Data rooms enable companies to share con­fid­en­tial documents with others. Data rooms tend to be used for mergers, sales or other business trans­ac­tions. There are digital data rooms as well as location-based ones.

What’s a data room?

Data rooms ori­gin­ated alongside the process of due diligence. Due diligence is the careful ex­am­in­a­tion of documents related to the sale of a property, a company or its shares as well as prior to an initial public offering (IPO). Both parties, the seller and the buyer, examine all available data and in­form­a­tion to identify and, if possible, eliminate risks and problems before the purchase takes place. They do this in a what’s known as a data room.

Ori­gin­ally data rooms were physical rooms in which the two parties, and oc­ca­sion­ally external parties such as tax and business con­sult­ants or auditors, would carefully review all existing documents without re­stric­tions or external dis­trac­tions. However, digital data rooms now perform a similar function and are able to ac­com­mod­ate glob­al­isa­tion and the changing demands of the business world. The goal of any digital data room is to provide both parties with fair and un­res­tric­ted access to all important documents while also pro­tect­ing the stored data from un­au­thor­ised access.

What types of data rooms are there?

Data rooms can be divided into two groups. Although there are some overlaps and special cases, the common names for data rooms are as follows:

Location-bound data rooms

Ori­gin­ally data rooms were physical rooms that all au­thor­ised parties had access to. This type of data room is still in use today. In location-bound data rooms, users benefit from personal contact with one another, and the risk of hacking or other cy­ber­at­tacks is lower. Data rooms are often set up in a neutral location to ensure maximum trans­par­ency. Law firms, for example, tend to have them. All relevant documents are then kept in this data room for the duration of the due diligence process and closely reviewed by the au­thor­ised persons. The parties agree on the exact rules in advance.

Digital data rooms

However, the practice of location-based data rooms isn’t always ad­vant­age­ous. For parties operating at great distances, the use of a physical data room may cause delays. For this reason, many companies now rely on virtual data rooms.

Security is paramount in digital data rooms. The cloud solution used must be able to ensure that only au­thor­ised persons have access to the in­form­a­tion, which is often very sensitive. Un­au­thor­ised du­plic­a­tion or dis­clos­ure of documents and un­au­thor­ised access are not permitted in digital data rooms. A strong security ar­chi­tec­ture, suitable en­cryp­tion pro­ced­ures, strict access rights and strong passwords ensure that virtual data rooms are as secure and reliable as their physical coun­ter­parts. Des­ig­nated ad­min­is­trat­ors are assigned rights and maintain an overview of all activ­it­ies taking place within the data room.

What are green and red data rooms?

Digital and physical data rooms are further sub­divided by usage and different au­thor­isa­tions. This is referred to as a green or red data room.

Green data rooms

Green data rooms are ac­cess­ible at all times to all persons involved in a potential trans­ac­tion. Re­spect­ive parties will usually sign a con­fid­en­ti­al­ity agreement and are then in­tro­duced to the pro­ced­ures, ob­lig­a­tions and re­stric­tions of the data room. They can then access all documents. In the case of a physical data room, they’re given un­res­tric­ted access. In a digital room, they’re provided with all relevant access au­thor­isa­tions and passwords. Depending on the rules that have been es­tab­lished, the access and duration of in­di­vidu­al par­ti­cipants may be recorded in an at­tend­ance log.

Red data rooms

Red data rooms are different. Here, only select people are allowed to enter. Access is severely limited and is often granted almost ex­clus­ively to persons who are already pro­fes­sion­ally bound to secrecy. This applies, for example, to lawyers, auditors and tax con­sult­ants.

It’s possible for a red data room to be launched during the last stages of a trans­ac­tion. Access is then granted only to select employees involved in the final steps of the deal. This ensures the details of a trans­ac­tion remain con­fid­en­tial.

Pre­par­a­tion for data rooms

Some pre­par­a­tion must be un­der­taken before a data room can be opened. All parties must determine and confirm the rules, content and users of the data room(s). This procedure is important for both virtual and physical data rooms. It ensures a smooth and, above all, legally compliant process. The following pre­cau­tions are par­tic­u­larly important to take before using a data room:

Rules of a data room

When agreeing to use a data room, valid rules should be es­tab­lished that all parties agree to adhere to at all times. This sim­pli­fies processes and ensures they’re fair for all users. Once signed, the rules are binding. It’s no longer possible to change them af­ter­wards.

Common rules for data rooms include, for example, es­tab­lish­ing an at­tend­ance list or banning copies and photos. Note-taking may be permitted. Generally, documents are not to be added to or removed from data rooms. In the case of location-based data rooms, a neutral su­per­visor ensures that the rules are observed.

Content of data rooms

The content of a data room is de­term­ined in advance. Often, audited and certified annual financial state­ments, articles of as­so­ci­ation or an up-to-date overview of staff are part of this content. An in­ter­ested party can gain a com­pre­hens­ive overview of a business by viewing this data. Nev­er­the­less, certain business secrets must be preserved to avoid risking com­pet­it­ive dis­ad­vant­ages if a sale doesn’t ma­ter­i­al­ise. For example, sales returns usually aren’t part of the documents in data rooms. The parties and their rep­res­ent­at­ives discuss the scope of the in­form­a­tion prior to setting up the room.

Au­thor­ised persons

Who is granted access to a data room must be defined and recorded in advance. This usually applies not only to the companies involved, but also to external con­sult­ants and experts. All parties involved are listed prior to con­duct­ing due diligence. They fa­mil­i­ar­ise them­selves with the rules and must sign a com­pli­ance document. A con­fid­en­ti­al­ity agreement is part of the procedure.

What are the ad­vant­ages of data rooms?

Physical and virtual data rooms have several ad­vant­ages for business trans­ac­tions. Data rooms ensure that all parties involved agree to binding rules and work with the same struc­tured data sets. Rule vi­ol­a­tions are rare because of the neutral en­vir­on­ment and the presence of an in­de­pend­ent authority con­trolling the process. At­tend­ance registers make it possible to re­con­struct in­di­vidu­al steps and ensure efficient working.

Digital data rooms offer great flex­ib­il­ity and in­de­pend­ence. Different teams can review documents sim­ul­tan­eously or in­de­pend­ently and free from spatial re­stric­tions. Data can be prepared and shared in an optimally struc­tured manner. The challenge here is keeping data stored in the cloud secure, thus pre­vent­ing un­au­thor­ised persons from gaining access to sensitive in­form­a­tion.

Tip

Looking for a secure and flexible found­a­tion for your data rooms? Buy a cloud server from IONOS and benefit from high avail­ab­il­ity, scalab­il­ity and ISO-certified security.

When are data rooms used?

There are plenty of different scenarios where digital and physical data rooms are practical. In merger and ac­quis­i­tions (M&A), the data room continues to be a valued and proven practice. IPOs, in­solv­ency pro­ceed­ings or re­struc­tur­ing of companies can also be optimally prepared in data rooms. In addition, data rooms are used for investor reporting, real estate trans­ac­tions or before a company is com­mis­sioned. This model is a good choice when sensitive data is to be made available to a specific group of people while also main­tain­ing the highest security standards possible.

Go to Main Menu