Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
This document provides an introduction to FundApps' shareholding disclosure service and its platform. FundApps provide shareholding disclosure monitoring services via a hosted web application 'Rapptr'. Rapptr is provided via FundApps controlled infrastructure from secure and strictly controlled hosting environments. We maintain the software, continuously updating with the latest software enhancements and legislative content updates.
Users of the system may choose to receive notification e-mails letting them know when this process has concluded and results are available inside the system. Users use a browser-based user interface to view the results of running the batch job and follow a workflow inside the software to investigate any results and file disclosures. Historical data from checks is retained within the system to provide a timeline of results and to facilitate correct calculation of disclosure requirements.
Rapptr is kept constantly up to date with the latest enhancements and fixes. We continuously deliver changes from development and content teams to client production environments. To support this activity we employ a best practices-based development approach employing test-driven development, pair programming and code review to reduce risk and improve software quality.
Every change to our software and rule content is run through an ever growing test suite to ensure a minimal amount of risk in this continuous update process. Security considerations are built into our software lifecycle; we identify work items early on that have security implications. We conduct an annual penetration test and supply our clients with the report and a remediation plan.
Deployment of changes of the Rapptr software is a fully automated and hands-off process.
With control over both software and infrastructure FundApps is able to deliver best in class availability and security. The principle of least privilege is applied throughout; at the network, system and software levels to tightly control availability of data and reduce the potential for security breaches.
On our AWS infrastructure, this data is subsequently encrypted at rest and employs a key management system which allows us to rotate the keys used for the encryption of these volumes on a regular basis. Backups are also stored encrypted at rest, meaning data is never available in cleartext.
Rapptr enforces several layers of access control.
Authentication: Rapptr allows clients to either use the Rapptr native single-factor authentication mechanism, the native multi-factor authentication mechanism or to integrate the platform with their Single-Sign-On.
Network access control: FundApps is able to provide further access control by applying IP restrictions to client environments, preventing access from networks other than those of the client site. These restrictions operate before any authentication to the system and prevent any requests being made to the application at all.
Client Segregation: Individual client environments are isolated at infrastructure level using separate databases, web and engine instances.
Access Control Audit Trail: A complete audit trail is visible inside the application and allows tracking of all operations taken inside the system, along with user access events. This auditing includes any support activities performed by FundApps staff.
We ship all log events generated on the platform to a central store for audit, reporting and alerting activity. Direct access to production systems is strictly restricted, to key personnel with a direct operational need and these accesses are reviewed on a monthly basis.
We have automated monitoring of critical conditions for both infrastructure and software in the platform. These conditions create alerts following escalation policies and where necessary alert operators on a 24/7 basis to preserve the integrity and availability of the platform.
Furthermore, FundApps uses a 24/7 Security Operation Centre (SOC) to detect and respond to security alerts.
Application performance and infrastructure metrics are used for capacity planning and platform management; ensuring there is always sufficient capacity available across the platform to satisfy all demands.
Rapptr works on a batch processing model; position data is uploaded to the system and processed in the background. Typically clients implement an automated upload job from their systems to the API endpoints provided by FundApps to receive this data. Documentation of our are publicly available.
All client data sent to or generated inside our platform follows an encrypted data lifecycle and all interactions with the system occurs over an encrypted protocol: Secure HTTP (HTTPS). FundApps keeps supported cipher suites for the SSL encryption used for HTTPS in line with industry standards and regularly runs external tests to verify this. The results of these tests are on the internet. Once data enters our platform it remains encrypted in transit throughout our networks.
Authorisation: Rapptr implements different authorisations based on roles which are described . These roles allow to match permissions in Rapptr with different users job functions.
Our platform is hosted in facilities with top grade physical security; we host entirely within the EU with Amazon Web Services (AWS). AWS hold industry standard certifications relating to security and availability, including but not limited to ISO 9001, 27001 and SOC I, II certifications. Full details of the certification activities undertaken by our hosting partner are available via .
For our platform's technical resilience please.
NOTE: At FundApps we're focused on offering the best possible services to the investment management industry. As part of that, we have a firm commitment to ensuring our platform remains highly available and your data remains secure. We have made this resource available to clients and prospective clients in order to learn more about how we achieve this and to assist with any due diligence questions you may have.
Our own staff use this resource to review security policy and educate themselves on our approaches. This is by it's nature a "living" document - which will evolve as we continually evaluate how we can deliver a best of breed platform to the industry.
If you require any clarifications or have any questions then don't hesitate to contact us.
FundApps approaches both information security and business continuity from risk based principles. Each identified information security or business continuity risk is reviewed with regard to Likelihood (the possibility of a risk happening), and Impact (the consequence of a risk happening).
Risks can be identified by any member of staff, and, staff members are encouraged to contribute. Once risks are identified and reviewed for Likelihood and Impact, an appropriate remediation plan can be formulated.
The key is that risk management drives activity to resolve identified risks, and is the responsibility is that of each employee of FundApps.
FundApps has no appetite for safety risks that could result in the injury or loss of life of FundApps staff, clients or partners.
FundApps has no appetite for information security risks that could result in unauthorised or accidental disclosure of, client or other sensitive information.
FundApps has a low appetite for business continuity risks which prevent it's ability to provide it's service to it's client.
It is important to note that following the risk management framework, any risk that equals or exceeds a risk rating of twelve (12) will exceed the FundApps Risk Tolerance level and therefore will require a risk treatment plan to lower the risk profile. See the FundApps Risk Management Matrix at the bottom of the page for further information.
Potential information security risks and business continuity risks are identified through both formal and informal channels:
Monthly security review meetings
Incident response and reviews
As part of the Software Development Lifecycle
As part of the continuous release management
As part of everyday working practice
Likelihood and impact
Potential risks are recorded in the risk register and assigned an owner. Risks are assessed on two criteria with regards to any current controls that may already be in place:
Likelihood, according to the FundApps Risk Management Matrix (cf. bottom of the page). Likelihood should consider the specific vulnerability or threats that may exploit this vulnerability.
Residual risk
The assessment of likelihood and impact places the risk within risk tolerance levels defined in the Risk Management Matrix (cf. bottom of the page).
Each risk level consists of
the likelihood and impact levels
a timeframe for review while the risk is open
a timeframe for review once the risk is closed
Based on this categorization we can then design a risk response in order to reduce our residual risk.
Strategies for responding to the risk can include:
Avoid risk – activities with a high likelihood of loss and large business impact. The best response is to avoid the activity.
Mitigate risk – activities with a high likelihood of occurring, but business impact is small. The best response is to use management control systems to reduce the risk of potential loss.
Transfer risk – activities with low probability of occurring, but with a large business impact. The best response is to transfer a portion or all of the risk to a third party by purchasing insurance, hedging, outsourcing, or entering into partnerships.
Accept risk – if cost-benefit analysis determines the cost to mitigate risk is higher than cost to bear the risk, then the best response is to accept and continually monitor the risk.
Our risk response may generate information security or business continuity controls which could be technical, procedural or policy based.
Identified risks and their mitigating controls are monitored and reviewed at least annually in order to ensure the residual risk is within the risk appetite. Should the residual risk change, either due to a change in the intrinsic risk, or due to the control effectiveness, the risk response will be reviewed.
Impact, according to the FundApps Risk Management Matrix (cf. bottom of the page). Further guidance must be taken from the FundApps Data Classification and Handling when referring to impact. This will take into account the Confidentiality, Integrity and Availability requirements of any data asset.
Use of definitions based upon ISACA’s
Client support queries
Internal communications
Server logs
Development source code
Information assets are identified as part of:
Monthly company-wide security awareness sessions
Monthly security review meetings
Our software development lifecycle
Everyday working practice
For each information asset identified, we
Assign an owner for the information
Identify if it falls under any specific regulation (primarily General Data Protection Regulation)
Identify an appropriate data classification from these ratings
Any changes to the register results in:
updates to our data classification policy with regards the information systems and asset information falling under each classification
Information systems are reviewed as part of our monthly security review meetings.
Our contains every information asset of value to FundApps. For example, this includes:
Assess CIA ratings in accordance with our process
Identify the that contain this data
Identify any specific information risks relating to this information and record it in our
Identify any specific business continuity risks relating to this information and record it in our
updates to our with regards the classification of information they hold
updates to our requiring us to record privileges granted to this systems and ensuring revokation during the offboarding process
The ISMS applies to the shareholding disclosure, position limits and sensitive industries services, which FundApps delivers to its clients. It also applies to the information assets, processes, teams and external service providers which FundApps relies on to provide these services.
FundApps’ three main services provided are:
Shareholding Disclosure
FundApps’ Shareholding Disclosure service helps compliance professionals with shareholding disclosure requirements, prove adherence to regulation and mitigate reputational risk to avoid fines.
FundApps’ outsourced, managed service combines FundApps’ proprietary rules engine with a team of compliance professionals and legal information from aosphere (an affiliate of Allen & Overy) and other regulatory data sources.
FundApps automates disclosure requirements such as major shareholding, 13F reporting, short selling (including EU Short Selling Rules, takeover panels, issuer limits, and issuer requests (such as Section 793).
Position Limits
FundApps' Position Limits is a managed service for financial institutions, who trade derivative contracts on multiple exchanges. It combines FundApps’ proprietary rules engine with a dedicated team of compliance professionals and up-to-date contract limits and exchange data. It helps compliance managers monitor holdings against position limits for exchange-traded contracts resulting from MiFID II regulation, as well as limits imposed by regulatory bodies such as the United States’ Community Futures Trading Commission (CFTC).
Sensitive Industries
FundApps automates the monitoring of regulatory disclosure thresholds in “sensitive industries”, including pre-approval and post notification, hard-stop and issuer-specific limits. FundApps’ Sensitive Industry rules cover industries in jurisdictions which have different regulations governing ownership.
The FundApps departments within the scope of the ISMS are:
Client Services – On-board clients and assist them throughout their experience with Rapptr.
Content – Help to ensure rules correctly mirror current regulation.
Finance – Manage FundApps’ budget, cash flow, tax planning and record keeping.
People Operations – Team responsible for employer brand, recruitment and on-boarding through to development, reward and recognition.
Product – Design and develop products to achieve the company’s objectives.
Engineering – Manage and maintain system architecture and design for all hosted clients.
At a high level, the following executives and teams support FundApps’ processes and services:
CEO – Assigns authority and responsibility for operating activities and reporting relationships. FundApps’ CEO defines and communicates the company’s objectives.
Head of Client Services – Takes the lead in owning FundApps client portfolio and drive cross-team collaboration to support FundApps’ objectives.
Head of Product – Accountable for all product management and content team activities globally.
Chief Technology Officer – Provides direction and decision making on what technologies to use, the architecture of the platforms and best technical practices to follow.
Head of Sales – Accountable for all sales activities within the region and as the People Leader for the Regional Sales team.
Head of People Operations – Reporting directly to the CEO, the head of People Operations smooths the next phase in growth as FundApps scales.
Information Security Lead – Responsible for managing Information Security, Cyber Security and Business Continuity risks potentially impacting FundApps.
FundApps operates out of three offices:
114-116 Curtain Road, London EC2A 3AH, United Kingdom
115 Broadway, New York, NY 10006, USA
#02-11, Capitol Piazza, 13 Stamford Road, Singapore 0178905
FundApps services make use of a resilient infrastructure, which is hosted within multiple data centres (availability zones) and regions operated by Amazon Web Services.
There are two environments with a primary environment made up of three data centres within a single geographic region, from which the service is provided in normal operation. There is also a secondary environment, in an alternate geographic region, which is used in case the primary environment is unavailable.
Each of the three data centres within the primary environment have discrete power and Internet connectivity. FundApps’ primary environment is designed to continue to provide its service should two of the three centres suffer concomitant failures.
Should the whole primary environment fail, FundApps has procedures to recover its service in the secondary environment.
The critical components of this highly available infrastructure include:
Proxy servers, which filter inbound traffic and route them to the correct servers;
Web front-end servers, which provide FundApps clients with a web user interface and an application programming interface (API);
Engine servers, which perform apply rule sets analysis of FundApps clients’ financial positions;
Database servers, which store the results of this analysis, as well as objects and events related to client environments;
Network Address Translation Gateways used by the servers to connect to non-FundApps resources; and
Bastion hosts, which FundApps staff use to administrate the infrastructure.
FundApps’ platform consists of system software (operating systems, middleware, and utilities) that supports its applications. FundApps’ stack is made of Windows servers running Internet Information Services (IIS), SQL Server and RabbitMQ.
AWS services such as Elastic Load Balancing, Amazon Route 53, AWS Lambda and Amazon Simple Storage Service are also used to support the service provided. Ingress traffic is filtered by high availability web proxies deployed to Linux servers running Ubuntu operating system.
The software developed by FundApps is mostly written in C# and NodeJS programming languages. This software is accessible to clients through a Web User Interface and an Application Programming Interface (API).
FundApps’ platform is kept up to date with the latest enhancements and fixes. FundApps delivers changes from development and content teams to client production environments. To support this activity FundApps employs test-driven development, pair programming and code review to reduce risk and improve software quality.
Every change to software and rule content is run through a test suite to achieve a minimal amount of reduce risk in this continuous update process. Security considerations are built into the software lifecycle. FundApps identify work items early on that have security implications.
Deployment of changes of the FundApps platform software is a fully automated process
AWS provide hosting services and is used to host the FundApps platform.
Data Centre Physical Security Overview
All data hosted in FundApps’ platform is hosted by AWS within the EU in facilities with physical security controls in place. AWS hold industry standard certifications relating to security and availability, including but not limited to ISO 9001, 27001, as well as SOC I and II attestations. Full details of the certification activities undertaken by FundApps’ hosting partner are available via AWS compliance.
Data Centre Access Control
AWS provides physical data centre access only to approved employees. All employees who need data centre access must first apply for access and provide a valid business justification. These requests are granted based on the principle of least privilege, where requests must specify to which layer of the data centre the individual needs access, and are time-bound. Requests are reviewed and approved by authorised personnel, and access is revoked after the requested time expires. Once granted admittance, individuals are restricted to areas specified in their permissions.
Third-party access is requested by approved AWS employees, who must apply for third-party access and provide a valid business justification. These requests are granted based on the principle of least privilege, where requests must specify to which layer of the data centre the individual needs access, and are time-bound. These requests are approved by authorised personnel, and access is revoked after request time expires. Once granted admittance, individuals are restricted to areas specified in their permissions. Anyone granted visitor badge access must present identification when arriving on site and are signed in and escorted by authorised staff.
Alert Logic provide network-based and host-based Intrusion Prevention Services (IPS), as well as a 24/7 Security Operation Centre (SOC).
There are no exclusions to the ISMS.
Rapptr (client instances)
Amazon AWS (production data)
Google Mail (our own internal communications)
Information systems are identified as part of:
Monthly company-wide security awareness sessions
Monthly security review meetings
Our software development lifecycle
Everyday working practice
Information systems that FundApps depend on that are managed by third party vendors are included in this register. As such we evaluate business continuity and sufficient security controls as part of our assessment process.
For each information system identified, we
Assign an owner for the system
Identify information security controls based on the data classification
Identify business continuity controls based on the data classification
Information systems are reviewed as part of our monthly security review meetings.
At FundApps we believe in simplicity, automation and testing in order to deliver high quality software - and that follows through our entire software development process. Testing is a integral part of this - not only through our software development but also our rules team who implement the legal changes made around the world.
Roadmaps and ideas for new development are captured as ‘living documents’, describing areas of functionality of our product, and possible new features - both internal ideas and suggestions from clients.
All artifacts are deployed from a centralized system that retains all deployed versions of artifacts and records of the versions, times and where applicable, manual intervention to trigger a deployment. This information is made available throughout the company via internal communications and stored for audit purposes.
All changes are tested with a multi-level test suite (Front End tests, integration tests, unit tests, rule tests, static application security testing as well as Open Source Software License scans) as can be seen in figures 4, 5, 6 and 7. Changes cannot be applied to production if tests fail. Finally, a dynamic application security testing tool scans a client-like environment on a weekly basis.
All builds are stored allowing to rollback to the last known good build in case of an emergency.
Work item specified Work items are scoped and defined as development tasks in ClubHouse. Potential security issues flagged and discussed at this stage. Items prioritised and tackled by the team (Figure 2)
Development work Development or configuration work is performed as scoped and defined in the work item.
Pull Request created Once the work is complete, or at intermediate stages for larger work items ‘pull requests’ are created (Figure 3). Pull requests specify the desired changes across files and act as proposals for specific change.
Built by CI server All releases and pull requests are compiled on a build server, to check that the artifacts contained in source control are complete.
Unit Tests Run All unit tests contained within the test suites are run on the build server to verify that the release functions as specified in an isolated environment. This occurs both on pull requests and on the master branch (Figure 3 & 4).
Change merged to master branch Once the pull request has all tests passing and any identified changes to pass review have been made, the pull request is merged to master and becomes a potential release of the system.
Test Rule Content with release The test suite maintained for our legislative rule content is run using the logic and algorithms of the proposed new release to confirm behaviour and semantics are maintained.
Deploy to master testing environment The proposed release is deployed to a master testing environment, to validate that the release can be successfully deployed and that the resulting instance reports a healthy status.
Run Feature Tests A series of automated feature tests, using a scripted web browser covering the key functionality of the system are run (uploading files, viewing results etc). These establish that the proposed release loads correctly and performs the desired tasks.
Deploy to master staging environment The proposed release is deployed into a staging environment in our Production network (Figure 5). This verifies that the release can be deployed successfully with production configuration and infrastructure
Smoke Test A smoke test is performed by checking the health of the master staging environment and uploading a position file. This ensures that in the production environment, the system is able to accept uploads and process data.
Deploy to client performance environment If desired, or if the release presents questions regarding performance impact (identified during the pull request review), the release may be deployed to a specific performance testing environment to examine performance characteristics on the production network before availability to clients.
Deploy to client staging environment (automated) Given successful completion of all previous steps and check, a release is promoted to all client staging environments.
Deploy to client production environment (automated) Given that a release has been successfully deployed to a client’s staging environment, it is promoted to all client production environments. This process may be conducted for all clients sequentially.
In order to preserve the appropriate confidentiality, integrity and availability of FundApps information assets, we must make sure they are protected against unauthorized access, disclosure or modification. This is critical for all personal data, client data and FundApps proprietary data we deal with across the FundApps business.
This standard applies to all FundApps information, irrespective of the data location or the type of device it resides on.
As a result, we can see at a glance
What information assets fall under which data classification
What information systems hold data falling under those classifications
The controls that we expect each system to have in place
All FundApps employees, contractors and third parties who interact with information held by and on behalf of the FundApps are responsible for assessing and classifying the information they work with and applying the appropriate controls. Individuals must respect the security classification of any information as defined and must report the inappropriate situation of information to the Information Security Manager or Head of Security as quickly as possible.
Each System has an owner who is responsible for assessing the information it contains and classifying its sensitivity. Systems owners are then responsible for ensuring the appropriate controls are in place in conjunction with the Information Security Lead.
Responsible for the advising on and recommending information security standards on data classification and ensuring these are regularly reviewed.
The latest classification guidance can be found below.
(*) RTO means Recovery Time Objective.
Report suspected violations of this policy to the Information Security Lead, the CTO or the CEO. Reports of violations are considered Restricted data until otherwise classified.
FundApps' contains any system (internal or external) that holds or permits access to information assets in our . For example, this includes:
Automatically identify the information assets stored in this system (as recorded in our .
Automatically identify the the system falls under based on the maximum data classification of the information stored.
Identify any specific information risks relating to this information and record it in our
Identify any specific business continuity risks relating to this information and record it in our
Significant changes to the production environment are captured in ClubHouse and are based on requirements made by FundApps stakeholders (Product Team, CTO, Information Security Lead, etc.) as illustrated in Figure 2. This process is described in a dedicated procedure available in .
All changes to production can only be submitted by members of the Engineering team, Content and CS teams. Furthermore they need to be peer reviewed (Figure 3) and approved by a different staff member (based on the repository) than the one submitting the changes, before they can be merged into the master code branch, as described .
Change reviewed Every change is scanned for security vulnerabilities by a Static Application Security Testing tool. The changes contained within the pull request are reviewed by another team member for code review - both for quality, style and security (making use of the results from the Static Application Security Testing tool). More details on our review process are specified in [Access restricted to FundApps staff]. Comments are placed on the pull request to drive any amendments that may be necessary.
Perform dynamic application security testing (automated) A client-like environment is scanned every week by a dynamic application security testing tool for vulnerabilities (cf. figure 8). Any potential vulnerability is managed through the process described in the .
We maintain an detailing all key information assets at FundApps, who owns them, the business processes they are used in, and any external service providers that may utilise or store the information.
Public
Open
Restricted
Confidential
Description
Publicly available data.
Accessible only to FundApps staff.
Access restricted to specific FundApps teams. Data which the data owner has not decided to make public; data that is legally regulated and requires some level of access control, and data protected by contractual obligations.
Access restricted to specific FundApps staff on a ‘need to know’ basis.Data which if disclosed publicly could cause significant financial or reputational damage to FundApps or our clients; data which is legally regulated requiring an extremely high level of protection; data protected by contractual obligations.
Impact
None
Low
Medium
High
Current data in this classification
- Regulatory information - Publicly available information on a company.
- FundApps policies, - List of clients, - Development and test data, - Prospective client visitor data and analytics, - Task lists, potential future work.
- Employee contracts, passports, salaries, bank records, - Engineering Source Code, - FundApps’ rule package, - Client portfolio, structures, - Client queries, - FundApps ISMS and asset register, - Server event logs, application logs, exception logs.
- Client portfolio holdings and transactions - Client results (disclosures, breaches etc) and data overrides - Encryption keys and infrastructure credentials
Current services included in this classification
- OneLogin - Aosphere.
- Amazon AWS Development, - OneDrive, - HubSpot, - PagerDuty, - Workable - GitBook, - Bonusly, - Google Analytics.
- GitHub, - ZenDesk, - Google Mail, - Google Drive, - Slack, - Kingston Smith, - HSBC, - Silicon Valley Bank, - AlertLogic, - SumoLogic, - Sentry.
- Amazon AWS Production, - Atlas, - Octopus, - Client Rapptr environment.
Data access & control
No access restrictions. Data is available for public access.
Available to FundApps prospects and clients (under NDA) and staff.
Available only to specified FundApps staff.
Access is controlled and restricted to specific FundApps staff, following a 'need to know' and 'least privilege' basis.
Legal requirements
Protection of data is at the discretion of the owner or custodian.
Protection of data is at the discretion of the owner or custodian.
Protection of data is required by law or at the discretion of the owner or custodian.
Protection of data is required by law or at the discretion of the owner or custodian.
Transmission
No other protection is required for public information.
Data must be shared through systems which restrict access to the intended audience. If this is not possible (e.g. data needs to be shared through internal chat or email), data must be sent encrypted (e.g. password protected encrypted archive where password is sent through unrelated channel) or through the means of a link to a system which implements the appropriate access control (link to Google Docs drive).
Transmission through email, support tickets, internal chat tools is prohibited. Transmission may only be made through approved channels that are authenticated and encrypted (HTTPS or VPN).
Audit controls
No audit controls required.
Information owners must periodically monitor and review their systems and procedures for potential misuse and/or unauthorized access.
Information owners must periodically monitor and review their systems and procedures for potential misuse and/or unauthorized access. Audit trails for the purposes of non-repudiation must be in place.
Systems must be actively monitored and reviewed for potential misuse and/or unauthorized access. Audit trails for the purposes of non-repudiation must be in place.
Storage
No restrictions.
No restrictions. Care must always be taken when storing this information on mobile devices.
Encryption is required if stored on a system without access control.
Encryption at rest mandatory for all data not within a physically secure ISO 27001 environment. Storage is prohibited on unapproved computing equipment.
Backup & Recovery procedures
Not required.
Documented backup and recovery procedures are required achieving an RTO* of 7 days.
Documented backup and recovery procedures are required achieving a minimum RTO of 1 day. A higher RTO may be required for certain types of data.
Documented backup and recovery procedures are required, including automated failover wherever feasible in order to achieve our RTO* of 4 hours.
Disposal (digital file)
No restrictions.
Standard deletion from media
Standard deletion from media
Delete all files or data using a secure delete tool (such as Eraser).
Disposal (physical medium)
No restrictions.
Media must be erased before disposal
Media must be erased before disposal if encrypted. Media must be disposed of securely using state of the art approved solutions for the permanent removal of data (e.g. shredding or physical destruction).
Media must be erased before disposal if encrypted. Media must be disposed of securely using state of the art approved solutions for the permanent removal of data (e.g. shredding or physical destruction).
Transport
Normal mail service
Normal mail service
Must never be printed
Must never be printed
Storage
No requirements
Secure office or other location. Room need not be locked if access to the building or floor is restricted to employees and authorised non-employees.
Must never be printed
Must never be printed
Disposal
No requirements
Information must be disposed of securely using strip-cut shredders or confidential waste bins which are certified for secure destruction.
Must never be printed
Must never be printed
The following table describes the plan for 2021 to achieve FundApps' objectives.
Objective
What will be done
Responsible
Resources required
Evaluation
Est. completion date
1) Ensure the protection of non-public data managed by FundApps' Information Systems.
Implement conditional access to allow same controls on BYOD than corporate devices
Information Security Lead
External expertise on conditional access
Conditional Access has been deployed to Okta
End of December 2021
2) Ensure the protection of all FundApps Information Systems against the risks of unauthorised access, misuse, damage and abuse.
Automate security testing for Infrastructure as Code
Information Security Lead
Recurrent budget
Automated security testing for IaC implemented in build pipeline
End of June 2021
3) Demonstrate a high level of competence and expertise in Information Security
Maintain a SOC 2 Type II Report
Information Security Lead
External auditor
SOC 2 Type II Report
End of November 2021
4) Maintain compliance with security standards.
Obtain ISO 27001 certification
Information Security Lead
Internal and External auditors
ISO 27001 certification
End of November 2021
5) Foster a culture of security awareness within FundApps.
Provide security awareness training refresher for all staff
Information Security Lead
None
Security awareness refresher training provided to all staff
End of September 2021
6) Protect FundApps from liability or damage due to an Information Security Incident.
Review compliance with Privacy laws
Legal counsel
Recruit legal counsel
Compliance with privacy laws reviewed
End of December 2021
7) Maintain a cycle of continuous improvement.
Remediate findings identified by ISO 27001 readiness assessment and Internal audit
Information Security Lead
None
All non-conformities have been remediated
End of July 2021
At FundApps we are dedicated to providing the highest quality of support while ensuring consistent data confidentiality, integrity, and availability.
As such, there are certain actions we can (and cannot) take on your behalf. The following is a list of some of the work practices you can expect from us:
We use secure virtual desktops hosted in our AWS production environment to access client platforms.
We provide a valid and unambiguous reason every time we log into a client environment (reviewable at any time in the audit trail).
We may click the "Validate File" button in order to troubleshoot failed file validations
We may download/export relevant files in order to conduct necessary analysis to troubleshoot unexpected behaviour (i.e. disclosure documents, positions and portfolio files). These files will only be downloaded to secure virtual desktops and destroyed when no longer required.
We may create or edit Companies as part of the environment setup. Subsequent changes must be based on a written request from a client with the administrator privileges.
We cannot create or edit any users (except the initial admin users when setting up the environment)
We cannot create or edit any data overrides
We cannot upload any files to client environments (except disaggregations & imported disclosures as part of the initial setup)
We cannot interact with results, except when downloading already generated documents to support
We cannot action any tasks, including approving any rules
We cannot download any files from a client’s platform anywhere except a secure virtual desktop.
FundApps management believes that embedding security into the culture of FundApps is critical to the success of our information security program, and as such this is a management priority.
FundApps implements the following practices to achieve this objective:
New joiners go through an Information Security training when they start at FundApps. This training covers what is Information Security, why it’s important to FundApps and what is expected of FundApps staff and contractors;
Security-themed presentations to all of FundApps’ staff;
Technical Security presentations to engineers on most common vulnerabilities;
Channels in company communication tool with security news;
Monthly security review session for key stakeholders where we actively review security access lists, audit logs and risk register;
Culture of continuous improvement across all areas of the business.
FundApps is committed to a robust implementation of Information Security Management. All our hosting environments are certified to ISO 27001. As an organisation we are endeavour to align our processes to ISO 27001 and the NIST Cyber Security Framework.
We are specifically committed to preserving the confidentiality, integrity and availability of data and documentation supplied by, generated by and held on behalf of our clients. The principles defined in this policy will be applied to all of the physical and electronic information assets for which the FundApps is responsible.
Our senior management team are directly responsible for ensuring that all FundApps staff have been made aware of these procedures and their contents.
All employees have access to this information, are required to abide by them, and are encouraged to regularly review and update these in their relevant areas.
Information security is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. It focuses primarily on the confidentiality, integrity and availability of data.
FundApps Data, for the purposes of this policy, is data owned, processed or held by FundApps, whether primary or secondary, irrespective of storage location. It is used interchangeably with the term ‘information’.
FundApps, headquartered in London, United Kingdom, helps investment managers to harness the power of community and technology to automate regulatory compliance.
There are a number of internal and external factors that create uncertainty that gives rise to risk. These include:
Information
FundApps processes the following types of information which require adequate protection:
sensitive client information,
personal data,
Sensitive FundApps Intellectual property.
People
Staff turnover,
Induction of new joiners,
Staff role changes,
High rate of recruitment due to rapid growth.
Organisation
Use of contractors,
Staff working in different time zones.
Products/Services
Products needs to align with evolving regulations,
FundApps services’ competitive advantage relies partly on its intellectual property.
Systems and Processes
Staff work from home,
Lack of process documentation.
Political Factors
Divergence of regulations between UK and EU following Brexit,
Frequent changes made to regulations.
Economic Factors
Market conditions affect our clients’ ability to subscribe to FundApps’ services,
Higher staff costs due to an increasing demand for software engineers or regulatory experts in a constrained market.
Social Factors
Increase in working from home and bring your own devices practices.
Technological Factors
Fast evolving threat landscape (e.g. ransomware campaigns),
Increased expectation from clients to manage their own security (e.g. Bring Your Own Key, feed export logs to client SIEM).
Environmental Factors
Pandemic affects how people work.
Legal Factors
More lenient financial regulations makes our products less appealing.
Regulations on personal data such as GDPR
Regulations on access to MNPI and insider trading.
Technology related legislation, such as the Computer Misuse Act 1990 or Freedom of Information Act 2000
Intellectual property concerns related to the use of open source software.
The objectives of the ISMS are:
Objective
Measurement
1) Ensure the protection of sensitive data managed by FundApps' Information Systems.
Zero data breaches.
2) Ensure the protection of all FundApps Information Systems against the risks of unauthorised access, misuse, damage and abuse.
Zero FundApps Information Systems compromised, misused, damaged or abused.
3) Demonstrate a high level of competence and expertise in Information Security
Obtain an ISO 27001 certification.
Zero clients lost due to Information Security issues.
4) Maintain compliance with security standards.
Maintain ISO 27001 certification and SOC 2 Type II Reports.
5) Foster a culture of security awareness within FundApps.
Zero security incident resulting from lack of security awareness (e.g. phishing).
6) Protect FundApps from liability or damage due to an Information Security Incident.
Zero law suits, fines or losses due to a security incident.
7) Maintain a cycle of continuous improvement.
All non-conformities with ISO 27001 standard are prioritised for remediation.
The following eight information security principles provide overarching governance for the security and management of information at FundApps.
Staff with particular responsibilities for information are responsible for ensuring the classification of that information; for handling that information in accordance with its classification level; and for any policies, procedures or systems for meeting those responsibilities.
All users covered by the scope of this policy must handle information appropriately and in accordance with its classification level.
As far as is reasonably possible, endeavours must be made to ensure data is complete, relevant, accurate, timely and consistent.
Information should be both secure and available to those with a legitimate need for access in accordance with its classification level.
Information will be protected against unauthorized access and processing in accordance with its classification level.
Information will be protected against loss or corruption.
Breaches of this policy must be reported
FundApps has a responsibility to abide by and adhere to all current UK and EU legislation as well as a variety of regulatory and contractual requirements. Relevant legislation includes: • The Computer Misuse Act 1990 • General Data Protection Regulation 2018 • The Freedom of Information Act 2000 • Regulation of Investigatory Powers Act 2000 • Copyright, Designs and Patents Act 1988 • Defamation Act 1996 • Obscene Publications Act 1959 • Protection of Children Act 1978 • Criminal Justice Act 1988 • Digital Economy Act 2010
A non-exhaustive summary of the legislation and regulatory and contractual obligations that contribute to the form and content of this policy is provided below. Related policies will detail other applicable legislative requirements or provide further detail on the obligations arising from the legislation summarised below.
The Computer Misuse Act 1990 defines offences in relation to the misuse of computers as: 1. Unauthorised access to computer material. 2. Unauthorised access with intent to commit or facilitate commission of further offences. 3. Unauthorised modification of computer material.
The General Data Protection Regulation 2018 (GDPR) defines obligations for businesses and organisations that collect, process and stored individuals' personal data. GDPR outlines seven data protection principles which relate to:
Lawfulness, fairness and transparency
Purpose limitation
Data minimisation
Accuracy
Storage limitation
Integrity and confidentiality (security)
Accountability
Any security breach of FundApps information systems could lead to the possible loss of confidentiality, integrity and availability of personal or other confidential data stored on these information systems. The loss or breach of confidentiality of personal data is an infringement of the Data Protection Act 1998, contravenes FundApps Data Protection Policy, and may result in criminal or civil action against FundApps.
The loss or breach of confidentiality of contractually assured information may result in the loss of business, financial penalties or criminal or civil action against FundApps. Therefore it is crucial that all users of the FundApps information systems adhere to the Information Security Policy and its supporting policies as well as the Information Classification Standards.
All current staff and other authorised users will be informed of the existence of this policy and the availability of supporting policies, codes of practice and guidelines.
Any security breach will be handled in accordance with all relevant FundApps policies, including the Conditions of Use of IT Facilities at FundApps and the appropriate disciplinary policies.
This policy, and its subsidiaries, shall be reviewed by FundApps and updated regularly to ensure that they remain appropriate in the light of any relevant changes to the law, organisational policies or contractual obligations.
The list of interested parties in FundApps' ISMS and their requirements are as follows:
Interested Party
Requirements on the ISMS
Clients
Provide service in line with contractual Service Level Agreements.
Protect client data from unauthorised access.
Staff and contractors
Provide a secure Information System to allow them to perform their jobs.
Owners and Investors
Provide a cost-effective, safe and secure Information System which allows to FundApps to be profitable, attract new clients and develop new services.
Suppliers
Operate a secure Information System which prevents security incidents from impacting the supplier's Information System (e.g. malware propagation).
Regulators
Operate a secure Information System which complies with applicable laws and regulations.
Based on these indicators, FundApps will assess whether its ISMS is performing efficiently and whether root causes of underperformance are being identified and managed appropriately.
At least once per calendar year a review of the ISMS will be done to ensure its continuing suitability, adequacy and effectiveness.
The annual management review meeting will have the following attendees:
the ISMS Implementer,
the ISMS Manager, and
at least one member from the Leadership Team, which can be the ISMS Manager.
The agenda will include the following topics:
Status of actions from previous management reviews
Relevant changes in external and internal issues
Performance of the ISMS
Audit results, non conformities and corrective actions
Monitoring and measurement results
Information Security Objectives
Feedback from interested parties
Results of risk assessment and status of risk treatment plan
Opportunities for continual improvement
This policy defines the internal audit process of FundApps' Information Security Management System (ISMS).
Internal audits shall be performed against FundApps' ISMS at planned intervals at least once per year.
The annual internal audit must cover a section of the ISMS so that over a period of 3 years, the entirety of the ISMS scope can be audited.
The internal auditor shall be appointed by the ISMS Manager. The auditor and may be a member of FundApps or an external trusted third party auditor. Auditor selection shall be done to ensure objectivity and the impartiality of the audit process.
Audits shall be planned in advance and the ISMS Manager shall be notified no less than 5 business days ahead of time.
The internal auditor shall prepare the audit plan which shall define the scope of the ISMS, including the scope of the controls, which shall be audited.
Amongst others, the audit plan must take as an input the following items:
Security related incidents that have occurred since last audit;
Changes made to the Information Security Policy;
Changes made to Information Security controls;
Improvements made to the ISMS.
The resulting audit plan must be validated by the ISMS Manager.
Upon validation the ISMS auditor must communicate the plan to the interested parties.
The internal auditor shall collect and study the previous audit findings and outstanding issues. They shall also prepare relevant documents required for the audit (e.g. ISMS Audit checklist).
During the audit, the internal auditor shall find relevant evidence to ascertain that:
The information security policy reflects the current business requirements;
An appropriate risk assessment methodology is being used;
Documented procedures (within the scope of the ISMS) are being followed and are meeting their objectives;
Controls are in place and working as intended;
Residual risks have been assessed correctly and are within FundApps' risk appetite and risk tolerance levels;
The agreed actions from the previous audits have been implemented;
The ISMS is compliant with ISO 27001.
The internal auditor shall prepare an audit report based on the audit findings. Findings shall be labelled according to their severity and priority level:
Major Non-Conformity - This pertains to a major deficiency in the ISMS and exists if one or more elements of the ISO/IEC 27001: 2013 Information Security standard is not implemented and this finding shall have a direct effect on information security, specifically on the preservation of confidentiality, integrity and availability of information assets.
Minor Non-Conformity - A minor deficiency. One or more elements of the ISMS is/are only partially complied with. Minor non-conformities have an indirect effect on information security.
Observations/Potential Improvements – An audit recommendation for improvement for consideration by FundApps.
The internal auditor shall send the audit report to the ISMS Manager and the ISMS Implementer.
According to the audit findings and the non-conformity levels, an action plan and potential follow-up audit shall be defined by the ISMS Implementer and validated by the ISMS Manager. The scope of a follow-up audit is limited to the non conformity and the same mechanisms that produced the finding are used.
Whether it's a USB stick left on a train, a website hack leading to stolen confidential information, or phishing attacks compromising accounts - IT security is in the news more and more.
FundApps is privy to sensitive client information daily and therefore it’s important a pro-active approach to security is taken. Our policies captured in this living document are therefore the responsibility of everyone in the Company to uphold and update. With suggestions and improvements be raised and addressed as required with the team and the CTO.
NOTE: Security doesn't stop when you leave the office. This policy applies to both FundApps provided equipment, but also any other equipment you may use to access FundApps systems or software.
Better safe than sorry. Use common sense. If you're not sure whether something is a good idea (downloading a piece of software, opening an email, leaving a laptop unattended, using a particular third party service) - it probably isn't. Discuss it with the team!
Educate yourself - read about a security breach? Find out how it happened and why. Think about whether there's anything we could do differently at FundApps to stop it happening here. Also see "other reading".
If you know or suspect a loss or theft of confidential information has a occurred, or the security or integrity of any system has potentially been compromised - report it immediately to the CTO and CEO. Keep trying until they confirm they are aware.
Don't just educate yourself, share with the team.
Join our #security channel in Slack
Read about a recent security breach at a company? Find a link that talks about what happened in detail and share it in Slack with the company
See someone leaving their screen unlocked? Lock it for them, and make sure they know you did!
This applies to all computers you access FundApps platforms from, not just your work computer.
Hard disk encryption enabled (BitLocker, FileVault).
Windows update enabled and configured for automatic update installs.
Anti-virus software installed and configured for automatic updates.
Make sure your computer password meets our minimum security requirements. It should be at least 8 characters with at least one upper/lowercase character, a number and symbol.
Set your PC so it will automatically lock after 3 minutes.
Only install applications from official application stores (e.g. Microsoft Store, App Store, Google Play).
Lock your computer whenever you leave it unattended.
Keep your desks clear of any printed information.
Use a different password for each service you access.
Use two factor authentication whenever available (we enforce this for services where we can, such as Google mail and GitHub).
Use secure passwords (minimum 8 characters in length, and at least 3 out of 4 of lower case, upper case, digits and symbols).
Never share individual account credentials.
Immediately change compromised credentials and report compromise to the Information Security Lead.
Any mobile device accessing FundApps email must have a secure PIN set and remote-wipe software installed.
Any device you use to access the FundApps platform or related services must comply to our security checklist (cf. Security Musts) - this includes but is not limited to - hard disk encryption, anti-virus installed, a secure password and 3 minute lock timeout.
Bring Your Own Devices compliant with these rules may be used to access all FundApps systems, provided access to production systems is done through virtualised systems or bastion hosts.
Email is not a secure medium. You should be conscious of this and consider how emails might be used by others. Emails can be spoofed (not come from the person you expect), and intercepted.
If your Email account is breached this is often a route into accessing many other services (given the reliance of email based password re-setting). You should never use your email password for other services.
When sending attachments containing FundApps confidential information, you should use a password protected archive and share the password via a secondary, unrelated channel (such as SMS)
Remember that emails can easily be taken out of context, that once an email is sent you cannot control what the recipients might do with it, and that it is very easy to forward large amounts of information.
Similarly you should not necessarily trust what you receive in an email - in particular, you must never respond to an email request to give a username or password.
Lock your computer whenever you leave it unattended.
Any computer equipment should be secured behind locked doors when left unattended.
Any unattended portable equipment should be physically secure if possible, for example locked in an office or a desk drawer. When being transported in a vehicle they should be hidden from view. Staff should avoid storing sensitive information on portable equipment whenever possible (see data security section).
Enable 3 minute screen savers on your computer. (Go to Screen Saver settings, wait 3 minutes, and check On resume, display logon screen).
FundApps attaches great importance to the secure management of the data it holds and generates and will hold staff accountable for any inappropriate mismanagement or loss of it.
If a client emails you sensitive portfolio data, please advise them that they should not be doing this.
Do not create users for clients, even if you know them. Every client has an Admin user who can create users for themselves.
If you need to debug client portfolio data, you should use our secure VMs in our production environment.
Client data (of any kind) should never be stored on mobile devices or taken off-site (with the exception of email).
Failure to comply with these requirements will be considered a serious breach of this policy.
If your profile mentions FundApps, be honest about who you are and what you do.
Be aware if your profile mentions FundApps, you may be more of a target for social engineering or phishing attacks
Never share your login details or let others post on your behalf.
Be respectful to other people, even if you disagree with their opinion.
Don’t post things or send messages that could damage our reputation, bring the company into disrepute or cause actual or likely harm to the company or colleagues.
You’re responsible for what you put online and any impact it has on others so set up privacy settings if you need to. Never give out personal or private information about colleagues or clients. As a general rule, if you wouldn’t say or show it to your manager, then it’s probably not appropriate to post or send it online!
Help us protect our company and reputation by thinking carefully about what you put online. If you see something online that concerns you please talk to the senior management team.
Internet access is provided as a critical aspect of our business. It should be used in a responsible manner and any personal use should be reasonable. The Internet may not be accessed and used for any of the following:
Any activity that would violate the laws and regulations of the UK
Sending offensive or harassing material to other users
Any activity that would violate the privacy of others
Cause damage or disruption to organisational systems
Monitoring software is in use to protect the effectiveness, security, availability and integrity of FundApps systems. We monitor the type and volume of internet and network traffic. The information recorded can be used to identify an individual user and the website domain being accessed.
If you know or suspect a loss or theft of confidential information has a occurred, or the security or integrity of any system has potentially been compromised - report it to the Information Security Lead, the CTO or CEO. This could include
Disclosure of confidential information to any unauthorised person.
Integrity of any system or data being put at risk (for example virus, malware, hacking).
Availability of the system or information being put at risk.
Loss of any system, laptop, mobile phone or other portable device.
Finding doors and/or windows broken and/or forced entry gained to a secure room/building in which computer equipment exists.
For general awareness, we recommend the following sites.
For more technical information, check out
This process aims to allow FundApps to continually improve the suitability, adequacy and effectiveness of the information security management system.
Nonconformities of FundApps' Information Security Management System with ISO 27001:2013.
FundApps shall implement the following process when nonconformities arise:
FundApps shall react to the nonconformity as applicable by taking action to control and correct it and deal with its consequences.
FundApps shall evaluate the need for action to eliminate the causes of the nonconformity to ensure it does not occur again.
To do so FundApps shall:
review the nonconformity;
determine the cause of the nonconformity; and
determine if similar nonconformities exist or could potentially occur.
FundApps shall implement actions required to address the root cause of the nonconformity.
FundApps shall review the effectiveness of the remediation actions which have been taken and make further changes to the ISMS if necessary.
FundApps shall retain evidence of:
the nature of the nonconformities and any subsequent action taken, and
the result of any remediation actions.
FundApps shall perform it's first ISMS audit in 2021.
This internal audit shall cover the following elements:
Observations from the Readiness Assessment against ISO/IEC 27001:2013 standard;
The audit will be performed before the end of June 2021.
The plan to achieve these objectives is described in the .
cf.
Information should be recorded in our information asset register, with the Information Systems which make use of it, classified in accordance with our and in accordance with relevant legislative, regulatory and contractual requirements.
Risks to information security should be assessed and assigned an owner in accordance with our
If a member staff is aware of an information security incident then they must report it to the Information Security Lead, the CEO or the CTO immediately. For more information, please see our .
The scope of the internal audit is FundApps' Information Security Management System (ISMS), which is described in .
Be aware of the kinds of information we look after as a company, and how we protect them. You can find more in our policy.
Be aware of - don't trust an attachment or a hyperlink in an email just because it comes from someone you know, or an organisation you trust. Better to type the URL into the browser window yourself, and avoid that unexpected attachment.
(or equivalent) installed and used for all passwords.
If you use your mobile phone for accessing company systems (including email) your mobile phone must have a PIN set and remote-wipe software installed. You must never store data classified as FundApps Confidential on your phone. You can find more in our .
Do not store FundApps confidential data on any removable media or equipment, in accordance with our .
In order to facilitate this, use a tool like for securely storing passwords.
You must comply with our and ensure you do not store data in breach of this.
is enforced for your FundApps email. .
Client data, particularly portfolio data should be treated with great care, and in accordance with our .
Please familiarize yourself with our
(developed in association with The UK's Citizen's Advice Bureau)
(changes monthly)
Non-conformities will be logged in , a ticketing system.
The remediation action and a deadline will be logged in for each non-conformity.
Once the action has been implemented, the corresponding story will be marked as done.
Annex A controls in scope as per the from A.5.1.1 to A.9.4.5 included.
What will be monitored & measured
Methods for monitoring & measurement
Metrics used to measure
Target
When will it be done
Who shall monitor & measure
Protection of sensitive data managed by FundApps' Information Systems
Incident register
# of data breaches in last 12 months
0
Annually and after incident occurred
Information Security Lead
Information Systems misused, damaged or abused.
Incident register
# of C1 or C2 security incidents in last 12 months
0
Annually and after incident occurred
Information Security Lead
Demonstrate a high level of competence and expertise in Information Security
Client dissatisfaction of security practices
# of clients lost due to Information Security issues in last 12 months
0
Annually
Information Security Lead
Demonstrate a high level of competence and expertise in Information Security
Prospect dissatisfaction of security practices
# of deals with prospects lost due to Information Security issues in last 12 months
<5% closed lost deals
Annually
Information Security Lead
Compliance with security standards.
ISO certification audit
ISO 27001 certification achieved
Yes
Annually
Information Security Lead
Compliance with security standards.
SOC 2 Type II Report
SOC 2 Type II Report maintained in last 12 months
Yes
Annually
Information Security Lead
Foster a culture of security awareness within FundApps
Incident register
# of C1, C2 or C3 security incidents resulting from lack of security awareness (e.g. phishing) in last 12 months
0
Annually and after incident occurred
Information Security Lead
Information Security and Business Continuity Risks
Risk assessments and reviews
# of risks above the risk tolerance level
0
Annually and following risk is identified
Information Security Lead
Audit Findings
Internal or external audit
# and severity of findings identified during last internal audit
0 major non-conformities
Following internal or external audit
Information Security Lead
Liability due to an Information Security Incident.
Law suits
# of law suits, fines or losses due to a security incident in last 12 months
0
Annually and following law suit
Information Security Lead
Business Continuity Plan Effectiveness
BCP test report
Impact the last activation of BCP had on business activity and clients
No impact
Annually
Information Security Lead
Disaster Recovery Plan Effectiveness
DR test report
Service return time during last DR Test
Return Time < 4 hours
Annually
Information Security Lead
Security of FundApps' platform
Penetration test report
# and severity of findings in last penetration test
0 Critical and High vulnerabilities
Annually
Information Security Lead
Finding No.
Major Non-Conformity | Minor Non-Conformity | Observations/Potential Improvements
Description
ISO 27001 Clause No.
Remediation Action
Remediation Deadline
Status
Evidence of remediation
All data hosted in FundApps’ platform is hosted in facilities with top grade physical security. These facilities are located within the EU with Amazon Web Services (AWS). AWS hold industry standard certifications relating to security and availability, including but not limited to ISO 9001, 27001 and SOC I, II certifications. Full details of the certification activities undertaken by our hosting partner are available via AWS compliance.
AWS provides physical data center access only to approved employees. All employees who need data center access must first apply for access and provide a valid business justification. These requests are granted based on the principle of least privilege, where requests must specify to which layer of the data center the individual needs access, and are time-bound. Requests are reviewed and approved by authorized personnel, and access is revoked after the requested time expires. Once granted admittance, individuals are restricted to areas specified in their permissions.
Third-party access is requested by approved AWS employees, who must apply for third-party access and provide a valid business justification. These requests are granted based on the principle of least privilege, where requests must specify to which layer of the data center the individual needs access, and are time-bound. These requests are approved by authorized personnel, and access is revoked after request time expires. Once granted admittance, individuals are restricted to areas specified in their permissions. Anyone granted visitor badge access must present identification when arriving on site and are signed in and escorted by authorized staff.
All FundApps offices are protected by locked doors which can be opened only with a valid access card, and CCTV. All doors are equipped with alarm systems which trigger if doors are forced open. Visitors are escorted throughout their visit to our offices.
FundApps has implemented a tiered network architecture to hosts its services. This tiered architecture allows to restrict communications between networks in order to reduce the probability and impact of a security incident. Each tier comprises host-based and network-based intrusion protection systems (IPS) which are monitored by a 24/7 Security Operation Centre (SOC) to detect and respond to security incidents.
Access to the administration of the network is limited to a small number of FundApps staff.
The following table summarises the controls that are relevant and applicable to FundApps' Information Security Management System in accordance with the requirements of ISO 27001:2013.
FundApps implements physical and logical access controls across its IT systems and services in order to provide authorised, granular, audit-able and appropriate user access, and to ensure appropriate preservation of data confidentiality, integrity and availability in accordance with our Information Security Policy.
An owner responsible for managing user access
The types of data it holds and therefore the data classification and controls required to protect that information.
Status of basic controls such as SSO and two-factor
FundApps' Identity and Access Management system allows to simplify and automate the on-boarding and off-boarding processes in terms of provisioning and de-provisioning accesses to systems.
Access via HTTPS only;
Named accounts using Single sign-on (SSO) and two-factor authentication;
Audit logs of support staff accessing the system, which is visible to our clients;
Access is granted on a least-privilege and need-to-know basis;
Access review by head of Client Services on a quarterly basis.
Access to our production network is restricted to a very small set of staff. Controls in place include:
All credentials and accounts are provisioned through a configuration change management system that requires approval of the change;
Access to the network must be made via a secure connection through the use of multi-factor authentication.
Each member of operational staff uses a named account to each server where access is required which is separately provisioned from the above network access;
Access is granted on a least-privilege and need-to-know basis;
All access to and key administrative actions on production servers are logged to a centralised audit store;
Access review by CTO on a quarterly basis.
Named accounts are mandatory, unless an exception is granted by the data owner responsible.
Any built-in, default accounts should be disabled or renamed and passwords changed
Single-sign-on should be enabled and mandatory wherever possible
Two-factor should be enabled and mandatory whenever possible
Passwords should not be re-used across systems. Passwords should be stored using an approved password management tool with a strong master password.
Use secure passwords (minimum 8 characters in length, and at least 3 out of 4 of lower case, upper case, digits and symbols).
Audit logs must provide non-repudiation for changes and access to FundApps Restricted and Confidential data
See our data classification policy for more information on the specific controls in place.
The CTO shall ensure FundApps allocates the appropriate resources to ensure the ISMS' conformity with the ISO 27001 standard and shall report the performance of the ISMS to the Leadership team.
The Information Security Lead shall maintain the ISMS, assess its conformity with the ISO 27001 standard, define appropriate corrective actions and report its performance to the CTO.
The internal auditor, who can be a staff member or a consultant, shall perform an impartial internal audit against the requirements of the ISO 27001 standard, and follow-up on the internal audit results to achieve continual improvement.
The leadership team will ensure the performance of the ISMS aligns with FundApps' business objectives.
Finally all FundApps staff members contribute to the ISMS, FundApps' security policies and procedures.
The following diagram details the organisation between the staff who have a role in the ISMS.
FundApps assesses the competencies of those who play a role in the ISMS based on the table below:
If gaps are identified with the required competencies, FundApps will define a set of actions to remediate it. These actions may include training, mentoring or hiring or contracting competent persons.
Internal communication regarding this ISMS will be conducted as described below:
This policy covers all FundApps IT systems and information not classified as 'Public' in our .
Each information system is recorded in FundApps' which includes:
Access to each information system is on a least-privilege and as-needed basis. These are managed by the nominated owner of the system and access to each system is managed through FundApps' . These are reviewed as part of our monthly security stakeholder meeting.
Data stored in the FundApps platform is classified as 'FundApps Confidential' (see ). Support staff access the platform through the same interface our clients do. As such, controls in place include:
Ongoing ;
Our classifies data stored across all our IT Systems. Principles we follow include:
See .
ISO Control
Description
Applicable
Business Requirement
Contractual Requirement
Legal Requirement
Implemented
A.5.1.1
Policies for information security A set of policies for information security shall be defined, approved by management, published and communicated to employees and relevant external parties.
Yes
X
X
Yes
A.5.1.2
Review of the policies for information security The policies for information security shall be reviewed at planned intervals or if significant changes occur to ensure their continuing suitability, adequacy and effectiveness.
Yes
X
X
Yes
A.6.1.1
Information security roles and responsibilities All information security responsibilities shall be defined and allocated.
Yes
X
X
Yes
A.6.1.2
Segregation of duties Conflicting duties and areas of responsibility shall be segregated to reduce opportunities for unauthorized or unintentional modification or misuse of the organization’s assets.
Yes
X
X
Yes
A.6.1.3
Contact with authorities Appropriate contacts with relevant authorities shall be maintained.
Yes
X
X
Yes
A.6.1.4
Contact with special interest groups Appropriate contacts with special interest groups or other specialist security forums and professional associations shall be maintained.
Yes
X
Yes
A.6.1.5
Information security in project management Information security shall be addressed in project management, regardless of the type of the project.
Yes
X
X
Yes
A.6.2.1
Mobile device policy A policy and supporting security measures shall be adopted to manage the risks introduced by using mobile devices.
Yes
X
X
Yes
A.6.2.2
Teleworking A policy and supporting security measures shall be implemented to protect information accessed, processed or stored at teleworking sites.
Yes
X
X
Yes
A.7.1.1
Screening Background verification checks on all candidates for employment shall be carried out in accordance with relevant laws, regulations and ethics and shall be proportional to the business requirements, the classification of the information to be accessed and the perceived risks.
Yes
X
X
Yes
A.7.1.2
Terms and conditions of employment The contractual agreements with employees and contractors shall state their and the organization’s responsibilities for information security.
Yes
X
X
X
Yes
A.7.2.1
Management responsibilities Management shall require all employees and contractors to apply information security in accordance with the established policies and procedures of the organization.
Yes
X
X
Yes
A.7.2.2
Information security awareness, education and training All employees of the organization and, where relevant, contractors shall receive appropriate awareness education and training and regular updates in organizational policies and procedures, as relevant for their job function.
Yes
X
X
Yes
A.7.2.3
Disciplinary process There shall be a formal and communicated disciplinary process in place to take action against employees who have committed an information security breach.
Yes
X
X
Yes
A.7.3.1
Termination or change of employment responsibilities Information security responsibilities and duties that remain valid after termination or change of employment shall be defined, communicated to the employee or contractor and enforced.
Yes
X
X
Yes
A.8.1.1
Inventory of assets Information, other assets associated with information and information processing facilities shall be identified and an inventory of these assets shall be drawn up and maintained.
Yes
X
X
Yes
A.8.1.2
Ownership of assets Assets maintained in the inventory shall be owned.
Yes
X
X
Yes
A.8.1.3
Acceptable use of assets Rules for the acceptable use of information and of assets associated with information and information processing facilities shall be identified, documented and implemented.
Yes
X
Yes
A.8.1.4
Return of assets All employees and external party users shall return all of the organizational assets in their possession upon termination of their employment, contract or agreement.
Yes
X
Yes
A.8.2.1
Classification of information Information shall be classified in terms of legal requirements, value, criticality and sensitivity to unauthorised disclosure or modification.
Yes
X
X
Yes
A.8.2.2
Labelling of information An appropriate set of procedures for information labelling shall be developed and implemented in accordance with the information classification scheme adopted by the organization.
Yes
X
Yes
A.8.2.3
Handling of assets Procedures for handling assets shall be developed and implemented in accordance with the information classification scheme adopted by the organization.
v
X
X
Yes
A.8.3.1
Management of removable media Procedures shall be implemented for the management of removable media in accordance with the classification scheme adopted by the organization.
Yes
X
X
Yes
A.8.3.2
Disposal of media Media shall be disposed of securely when no longer required, using formal procedures.
Yes
X
X
Yes
A.8.3.3
Physical media transfer Media containing information shall be protected against unauthorized access, misuse or corruption during transportation.
Yes
X
X
Yes
A.9.1.1
Access control policy An access control policy shall be established, documented and reviewed based on business and information security requirements.
Yes
X
X
Yes
A.9.1.2
Access to networks and network services Users shall only be provided with access to the network and net-work services that they have been specifically authorized to use.
Yes
X
X
Yes
A.9.2.1
User registration and deregistration A formal user registration and de-registration process shall be implemented to enable assignment of access rights.
Yes
X
X
Yes
A.9.2.2
User access provisioning A formal user access provisioning process shall be implemented to assign or revoke access rights for all user types to all systems and services.
Yes
X
X
Yes
A.9.2.3
Management of privileged access rights The allocation and use of privileged access rights shall be restricted and controlled.
Yes
X
X
Yes
A.9.2.4
Management of secret authentication information of users The allocation of secret authentication information shall be controlled through a formal management process.
Yes
X
X
Yes
A.9.2.5
Review of user access rights Asset owners shall review users’ access rights at regular intervals.
Yes
X
X
Yes
A.9.2.6
Removal or adjustment of access rights The access rights of all employees and external party users to information and information processing facilities shall be removed upon termination of their employment, contract or agreement, or adjusted upon change.
Yes
X
X
Yes
A.9.3.1
Use of secret authentication information Users shall be required to follow the organization’s practices in the use of secret authentication information.
Yes
X
X
Yes
A.9.4.1
Information access restriction Access to information and application system functions shall be restricted in accordance with the access control policy.
Yes
X
X
Yes
A.9.4.2
Secure log-on procedures Where required by the access control policy, access to systems and applications shall be controlled by a secure log-on procedure.
Yes
X
X
Yes
A.9.4.3
Password management system Password management systems shall be interactive and shall ensure quality passwords.
Yes
X
X
Yes
A.9.4.4
Use of privileged utility programs The use of utility programs that might be capable of overriding system and application controls shall be restricted and tightly controlled.
Partly
X
X
Only on production infrastructure
A.9.4.5
Access control to program source code Access to program source code shall be restricted.
Yes
X
X
Yes
A.10.1.1
Policy on the use of cryptographic controls A policy on the use of cryptographic controls for protection of information shall be developed and implemented.
Yes
X
X
Yes
A.10.1.2
Key management A policy on the use, protection and lifetime of cryptographic keys shall be developed and implemented through their whole lifecycle.
Yes
X
X
Yes
A.11.1.1
Physical security perimeter Security perimeters shall be defined and used to protect areas that contain either sensitive or critical information and information processing facilities.
Yes
X
X
Yes
A.11.1.2
Physical entry controls Secure areas shall be protected by appropriate entry controls to ensure that only authorized personnel are allowed access.
Yes
X
X
Yes
A.11.1.3
Securing offices, rooms and facilities Physical security for offices, rooms and facilities shall be designed and applied.
Yes
X
X
Yes
A.11.1.4
Protecting against external and environmental threats Physical protection against natural disasters, malicious attack or accidents shall be designed and applied
Yes
X
X
X
Yes
A.11.1.5
Working in secure areas Procedures for working in secure areas shall be designed and applied.
Yes
X
X
Yes
A.11.1.6
Delivery and loading areas Access points such as delivery and loading areas and other points where unauthorized persons could enter the premises shall be controlled and, if possible, isolated from information processing facilities to avoid unauthorized access.
Yes
X
Yes
A.11.2.1
Equipment siting and protection Equipment shall be sited and protected to reduce the risks from environmental threats and hazards, and opportunities for unauthorized access.
Yes
X
X
Yes
A.11.2.2
Supporting utilities Equipment shall be protected from power failures and other disruptions caused by failures in supporting utilities.
Yes
X
X
Yes
A.11.2.3
Cabling security Power and telecommunications cabling carrying data or supporting information services shall be protected from interception, interference or damage.
Yes
X
Yes
A.11.2.4
Equipment maintenance Equipment shall be correctly maintained to ensure its continued availability and integrity.
Yes
X
X
Yes
A.11.2.5
Removal of assets Equipment, information or software shall not be taken off-site without prior authorization.
Yes
X
X
Yes
A.11.2.6
Security of equipment and assets off-premises Security shall be applied to off-site assets taking into account the different risks of working outside the organization’s premises.
Yes
X
X
Yes
A.11.2.7
Secure disposal or re-use of equipment All items of equipment containing storage media shall be verified to ensure that any sensitive data and licensed software has been removed or securely overwritten prior to disposal or re-use.
Yes
X
X
Yes
A.11.2.8
Unattended user equipment Users shall ensure that unattended equipment has appropriate protection.
Yes
X
X
Yes
A.11.2.9
Clear desk and clear screen policy A clear desk policy for papers and removable storage media and a clear screen policy for information processing facilities shall be adopted.
Yes
X
X
Yes
A.12.1.1
Documented operating procedures Operating procedures shall be documented and made available to all users who need them.
Yes
X
X
Yes
A.12.1.2
Change management Changes to the organization, business processes, information pro- cessing facilities and systems that affect information security shall be controlled
Yes
X
X
Yes
A.12.1.3
Capacity management The use of resources shall be monitored, tuned and projections made of future capacity requirements to ensure the required system performance.
Yes
X
X
Yes
A.12.1.4
Separation of development, testing and operational environments Development, testing, and operational environments shall be separated to reduce the risks of unauthorized access or changes to the operational environment.
Yes
X
X
Yes
A.12.2.1
Controls against malware Detection, prevention and recovery controls to protect against malware shall be implemented, combined with appropriate user awareness.
Yes
X
X
Yes
A.12.3.1
Information backup Backup copies of information, software and system images shall be taken and tested regularly in accordance with an agreed backup policy.
Yes
X
X
Yes
A.12.4.1
Event logging Event logs recording user activities, exceptions, faults and information security events shall be produced, kept and regularly reviewed.
Yes
X
X
Yes
A.12.4.2
Protection of log information Logging facilities and log information shall be protected against tampering and unauthorized access.
Yes
X
X
Yes
A.12.4.3
Administrator and operator logs Control System administrator and system operator activities shall be logged and the logs protected and regularly reviewed.
Yes
X
X
Yes
A.12.4.4
Clock synchronisation The clocks of all relevant information processing systems within an organization or security domain shall be synchronised to a single reference time source.
Yes
X
Yes
A.12.5.1
Installation of software on operational systems Procedures shall be implemented to control the installation of software on operational systems.
Yes
X
X
Yes
A.12.6.1
Management of technical vulnerabilities Information about technical vulnerabilities of information systems being used shall be obtained in a timely fashion, the organization’s exposure to such vulnerabilities evaluated and appropriate measures taken to address the associated risk
Yes
X
X
Yes
A.12.6.2
Restrictions on software installation Rules governing the installation of software by users shall be established and implemented.
Yes
X
X
Yes
A.12.7.1
Information systems audit controls Audit requirements and activities involving verification of operational systems shall be carefully planned and agreed to minimise disruptions to business processes.
Yes
X
Yes
A.13.1.1
Network controls Networks shall be managed and controlled to protect information in systems and applications.
Yes
X
X
Yes
A.13.1.2
Security of network services Security mechanisms, service levels and management requirements of all network services shall be identified and included in network services agreements, whether these services are provided in-house or outsourced.
Yes
X
X
Yes
A.13.1.3
Segregation in networks Groups of information services, users and information systems shall be segregated on networks.
Yes
X
X
Yes
A.13.2.1
Information transfer policies and procedures Formal transfer policies, procedures and controls shall be in place to protect the transfer of information through the use of all types of communication facilities.
Yes
X
X
Yes
A.13.2.2
Agreements on information transfer Agreements shall address the secure transfer of business information between the organization and external parties.
Yes
X
X
Yes
A.13.2.3
Electronic messaging Information involved in electronic messaging shall be appropriately protected.
Yes
X
X
Yes
A.13.2.4
Confidentiality or non- disclosure agreements Requirements for confidentiality or non-disclosure agreements reflecting the organization’s needs for the protection of information shall be identified, regularly reviewed and documented.
Yes
X
X
X
Yes
A.14.1.1
Information security requirements analysis and specification The information security related requirements shall be included in the requirements for new information systems or enhancements to existing information systems.
Yes
X
X
Yes
A.14.1.2
Securing application services on public networks Information involved in application services passing over public networks shall be protected from fraudulent activity, contract dispute and unauthorized disclosure and modification.
Yes
X
X
Yes
A.14.1.3
Protecting application services transactions Information involved in application service transactions shall be protected to prevent incomplete transmission, mis-routing, unauthorized message alteration, unauthorized disclosure, unauthorized message duplication or replay.
Yes
X
X
Yes
A.14.2.1
Secure development policy Rules for the development of software and systems shall be established and applied to developments within the organization.
Yes
X
X
Yes
A.14.2.2
System change control procedures Changes to systems within the development lifecycle shall be controlled by the use of formal change control procedures.
Yes
X
X
Yes
A.14.2.3
Technical review of applications after operating platform changes When operating platforms are changed, business critical applications shall be reviewed and tested to ensure there is no adverse impact on organizational operations or security.
Yes
X
X
Yes
A.14.2.4
Restrictions on changes to software packages Modifications to software packages shall be discouraged, limited to necessary changes and all changes shall be strictly controlled.
Yes
X
Yes
A.14.2.5
Secure system engineering principles Principles for engineering secure systems shall be established, documented, maintained and applied to any information system implementation efforts.
Yes
X
X
Yes
A.14.2.6
Secure development environment Organizations shall establish and appropriately protect secure development environments for system development and integration efforts that cover the entire system development lifecycle.
Yes
X
X
Yes
A.14.2.7
Outsourced development The organization shall supervise and monitor the activity of out-sourced system development.
Yes
X
X
Yes
A.14.2.8
System security testing Testing of security functionality shall be carried out during development.
Yes
X
X
Yes
A.14.2.9
System acceptance testing Acceptance testing programs and related criteria shall be established for new information systems, upgrades and new versions.
Yes
X
X
Yes
A.14.3.1
Protection of test data Test data shall be selected carefully, protected and controlled.
Yes
X
X
Yes
A.15.1.1
Information security policy for supplier relationships Information security requirements for mitigating the risks associated with supplier’s access to the organization’s assets shall be agreed with the supplier and documented.
Yes
X
X
Yes
A.15.1.2
Addressing security within supplier agreements All relevant information security requirements shall be established and agreed with each supplier that may access, process, store, communicate, or provide IT infrastructure components for, the organization’s information.
Yes
X
X
Yes
A.15.1.3
Information and communication technology supply chain Agreements with suppliers shall include requirements to address the information security risks associated with information and communications technology services and product supply chain
Yes
X
X
Yes
A.15.2.1
Monitoring and review of supplier services Organizations shall regularly monitor, review and audit supplier service delivery.
Yes
X
X
Yes
A.15.2.2
Managing changes to supplier services Changes to the provision of services by suppliers, including maintaining and improving existing information security policies, procedures and controls, shall be managed, taking account of the criticality of business information, systems and processes involved and re-assessment of risks.
Yes
X
X
Yes
A.16.1.1
Responsibilities and procedures Management responsibilities and procedures shall be established to ensure a quick, effective and orderly response to information security incidents.
Yes
X
X
Yes
A.16.1.2
Reporting information security events Information security events shall be reported through appropriate management channels as quickly as possible.
Yes
X
X
Yes
A.16.1.3
Reporting information security weaknesses Employees and contractors using the organization’s information systems and services shall be required to note and report any observed or suspected information security weaknesses in systems or services.
Yes
X
X
Yes
A.16.1.4
Assessment of and decision on information security events Information security events shall be assessed and it shall be decided if they are to be classified as information security incidents.
Yes
X
X
Yes
A.16.1.5
Response to information security incidents Information security incidents shall be responded to in accordance with the documented procedures.
Yes
X
X
Yes
A.16.1.6
Learning from information security incidents Knowledge gained from analysing and resolving information security incidents shall be used to reduce the likelihood or impact of future incidents.
Yes
X
Yes
A.16.1.7
Collection of evidence The organization shall define and apply procedures for the identification, collection, acquisition and preservation of information, which can serve as evidence.
Yes
X
Yes
A.17.1.1
Planning information security continuity The organization shall determine its requirements for information security and the continuity of information security management in adverse situations, e.g. during a crisis or disaster.
Yes
X
X
Yes
A.17.1.2
Implementing information security continuity The organization shall establish, document, implement and maintain processes, procedures and controls to ensure the required level of continuity for information security during an adverse situation.
Yes
X
X
Yes
A.17.1.3
Verify, review and evaluate information security continuity The organization shall verify the established and implemented information security continuity controls at regular intervals in order to ensure that they are valid and effective during adverse situations.
Yes
X
X
Yes
A.17.2.1
Availability of information processing facilities Information processing facilities shall be implemented with redundancy sufficient to meet availability requirements.
Yes
X
X
Yes
A.18.1.1
Identification of applicable legislation and contractual requirements All relevant legislative statutory, regulatory, contractual requirements and the organization’s approach to meet these requirements shall be explicitly identified, documented and kept up to date for each information system and the organization.
Yes
X
Yes
A.18.1.2
Intellectual property rights Appropriate procedures shall be implemented to ensure compliance with legislative, regulatory and contractual requirements related to intellectual property rights and use of proprietary software products.
Yes
X
Yes
A.18.1.3
Protection of records Records shall be protected from loss, destruction, falsification, unauthorized access and unauthorized release, in accordance with legislatory, regulatory, contractual and business requirements.
Yes
X
Yes
A.18.1.4
Privacy and protection of personally identifiable information Privacy and protection of personally identifiable information shall be ensured as required in relevant legislation and regulation where applicable.
Yes
X
X
X
Yes
A.18.1.5
Regulation of cryptographic controls Cryptographic controls shall be used in compliance with all relevant agreements, legislation and regulations.
Yes
X
X
X
Yes
A.18.2.1
Independent review of information security The organization’s approach to managing information security and its implementation (i.e. control objectives, controls, policies, pro- cesses and procedures for information security) shall be reviewed independently at planned intervals or when significant changes occur.
Yes
X
Yes
A.18.2.2
Compliance with security policies and standards Managers shall regularly review the compliance of information processing and procedures within their area of responsibility with the appropriate security policies, standards and any other security requirements.
Yes
X
X
Yes
A.18.2.3
Technical compliance review Information systems shall be regularly reviewed for compliance with the organization’s information security policies and standards.
Yes
X
X
Yes
Role
Competencies
How competencies are assessed
ISMS Manager
Technical Leadership experience
Technical and architectural expertise
Experience in an environment with high security requirements
Competencies are assessed during recruitment process and ISMS annual review meeting.
ISMS Implementer
Information Security Leadership experience
Information Security expertise
Competencies are assessed during recruitment process and ISMS annual review meeting.
ISMS Internal Auditor
Auditor experience
ISO 27001 expertise
Competencies are assessed during recruitment/purchasing process and ISMS annual review meeting.
Leadership Team
FundApps Staff
Knowledge of FundApps' Information Security Policies
Knowledge on how to react to most common security threats (e.g. react to phishing emails)
Competencies are assessed during new joiner information security training and during annual refreshers.
Define the version control, change approval and review cycle of FundApps policies.
FundApps Information Security , Risk management and business continuity policies.
Policies in scope shall be versioned through the use of git. Any change to a policy will be tied to a commit number and an author. This information will be stored in the policies git log.
Policies in scope shall be approved by a member of the leadership team. These approvals will be stored in the policies git log.
Policies in scope shall be reviewed by the Information Security Lead and at least one member of the Leadership Team annually.
Whatever part of FundApps we work in we are ambassadors for our company.
Lots of us are having conversations and sharing through social media or online communities. We approach the online world in the same way we do the physical one – by using sound judgement, respect and common sense.
It applies to anyone working for and on behalf of FundApps. This policy doesn’t form part of your contract and may be amended at any time.
This policy covers the use of any online platform which can be used for networking, sharing information or opinions. This includes posting comments, pictures, videos, blogging, using forums, sending private messages relating to FundApps its clients or colleagues, endorsing other people’s content and re-tweeting/circulating posts. It covers platforms like YouTube, LinkedIn, Facebook, Twitter, Instagram, Pinterest, Yammer and Instant Messaging services e.g. WhatsApp, etc., or any other existing or new social media platforms, whether it’s internal or external on your own or a work device.
If you want to then yes you can; just make sure it’s clear that you’re not speaking on behalf of FundApps and say that ‘all views are my own’ somewhere on your profile.
If your profile mentions FundApps, be honest about who you are and what you do. Never share your login details or let others post on your behalf. If you’re leaving, remember to update your profile with your new company name or employment status.
Be respectful to other people, even if you disagree with their opinion.
Don’t post things or send messages that could damage our reputation, bring the company into disrepute or cause actual or likely harm to the company or colleagues.
Don’t use statements, photos, videos, audio or send messages that reasonably could be viewed as malicious, abusive, offensive, obscene, threatening, intimidating or contain nudity or images of a sexual nature, or that could be seen as bullying, harassment or discrimination.
You’re responsible for what you put online and any impact it has on others so set up privacy settings if you need to. Never give out personal or private information about colleagues or clients. As a general rule, if you wouldn’t say or show it to your manager, then it’s probably not appropriate to post or send it online!
And remember, what you post or send can be difficult to delete once it’s online.
Help us protect our company and reputation by thinking carefully about what you put online. If you see something online that concerns you please talk to the senior management team.
Even when you say something is your personal opinion we can still be held liable, so pause and think before you post.
You should never assume your social media content won’t reach a wider, public audience. Even if it was originally meant for a small group of friends or for a private message, colleagues or clients may have access to things you put online.
Disseminating confidential or sensitive information; or posting, sharing or endorsing inappropriate messages about your colleagues or FundApps, could result in disciplinary action, which could lead to your dismissal.
To help protect our business anything you develop or create, including programs or documentation, whilst working for us remains the property of FundApps and must not be used or shared on social media sites or online forums, unless you have specific permission from your director to do so.
Never reveal confidential or sensitive information including anything that is given to us in confidence by suppliers or third parties.
This includes information about FundApps which is not in the public domain.
Intellectual property laws (which include copyright and trademarks) are in place to protect the ideas people have, create or develop so that other people can’t steal or use them without permission. For example, FundApps is our trademark, which means we can stop other people from using it on their products.
We must always take care to protect intellectual property rights and respect the rights of others. Stealing someone’s idea can reflect badly on FundApps and damage client trust.
Most forms of published information are protected by copyright, which means you shouldn’t re-use it without getting the owner’s permission first.
Copyright applies to stuff that’s used both internally and externally so make sure you always respect copyright and see permission first – even if it’s only being used within FundApps. Copyright can also apply when sharing content on Twitter and Facebook, so be mindful when doing this.
You should use your personal e-mail address unless you’re speaking on behalf of the company (and are authorised to do so).
Yes, as long as it’s connected with work, appropriate to post, does not reveal confidential information and any people in the photo are happy for it to be posted.
Yes, if you’re using social media for part of your job or it’s related to work (for example, to help a client). Otherwise, using social media during working hours must be reasonable and shouldn’t interfere with you carrying out your job.
If it’s something that’s personally offensive to you, you should speak to the person involved, if you’re comfortable to do so, and ask them to remove the post. If the posts aren’t removed or it happens again you should speak to your manager about it. If the post is directly about you, and has been posted without your consent or you’re offended by it, or it’s inappropriate, please speak to your manager or the senior management team.
If you endorse, share or send an offensive or inappropriate comment or message about FundsApps or your colleagues, it will be investigated and may result in us taking disciplinary action against you, which could lead to your dismissal.
If the post contains company information which you believe to be confidential (basically something which isn’t already in the public domain), you should report this immediately to our CTO and security@fundapps.co.
Yes. Social media sites are scanned for any mention of FundApps, our products and services or inappropriate comments about the company, our colleagues, managers or clients. If you spot anything that’s been posted about our business that concerns you please contact the senior management team.
Inappropriate behaviour including posting confidential or sensitive information will be investigated, and may result in us taking disciplinary action against you which could lead to your dismissal. You will be asked to co-operate with any investigation.
If it comes to our attention that any inappropriate posts, comments or messages have been made/sent by you or can be viewed on your profile, then we reserve the right to access these posts and to take copies of them. You may also be asked to remove any content that we consider to be a breach of this policy. If you don’t remove the content when asked, it may result in disciplinary action. Any such posts may be used in internal proceedings and/or legal action.
We treat the online world the same as the physical one, so if your post, comment or message would breach our policies in another forum it will breach it in an online forum too.
For anyone else not directly employed by FundApps: if you breach this policy we may terminate the arrangements we have with you for your services.
FundApps backups production data to local storage at the following frequency:
Weekly full backups,
Daily differential backups,
15 minute transaction log backups.
Backups are retained for a week on the local disk and replicated immediately into archival storage (AWS S3) in the primary and secondary regions. The archival storage retains 30 days of all backups generated.
Each backup contains the entire history of the client instance. Backup integrity is checked automatically at the end of each backup. Backups are fully encrypted.
FundApps logs system and network events in order to detect and respond to information security threats.
The following events are logged:
Application events:
Login attempts,
Changes to users and privileges,
System events:
System accesses,
File system accesses,
Host-based IPS (Intrusion Prevention System) alerts.
Network events:
Network traffic,
Network-based IPS (Intrusion Prevention System) alerts.
All events are aggregated, stored centrally and protected against alteration.
FundApps has processes in place to monitor logs. Automated alerting of certain events or event thresholds allows FundApps staff and a 24/7 Security Operation Centre to detect and respond to a potential security incident.
Security alerts are reviewed by the Information Security Lead and tracked in the Security Incident and Event Management tool and a summary is provided during the monthly security meeting.
The purpose of this policy is to define the way in which FundApps manages patching of it's Information System.
The policy applies to all FundApps managed Information Systems.
End user computers must receive system patches automatically. Users must not be able to defer patching for more than 30 days.
Proxy servers must be cycled at least on a monthly basis, and must be built using an image including the latest system patches.
Web servers must receive system patches automatically every month.
Other servers must receive system patches at least every 3 months.
The purpose of this policy is to define the way in which FundApps raises, approves, records and reviews exceptions to its information security policies.
This policy applies to all exceptions to FundApps' security policies.
All exceptions must be raised to the Information Security Lead, the CTO or the CEO in a timely fashion once they have been detected.
Exceptions must be approved by the Information Security Lead, the CTO or the CEO.
Exceptions will be reviewed by the Information Security Lead yearly.
The purpose of this policy is to define the way in which FundApps detects, classifies, mitigates and corrects vulnerabilities on its Information System. Effective implementation of this policy will allow to reduce the probability and/or impact of vulnerabilities affecting the FundApps Information System
This policy applies to applications and infrastructure which makes up FundApps’ production environment. Physical vulnerability management is out of scope of this policy and managed by our hosting provider (AWS).
Applications
FundApps performs a technical security audit annually against FundApps’ application in order to detect vulnerabilities and other security concerns.
This assessment is performed against an environment identical to the production environment except it doesn’t contain production or sensitive data.
An executive summary of the assessment and it’s finding is made available to clients upon request within 20 working days of the assessment being completed.
Infrastructure
FundApps performs an automated scanning of vulnerabilities on its production infrastructure on a monthly basis.
Applications
Infrastructure
Process
Once vulnerabilities have been identified, rated and formalised, FundApps will manage risk treatment based on the following diagram:
By default, and as a maximum, the vulnerability acceptance period will be one year.
Applications
FundApps will endeavour to address vulnerabilities based on their severity as defined in the following table:
Critical
High
Medium
Low
Action plan defined
<=2 (*)
<=5 (*)
<=20 (*)
<=20 (*)
Vulnerability mitigated
<=2 (*)
<=5 (*)
<=20 (*)
<=20 (*)
Vulnerability corrected or accepted (**)
<=2 (*)
<=5 (*)
<=20 (*)
<=20 (*)
(*) number of working days after application vulnerability report is formalised. (**) Critical or High vulnerabilities will not be accepted. In the worst case scenario FundApps will mitigate these to reduce the risk to Medium.
Infrastructure
FundApps will endeavour to address infrastructure vulnerabilities based on their severity as defined in the following table:
Critical
High
Medium
Low
Vulnerability corrected or accepted
<=20 (*)
<=40 (*)
<=60 (*)
Best effort
(*) number of working days after vulnerability has been identified.
A rapid response to incidents that threaten the confidentiality, integrity, and availability (CIA) of FundApps information assets, information systems and the networks that deliver the information is required to protect those assets. Without a rapid response, those assets could be compromised and FundApps could be in breach of legislation, our own stated policies, and the potential of of breaching the trust of our clients and users.
Information Security incidents will occur that require full participation of FundApps technical staff as well as management leadership to properly manage the outcome. To accomplish this FundApps has established an incident response policy and procedures that will ensure appropriate leadership and technical resources are involved to:
assess of the seriousness of an incident
assess the extent of damage
identify the vulnerability created
estimate what additional resources are required to mitigate the incident
It will also ensure that proper follow-up reporting occurs and that procedures are adjusted so that responses to future incidents are improved.
The primary emphasis of processes and activities described within this policy is the return to a normal (secure) state as quickly as possible, whilst minimising the adverse impact to FundApps. The capture and preservation of incident relevant data (e.g., network flows, data on drives, access logs, etc.) is performed primarily for the purpose of problem determination and resolution. Strict forensic measures are not used in the data capture and retention. Forensic measures will be determined on a case by case basis.
Contingency Planning, Business Continuity and Disaster Recovery are governed by a different set of policies. An event may initially be declared an ‘Information Security Incident’ and subsequently declared to be a ‘Disaster’. In this case, the activities described below will be included in the Disaster Recovery process.
An Information Security Incident is generally defined as any known or highly suspected circumstance that results in an actual or possible unauthorised release of information deemed sensitive by FundApps or subject to regulation or legislation, beyond FundApps sphere of control.
Examples of an Information Security Incident may include but are not limited to:
the theft or physical loss of computer equipment known to hold files containing sensitive client or company information
a server known to hold sensitive data is accessed or otherwise compromised by an unauthorised party
the FundApps network is subjected to a Distributed Denial of Service (DDoS) attack
a firewall is accessed by an unauthorised entity
a network outage is attributed to the activities of an unauthorised entity
For the purposes of this protocol, incidents are categorised as “Unauthorised Access” or “Unauthorised Acquisition” and can be recognised by associated characteristics.
The unauthorised access to or disclosure of FundApps or client information through network and/or computing related infrastructure, or misuse of such infrastructure, to include access to related components (e.g., network, server, workstation, router, firewall, system, application, data, etc.). Characteristics of security incidents where unauthorised access might have occurred may include but are not limited to:
Evidence (e‐mail, system log) of disclosure of sensitive data
Anomalous traffic to or from the suspected target
Unexpected changes in resource usage
Increased response time
System slowdown or failure
Changes in default or user‐defined settings
Unexplained or unexpected use of system resources
Unusual activities appearing in system or audit logs
Changes to or appearance of new system files
New folders, files, programs or executables
User lock out
Appliance or equipment failure
Unexpected enabling or activation of services or ports
Protective mechanisms disabled (firewall, anti‐virus)
The unauthorised physical access to, disclosure or acquisition of assets containing or providing access to FundApps or client information (e.g., removable drives or media, hardcopy, file or document storage, server hardware, etc.)/ Characteristics of security incidents where unauthorised acquisition might have occurred may include but are not limited to:
Theft of computer equipment where sensitive data is stored
Loss of storage media (removable drive, flash drive, etc)
Illegal entry (burglary)
Suspicious or foreign hardware is connected to the network
Normally secured storage areas found unsecured
Broken or non‐functioning locking mechanisms
Presence of unauthorised personnel in secured areas
Disabled security cameras or devices
Incidents assigned a criticality rating according to the actual and potential impact on the business of FundApps.
Level
Level Definition
Typical Incident Categories
Incident Response Time
C1
Incident affecting critical systems or information with potential to be revenue or client impacting.
Denial of service Compromised Asset (critical) Internal Hacking (active) External Hacking (active) Virus / Worm (outbreak) Destruction of property (critical)
60 minutes
C2
Incident affecting non‐critical systems or information, not revenue or client impacting. Employee investigations that are time sensitive should typically be classified at this level.
Internal Hacking (not active) External Hacking (not active) Unauthorised access Policy breaches Unlawful activity Compromised information Compromised asset (non‐critical) Destruction of property (non‐critical)
4 hours
C3
Possible incident, non‐critical systems. Incident or employee investigations that are not time sensitive. Long‐term investigations involving extensive research and/or detailed forensic work.
Email Forensics Request Inappropriate use of property. Policy breaches
48 hours
Key roles and responsibilities of those who form part of the Incident Response Team (IRT) have been defined below:
Role
Responsibilities
CTO or Information Security Lead
Incident response team lead (IRTL)
CEO
Participates in incident response team, leading external communications.
IT Team / Engineering
Normally form part of the incident response team, subject to CTO approval after initial assessment.
The Critical Incident Response Protocol consists of these key components
Detection
Activation of team
Containment
Notification of non-IRT team members
Assessment
Notification of external parties
Corrective Measures
Washup & lessons learned
Closure
Timely detection of incidents is critical to containment and minimizing it's impact on our business and clients. Please see our IT security policy and specific controls regarding how we detect security incidents.
All suspected security incidents are reported to the Incident Response Team Lead, mobilization will be immediate and based on initial orientation and observation. Notification of the rest of the team should occur via a direct communication - that is any form of communication where you get a response from the other party (ie voicemail or email are not considered direct notification). Team members should rely on usual company communication channels to ensure they have up to date information.
The IRT will determine and cause to be executed the appropriate activities and processes required to quickly contain and minimise the immediate impact to the FundApps and our clients.
Containment activities are designed with the primary objectives of:
Counteract the immediate threat
Prevent propagation or expansion of the incident
Minimise actual and potential damage
Restrict knowledge of the incident to authorised personnel
Preserve information relevant to the incident
Activities that may be required to contain the threat presented to systems where unauthorised access may have occurred:
A1. Disconnect the system or appliance from the network or access to other systems.
A2. Isolate the affected IP address from the network.
A3. Power off the appliance(s), if unable to otherwise isolate.
A4. Disable the affected application(s).
A5. Discontinue or disable remote access.
A6. Stop services or close ports that are contributing to the incident.
A7. Remove drives or media known or suspected to be compromised.
A8. Where possible, capture and preserve system, appliance and application logs, network flows, drives and removable media for review.
A9. Notify IRT of status and any action taken.
Activities that may be required to contain the threat presented to a assets where unauthorised acquisition may have occurred:
B1. Identify missing or compromised assets.
B2. Gather, remove, recover and secure sensitive materials to prevent further loss or access.
B3. Power down, recycle or remove equipment known to be compromised.
B4. Where possible, secure the premises for possible analysis by local management and law enforcement.
B5. Gather and secure any evidence of illegal entry for review by local management and law enforcement.
B6. Where possible, record identities of all parties who were a possible witness to events.
B7. Preserve camera logs and sign‐in logs for review by local management and law enforcement.
B8. Notify IRT of disposition of assets and any action taken.
Designated persons will take action to notify the appropriate internal parties, as necessary. All internal & external communication must be approved by the IRT Lead
The IRT will determine the category and severity of the Incident and undertake discussions and activities to best determine the next best course of action, i.e., decide if protocol execution is required. Once the IRT is assembled, the Assessment Checklist is executed and reviewed to ensure all pertinent facts are established. All discussions, decisions and activities are to be documented.
Assessment should consist of the following at a minimum:
Incident data
The current date and time, and a brief description of the Incident
Who discovered the incident and how?
Types of information
What is the nature of the data?
Was the data held by FundApps or a third party?
How was the information held? Was the data encrypted or otherwise obfuscated?
Risk
Can we reasonably determine the risk or exposure?
To what degree are we certain that the data has or has not been released?
Can we identify and do we have contact with the party that received the data or caused the compromise? Describe what is known.
Identify the impacted clients, if possible.
What is the risk or exposure to FundApps?
What is the risk or exposure to the client?
Next Steps
Do we have enough information to establish the category and severity of the Incident?
If additional data collection data is required, assign responsibility to IRT member for collection
Is there any deadline or reporting requirement (self‐imposed or regulatory) we need to address?
What communications need to be established? Provide details
Are there any immediate issues that have not been addressed? Describe
Recap all work and responsibility assignment
When do we meet again to follow‐up? Provide details
Is this incident going to have legal impacts, requiring forensic evidence to be gathered? If so, refer to section Gathering Forensic Evidence.
The following rules should be enforced when interacting with potential evidence:
Save the original materials: You should always work on copies of the digital evidence as opposed to the original. This ensures that you are able to compare your work products to the original that you preserved unmodified.
Take photos of physical evidence: Photos of physical (electronic) evidence establish the chain of custody and make it more authentic.
Take screenshots of digital evidence content: In cases where the evidence is intangible, taking screenshots is an effective way of establishing the chain of custody.
Document date, time, and any other information of receipt. Recording the timestamps of whoever has had the evidence allows investigators to build a reliable timeline of where the evidence was prior to being obtained. In the event that there is a hole in the timeline, further investigation may be necessary.
Provide third party company with a bit-for-bit clone of digital evidence. This ensures that they have a complete duplicate of the digital evidence in question.
Perform a hash test analysis to further authenticate the working clone.
Designated persons will take action to notify the appropriate internal and external parties, as necessary. Communications may include meetings, video conferencing, teleconferencing, e‐mail, telephone/messaging, voice recordings or other means as deemed appropriate. All external communication must be approved by the IRT Lead. FundApps will endeavour to notify clients of any potential incidents impacting the confidentiality, integrity or availability of the client's data, stored in the FundApps platform, no later than 48 hours after having first detected an anomaly.
Clients - IRT Lead or CEO will establish communication with Clients, as appropriate for the circumstance
Other affected parties - IRT Lead or CEO will establish communication with other affected parties (such as hosting providers) as appropriate for the circumstance
Law enforcement - IRT Lead will establish if law enforcement is required and take appropriate action
Government or Regulatory Bodies - IRT Lead will establish if government notification (e.g. Information Commissioner) is required and take appropriate action
Media interest - CEO will deal with any communications with Media.
The IRT will determine and cause to be executed the appropriate activities and processes required to quickly restore circumstances to a normal (secure) state.
Corrective measures are designed with the primary objectives of:
Secure the processing environment
Restore the processing environment to its normal state
Activities that may be required to return conditions from unauthorised access to a normal and secure processing state.
A1. Change passwords on all local user and administrator accounts or otherwise disable the accounts as appropriate.
A2. Change passwords for all administrator accounts where the account uses the same password across multiple appliances or systems (servers, firewalls, routers).
A3. Re image systems to a secure state.
A4. Restore systems with data known to be of high integrity.
A5. Apply OS and application patches and updates.
A6. Modify access control lists as deemed appropriate.
A7. Implement IP filtering as deemed appropriate.
A8. Modify/implement firewall rule sets as deemed appropriate.
A9. Ensure anti‐virus is enabled and current.
A10. Make all personnel “security aware”.
A11. Monitor/scan systems to ensure problems have been resolved.
A12. Notify IRT of status and any action taken.
Activities that may be required to return conditions from an unauthorised acquisition to a normal and secure processing state.
B1. Retrieve or restore assets where possible.
B2. Store all sensitive materials in a secure manner (e.g., lockable cabinets or storage areas/container).
B3. Install/replace locks and issue keys only to authorised personnel.
B4. Restore security devices and/or apparatus to working condition.
B5. Remove and retain unauthorised equipment from network/area.
B6. Implement physical security devices and improvements (e.g., equipment cables, alarms) as deemed appropriate.
B7. Make all personnel “security aware”.
B8. Notify IRT of status and any action taken.
After the incident has been dealt with, a subsequent washup session will be run in order to identify if any further lessons can be learnt or actions taken aside from the immediate corrective measures.
The IRT will stay actively engaged throughout the life cycle of the Information Security Incident to assess the progress/status of all containment and corrective measures and determine at what point the incident can be considered resolved.
Recommendations for improvements to processes, policies, procedures, etc. will exist beyond the activities required for incident resolution and should not delay closing the Information Security Incident.
The purpose of this policy is to define the way in which FundApps retains data throughout it's systems.
The policy applies to all data processed or stored by FundApps.
FundApps retains the following sets of data within it's production platform during the lifetime of the contract with its clients:
Data uploaded to the platform;
Application audit trail (i.e. actions performed by users in application).
Upon contract termination FundApps will securely delete all client data from its infrastructure within 20 working days. A copy of this data can be provided to the client prior to deletion, based on contractual agreements.
FundApps stores technical logs and events related to its production infrastructure within a centralised log management platform. Data is retained for at least one year.
All other data which do not fall in the previous categories is retained by FundApps within its systems for the length of time deemed adequate by FundApps to provide its service efficiently.
Our AWS stack is designed with two primary failure modes: Failover and Disaster Recovery. Failover is catered for entirely within a single geographic region using a highly available primary environment. In this primary environment data is replicated synchronously between multiple database servers and redundant systems are used to ensure the maximum possible continuity of service.
These redundant systems are distributed across several AWS Availability Zones (AZs) in a single geographic region (Dublin, Ireland). AWS have multiple AZs per geographic region, but each AZ has discrete power and internet connectivity. We use two availability zones simultaneously for web traffic, reducing the effect of any failure on the availability of the service, and three availability zones for hosting database services.
Disaster Recovery functionality is provided from a secondary geographic region (Frankfurt, Germany) and this mode is intended to meet a 4 hour RTO in case of total loss/failure of the primary environment. This is facilitated by shipping backups on a regular basis to encrypted storage in the region.
Configuration management and automation allows spin up of the other platform components in this region to support a deployment of the system in the absence of our primary geographic location.
Our clients include high profile companies with high availability and service expectations. It is therefore vital that FundApps maintain service and in the event of disruption, are able to effectively manage the incident and communicate with all key interested parties.
Any loss of service from the data centres or our key services will impact the reputation of FundApps, result in loss of revenue through service credits and other compensations, and potentially damage FundApps irreparably in the marketplace.
NOTE: This document describes the management systems framework intended for compliance with ISO 22301. It is designed to provide some documentation that is needed by ISO 22301, with pointers to the other key documents, and is aligned in structure to ISO 22301 for ease of assessing compliance.
The scope of the Business Continuity Management System includes:
The following locations:
FundApps offices (London, GB; New York, USA; Singapore, Singapore)
Amazon data centres in:
Dublin
Frankfurt
Included in the scope are all FundApps staff and any key contractors working on behalf of FundApps
All data centre provision and hardware operations are outsourced to Amazon Web Services. FundApps do not have cause to visit these locations. All data centre staff and operations are outside the scope. All of FundApps’ products and services are within scope.
Top management commitment is demonstrated through the policy endorsed by the management team including Andrew White, CEO, Toby O'Rourke, CTO, and the participation of the top management team in the Crisis Management Team and their active involvement in the associated exercising alongside operational teams.
Management commitment is shown by:
Policy and objectives endorsed by the CEO;
Integration of business continuity into the FundApps process model;
Promoting the improvement of the existing business continuity provisions to meet good practice as now recognized in ISO 22301;
Committing all business areas to supporting business continuity development;
Participation of management in BIA process and encouraging relevant team members to contribute too;
Participation of management, deputies and team members in exercising at business unit level.
As part of establishing the BCMS the following has been undertaken:
Establishing roles, responsibilities and competencies and associated training programme;
Defining acceptable risk;
Establishing internal audit procedures and programme;
Establishing management review processes that monitor the effectiveness of the BCMS;
Demonstrating continual improvement.
Following a disruptive incident, our highest priority is staff welfare, so they are safe and able to address the other matters arising from the incident.
This includes ensuring safe evacuation from affected premises, safe containment within affected premises, ensuring that staff are paid in a timely manner, and managing all issues arising from disruptive incidents that directly impact on staff.
FundApps’s management team have experience from other organisations that promoted an awareness of the need for business continuity and consequently the resilience of the service has always been a key consideration. This has been re-enforced by some planned activities such as moving office, recent transport strikes and planned maintenance in the data centre requiring a planned failover to the alternate data centre. All such events are recorded within the BCMS.
FundApps considered all potential interested parties and referred to Figure 2 to ensure comprehensive coverage.
FundApps’s key interested parties include:
FundApps’ shareholders – FundApps is a privately held company and not quoted on the LSE or elsewhere;
FundApps’ staff;
FundApps’ clients;
Financial Services regulators who preside over the activities of FundApps’ clients.
Media handling is undertaken directly by the CEO. Further media handling during an incident is undertaken within the Crisis Management process, with specific guidance in the Crisis Management Plan.
Neighbours activities have been considered as part of the risk assessment, in order to identify any areas where neighbours’ activities may pose risks to FundApps operations. FundApps have liaised with the landlord’s agents and other building occupants regarding business continuity issues, in particular rehearsing evacuation procedures, sharing information and liaising with the emergency services.
Emergency Services will in most circumstances deal with the landlords – i.e. the hosting provider at the data centres and the landlord’s agents at FundApps office. In some circumstances, FundApps may specifically be contacted and one such circumstance was explored during the 2014 Crisis Management exercise which required working with the Ambulance, Police and HPA.
FundApps’s staff have expectations that FundApps will continue to employ them and treat them fairly with due care in the event of a disruptive incident.
All staff are required to provide emergency contact details and these are held in our internal portal, providing a means of contacting staff outside of the normal channels and allowing FundApps to provide information to the emergency services should the need arise.
FundApps have not been specifically targeted by pressure groups but are aware that they and their clients may be targeted due to the general discontent with financial services firms following the financial crisis. This is specifically reviewed as part of the business continuity risk assessment and is under constant review as part of the maintenance and enhancement of the ISMS.
FundApps complies with all applicable UK Laws including Health and Safety at Work Act 1974 and these are detailed in the ISMS. FundApps have no specific legal and regulatory obligations to implement business continuity management. This is reviewed annually as part of the overall BCMS review. This review is a simple process:
Identify any key changes to legislation that may apply to FundApps;
Review new clients or changes to existing clients’ business to determine if there are any legal and regulatory requirements on them that may imply new or changed requirements on FundApps;
Any issues that arise are included as non-conformities within the BCMS where they will be assigned ownership and resolved.
New clients’ legal and regulatory requirements are always considered during the sales process.
FundApps’ target clients are Financial Services Firms who have advanced business continuity programmes including There is an expectation in clients that FundApps will have business continuity management in place, this forming an implicit or explicit part of the contractual relationship with the clients.
Clients are responsible for the IT DR relating to their services. FundApps offer and will build resilient services with appropriate IT DR. A plan has been lodged with FundApps within its BCMS. FundApps are therefore contractually obligated to enact these when a major incident occurs. Clients therefore have a reasonable expectation that FundApps have the capacity and capability to do this.
FundApps’s shareholders have a reasonable expectation that the company will continue to operate and make returns on capital. Consequently ensuring that unexpected and difficult incidents are managed effectively is an implied requirement on FundApps of their financial backers.
The Business Continuity Policy is maintained by the Information Security Lead and is endorsed by:
Andrew White, CEO,
Toby O'Rourke, CTO.
It is an open document and available to all employees through our internal portal, and on request to any interested party.
The Business Continuity Management System (BCMS) is the responsibility of the Information Security Lead. It is his responsibility to ensure that the BCMS is established, implemented, operated and maintained.
The BCMS defines the incident response structure, and what supporting business continuity plans are required. The BCMS defines the Exercise Programme which is agreed for each coming calendar year and approved by management through the business continuity management forum. Each plan has a designated owner.
Each business continuity plan owner and they are responsible for:
Defining impacts to their business area that may arise following a disruptive incident
Identifying risks to their business
Defining their requirements following any disruptive incident
Populating a standard FundApps business continuity plan and maintaining this plan
Reviewing their business continuity plan on a 6 monthly basis and when significant changes occur to ensure details are current
Undertaking basic exercises as required in the Exercise Programme according to the guidelines provided
Participating in other exercises as agreed in the annual Exercise Programme
Notifying the Information Security Lead of issues arising from reviews, exercises or any other pertinent matters.
FundApps currently has three offices in London, New York and Singapore. The team work from home and away from the office on a regular basis and no data is uniquely held in the office or on the laptops with which they access the systems. Consequently there is little direct dependence on the office and the team are able to work away from this location with little difficulty.
FundApps’ business continuity objectives are:
Ensure the safety of staff and other occupants for which they are responsible, within the buildings;
Minimize disruption to clients and hence protect reputation and standing;
Enable a return to normal operations in the shortest practical time with the minimum of disruption;
Establish, implement and maintain a BCMS compliant with ISO22301.
FundApps raise awareness about Business Continuity needs to staff during induction and through regularly planned BCP tests.
This is to ensure staff:
Are aware of their role in business continuity and what will be expected of them following a disruptive incident
Understand their role in maintaining and improving the BCMS.
Staff who hold specific roles receive training and take part in exercising to ensure that they are ready to fulfil those roles. Any enquiries from staff requiring further details are passed to the Information Security Lead or CTO.
External communication includes existing and prospective clients and suppliers:
Existing and prospective clients will be informed of FundApps’ business continuity arrangements in outline and will receive a copy of the policy on request.
Suppliers are asked to provide information on their business continuity arrangements during the procurement process.
Client enquiries are initially dealt with by the business teams. Where additional detail is required, these are referred to the Information Security Lead or CTO.
Any communication with the local community would be by the landlord or the emergency services. Media communications are dealt with by the CEO.
The Environment Agency and the Met Office provide information on flooding and weather, and these have been identified as the only regional or national threat advisory systems. FundApps monitor these when necessary, i.e. when a warning is issued that is pertinent to FundApps. As no direct flood risk has been identified, the focus on the monitoring is on the effect it may have on staff and travel disruptions. This is considered business as usual activity and is incorporated into the incident response when necessary, and is included in the exercising programme too.
FundApps have recognised that communication following a disruptive incident can be challenging and that normal means of communication may not suffice. In order to address this, FundApps have sought to ensure that many communication channels are available including but not limited to:
Slack which enables rapid communication through a messaging system and details of who is available.
Mobile phones. Mobile phone numbers are the main point of contact for clients to senior management, for sales and technical staff.
Email (both personal and FundApps) can be used to communicate to all staff and to clients and suppliers.
SMS Text messaging to provide short messages.
Landline numbers where possible for staff.
It is recognised that in extreme circumstances all of these channels can become unavailable. Communication methods are exercised as part of the exercise programme and reviewed following incidents.
Incidents which can lead to a crisis can be detected in several ways as described hereafter:
Incidents within the data centres are detected by:
FundApps own monitoring detects the external availability of our service, and the internal availability and correct functioning of our internal services. Alerts will be raised through our monitoring software and dealt with through the incident management process.
Data centre staff and automated monitoring also notify FundApps of underlying issues with infrastructure via a public status page.
Incidents at FundApps office are detected by:
The landlords’ agents who follow their procedure to notify occupants of the building, specifically via FundApps facilities
Directly by FundApps staff who raise this with FundApps facilities or the MMC out of hours.
Incidents externally are detected by:
Media coverage
Directly by contact with the Emergency Services.
Once notified, the relevant personnel assess whether the incident is managed through normal business as usual procedures or whether further escalation is required. This is based on both experience and knowledge of the individuals and by reference to the impact criteria table in the Crisis Management Plan where necessary.
The CMT have received training and have responded to several challenging incidents. Post incident reports are available.
Ongoing exercising is designed to ensure that the CMT are well equipped to deal with incidents of all sorts and this includes relevant deputies. Similarly every business area has undertaken basic training and exercising, has had to respond to real incidents and ongoing exercising is aimed at ensuring that the whole incident response structure operates effectively.
In preparation for this, a number of actions take place:
Employee contact information is stored in the Google Drive which is externally hosted.
In addition, each employee has contact numbers already stored in their mobile phones.
In order to maintain consistency, legibility and accessibility all BCMS documentation is held as an electronic copy within FundApps’s document management system GitHub.
A summary of the main documents and its owner can be found in this document. Each document will be approved by the owner prior to issue, as will any subsequent updates. The approval process will typically be conducted via email.
GitHub has built-in version control which allows anyone with sufficient access to view previous versions and therefore facilitates comparison between versions. Unwanted documents are removed from the repository but are retrievable by IT. Documents can only be checked out for update by those with appropriate access. Each document has an assigned Owner and GitHub tracks whether documents have been appropriately approved.
An annual programme of exercising is documented and agreed. This is then executed by the Information Security Lead and the relevant business areas. Audit processes ensure that business exercises are completed and are effective. Actions arising are captured by the Information Security Lead and ownership assigned for execution.
The team undertake regular tests of the IT recovery and these are recorded in Google Drive. Any issues arising are tracked through the raising of tickets as part of business as usual fault resolution.
Identified Business Continuity risks and associated action plans are discussed during the monthly security meetings. These meetings have the following attendees:
Information Security Lead (Chair)
CTO
OPS team
The Information Security Lead reviews the FundApps Business Continuity Management System and submits changes to the management forum for validation, at a minimum, on an annual basis.
What to communicate
Whom shall communicate
Whom to communicate to
When to communicate
How to communicate
Changes to Information Security Management Policy Changes to Risk Management, Information Security, and Business Continuity Policies
Changes to Software Development Policy
Changes to Personnel and Safety Policies
Information Security Lead or CTO
Employees
Contractors
Leadership team
Clients
Prospects
Ad-hoc
Via FundApps policy portal
Risks above risk tolerance
Information Security Lead or CTO
Leadership team
Risk owner
Ad-hoc
Via Risk Register
Findings from internal or external audits
Information Security Lead or CTO
Employees
Leadership team
Ad-hoc
Via Slack
Availability of FundApps' platform
Information Security Lead or CTO
Employees
Contractors
Leadership team
Clients
Prospects
Daily
Via
Changes in security and privacy related contractual requirements
Information Security Lead or CTO
Contractors
Providers
Ad-hoc
Via email
FundApps' privacy policy is available on .
FundApps has performed a business impact analysis and maintains a risk register as part of our information security management system. The full risk register is .
Exceptions must be recorded in the Security Exception Log .
Application vulnerabilities are rated based on their impact and likelihood. Possible vulnerability ratings are Low, Medium, High and Critical. The rating system is based on the OWASP Risk Rating Methodology ().
Infrastructure vulnerabilities are rated using the Common Vulnerability Scoring System (). Possible vulnerability ratings are None (0.0), Low (0.1 - 3.9), Medium (4.0 - 6.9), High (7.0 - 8.9) and Critical (9.0 - 10.0).
Sensitive data is considered anything classified as Confidential or Restricted by our .
If the incident will have legal impacts which require a case to go to court, forensic evidence will need to be collected. This should be done by an accredited Cyber Incident Reponse third party company. A list can be found .
Retention of personal data is described in .
The existing technical environment is designed to be resilient but there are always risks that could impact the availability of our service. These known risks are recorded on a risk register in accordance with our and monitored for change in status. Opportunities for improvement are sought as part of the ongoing risk management process and the strategic development of the business.
When the Crisis Management Team (as defined in the ) is activated, the initial incident details are recorded on the Incident Report Form and subsequent updates are recorded on the “Status Report Form”. The Crisis Management Team (CMT) keep a record of issues, actions and communications and log all activity as part of the process.
The provides supporting information for the CMT to Assemble, Meet and Manage the incident including monitoring the situation and developments. It also explicitly requires consideration of closing the incident and reviewing what has been learned. Further details can be found in the .
In the event of an incident which requires the full or partial invocation of the , it is vital that the Company is able to contact all of its personnel quickly and efficiently.
Please see our for information about how we assess risks, their likelihood impact and our risk appetite.
These are documented as a set of documents which together support the incident response. There is a to support the Crisis Management Team (CMT) and plans to support IT Recovery in the event of a data centre failure. A short plan for management of the immediate response has also been developed.
FundApps has performed a business impact analysis and maintains a risk register as part of our business continuity management system. The full risk register is . We do not include the full details here, but below is a summary of the risks that we have analysed.
Ref
Risk Identified
Guidance notes
Risk type
1
Pandemic (flu like infection)
Widespread flu
National
2
Terrorist attack against UK generally
Dealt with under location risks
National
3
Regional or national power failure
National
4
Fuel supply crisis
Political instability at home or abroad makes petrol/diesel difficult to acquire
National
5
Solar weather
Major flares from the Sun can disrupt networks, electricity grids and infrastructure in unpredicatble ways
National
6
Criminal activity aimed specifically against Fund Apps
Organizations someitmes targeted to move funds or act as a trusted party fronting for criminal activity
Organisational
7
Espionage against Fund Apps for high profile clients
Organizations are sometimes targetted for espionage in order to gain insight into confidential information in client
Organisational
8
Malicious damage by member of staff
Staff who are being disciplined or recently dismissed or suffering mental illness
Organisational
9
Loss of key individuals
Staff may be ill, have accidents or leave for other work
Organisational
10
Earthquake
Location - Natural
11
Volcano
Identified as a National Risk too
Location - Natural
12
Fluvial flooding
Flooding from rivers
Location - Natural
13
Flash (pluvial) flooding
Flash floods follow intense rain
Location - Natural
14
Severe weather (snow)
Snow fall over large part of the area and remaining for 1 week
Location - Natural
15
Severe weather (prolonged low temperatures)
Persistent low temperatures
Location - Natural
16
Severe weather (Heat Wave)
Temperatures exceeding 32C and minimum overnight exceeding 15C over 5 days
Location - Natural
17
Severe weather (drought)
Prolonged shortage of rainfall or failure in water supply
Location - Natural
18
Outbreak of severe illness or communicable disease
May arise from local transmission of disease or collective exposure to food pathogens or legionella et al
Location - Health
19
Impact to building from road traffic accident
Location - traffic
20
Road traffic accident blocking access roads
Road intersection few LGVs
Location - traffic
21
Road traffic incident with hazardous chemicals
Construction traffic may pass, petrol station opposite office
Location - traffic
22
Road traffic incident or fire with gas/gas cylinders
Construction traffic with gas cylinders almost certainly passes office
Location - traffic
23
Rail accident
Old Street Tube Station only nearby line
Location - traffic
24
Air accident
Aircraft directly impacting site
Location - traffic
25
Neighbouring businesses
Activities of neighbours may expose Fund Apps to risks
Location
26
Criminal activity against site
Opportunistic or directed activity
Location
27
Terrorist action in vicinity
Fund Apps not targeted but impacted by nearby attack
Location
28
Terrorist action against site
Fund Apps not target per se, but site attacked for some perceived connections
Location
29
Effectiveness of Physical security
Criminals, terrorists, demonstrators can all be discouraged and prevented by effective perimeter security
Perimeter
30
Utility supply to site - Electricity
Liable to localised mains failure, substation fire and disturbance through ground works
Perimeter
31
Utility supply to site - Gas
Liable to disturbance through ground works
Perimeter
32
Utility supply to site - Water
Liable to disturbance through ground works. Loss through systemic failures in distribution system.
Perimeter
33
Utility supply to site - Sewerage
Liable to disturbance through ground works
Perimeter
34
Utility supply to site - Telecomms
Liable to disturbance through ground works and loss of local exchange
Perimeter
35
Building roof
Roofs may leak giving rise to structural damage or flooding
Building
36
Building structure
Overall structure must be sound to withstand severe weather, tremors etc.
Building
37
Building structure
Asbestos - danger to health and needs controlled operations for works
Building
38
Building basement areas
May be liable to flood from above or groundwater
Building
39
Building - internal water supplies
Pipes and tanks must be in good condition and not positioned where they will cause significant damage
Building
40
Building - M&E
M&E provides the air handling, chillers, boilers and electrical infrastructure for the operation of the premises
Building
41
Fire within building
Rare but highly disruptive and damaging with a risk to life
Building
42
Loss or disruption to key supplier
Suppliers, distributors and others are key to any business operation
3rd parties
43
Loss of local IT infrastructure services
Office IT loss
IT
44
Loss of IT applications
Servers or storage failures in DCs
IT
45
Cyber attack
Fund Apps targetted or simply collateral damage to other attack(s)
IT
AWS has established formal policies and procedures to delineate the minimum standards for logical access to AWS platform and infrastructure hosts. AWS conducts criminal background checks, as permitted by law, as part of preemployment screening practices for employees and commensurate with the employee’s position and level of access. The policies also identify functional responsibilities for the administration of logical access and security.
Added a Security Exception Management Policy.
Updated recommendations for password management to current good practices.
Clarified wording in Data Security and Network Security paragraphs.
Business Continuity Plan, Business Continuity Test and Disaster Recovery Test can now be found in a page called Business Continuity Documents.
Attached FundApps' Risk Management Matrix.
Clarified which documents are restricted to FundApps staff.
Included Static Application Security Test (SAST) and Dynamic Application Security Test (DAST) tools in the SDLC process.
Added a data retention policy.
Applications should only be installed from official application stores.
Clarified systems which can be used through BYOD.
Added a section about gathering forensic evidence.
Added latest version of FundApps' Business Continuity Plan.
Item
Location
Health and safety law poster
Kitchen
First-aid box is located
Kitchen. Second box in General Office cabinet under large TV
Accident book
Andrew White has overall and final responsibility for Health and Safety
Hana Sekerez has day-to-day responsibility for ensuring this policy is practiced
Statement of general policy
Who
Action/Arrangements
Prevent accidents and cases of work-related ill health by managing the health and safety risks in the workplace
HS
Relevant risk assessments completed and actions arising out of those assessments implemented. (Risk assessments reviewed when working habits or conditions change.)
Provide clear instructions and information, and adequate training, to ensure employees are competent to do their work
HS
Staff & subcontractors given necessary health and safety induction and provided with appropriate training (including working at height, asbestos awareness and electrical safety) and personal protective equipment. We will ensure that suitable arrangements are in place to cover employees engaged in work remote from the main company site.
Engage and consult with employees on day-to-day health and safety conditions
HS
Staff routinely consulted on health and safety matters as they arise but also formally consulted at regular health and safety performance review meetings or sooner if required.
HS
Escape routes well signed and kept clear at all times. Evacuation plans are tested from time to time and updated as necessary.
Maintain safe and healthy working conditions, provide and maintain plant, equipment and machinery, and ensure safe storage/use of substances
HS
Toilets, washing facilities and drinking water provided. System in place for routine inspections and testing of equipment and machinery and for ensuring that action is promptly taken to address any defects.
Our Code is how we put the FundApps values into practice. As a business, we set ourselves high standards both in what we aspire to achieve and how we behave. It reminds us of the personal responsibility we all play in ensure FundApps is, and remains an awesome place to work and a trusted partner to our clients and the community.
We don't want to (nor could we) enumerate every thing people should or should not do in Our Code, nor all of the possible scenarios that might arise. Instead, we prefer to assume everyone at FundApps is a responsible, respectful adult, and trust people to understand it, act accordingly and be able to work through differences as they arise.
Please read this document, and follow both in spirit and letter, bearing in mind each of us has a personal responsibility to live by our values in everything we do at FundApps.
Our role
No matter what job we do or where we do it, we are FundApps. We must keep this in mind in every business relationship, transaction and interaction to ensure our actions always reflect our values, Our Code, and the laws and regulations where we operate.
If you see or suspect anything illegal or unethical, it may seem easier to look the other way or let someone else take the lead—but misconduct affects all of us. No concern is too minor to report. Share your concerns promptly and cooperate fully and honestly as we investigate. We expect all FundAppers to know and follow Our Code. Failure to do so can result in disciplinary action, including termination of employment.
If you manage people, you have an even greater responsibility. Lead by example, making sure your team members know this is a resource for them and that there is no difference between what you do and what you expect from others. Create the kind of workplace where employees feel comfortable coming forward with questions and concerns, and support them when they raise issues. Never retaliate against employees for sharing concerns in good faith, and prevent retaliation by others.
Where to go for help
Whilst we hope nothing ever goes wrong, there are a number of things you can do to address problems and situations with your fellow FundAppers or with our People Ops. We know that you'll do your best work if you're happy and comfortable in your surroundings, so we take concerns about this stuff seriously. Depending on your comfort level and the severity of the situation, here are some things you can do to address it:
Address it directly. If you're comfortable bringing up the incident with the person who instigated it, pull them aside to discuss how it affected you. Be sure to approach these conversations in a forgiving spirit: an angry or tense conversation will not do either of you any good. If you're unsure how to go about that, try discussing with your manager or with People Ops first—they might have some advice about how to make this conversation happen. If you're too frustrated to have a direct conversation, there are a number of alternate routes you can take.
Talk to a peer or mentor. Your colleagues are likely to have personal and professional experience on which to draw that could be of use to you. If you have someone you're comfortable approaching, reach out and discuss the situation with them. They may be able to advise on how they would handle it, or direct you to someone who can. The flip side of this, of course, is that you should also be available when your colleagues reach out to you.
Talk to your manager. Your manager probably knows quite a lot about the dynamics of your team, which makes them a good person to look to for advice. They may also be able to talk directly to the colleague in question if you feel uncomfortable or unsafe doing so yourself. Finally, your manager will be able to help you figure out how to ensure that any conflict with a colleague doesn't interfere with your work.
Talk to People Ops. People Ops are happy to talk to you in person or remotely about the problem and help figure out what steps to take, from small challenges through to situations where more significant action needs to be taken. People Ops will make every effort to stay in clear communication with anyone who reports a problem, maintain confidentiality whenever possible. There may be instances where People Ops are required to escalate or inform others (e.g. CEO, legal advisors etc) about matters.
A safe space to speak up
We don't tolerate retaliation. We know it takes courage to come forward and share concerns. We won't retaliate or permit retaliation against anyone who raises questions or concerns relating to Our Code. Regardless of who you contact, you can be confident that you're doing the right thing and that your concern will be handled promptly and appropriately. We investigate reports of misconduct thoroughly, and will only disclose information to those who need it.
We're one team, but we represent many ideas, experiences and backgrounds. Essential to our ability to advance our objectives and growth plans is for all FundAppers to have an equal chance to succeed. It is through the diversity and talents of our people that we are successful, so keeping our positive and inclusive work environment
Equal Opportunity
Employment at FundApps is based solely upon individual merit and qualifications directly related to professional competence. We strictly prohibit unlawful discrimination or harassment on the basis of race, color, religion, veteran status, national origin, ancestry, pregnancy status, sex, gender identity or expression, age, marital status, mental or physical disability, medical condition, sexual orientation, or any other characteristics protected by law. We also make all reasonable accommodations to meet our obligations under laws protecting the rights of people with a disability.
Harassment & Bullying
FundApps prohibits harassment and bullying in any form. Harassment is an action, conduct or behaviour that is viewed as unwelcome, humiliating, intimidating or offensive by the recipient. Bullying is repeated verbal, physical, social or psychological abuse by a person or group of people at work.
The test for what is considered unwelcome, humiliating, intimidating or offensive is what a reasonable person in society (ie. If you told a complete stranger about the situation, what would they think?).
Workplace harassment and bullying should not be confused with constructive feedback or coaching on work performance or work-related behaviour of an individual or group for development purposes.
Microaggressions
Much exclusionary behavior takes the form of subtle-isms, or microaggressions – small things that make others feel unwelcome. For example, saying "It's so easy my grandmother could do it" is a subtle-ism with tones of both sexism and ageism. Regardless of intent, these comments can have a significant demeaning impact on teammates.
If you see a microaggression, you can point it out to the relevant person, either publicly or privately, or you can ask your Manager or People Ops to say something.
Standing up for inclusion
If a situation occurs where you believe you have been present for a behaviour or microaggression that doesn't align with Our Code, FundAppers are encouraged to speak up within the moment in order to let that person know that what has happened is not inclusive behaviour. This makes for a situation from which all parties can learn, and is one which promotes understanding. Additionally it makes it possible for that someone to de-escalate the situation by correcting themselves and apologising. This does not ensure, there will be no consequences, it however will greatly reduce the chance of escalation and has the potential to return a situation to once again become comfortable and inclusive.
Anti-bribery & corruption
Like most global businesses, we are subject to laws that prohibit bribery in basically every kind of commercial setting. The rule for FundApps is simple - don't bribe anybody, anytime, for any reason. This includes pure bribes, kickbacks, illegal payments and any other offer of items of value that may influence behaviour directly or through a third party.
Whistleblowing
Whistleblowing is generally defined as the reporting of certain types of wrongdoing that are in the public interest (ie it must affect others such as the general public). We encourage all of our employees and others who have serious concerns about any aspect of FundApps work to come forward and voice those concerns. The types of whistleblowing covered under legislation include:
a criminal offence, eg fraud
someone's health and safety is in danger
risk or actual damage to the environment
a miscarriage of justice
the company is breaking the law, eg doesn't have the right insurance
you believe someone is covering up wrongdoing
In the first instance, concerns can be raised in writing with the People Ops Manager or CEO. Concerns can also be raised to relevant prescribed bodies under national whistleblowing legislation.
Child Labour & Modern Slavery
We have zero tolerance for suppliers of goods and services, including in relation to child labour, inhumane treatment of employees and forced or compulsory labour.
Gifts
It is the nature of global business that we may give or receive gifts as part of maintaining relationships with our clients, suppliers and partners. Employees are to:
Use sound judgment and comply with the law, regarding gifts and other benefits
Never allow gifts, entertainment or other personal benefits to influence decisions or undermine the integrity of business relationships
Never accept gifts or entertainment that are illegal, immoral or would reflect negatively on the company
Never accept cash, cash equivalents, stocks or other securities
Employees may accept occasional unsolicited personal gifts of nominal value such as promotional items and may provide the same to clients and business partners.
Conflict of Interest
When you are in a situation in which competing loyalties could cause you to pursue a personal benefit for you, your friends, or your family at the expense of FundApps or our clients, you may be faced with a conflict of interest. All of us should avoid conflicts of interest and circumstances that reasonably present the appearance of a conflict.
When considering a course of action, ask yourself whether the action you're considering could create an incentive for you, or appear to others to create an incentive for you, to benefit yourself, your friends or family, or an associated business at the expense of FundApps. If the answer is "yes," the action you're considering is likely to create a conflict of interest situation, and you should avoid it.
There are seven common areas where conflicts of interest can arise:
Personal investments
Outside employment, advisory roles, board seats, and starting your own business
Business opportunities found through work
Inventions
Friends and relatives; co-worker relationships
Accepting gifts, entertainment, and other business courtesies
Use of Google products and services
In each of these situations, the rule is the same – if you are considering entering into a business situation that creates a conflict of interest, don't. If you are in a business situation that may create a conflict of interest, or the appearance of a conflict of interest, review the situation with your manager and People Ops. In most cases, a plan can be put in place to mitigate any actual or perceived conflict of interest. Finally, it's important to understand that as circumstances change, a situation that previously didn't present a conflict of interest may present one.
Confidentiality & Privacy
We respect the privacy of our clients, employees and others with whom we conduct business, and we handle their personal information with care. "Personal information" is any information that could be used to identify someone, either directly or indirectly, such as a name, email address or phone number. There are data privacy laws that prescribe how to responsibly collect, store, use, share, transfer and dispose of personal information, and we strive to comply with those laws everywhere we operate.
Environment
Goodness matters! In everything we do, we strive to do it in an environmentally responsible manner and hold ourselves accountable for compliance with all applicable environmental laws and regulations. Whilst our environmental footprint is not big, we all have a role to play and we are committed to actions that minimise our environmental footprint by reducing energy use in our offices, decreasing waste, only using water when we absolutely have to, and avoiding one-time plastic usage and printing like the plague!
Consider this commitment in everything you do, from how you dispose of waste, to purchasing environmentally friendly products in our physical and home offices. Where there is an opportunity to minimise our footprint as a company, or your own as an employee of FundApps, please take it.
Purchasing
Whilst we may be a small company, FundApps believes in purchasing any items it requires for day-to-day operations of our business from local suppliers or suppliers owned by people from minority backgrounds. This forms part of our commitment to our local communities and doing good as a company beyond the profits we make.
FundApps is committed to being a company that does good by our people, our clients and our community. We rely on one another's good judgment to uphold a high standard of integrity for ourselves in everything we do, and we expect all FundAppers to be guided by both the letter and the spirit of Our Code. Sometimes, identifying the right thing to do isn't an easy call. If you aren't sure, don't be afraid to ask questions of your manager or People Ops.
And remember… if you see something that you think isn't right – speak up!
We follow a task based process in our HR system that ensures correct checks are carried out and crucial training delivered when onboarding new staff.
Prior to employment HR performs background checks which includes, except where local restrictions exist:
Professional references
Education / academic credentials
Right to work in country of employment
Additionally, for roles deemed high-risk, advanced screening is conducted prior to start date by an external background check provider covering the above, plus:
Verification of personal identification
Check of criminal and county records
Assessment of financial history
Employment history
Contractors are subject to reference checks and do not have access to production systems or client data.
All FundApps employees have a confidentiality clause in their employment contract, which extends beyond the end of their term of employment. Any breach of the above obligations by the employee is regarded very seriously by FundApps Limited and could result in legal proceedings being taken against the offender.
As part of the on-boarding process, new starters are trained in office and information security. These are then followed up by the ongoing training we do as an organisation.
We ensure all employees are aware of the importance of maintaining the security of our systems and client data; use of encryption, transferring sensitive information externally whether via the internet or physical removable media, and general security awareness including virus scanners, phishing scams.
Please with regards Health and Safety
Please
We maintain a
Located
Implement emergency procedures – evacuation in case of fire or other significant incident. You can find help with your fire risk assessment
Accidents and ill health at work reported under (Reporting of Injuries, Diseases and Dangerous Occurrences Regulations).
Please familiarise yourself with the and our Information Security Policies and ensure you follow our policies and protect any personal information that is entrusted to you. Use it only in the way it's meant to be used, don't share it with anyone inside or outside of the company in an unauthorised manner, and ensure our networks, equipment, programs and data are protected from attack, damage or unauthorised access. The individual and business consequences of data and security breaches can be severe and we all have a responsibility to protect FundApps, our clients and the data we process.
This training includes a regular monthly company-wide meeting to discuss both information security and business continuity issues. You can find more about our
Access is granted to staff on a least privilege basis. Please see our section for information on how we manage access to systems.
We follow a task based process in our HR system that ensures correct steps are followed out during off-boarding of an employee, with agreed deadlines. Please see our section for information on how we manage access to systems.
Updated page to give a more up to date summary of the FundApps platform and technologies used.
Added Change Management Control section. Made cosmetic changes to layout.
Updated background checks to add employment history and align language with current practices
Added a page describing what actions FundApps will and will not take on your behalf.
Added a page describing Physical Security controls of data centres used by FundApps as well as FundApps Offices.
Added a page describing Network security controls.
Added a page describing Logging, Monitoring and Alerting.
Added a page describing Data backup processes.
Updated Risk Management Process to clarify Risk and Control Monitoring.
Created a dedicated page for technical resilience regrouping content from the Techn & Platform Overview page and Business Continuity Framework page.
Isolated the policy from the general description of the Business Continuity Management System
Renamed the Business Continuity Management Framework to Business Continuity Management System.
Renamed the chapter from Data Classification Standard to Data Classification and Protection Standard
Rule added to forbid credential sharing and obligation to change and report compromised credentials;
References updated to tools (e.g. 1password);
Links updated in Further reading.
Aligned policy to our current practices (e.g. added dev talk on OWASP vulnerability).
Added quarterly access review for Rapptr and AWS Production environment access.
Corrected typos.
New vulnerability Management Policy
Replaced Data Protection Act with GDPR
Added summary of GDPR
Added reference to NIST Cyber Security Framework
Added a risk appetite statement.
Simplified descriptions of data classification ratings;
Reviewed list of existing data classification ratings;
Removed references to systems not used anymore;
Simplified rules on data transmission and storage;
Removed references to Data Protection Act;
Added reference to InfoSecLead.
Removed references to commissioning OPREL
Changed responsibility for maintaining BCMS from CTO to Information Security Lead;
Merged awareness and communication paragraphs;
Added headings for incident detection, Crisis Management activation and management of staff contact details;
Removed paragraphs which repeated each other;
Simplified paragraph on Framework review and improvements.