Computer Application Services Limited

Workpro HR - employee relations case management system

Workpro HR case management system tracks and processes employee relations casework. 24 configurable case types included (e.g. Disciplinary, Grievance, Health and Safety, Absence Management, Performance). Clear process steps, templates and targets ensure compliant, consistent case handling. Reporting and performance monitoring improves control and analysis. Integrates with other HR systems.


  • 24 built-in case types, configurable to match your HR policies.
  • Built-in standard reports library and flexible report creation tools.
  • Comprehensive dashboards, case and task views to track casework.
  • Quick and advanced search to access relevant cases and documents.
  • Protect sensitive cases with user permissions. Allocate cases and tasks.
  • Highly visible alerts ensure key dates and actions aren’t missed.
  • All documentation stored and created within case record. Microsoft integration.
  • Email and letter templates auto-populated with case data save time.
  • Key system elements and permissions maintainable by authorised administrators.
  • File management and GDPR compliance tools support data protection policies.


  • Manage HR casework from one secure online system
  • Ensure consistency and fairness in issue resolution and advice
  • Improve correspondence and log all case documentation
  • Track case activity with clear visibility of next steps
  • Improve productivity, reducing time taken on cases
  • Ensure case handling complies with policies and legislation
  • Maintain full accountability with a chronological audit trail
  • Monitor case status and team performance in real-time
  • Produce management reports easily from rich, accurate data
  • Spot trends and analyse root causes for improvement initiatives.


£66 a user a month

  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.


G-Cloud 12

Service ID

3 2 5 9 6 5 0 0 4 5 9 7 8 0 7


Computer Application Services Limited Ken Naismith
Telephone: 0131 449 7071

Service scope

Software add-on or extension
Cloud deployment model
  • Public cloud
  • Private cloud
Service constraints
Workpro requires Internet Explorer 10 or higher, but IE11 or Edge recommended. Also supports Mozilla Firefox and Google Chrome. For full integration when working with case documents, while MS Word 2007 or higher is supported, 2010 or above is recommended.
System requirements
  • Requires Internet Explorer 10 or higher. IE11 or Edge recommended.
  • Microsoft Word 2007 or higher (2010+ recommended) for case documents.

User support

Email or online ticketing support
Email or online ticketing
Support response times
We aim to respond as soon as possible, with standard response commitments as follows: Priority 1 within 1 hour (system non-operational and affects more than 50% users). Priority 2 within 4 hours (system non-operational and affects minority of users). Priority 3 within 4 hours (identifiable fault but system still operational, minor faults and advice). Priority 4 within 8 hours (cosmetic issues which do not affect the operation of the system). Priority 5 within 5 working days (system enhancements, new and additional features). Standard working hours are Mon-Fri 9am-5pm GMT but out of hours support is available.
User can manage status and priority of support tickets
Online ticketing support accessibility
None or don’t know
Phone support
Phone support availability
9 to 5 (UK time), Monday to Friday
Web chat support
Onsite support
Yes, at extra cost
Support levels
We operate a manned support helpdesk with backup technical resource, manned during office hours as standard (Mon-Fri 09:00 GMT to 17:00GMT, excluding Christmas and New Year period).

Our online Help portal is available 24/7/365 for self-service. Clients can securely log support requests, monitor request priorities and status, support hours used and how many remain.

Managed cloud hosting support is 24/7/365 days a year (our hosting partner iomart plc provides Service Availability Guarantee of 99.5%).

Out of hours application support is also available at extra cost.

Support is delivered by email or telephone, remote support via dedicated link or onsite as required. We aim to respond as soon as possible, with support response commitments agreed in the client Support Level Agreement.

Support costs £110 for one hour slot, discounted bundles available. Onsite visits charged at day rate: £900 plus expenses.

The support response is coordinated by the our Business Relationship Manager.
Support available to third parties

Onboarding and offboarding

Getting started
As standard, the Workpro Implementation Team will set up a client instance of Workpro on the Workpro Private or Public Cloud and will ensure client specific security settings are in place. Additional modules, customisation, support, integration and migration services can be purchased with Workpro. Workpro Cloud Support Services are available in G Cloud Lot 3.
While Workpro is designed to be intuitive and easy to use, we recommend training on the system to ensure that your organisation can use it to best advantage. Training is available for users, Train the Trainer, System Administrators and Report Writers. This can be onsite, or web based. A Workpro User Guide is supplied with the system and is accessible by a help link on screen.
Service documentation
Documentation formats
End-of-contract data extraction
We would provide client data in the form of a spreadsheet when the contract ends. We would also transfer any stored documents to a client drive.
End-of-contract process
1 month's notice is required, during which time service deprovisioning will be done.
Data and document extraction would be included in the price of the contract.

Using the service

Web browser interface
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
Application to install
Designed for use on mobile devices
Differences between the mobile and desktop service
Workpro has a responsive design so it can be accessed from any mobile device.
Service interface
Description of service interface
Workpro is a responsive web application, and is therefore accessible from any web-enabled device.
Accessibility standards
WCAG 2.1 A
Accessibility testing
We have some customers with partially sighted users who use screen reader software to access Workpro.
What users can and can't do using the API
The Workpro API interface is designed for access by a client website and provides functionality to support the creation of Workpro cases. Additionally, it allows users to upload one or more supporting pieces of documentation and associate them with a case. Workpro web services are typically hosted in one of two configurations: Within a separate application hosted inside a Workpro application or as a completely separate web site hosted in IIS.
Access to the services is normally limited by a firewall to specific source networks or addresses, to prevent unauthorised use. Other security mechanisms can be added depending on requirements. It is implemented as a set of WCF services configured to communicate using the WS-I Basic Profile1. This specification uses WSDL to define services and a version of SOAP for communication. To access and consume the services you should be able to use any programming language or tool which supports access to web services using SOAP.
API documentation
API documentation formats
API sandbox or test environment
Customisation available
Description of customisation
Administration tools allow many aspects of the solution to be maintained by authorised users with the required access level and appropriate training. Authorised users can make changes for example to look-up lists, data categories, fields, document templates, targets, thresholds and alerts, user permissions and some file management and data retention activities.
The Workpro team are also available to support customisation should clients require or prefer it . We also provide integration (e.g. with your HR/Payroll system) and data migration services as required. See Workpro Cloud Support services in Lot 3.


Independence of resources
Each application has a separate application pool / database so that resource allocation can be profiled and allocated according to expected usage. Overall performance of the system is monitored by checking response times and resource usage. Where necessary, additional resources can be allocated.


Service usage metrics
Metrics types
Support service metrics can be viewed on the Workpro online support portal. • Colour coded Issue List shows priority and status • Billing dashboard shows contracted hours used and how many remain • Reporting dashboard shows e.g. issues raised, closed or currently open. If the Usage Based Licencing model is chosen, monthly user login reports determine how many users have logged in that month. An invoice will be produced based on that number. A user will be defined as a named individual and usage will be defined as the initial login for that named individual in a calendar month.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request


Supplier type
Not a reseller

Staff security

Staff security clearance
Conforms to BS7858:2012
Government security clearance
Up to Security Clearance (SC)

Asset protection

Knowledge of data storage and processing locations
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
Physical access control, complying with another standard
Data sanitisation process
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
Data can be exported from reports to other applications and formats, e.g. Excel, Word, PDF.
Data export formats
  • CSV
  • Other
Other data export formats
  • Excel
  • HTML
  • PDF
Data import formats
  • CSV
  • Other
Other data import formats
  • PDF
  • HTML
  • Excel

Data-in-transit protection

Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway

Availability and resilience

Guaranteed availability
We guarantee service availability of 99.9% within a calendar month and offer a refund of licence fees for periods where the service isn't available.
Approach to resilience
Available on request.
Outage reporting
Email alerts are sent to our support team if the service isn't available.

Identity and authentication

User authentication needed
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels
Administrator accounts are not granted permissions to access case data within the system. Access to servers is via named accounts and is monitored.
Access restriction testing frequency
Less than once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
  • Dedicated link (for example VPN)
  • Username or password

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Who accredited the ISO/IEC 27001
BM TRADA Certification Ltd.
ISO/IEC 27001 accreditation date
What the ISO/IEC 27001 doesn’t cover
The CAS ISO27001 certification scope covers the service provided directly by the organisation, i.e. the software processing and storage environment, and development and administrative systems in place to support this. The provision of hardware and network services is the responsibility of our service partners, Iomart, who have their own ISO 27001 certification.
ISO 28000:2007 certification
CSA STAR certification
PCI certification
Other security certifications
Any other security certifications
Cyber Essentials

Security governance

Named board-level person responsible for service security
Security governance certified
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
Cyber Essentials
Information security policies and processes
As an ISO 27001 certified organisation, CAS has a fully documented ISMS (Information Security Management System) which includes the following policies: CAS Information Security Standard, CAS Information Backup Procedure, CAS Logical Access Security Standard, CAS Risk Assessment and Treatment Procedure, CAS Physical Security Guidelines, CAS Site Security Instructions, CAS Data Protection Procedure, CAS HR Security Guidelines. Copies of policies are available on request. The CAS Chief Executive Officer is responsible for overseeing the high level co-ordination of Information Security Management within CAS. CAS has an Information Security Forum who meet regularly and are responsible for ensuring policies are followed, consisting of:
• CAS Chief Technical Officer
• CAS Information Security Manager
• CAS Business Relationship Manager
• CAS Quality Manager.

Operational security

Configuration and change management standard
Supplier-defined controls
Configuration and change management approach
Our change management process is included within the scope of our ISO9001 accreditation.
At the start of a customer project a baseline specification is created. Changes to this are managed via a formal change control process with customers required to approve any changes to this specification.
Core product changes are managed using an agile process. A specification for the core product is checked in to our source control system which describes the version at that revision.
Configuration changes are managed in the same way and deployed using an automated build for removing variability from deployments.
Vulnerability management type
Supplier-defined controls
Vulnerability management approach
CAS assign information processing assets to individual owners within the organisation, who are responsible for assessing risks and mitigation steps applicable to these assets. The Workpro application can be patched with very little notice: there is no specific timetable for such updates as the priority depends on the nature of any vulnerability. Regarding information on potential threats, Workpro is subject to constant review during development and installation. Additionally external penetration tests have been arranged and can be repeated if required.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
The Workpro environment is subject to constant ongoing monitoring by an industry standard tool which can report failures or other incidents to responsible staff. These monitors are run from a range of systems, including externally hosted servers. Any incident is subject to review, discussion and escalation with an experienced team in place to identify and address issues. Since reporting is real time, the response to any incident can be immediate.
Incident management type
Supplier-defined controls
Incident management approach
CAS has a documented incident reporting process that includes action steps to handle critical incidents, up to and including large scale business continuity issues. CAS maintains a robust reporting system, accepting inputs from internal and external sources. Incidents are recorded in a formal database and are treated according to priority and impact. Failures that impact on user access or data can result in a formal report including details of actions taken, and any steps proposed to prevent or mitigate further incidents.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks


£66 a user a month
Discount for educational organisations
Free trial available
Description of free trial
Clients are given a login to a trial version. Report Builder is not included with this version. Access is usually for one month, but is negotiable.

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at Tell them what format you need. It will help if you say what assistive technology you use.