How WEVS Works

Online Nominations Portal

  • Students can submit their nominations together with their seconders details.
  • The System then sends emails to each seconder to verify the secondment and this is
    recorded with time stamps and unique key to authenticate the secondment is valid.
  • The nominations portal generates reports of each nominated candidate displaying the
    number of verified secondments.

Voting Administration Portal – Admin Section

  • Creation of Elections and addition of Candidates with Photos and Portfolios
  • Voters Roll Uploads
  • Messaging Options for Email / SMS
  • OTP Delivery Automation
  • On-the-fly Results Generation

Voters Experience

  • Data-less access to system
  • No APP installation is required and can be accessed from most smartphones, tablets browser or computer browser. Only a single 10-character alphanumeric OTP is required to vote.
  • The system has been Zero-Rated by South African MNO’s so it still can be accessed by phones that have no airtime.

Step 1 : Election Set-up

Customise your election setup by including your logo, colour themes and photos.

Step 2 : Add Voters

You control who is eligible to vote in your elections. Add voters one-by-one, or import them from an EXCEL spreadsheet. No user name or passwords required for each voter, just email addresses.

Step 3 : Voting

Voter will receive an email with a unique OTP and HTML link to your voting page. Voter enters OTP and starts the voting process.

Step 3 : Monitor Results

Watch the results of your election in real-time. At the end of the election you have the option to publish and share the results with your voters.

System Features

Authentication Methods** you need to fill in

Customised voting website

  • You will be provided with your own HTTPS voting website, example – https://myvoting.elections.com
  • You can customise your website with your own logo and colours, in easy to do steps, creating a professional voting experience.

Easy to manage

  • Our user friendly developed system allows you to easily create your own voting website, with no prior computer skills needed.
  • Voters email address can entered one at a time or bulk emails can be easily exported from Excel spreadsheets or CSV files.

Efficient & Robust / Certified Results

  • Ballot Counting is done and only accessible immediately after the elections window is complete and takes under a minute to generate results.
  • Number of total votes can be cross referenced with physical voter-roll.

Versatile / Multiple Overlapping elections capability

  • Elections can be run independently of each other, or even simultaneously. Anyone qualified to vote in multiple ballots, will be allowed to vote in each one.
  • Unlimited Number of Elections can be added onto the system.
  • Unlimited Number of Portfolios per Election
  • Unlimited Number of Candidates per Portfolio

Mobile voting

Elections are optimized for desktop and mobile devices. Voters can vote from a web browser or our iOS & Android apps.

Whilst the system was developed for great user friendliness it was also extensively developed to be a fortress of impenetrability and resilience against tampering of ballots and elections results.

  • Hosting and reliability
    • 4096bit SSL Security is used encrypt all Data transfers between the Voters Computer Terminals and the Elections hosting server and vise versa.
  • Security details
    • SEaaS source code is encrypted by IonCube technology and cannot be disseminated or reverse engineered.
    • Network access to the U-SEEMS system is controlled by three firewalls. One at the network layer, the web services layer and the last one at the application layer.
    • The most stringent IPv6 control mechanisms is in place.
  • Confidentiality
    • Application Layer firewalls will prevent and track hack attempts through the web interface and scan for RCE scripts, RootKits, RPC Executions, SQL injections and DDOS attempts.
    • At the application layer all relayed data is checked and sanitized further for SQL/Code injection.
    • Random MD5 HASH coding is used as database identifiers instead of primary keys

To maintain the integrity and security of the WEVS system, it will never be allowed to be self-hosted by the client and will permanently be hosted on Wolfatek’s Private Cloud Infrastructure.

WEVS is ready to be rolled out and is available for evaluation.