Legal Case Management System
Proquro legal case management platform is built especially for UK public sector organisations. From referrals to case intake, research to document review, court appearances to document bundling, time-recording to billing and invoicing, Proquro can connect you directly to the information you need, when you need it.
Features
- Compliant with industry best practices
- End-to-end case management for small or large organisations
- Document management, version management, in-app editing, automated templates, redaction, bundling
- Document bundling compliant with Courts and Tribunals Judiciary regulations
- Tasks and workflow management including automated workflows
- Integrated time-recording, billing and invoicing management
- Enhanced reporting and customisable, interactive dashboards
- Client portal for secure document sharing and collaboration
- E-Signature integration for documents
- Integrated email communication and secure large file transfers
Benefits
- Never miss any deadlines with task management and automated notifications
- Centralised document library stores documents and versions in one place
- Control permissions and security at granular level with role-based access
- Fully customisable platform with user defined fields and lookup values
- Client portal to collaborate with customers from a single platform
- Compare document versions to spot discrepancies with a single button-click
- Comprehensive audit trails provide accountability and traceability for every action
- Create customisable, interactive dashboards and reports for enhanced reporting
- Create court-compliant document bundles with a single-click
- Monitor real-time spending on the case with finance system integration
Pricing
£20 to £40 a licence a month
- Education pricing available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 2 7 1 6 1 4 3 8 0 1 0 0 1 4
Contact
MASTER SOFTWARE SOLUTIONS LTD
Sai Krishna Siddula
Telephone: 07944145034
Email: sai@mastersoftware.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Public cloud
- Service constraints
- There are no specific hardware configurations required for the application as it runs wholly inside a web browser. Application is available 24x7. However, maintenance and upgrades will be made outside the business hours i.e. between 8:00 PM and 6:00AM M - F or during weekends.
- System requirements
- A device with a compatible web browser with internet connection
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- All support requests will be triaged within 2 hours and assigned a severity as specified in the impact matrix.
- User can manage status and priority of support tickets
- No
- Phone support
- No
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Customer support includes troubleshooting, bug fixes, new user onboarding/training and routine upgrades to the system. A dedicated account manager will be assigned to the contract. This person will be the direct point of contact for the client and will be responsible for overall delivery for all the work in the contract.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- To support the onboarding process effectively, we have established a comprehensive framework that addresses various perspectives, including communications and engagement, project management, implementation and service support, information security and governance, training, and testing. A dedicated project manager will work with the client team to ensure smooth onboarding.
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- At the time of exit, client data will be extracted and packaged in a suitable format, ensuring easy access and usability. This export can be in various formats like CSV, Excel, JSON, or any other agreed-upon format. The export also includes all documents stored within the platform.
- End-of-contract process
- At every stage of the exit process, we will work closely with you to tailor our approach to your specific requirements, providing you with a customized and seamless experience. Exit costs are included in the contract price and will be shared at the start of contract.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The application is fully mobile compatible, but we recommend using it on a desktop for best user experience.
- Service interface
- No
- User support accessibility
- WCAG 2.1 AAA
- API
- No
- Customisation available
- Yes
- Description of customisation
- Our platform comes with a set of standard fields out-of-the-box. You can use these fields out of the box or set up custom fields and lookup values to suit your business process. All this is defined during customer onboarding.
Scaling
- Independence of resources
- Our systems are designed to scale up or down to maintain satisfactory performance levels.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Available upon request
- Reporting types
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Reports data can be exported into Excel or CSV format
- Data export formats
-
- CSV
- Other
- Other data export formats
-
- EXCEL
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
- TLS (version 1.2 or above)
Availability and resilience
- Guaranteed availability
- Our service has an SLA of 99.9% availability
- Approach to resilience
- This information is available upon request.
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Management interfaces and support channels are can be accessed by only named admin users logged in via VPN
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- No
- Security governance approach
- This information is made available upon request.
- Information security policies and processes
- This information is made available upon request.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
- All change requests are tracked through our internal change review process.
- Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
- We conduct annual pen testing on our platform to identify security vulnerabilities and take immediate action to fix the issues identified. We also run regular vulnerability scans on our services.
- Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
- We use Azure Monitoring for daily monitoring of services. Any issues found are promptly addressed and resolved.
- Incident management type
- Supplier-defined controls
- Incident management approach
- Our incident management approach is laid out in the Incident Management Policy (available upon request)
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
- Other
- Other public sector networks
-
- Contracts Finder Service
- Find a Tender Service
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Equal opportunity
- Wellbeing
Fighting climate change
Even though we are a micro-organisation, we take environment very seriously. We play a significant role in environmental sustainability by adopting Sustainable Software Engineering practices. Carbon Footprint: As a micro-organisation using 100% green energy provider for electricity, using an electric car for transport and leveraging remote working, our carbon foot print is very small. Our only scope 1 emissions are from gas used for heating the registered office. We use the carbon footprint calculator from carbontrust.com to compile our carbon footprint stats report and benchmark results.Equal opportunity
Promote Local Skills and Employment: We are promoting the return of local women into tech roles after taking a career hiatus by offering mentoring, training and hiring them into appropriate roles. Our goal for 2024 is to start an apprenticeship program to open up opportunities in tech sector for local students.Wellbeing
Supporting Growth of Responsible Regional Business Practices: Employee well-being is very important to us. We offer flexible remote working and no fixed hours. Our staff can set their own hours and work around childcare responsibilities as long as they can meet the deliverables.
Pricing
- Price
- £20 to £40 a licence a month
- Discount for educational organisations
- Yes
- Free trial available
- No