Solidatus acceptable use policy
Solidatus covers the security and use of all Threadneedle Software Ltd (Solidatus)’s information and IT equipment. It also includes the use of email, internet, voice and mobile IT equipment. This policy applies to all Solidatus’ employees, contractors and agents.
Solidatus anti-bribery and corruption policy
Solidatus is fully committed to the fight against financial crime and makes every effort to remain in full compliance with all applicable financial crime compliance laws, regulations and standards in all of the jurisdictions in which it operates.
Solidatus data protection policy
Solidatus is committed to protecting the rights and freedoms of individuals in terms of the processing of their personal data. This Policy refers to all personal data processed for Solidatus’ purposes, regardless of where it is held and, in respect of automatically processed data, the ownership of the equipment used.
Solidatus health and safety policy
Solidatus takes the health and safety of its employees seriously. Relevant risk assessments are completed and actions arising out of those assessments implemented. We provide clear instructions and information, and adequate training, to ensure employees are competent to do their work.
Solidatus identity and access management process
Authorised Solidatus staff and direct contractors have an Azure Active Directory account (AD). AD account holders may request access to an installation hosted in the Solidatus Cloud or a managed Solidatus instance from a Solidatus director – they must include a reasonable justification.
Solidatus incident management and data breach policy and procedure
Solidatus adopts a risk-based approach to data risk assessment. Its approach to risk management is to the management of all business risks, including data breaches. Solidatus will ensure that there are adequate skilled resources in all lines of defence to manage risk within the Solidatus’ 2LOD process.
Solidatus information classification standard
In order to preserve the appropriate confidentiality, integrity and availability of Solidatus’ information assets, we make sure we are protected against unauthorized access, disclosure or modification. This is critical for assets covered by GDPR, the primary and secondary data used for research purposes, and for all business conducted across the company.
Solidatus information security policy
The confidentiality, integrity and availability of information, in all its forms, are critical to the ongoing functioning and good governance of Solidatus. Failure to adequately secure information increases the risk of financial and reputational losses from which it may be difficult for Solidatus to recover.
Solidatus modern slavery and human trafficking policy
Our organisation is absolutely committed to preventing slavery and human trafficking in its corporate activities, and to ensuring that its supply chains are free from slavery and human trafficking.
Solidatus quality management policy
Quality is important to our business because we value our customers. We strive to provide our customers with products and services which meet and even exceed their expectations.
For more information on our policiesPlease contact Philip Miller, Co-Founder and Director
Solidatus unlocks the true business value behind data. A lineage-first approach enables organizations to connect and visualize data relationships across the enterprise, simplifying how they identify, access and understand them. With a reimagined, sustainable data foundation in place, organizations can mine actionable intelligence and solve complex problems to deliver transformational business results.
Solidatus is a member of the EDM Council.