Security Policy - Overview

WorkSmart provides a Web-based workplace, consisting of an integrated suite of simple and easy-to-use applications. We understand that security and reliability are critical factors for our customers - that's why they are our top priority and our approach to them is comprehensive.

The security section of our website details the hardware, software and processes we use that drive the application and data security for the hosted solution.

Secure Data Centers

The service is hosted in dedicated spaces at top-tier SAS 70 certified data centers, which provide the physical environment necessary to keep our service continually up and running 24-7.

These facilities are custom-designed with redundant HVAC temperature control systems, multiple uninterruptible power supplies - with lightning protection and back-up generators, as well as multiple connections to the Internet. They offer the widest range of physical security measures, including state-of-the-art fire suppression and water detection systems, motion sensors, as well as 24 hour security guards, proximity reader access, CCTV camera surveillance and security breach alarms.

Application Security

The application incorporates multiple security levels which adhere to globally accepted standards:

User Authentication

Every user is provided with a unique, confidential username and password to access their system protected by 128-bit SSL encryption.

Secure Data Access uses secure directory access protocol, which maps users to their registered information held on the system and only then allows them to access their data. also provides customisable role-based security and item-level access controls ensuring that only the right people get access to the right information.

SSL Data Encryption

Your data is always encrypted during transit and sent using HTTPS. All your files and backups are stored encrypted using GPG.

Data Storage, Backup and Disaster Recovery

All customer data is stored on fully redundant servers, which insulates us from any hardware failure.

All customer data is backed up at Primary Data centre using Continuous Data Protection (CDP) and copied to a secondary data centre on a nightly basis. Hence, we always have an off-site backup copy – in case of any emergency situation.

In an event of a catastrophic hardware failure, natural disaster or other event that renders the primary hosting facility inoperable, DesignLinks has set up procedures to bring the system back online at the secondary data centre with minimal time/data loss. We regularly test to check our disaster recovery procedures and the integrity of the customer data.

Network Security & Availability

At DesignLinks, our goal is 100% up-time for Service. WorkSmartnet. utilizes a number of safeguards to maximize network security and availability.


DesignLinks uses multiple fault-tolerant firewalls. Each firewall employs both static and dynamic access-lists, configured to permit only necessary traffic. Abusive or malicious traffic is dynamically denied per dynamic access lists on the firewalls.

Security Patches and Critical Updates

All servers are audited regularly for security patch and critical update levels. Patches and updates are first deployed to a test environment to assure compatibility, then to the live environment.

Multiple Tier-1 ISPs

DesignLinks uses three Tier-1 Internet Service Providers (ISPs) with BGP4 protocol, which offers high level of redundancy, so if one line should fail the other automatically takes over without the customer ever knowing there was a problem. BGP4 also improves the speed of connection to our servers for the end user, as it can calculate the best and fastest route to its destination and take that specific route.

Security Monitoring

Our Information Security department monitors notification from various sources and alerts from internal systems to identify and manage threats.