ELMhub

ENGAGE:

employees, contractors; remote or in-office

CONNECT:

workflow, applications, third party services

SHARE:

policies, user guides, knowledge & insights

Advocacy phase in the ELMhub lifecycle
Pre-onboarding through ELMhub processes
Engagement supported by ELMhub tools
Ongoing development within the ELMhub platform
Retention strategies managed via ELMhub
Exit stage tracked through ELMhub workflows

Introducing ELMhub from SSLPost

Simple, effective employee engagement and management

Pre and Onboarding
Pre and Onboarding
Offer
Contract
Document approvals
Policies & compliance
Induction & initial training
Guides & instructions
Exit
Exit and Advocacy
Advocacy
Acknowledgements
Final arrangements
P45
Advocacy

Start your ELM journey

Getting started is so easy!

Employer begins the ELMhub communication process
Produce documents for secure delivery through ELMhub
Step forward in the document flow process
Upload documents to the ELMhub system
Continue to recipient invitation phase
Automated invitation sent from ELMhub to recipient
Proceed to recipient registration
Employee receives access via ELMhub
Register to securely access documents on ELMhub
Next step in the workflow
Notification received when document is ready
Final arrow to secure document access
Log in to view and manage documents through ELMhub

ELMhub

Securely upload confidential, time critical, personalised or non-personalised documents to single or multiple recipients – 100% delivery assured.

Create secure libraries and repositories for operations, contracts, employee handbooks & policies, planning & development, pensions, legal & human resources, training & personal development, to name just a few

Add SSLPost esign for those documents requiring agreement or approval.

Watch the ELMhub introduction video here!

ELM hub
Payslips
Encrypted-mail
Contracts
Hr-documents
Benefits
Pension
Esign
Policies
Guides

Managing your solutions via our comprehensive administrator dashboard

  • The ELMhub, users, messages and documents are controlled and managed through the in-built administrator dashboard.
Security by design
When it comes to data security, there are no half measures

Security and privacy by design

Contact Us