organisations No
Free trial available No

Documents

Documents
Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑