Legal Case Management Software
Full Management of legal matters.
Case Management, triage of work and workflows.
Legal team CRM.
A legal client service page comprising intake forms and template provision.
Document Management and Repositories.
Law Firm Panel Management.
Features
- Legal intake and triage
- Document management
- case management
- matter management
- No-Code Workflows
- Law Firm Panel Management and work allocation
- Law Firm RFPs, Dynamic Purchasing System; Tender management.
- KPIs and analytics
- Contract Lifecycle Management
- Data export and migration
Benefits
- Streamline the intake of legal and compliance work
- Triage work internally or with external service providers
- Full visibility of work within the team and externally
- Monitor speed of work with KPIs and find bottlenecks
- Reduce external legal spend by comparing law firm quotes
- Monitor work with law firms to improve efficiency
- A single source of truth of contracts, policies and know-how
- Collaborate on matters effectively
- Client self-service and automated client updates of work progress
- Reduce reliance on legal team by enabling clients
Pricing
£69 a user a month
- Education pricing available
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
4 8 0 2 9 1 5 0 6 1 1 0 5 8 0
Contact
Tabled
Paul Massey
Telephone: 07517179098
Email: paul@tabled.io
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Service constraints
- N/a
- System requirements
- Service is accessible via most browsers.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Response within 1 hour during business hours with additional support available.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- Each client has a dedicated client support contact and also has access to technical support as required.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
-
Onside and online training.
User documentation.
Configuration of platform and analysis of workflows.
Helpdesk. - Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Data is extracted via CSV by users and documents in the system can be exported manually or with technical support via secure means.
- End-of-contract process
- All offboarding is included in the cost apart from transfer of data to another system which may require a small fee.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- The interface is fully optimised for both web and mobile interfaces.
- Service interface
- Yes
- User support accessibility
- WCAG 2.1 A
- Description of service interface
- Simple design and interaction for ease of use across platforms.
- Accessibility standards
- WCAG 2.1 A
- Accessibility testing
- Internal Testing to ensure accessibility.
- API
- Yes
- What users can and can't do using the API
-
Integrate a mobile applications to enable external users to interact with the workspace.
Email integrations and other services such as document management integrations. - API documentation
- No
- API sandbox or test environment
- No
- Customisation available
- Yes
- Description of customisation
-
The service is fully customisable on a no-code basis.
Intake forms and workflows can be fully customised to capture required data and workflows.
Scaling
- Independence of resources
- Tabled has a scalable AWS infrastructure with a virtualised infrastructure that scales to the demand required and means user volume does not impact other users.
Analytics
- Service usage metrics
- Yes
- Metrics types
-
KPIs configured by users to determine workflow status changes for different worktypes.
Analytics dashboard provides user numbers, work volume and type, user activity.
Custom metrics can be provided. - Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Conforms to BS7858:2019
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Encryption of all physical media
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- A third-party destruction service
Data importing and exporting
- Data export approach
- Via CSV from a dashboard. Documents can also be easily downloaded.
- Data export formats
- CSV
- Data import formats
-
- CSV
- ODF
- Other
- Other data import formats
-
- Doc
- Docx
- Jpeg
- Png
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
The Platform shall have 99.9% uptime, excluding any scheduled downtime required for updates to the platform outside of normal business hours (8am-6pm Monday to Friday)
Uptime is measured over each calendar month.
If uptime drops below the relevant threshold, a penalty will be applied in the form of a credit for the Client. This means the following month’s fee payable by the Client will be reduced on a sliding scale as follows:
2% fee reduction for every 1% below the uptime SLA.
The level of penalty will be calculated depending on the number of hours for which the service was unavailable, minus the downtime permitted by the SLA:
Uptime penalties in any month are capped at 50% of the total monthly fee - Approach to resilience
- Available on request.
- Outage reporting
- Email alerts
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- Identity federation with existing provider (for example Google Apps)
- Username or password
- Access restrictions in management interfaces and support channels
- Onoly permissioned administrative users have access to management interfaces via secure login.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- CyberEssentials Certification
- Information security policies and processes
-
Tabled has comprehensive Information and Data Security; Data Retention, Security Incident Response, Business Continuity and Privacy Polices and Processes.
These policies and processes and the responsibility of Senior Management and Line Managers.
Policies are reviewed and tested at least annually, with staff training and awareness requirements. There are full client reporting requirements to ensure that any incidents are dealt with in an efficient and transparent manner.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
All technical assets are tracked and monitored from inception and throughout their lifecycle, with a central asset register keeping details, location, any risks (linked to risk register monitoring) and updates.
Our software asset management program includes maintaining a register of software licences, patches and includes regular checks to ensure security.
A user account monitoring programme and register is in place to ensure all software is properly licensed and no vulnerabilities are introduced through software not allowed under policy.
Our IT helpdesk ensures all asset issues and change requests are tracked and monitored to ensure proper use. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
We perform vulnerability assessment of our entire technology estate on a monthly basis and use an automated vulnerability assessment system in AWS that is constantly monitoring vulnerabilities.
Patches are deployed within 24 hours of becoming aware of a high priority security vulnerability and within 48 hours of medium or low security risks. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
We use a combination of periodic (at least annual) external penetration testing and regular internally conducted OWASP ZAP penetration testing.
Logs of activity are also kept to ensure security and for monitoring of access to services.
If vulnerabilities are found, critical issues are dealt with as soon as becoming aware with a view to resolution within 24 hours. Medium and law level risks are dealt with within 48 hours of becoming aware. - Incident management type
- Supplier-defined controls
- Incident management approach
-
The Tabled Incident Management Policy includes comprehensive processes and responsibilities for dealing with incidents in a timely manner. Incident planning and testing is conducted regularly.
Alongside our own monitoring, users can report incidents to account managers via phone or email and these are escalated to responsible management on a priority basis for resolution in line with and exceeding service levels set out in customer contracts.
regular reports of resolution are provided to customers with a final incident report provided on completion. Monitoring is then put in place to ensure incident is resolved and does not re-occur.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Fighting climate change
-
Fighting climate change
Tabled contributes to carbon offset through Ecologi. - Tackling economic inequality
-
Tackling economic inequality
Tabled is used by pro bono legal groups for managing legal work for those who cannot afford legal advice and who may not qualify for legal aid. - Equal opportunity
-
Equal opportunity
Tabled is an equal opportunity employer with a diverse workforce and values. - Wellbeing
-
Wellbeing
The wellbeing of our staff and clients is one of our values.
Pricing
- Price
- £69 a user a month
- Discount for educational organisations
- Yes
- Free trial available
- Yes
- Description of free trial
- Up to 1 month free trial with support through trial.
- Link to free trial
- https://tabled.io/new-account/join