For a quick overview of how this works, have a look at the demo video below.
The whole reason why we built this website is to enable you to come forward to report incidents that you would feel uncomfortable reporting face-to-face. We know that the only way you're going to do this is if you feel completely safe. So our whole solution is built around you and making sure that you have complete peace of mind. That's our number one priority, and always will be.
You might think that because we're paid by your company, that's where our loyalty lies. It's not true - in fact, our loyalty lies with you (the employee) since we know that without you we wouldn't have a business. In our Terms and Conditions which the company signed, we specifically told them that we won't reveal any information that we know (and you'll find out below that we actually know very little). If the company is not prepared to accept that, then we won't work with them. Simple as that.
When you make a submission through this tool, we ask only one piece of information about you - your email. That's it. And you don't have to use your work email either. You can use a personal email, if you prefer. And if you really want to be safe, you can generate a new email with one of the mail providers like gmail or yahoo to make you completely untraceable. If you choose to go this route, then make sure that you check this email account on a fairly regular basis to see if there has been any responses to your submission.
That's right, we don't record your IP address. So you can use your work computer to make a submission if you want. If you prefer, you can use a personal computer at home. And if you are really worried, then you can use a third party computer at an internet cafe or somewhere else.
In addition, the system uses Secure Socket Layer (SSL) which is a cryptographic protocol designed to provide communication security over the internet. SSL technology makes use of X.509 certificates which are asymmetric and assure you that the exchange is secure.
Apart from SSL, which you can verify in the address bar via the lock icon and https prefix in the URL, the system also makes use of Triple DES or 3DES to encrypt fields within the database. 3DES makes use of a 128bit key size and applies the Data Encryption Standard (DES) cipher algorithm three times to each 64bit data block.
The use of these two technologies makes it all but impossible for someone to eavesdrop on the connection or to gain any useful information from the database should it ever be acquired.
If your submission leads to money being recovered from the guilty party or action being taken (eg. disciplinary action against the guilty party, criminal prosecution, etc.), then you may be eligible to receive an attractive reward.
Guilty employee/s are subject to disciplinary action
Guilty employee/s are subject to criminal prosecution
Further losses in the reported area are prevented as a result of the employee's report
Monies lost due to fraud are recovered as a result of the employee's report
10% of the annual losses prevented,
subject to a maximum of R5,000
10% of the total monies recovered,
subject to a maximum of R10,000
Please be as detailed and specific as possible when describing what has taken place. Remember to include who, what, when, where, how and the amount involved. For example, you should mention exact dates where possible, as well as the full names or other identifying information of employees or third parties involved.
If possible, you should provide additional material to support your submission. This can be in the form of documents, invoices, pictures, videos or any other suitable files that are relevant to your submission. You can upload these files directly to our system during the submission process.
You should describe the impact that the activity is having on the company. This could relate to the amount of money involved, the risk that the company faces as a result of the fraud, or the impact it is having on affected employees.
This facility is being provided to give you a safe and effective way to anonymously report these activities that you have witnessed. Please respect the process, and be truthful and honest in your submission and subsequent interactions on the system.
If you've chosen to report via the anonymous route, in your conversations with the authority figure/s at your company, make sure not to reveal information that could identify you. For example, you shouldn't write "I was speaking to Ntombi in the office next to me...' or 'My wife Sally who works in HR, discovered ...'. because both these scenarios make it easier to identify you. Be specific and honest, but make sure not to enter personal, self-identifying information.