6 Examples of Customisation in Safelink

16 April 2020 James Logue

Safelink has a range of advanced features which let us highly customise and adapt your Safelink platform to accelerate your business processes and workflows. 

Every Safelink portal starts off with the following core features enabled. As well as having your own branding, each portal/workspace can be branded separately to meet your or your clients’ needs.

Core features of Safelink as an out of the box secure communication and transfer portal are:

  • document sharing
  • secure large file transfer
  • secure mail
  • electronic signatures
  • activity reports


Safelink's new Solutions Desk opens up a whole new world of digital innovation to your Safelink platform, allowing advanced customisations and built in workflows. Customisation requests can be made via the Solutions Desk (solutions@safelinkhub.com), where we give you a quotation for the project. 

Our developers then enable customised workspaces, configured to your and your clients’ specific requirements.  This is a quick and painless process where we do the work and leave you to get on with impressing your clients with customised access and efficient service delivery.  From basic workflows, to stylish microsites and knowledge portals we can turn your vision of digital service delivery into something tangible and secure quickly and cost-effectively.

Here are some examples of basic workflows (across internal and external parties) that we have built for customers using Safelink's advanced features.


1) Invoice management and payment approval

Who it applies to: Trust & corporate service providers

The problem: Handling a high volume of invoices on behalf of a managed entity

Invite authorised parties to log in and upload invoices for payment by an entity under management.  The system determines what approvals are necessary and reaches out to the approvers, then forwards the invoices on to the accounts team for payment.  The submitter can log in to see progress and will be notified when invoices are paid.


2) Secure payment requests

Who it applies to: Trust & corporate service providers

The problem: Preventing payment fraud ("phishing")

Invite customers and/or suppliers to request payments through a simple workflow within the encrypted environment.  External party logs in (using 2FA) and is presented with a “request payment” option which takes them to a form for details of the payment required. Once the request is submitted, the system notifies the relevant party or can prompt an action or workflow in the internal systems of the provider and provide notifications to interested parties. Approvals and/or electronic signatures can be built into the process.


3) Arrange approval of financial payments

Who it applies to: Financial Services Businesses

The problem: Disparate users completing parts of a set process involving confidential information

Invite client / administrator to provide core documents for financial statements file.  Accountant reviews core documents and prepares financial statements before uploading them to the system.  The system notifies the directors of the company that the financial statements are ready for review.  The directors review and raise any queries to the accountants through the system or confirm approval. Accountant prompts digital signature process on final version which the system automates through notification to directors and secretary and storage of signed copy with all supporting papers stored in the same area for future reference or audit purposes.


4) Business continuity site

Who it applies to: All businesses

The problem: Where to keep the information and documents that you need to keep your business operating when people are no longer able to access your premises

Keep business-critical documents and record contact details, registers and schedules in one secure, online site which can facilitate convenient access for your disaster recovery team in the event of the invocation of your business continuity plan.


5) Client onboarding

Who it applies to: Law & Financial Services Firms

The problem: On-boarding new clients in compliance with AML/KYC and other regulations

Allow your team to initiate an onboarding process, in which the system reaches out to the external client (if desired) to enable self-entry of information and upload of required documents.  The onboarding workflow can include automated KYC checks and conflict checks, making contact with relevant people or external systems as needed. The process can be customised to match your existing process


6) Group Litigation User Registration & Management

Who it applies to: Law firms organising group litigation actions

The problem: Registration and management of claimants, and ongoing communications

Allow claimants to register online, including agreement of terms, client onboarding including automated address checks, and the completion of claim-specific forms.  After registration, claimants can access a portal to update their details and access case materials.  Claim managers can search and report on claimants, send emailed communications.  The system can be configured to reach out to claimants to obtain additional information if necessary.

What else is possible? The sky's the limit! Safelink's toolset is extensive and grows by the day. The nature of customisations is limited only by your imagination.

Try us! Get in touch with solutions@safelinkhub.com to enquire about customisations to your Safelink platform. 

Your digital acceleration starts here.


Go back to blog home


James Logue - Profile Picture

James Logue

Understanding the data security challenge When Safelink launched in 2010, our first customers were offshore wealth management firms....
Read More - How we built a system that houses some of the world's most sensitive data
Safelink andVaiiehave joined forces to give free secure online portals to Jersey and Guernsey organisations to help them work...
Read More - Working securely, whilst working remotely
On Monday, the US Federal Trade Commission (FTC) agreed a settlement of up to $700m for a class action brought against Equifax. This...
Read More - Learning points from the "entirely preventable" Equifax data breach