How reporting with Elker works
However your organisation has asked you to speak up, this is how our platform keeps your report secure and your information private.
How the platform protects you
Anonymity by design
You can report without giving your name, email, or phone. Your case is identified by a unique reference, and the tracking your device normally sends is removed before anything reaches your reviewer.
Encrypted at every step
Every report, message, and file is locked with strong, industry-standard encryption while it travels to Elker and while it’s stored. Anyone watching the connection sees scrambled data, not what you wrote.
Role-based access
Only the reviewers your organisation has nominated can open a case. Managers, IT, and general staff have no access. Every view, edit, and download is logged so nothing happens off the record.
Separate from employer systems
Elker runs on independent infrastructure. Your report never passes through your employer’s email, file shares, or staff IT systems.
Your organisation’s own space
Your organisation’s data is held in a dedicated space, separate from every other Elker client. No other organisation can see your reports, and your reports are never mixed with anyone else’s.
Stored on trusted cloud infrastructure
Your data is held on Amazon’s secure cloud and stays encrypted while it’s stored. Both Amazon and Elker are reviewed by independent security auditors every year.
Strictly limited Elker staff access
Elker employees can’t read your reports in normal operations. Only the reviewers your organisation has nominated can open a submitted report, and every access is logged.
Independently audited
Elker holds ISO 27001 and SOC 2, independent security certifications that mean our controls, processes, and infrastructure are checked every year by outside auditors.
Retention and deletion
Your organisation sets how long closed cases are kept. When data is deleted, it is removed from our systems and any backup copies expire on a fixed timetable.
What happens, step by step
- 01
Open your organisation’s page
You arrive at a secure page hosted by Elker on your organisation’s behalf. No account, no sign-in required to start.
- 02
Read what’s available
Your organisation’s Elker start page explains what you can report through the Elker channel, who sees and reviews reports, and what happens next.
- 03
Answer a few questions
A short form asks for the details your organisation needs to look into what happened. You decide how much to share and whether to include your name.
- 04
Submit your report
Your report is encrypted and delivered to a small, named group of reviewers. You receive a unique case reference at this point.
- 05
Return to your dashboard
Sign back in with whatever option you set up: email, phone number, username and password, the Elker app, or a one-time login key. Read updates, answer questions from the reviewer, or add more information, without revealing your identity.
What we don't do
- We don’t share your report with your employer beyond the information you submit and the messages you choose to send.
- We don’t use your report content to train or fine-tune AI models. Your words are never added to any training dataset, by Elker or anyone else.
- We don’t sell, rent, or share report data with advertisers, data brokers, or any third party for marketing or research.
- We don’t keep a record of your computer’s internet address (your IP) beyond the moment your browser first connects to us. It never appears next to anything you write.
- We don’t keep deleted cases on our systems once your organisation’s retention period ends, and any backup copies expire on the same timetable.
- We don’t require your name, email, or phone number to submit a report. Sharing those details is your choice.
Answers to what reporters ask
If this is an emergency or involves imminent harm, contact your local emergency services first. Elker is not an emergency reporting channel.