Download our policies below. If you have any questions, please get in touch.

Acceptable use policy

Solidatus covers the security and use of all Threadneedle Software Ltd (Solidatus)’s information and IT equipment. It also includes the use of email, internet, voice and mobile IT equipment. This policy applies to all Solidatus’ employees, contractors and agents.

Anti-bribery and corruption policy

Solidatus is fully committed to the fight against financial crime and makes every  effort to remain in full compliance with all applicable financial crime compliance laws, regulations and standards in all of the jurisdictions in which it operates.

Business continuity plan

Analyse your business, assess the risks, develop your strategy, develop and rehearse your plan. 

Data protection policy

Solidatus is committed to protecting the rights and freedoms of individuals in terms of the processing of their personal data. This Policy refers to all personal data processed for Solidatus’ purposes, regardless of where it is held and, in respect of automatically processed data, the ownership of the equipment used.

Health and safety policy

Solidatus takes the health and safety of its employees seriously. Relevant risk assessments are completed and actions arising out of those assessments implemented. We provide clear instructions and information, and adequate training, to ensure employees are competent to do their work.

Identity and access management process

Authorised Solidatus staff and direct contractors have an Azure Active Directory account (AD). AD account holders may request access to an installation hosted in the Solidatus Cloud or a managed Solidatus instance from a Solidatus director – they must include a reasonable justification.

Incident management and data breach policy and procedure

Solidatus adopts a risk-based approach to data risk assessment. Its approach to risk management is to the management of all business risks, including data breaches. Solidatus will ensure that there are adequate skilled resources in all lines of defence to manage risk within the Solidatus’ 2LOD process.

Information classification standard

In order to preserve the appropriate confidentiality, integrity and availability of Solidatus’ information assets, we make sure we are protected against unauthorized access, disclosure or modification. This is critical for assets covered by GDPR, the primary and secondary data used for research purposes, and for all business conducted across the company.

Information security policy

The confidentiality, integrity and availability of information, in all its forms, are critical to the ongoing functioning and good governance of Solidatus. Failure to adequately secure information increases the risk of financial and reputational losses from which it may be difficult for Solidatus to recover.

Modern slavery and human trafficking policy

Our organisation is absolutely committed to preventing slavery and human trafficking in its corporate activities, and to ensuring that its supply chains are free from slavery and human trafficking.

Quality management policy

Quality is important to our business because we value our customers. We strive to provide our customers with products and services which meet and even exceed their expectations.