Only this pageAll pages
Powered by GitBook
Couldn't generate the PDF for 116 pages, generation stopped at 100.
Extend with 50 more pages.
1 of 100

Current Version

Loading...

FundApps Policies

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Legal Information

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Policy Change Log

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Loading...

Risk Management

Information Security Management System

Information Security Policies

Technical & Platform Overview

This document provides an introduction to FundApps' shareholding disclosure service and its platform. FundApps provides shareholding disclosure monitoring services via a hosted web application which is provided via FundApps controlled infrastructure from secure and strictly controlled hosting environments. We maintain the software, continuously updating with the latest software enhancements and legislative content updates.

Workflow

FundApps' web application works on a batch processing model; position data is uploaded to the system and processed in the background. Typically clients implement an automated upload job from their systems to the API endpoints provided by FundApps to receive this data. Documentation of our API and example implementations are publicly available.

Figure 1. Relationship of our Platform Components to Workflow

Users of the system may choose to receive notification e-mails letting them know when this process has concluded, and results are available inside the system. Users use a browser-based user interface to view the results of running the batch job and follow a workflow inside the software to investigate any results and file disclosures. Historical data from checks is retained within the system to provide a timeline of results and to facilitate the correct calculation of disclosure requirements.

Software

FundApps' web application is kept constantly up to date with the latest enhancements and fixes. We continuously deliver changes from development and content teams to client production environments. To support this activity we employ a best practices-based development approach employing test-driven development, pair programming and code review to reduce risk and improve software quality.

Every change to our software and rule content is run through an ever-growing test suite to ensure a minimal amount of risk in this continuous update process. Security considerations are built into our software lifecycle; we identify work items early on that have security implications. We conduct an annual penetration test and supply our clients with the report and a remediation plan.

Deployment of changes to our software is a fully automated and hands-off process.

Platform

FundApps platform is hosted in Amazon Web Services datacentres located in Dublin, Ireland and Frankfurt, Germany. With control over both software and infrastructure FundApps is able to deliver best in class availability and security. The principle of least privilege is applied throughout; at the network, system and software levels to tightly control the availability of data and reduce the potential for security breaches.

Data Security

All client data sent to or generated inside our platform follows an encrypted data lifecycle and all interactions with the system occur over an encrypted protocol: Secure HTTP (HTTPS). FundApps keeps supported cipher suites for the SSL encryption used for HTTPS in line with industry standards and regularly runs external tests to verify this. The results of these tests are on the internet. Once data enters our platform it remains encrypted in transit throughout our networks.

On our AWS infrastructure, this data is subsequently encrypted at rest and employs a key management system which allows us to rotate the keys used for the encryption of these volumes on a regular basis. Backups are also stored encrypted at rest, meaning data is never available in cleartext.

Access Control

FundApps' web application enforces several layers of access control.

Authentication: Our software allows clients to either use a single-factor authentication mechanism, the native multi-factor authentication mechanism or to integrate the platform with their Single-Sign-On.

Authorisation: Our software implements different authorisations based on roles which are described . These roles allow us to match permissions in our software with different users' job functions.

Network access control: FundApps is able to provide further access control by applying IP restrictions to client environments, preventing access from networks other than those of the client site. These restrictions operate before any authentication to the system and prevent any requests being made to the application at all.‌

Client Segregation: Individual client environments are isolated at the infrastructure level using separate databases, web and engine instances.

Access Control Audit Trail: A complete audit trail is visible inside the application and allows tracking of all operations taken inside the system, along with user access events. This auditing includes any support activities performed by FundApps staff.

Processes & Controls

Our platform is hosted in facilities with top-grade physical security; we host entirely within the EU with Amazon Web Services (AWS). AWS hold industry standard certifications relating to security and availability, including but not limited to ISO 9001, 27001 and SOC I, II certifications. Full details of the certification activities undertaken by our hosting partner are available via .

We ship all log events generated on the platform to a central store for audit, reporting and alerting activity. Direct access to production systems is strictly restricted to key personnel with a direct operational need, and these accesses are reviewed on a monthly basis.

Monitoring

We have automated monitoring of critical conditions for both infrastructure and software in the platform. These conditions create alerts following escalation policies and where necessary alert operators on a 24/7 basis to preserve the integrity and availability of the platform.

Furthermore, FundApps uses a 24/7 Security Operation Centre (SOC) to detect and respond to security alerts.

Application performance and infrastructure metrics are used for capacity planning and platform management; ensuring there is always sufficient capacity available across the platform to satisfy all demands.

Technical Resilience

For our platform's technical resilience please go to .

Information Systems Register

FundApps' information systems register [] contains any system (internal or external) that holds or permits access to information assets in our . For example, this includes:

  • Client instances

  • Amazon AWS (production data)

  • Google Mail (our own internal communications)

Document Control Policy

Objective

Define the version control, change approval and review cycle of FundApps policies.

Scope

Internal Audit Plan for a 3 year cycle

This plan describes how the Internal Audit will be split over 3 years, so that every 3 year cycle the entirety of FundApps' Information Security Management System has been audited.

Once a cycle of 3 years is completed, a new 3 year cycle will begin.

Year 1

This internal audit shall cover the following elements:

FundApps Information Security , Risk management and business continuity policies.

Policy

Version control

Policies in scope shall be versioned through the use of git. Any change to a policy will be tied to a commit number and an author. This information will be stored in the policies git log.

Change approval

Policies in scope shall be approved by a member of the leadership team. These approvals will be stored in the policies git log.

Review Cycle

Policies in scope shall be reviewed annually by the Head of Information Security and at least one member of the Leadership Team.

Clauses 4 to 10;
  • All Annex A controls in scope as per the statement of applicability.

  • The audit will be performed before the end of June of year 1.

    Year 2

    This internal audit shall cover the following elements:

    • Clauses 4 to 10;

    • Annex A controls in scope as per the statement of applicability from A.5.1. to A.6.8 included.

    The audit will be performed before the end of June of year 2.

    Year 3

    This internal audit shall cover the following elements:

    • Clauses 4 to 10;

    • Annex A controls in scope as per the statement of applicability from A.7.1 to A.8.34 included.

    The audit will be performed before the end of June of year 3.

    Identification

    Information systems are identified as part of:

    • Supplier Review Procedure

    • Monthly security review meetings

    • Our software development lifecycle

    • Everyday working practice

    Third-party vendors

    This register includes information systems that FundApps depends on and that third-party vendors manage. As such, we evaluate business continuity and sufficient security controls as part of our assessment process.

    Assessment

    For each information system identified, we

    • Assign an owner (Supplier Relationship Manager) for the system.

    • Identify the business criticality.

    • Identify the data classification the system falls under based on the maximum data classification of the information stored.

    • Based on the data classification, identify information security and business continuity controls. This information is stored in our Third-Party Risk Management System.

    • Identify any specific risks relating to this third party and record them in our

      • Third-Party Risk Management System,

      • The Information Security Risk Register,

      • Business Continuity Risk Register, or

      • DPIA.

    Review

    Information systems are reviewed as part of our monthly security review meetings.

    Restricted to FundApps staff
    information asset register

    Welcome to FundApps' Policy Portal

    NOTE: At FundApps we're focused on offering the best possible services to the investment management industry. As part of that, we have a firm commitment to ensuring our platform remains highly available and your data remains secure. We have made this resource available to clients and prospective clients in order to learn more about how we achieve this and to assist with any due diligence questions you may have.

    Our own staff use this resource to review security policy and educate themselves on our approaches. This is by its nature a "living" document - which will evolve as we continually evaluate how we can deliver a best of breed platform to the industry.

    Policy documentation is maintained electronically across GitBook and Notion, depending on its intended audience. Version control is managed through GitHub via GitBook’s Git Sync feature, ensuring all changes are tracked. Pull requests provide visibility into modifications and require approval from the CTO and Head of Security before being merged.

    If you require any clarifications or have any questions then don't hesitate to contact us.

    publicly available
    here
    AWS compliance
    this page

    Software Development

    Introduction

    At FundApps we believe in simplicity, automation and testing in order to deliver high quality software - and that follows through our entire software development process. Testing is a integral part of this - not only through our software development but also our rules team who implement the legal changes made around the world.

    Security in project management

    Information Security should be addressed for all FundApps projects that have a potential for impacting FundApps Information System or FundApps data as defined in the .

    These projects must include information security requirements.

    An information security risk assessment must be conducted at an early stage of the project to identify necessary controls.

    Information security must be applied to all the phases of the applied project methodology.

    Change Management Controls

    Authorising Changes

    Significant changes to the production environment are captured in Shortcut and are based on requirements made by FundApps stakeholders (Product Team, CTO, Head of Information Security, etc.) as illustrated in Figure 2. This process is described in a dedicated procedure available in .

    Testing changes

    All changes are tested with a multi-level test suite (Front End tests, integration tests, unit tests, rule tests, static application security testing as well as Open Source Software License scans) as can be seen in figures 4, 5, 6 and 7. Changes cannot be applied to production if tests fail. Finally, a dynamic application security testing tool scans a client-like environment on a weekly basis.

    Approving changes and Segregation of Duties

    All changes to production can only be submitted by members of the Engineering team, Content and CS teams. Furthermore they need to be peer reviewed (Figure 3) and approved by a different staff member (based on the repository) than the one submitting the changes, before they can be merged into the main code branch, as described .

    Emergency changes

    All builds are stored allowing to rollback to the last known good build in case of an emergency.

    Change Management Steps

    1. Work item specified Work items are scoped and defined as development tasks in Shortcut. Potential security issues flagged and discussed at this stage. Items prioritised and tackled by the team (Figure 2)

    2. Development work Development or configuration work is performed as scoped and defined in the work item.

    3. Pull Request created Once the work is complete, or at intermediate stages for larger work items ‘pull requests’ are created (Figure 3). Pull requests specify the desired changes across files and act as proposals for specific change.

    Internal and External Communication Plan

    Internal communication regarding this ISMS will be conducted as described below:

    What to communicate
    Whom shall communicate
    Whom to communicate to
    When to communicate
    How to communicate

    Changes to Information Security Management Policy Changes to Risk Management, Information Security, and Business Continuity Policies

    Changes to Software Development Policy

    Changes to Personnel and Safety Policies

    Information Security Lead or CTO

    Employees

    Contractors

    Leadership team

    Clients

    Prospects

    Ad-hoc

    Via FundApps policy portal

    Information Asset Register

    Our information asset register [Restricted to FundApps staff] contains every information asset of value to FundApps. For example, this includes:

    • Client support queries

    • Internal communications

    • Server logs

    • Development source code

    Identification

    Information assets are identified as part of:

    • Monthly company-wide security awareness sessions

    • Monthly security review meetings

    • Our software development lifecycle

    • Everyday working practice

    Assessment

    For each information asset identified, we

    • Assign an owner for the information

    • Identify if it falls under any specific regulation (primarily General Data Protection Regulation)

    • Assess CIA ratings in accordance with our process

    • Identify an appropriate data classification from these ratings

    Any changes to the register results in:

    • updates to our with regards the classification of information they hold

    • updates to our data classification policy with regards the information systems and asset information falling under each classification

    • updates to our requiring us to record privileges granted to this systems and ensuring revokation during the offboarding process

    Review

    Information systems are reviewed as part of our monthly security review meetings.

    Risks above risk tolerance

    Information Security Lead or CTO

    Leadership team

    Risk owner

    Ad-hoc

    Via Risk Register

    Findings from internal or external audits

    Information Security Lead or CTO

    Employees

    Leadership team

    Ad-hoc

    ShortCut and/or Notion

    Availability of FundApps' platform

    Information Security Lead or CTO

    Employees

    Contractors

    Leadership team

    Clients

    Prospects

    Daily

    Via FundApps' status page

    Changes in security and privacy related contractual requirements

    Information Security Lead or CTO

    Contractors

    Providers

    Ad-hoc

    Via email

  • Identify the information systems that contain this data

  • Identify any specific information risks relating to this information and record it in our infosec risk register

  • Identify any specific business continuity risks relating to this information and record it in our BC risk register

  • risk management
    information systems register
    access control register

    Logging, Monitoring and Alerting

    Logging

    FundApps logs system and network events in order to detect and respond to information security threats.

    The following events are logged:

    • Application events:

      • Login attempts,

      • Changes to users and privileges,

    • System events:

      • System accesses,

      • File system accesses,

      • Host-based IPS (Intrusion Prevention System) alerts.

    • Network events:

      • Network traffic.

    All events are aggregated, stored centrally and protected against alteration.

    Monitoring and Alerting

    FundApps has processes in place to monitor logs. Automated alerting of certain events or event thresholds allows FundApps staff to detect and respond to a potential security incident 24/7.

    Security alerts are reviewed by the Security team and tracked in the Security Incident and Event Management tool, and a summary is provided during the monthly security meeting.

    Data Backups

    FundApps backups production data to local storage at the following frequency:

    • FundApps continuously backups production data to a hot standby instance in the same region but a different availability zone (generally <100ms RPO, <5 minutes RTO).

    • Backups are continuously replicated to a cold standby instance in a secondary region (generally <500ms RPO, <1 hour RTO).

    Seven days of full snapshot history are stored in RDS snapshots in the primary and secondary regions. Each backup contains the entire history of the client instance. Backup integrity is checked automatically at the end of each backup. Backups are fully encrypted.

    Network Security

    FundApps has implemented a tiered network architecture to host its services. This tiered architecture allows the restriction of communications between networks in order to reduce the probability and impact of a security incident.

    Operational and security logs are monitored 24/7 by the Security team to detect and respond to security incidents.

    Access to the administration of the network is limited to a small number of FundApps staff.

    Patch Management Policy

    Objective

    The purpose of this policy is to define the way in which FundApps manages patching of its Information System.

    Scope

    The policy applies to all FundApps managed Information Systems.

    Policy

    End user computers

    End user computers must receive system patches automatically. Users must not be able to defer patching for more than 30 days.

    Servers

    Proxy servers

    Proxy servers must be cycled at least on a monthly basis, and must be built using an image including the latest system patches.

    Web servers

    Web servers must receive system patches automatically every month.

    Other servers

    Other servers must receive system patches at least every 3 months.

    Governance

    Business Continuity Documents

    163KB
    Disaster Recovery Test Report (October 2025).pdf
    PDF
    Open
    Disaster Recovery Test - 2025
    58KB
    Business Continuity Test (May 2025) (1).pdf
    PDF
    Open
    Business Continuity Test - 2025
    252KB
    Business Continuity Plan 2025 - REDACTED.pdf
    PDF
    Open
    Business Continuity Plan - 2025

    Information Security Risk Register

    FundApps has performed a business impact analysis and maintains a risk register as part of our information security management system. The full risk register is maintained here [Restricted to FundApps staff].

    Business Continuity

    DORA

    This section is intended to outline how FundApps supports its EU based clients with the Digital Operational Resilience Act (DORA) .

    August 2025

    Information Security Management System > Information Security Management Policy

    Added an entry to External Issues > Legal Factors: Regulations affecting FundApps’ relations with its clients and providers (e.g. DORA)

    August 2024

    Additional Information

    Added information about our insurance.

    June 2025

    General Terms > Third Party Data Provider Terms

    Adding BIGTXN third party terms for Sanctions data.

    July 2024

    Information Security Management System > Access Control Policy

    Added information regarding Just In Time access.

    Third party vendors

    AWS has established formal policies and procedures to delineate the minimum standards for logical access to AWS platform and infrastructure hosts. AWS conducts criminal background checks, as permitted by law, as part of preemployment screening practices for employees and commensurate with the employee’s position and level of access. The policies also identify functional responsibilities for the administration of logical access and security.

    Personnel & Safety

    AI

    October 2023

    Personnel & Safety > The FundApps Code for Third Parties

    Uploaded the first version of our supplier code of conduct.

    Change reviewed Every change is scanned for security vulnerabilities by a Static Application Security Testing tool. The changes contained within the pull request are reviewed by another team member for code review - both for quality, style and security (making use of the results from the Static Application Security Testing tool). More details on our review process are specified in FundApps' code review guidelines[Access restricted to FundApps staff]. Comments are placed on the pull request to drive any amendments that may be necessary.

  • Built by CI server All releases and pull requests are compiled on a build server, to check that the artifacts contained in source control are complete.

  • Unit Tests Run All unit tests contained within the test suites are run on the build server to verify that the release functions as specified in an isolated environment. This occurs both on pull requests and on the main branch (Figure 3 & 4).

  • Change merged to main branch Once the pull request has all tests passing and any identified changes to pass review have been made, the pull request is merged to main and becomes a potential release of the system.

  • Test Rule Content with release The test suite maintained for our legislative rule content is run using the logic and algorithms of the proposed new release to confirm behaviour and semantics are maintained.

  • Deploy to main testing environment The proposed release is deployed to a main testing environment, to validate that the release can be successfully deployed and that the resulting instance reports a healthy status.

  • Run Feature Tests A series of automated feature tests, using a scripted web browser covering the key functionality of the system are run (uploading files, viewing results etc). These establish that the proposed release loads correctly and performs the desired tasks.

  • Deploy to main staging environment The proposed release is deployed into a staging environment in our Production network (Figure 5). This verifies that the release can be deployed successfully with production configuration and infrastructure

  • Smoke Test A smoke test is performed by checking the health of the main staging environment and uploading a position file. This ensures that in the production environment, the system is able to accept uploads and process data.

  • Deploy to client performance environment If desired, or if the release presents questions regarding performance impact (identified during the pull request review), the release may be deployed to a specific performance testing environment to examine performance characteristics on the production network before availability to clients.

  • Deploy to client staging environment (automated) Given successful completion of all previous steps and check, a release is promoted to all client staging environments.

  • Deploy to client production environment (automated) Given that a release has been successfully deployed to a client’s staging environment, it is promoted to all client production environments. This process may be conducted for all clients sequentially.

  • Perform dynamic application security testing (automated) A client-like environment is scanned every week by a dynamic application security testing tool for vulnerabilities (cf. figure 8). Any potential vulnerability is managed through the process described in the Vulnerability Management Policy.

  • Data Classification and Protection Standard
    FundApps knowledge sharing tool
    in the FundApps Code Review guidelines
    Figure 1 - A flow chart overview of the FundApps development and deployment process
    Figure 2 - Work items described in Shortcut, split per implementation phase
    Figure 3 - A “Pull Request” containing a proposed change to the system
    Figure 4 - The release process as seen in our CI software, TeamCity
    Figure 5 - A completed deployment to the main staging environment in our deployment tool.
    Figure 6 - Static application security test result
    Figure 7 - Open Source Software License scan
    Figure 8 - Dynamic application security test result

    Objective Plan

    The following table describes the plan for 2025 to achieve FundApps' objectives.

    Objective
    What will be done
    Responsible
    Resources required
    Evaluation
    Est. completion date

    1) Ensure the protection of non-public data managed by FundApps' Information Systems.

    Reduce the need to access client environments for Client Success staff

    Security team

    Security team, Engineering time, CS team

    CS can manage the health of a client without the need to log into a client environment.

    Internal Audit Policy

    Objective

    This policy defines the internal audit process of FundApps' Information Security Management System (ISMS).

    Scope

    The scope of the internal audit is FundApps' Information Security Management System (ISMS), which is described in .

    Frequency and Coverage

    Internal audits shall be performed against FundApps' ISMS at planned intervals at least once per year.

    Over a three year period there will be three internal audits:

    • one audit will cover the entire scope of the ISMS

    • two audits will cover at least one third of the ISMS.

    Internal Auditor

    The internal auditor shall be appointed by the ISMS Manager. The auditor and may be a member of FundApps or an external trusted third party auditor. Auditor selection shall be done to ensure objectivity and the impartiality of the audit process.

    Internal Audit Process

    Audit Planning

    Audits shall be planned in advance and the ISMS Manager shall be notified no less than 5 business days ahead of time.

    The internal auditor shall prepare the audit plan which shall define the scope of the ISMS, including the scope of the controls, which shall be audited.

    Amongst others, the audit plan must take as an input the following items:

    • Security related incidents that have occurred since last audit;

    • Changes made to the Information Security Policy;

    • Changes made to Information Security controls;

    • Improvements made to the ISMS.

    The resulting audit plan must be validated by the ISMS Manager.

    Upon validation the ISMS auditor must communicate the plan to the interested parties.

    Audit Preparation

    The internal auditor shall collect and study the previous audit findings and outstanding issues. They shall also prepare relevant documents required for the audit (e.g. ISMS Audit checklist).

    Conduct Audit

    During the audit, the internal auditor shall find relevant evidence to ascertain that:

    • The information security policy reflects the current business requirements;

    • An appropriate risk assessment methodology is being used;

    • Documented procedures (within the scope of the ISMS) are being followed and are meeting their objectives;

    • Controls are in place and working as intended;

    Audit Reporting

    The internal auditor shall prepare an audit report based on the audit findings. Findings shall be labelled according to their severity and priority level:

    • Major Non-Conformity - This pertains to a major deficiency in the ISMS and exists if one or more elements of the ISO/IEC 27001: 2022 Information Security standard is not implemented and this finding shall have a direct effect on information security, specifically on the preservation of confidentiality, integrity and availability of information assets.

    • Minor Non-Conformity - A minor deficiency. One or more elements of the ISMS is/are only partially complied with. Minor non-conformities have an indirect effect on information security.

    • Observations/Potential Improvements – An audit recommendation for improvement for consideration by FundApps.

    The internal auditor shall send the audit report to the ISMS Manager and the ISMS Implementer.

    Audit Remediation

    According to the audit findings and the non-conformity levels, an action plan and potential follow-up audit shall be defined by the ISMS Implementer and validated by the ISMS Manager. The scope of a follow-up audit is limited to the non conformity and the same mechanisms that produced the finding are used.

    Appendix

    Internal Audit Template

    Finding No.
    Major Non-Conformity | Minor Non-Conformity | Observations/Potential Improvements
    Description
    ISO 27001 Clause No.
    Remediation Action
    Remediation Deadline
    Status
    Evidence of remediation

    Risk Management Framework

    Overview

    FundApps approaches both information security and business continuity from risk based principles. Each identified information security or business continuity risk is reviewed with regard to Likelihood (the possibility of a risk happening), and Impact (the consequence of a risk happening).

    Risks can be identified by any member of staff, and, staff members are encouraged to contribute. Once risks are identified and reviewed for Likelihood and Impact, an appropriate remediation plan can be formulated.

    The key is that risk management drives activity to resolve identified risks, and is the responsibility is that of each employee of FundApps.

    Risk Appetite

    FundApps has no appetite for safety risks that could result in the injury or loss of life of FundApps staff, clients or partners.

    FundApps has no appetite for information security risks that could result in unauthorised or accidental disclosure of, client or other sensitive information.

    FundApps has a low appetite for business continuity risks which prevent the ability to provide service to clients.

    Risk Tolerance

    It is important to note that following the risk management framework, any risk that equals or exceeds a risk rating of twelve (12) will exceed the FundApps Risk Tolerance level and therefore will require a risk treatment plan to lower the risk profile. See the FundApps Risk Management Matrix at the bottom of the page for further information.

    Risk Management Process

    A- Risk Identification

    Potential information security risks and business continuity risks are identified through both formal and informal channels:

    1. Monthly security review meetings

    2. Incident response and reviews

    3. As part of the Software Development Lifecycle

    4. As part of the continuous release management

    B- Risk Assessment

    Likelihood and impact

    Potential risks are recorded in the risk register and assigned an owner. Risks are assessed on two criteria with regards to any current controls that may already be in place:

    • Likelihood, according to the FundApps Risk Management Matrix (cf. bottom of the page). Likelihood should consider the specific vulnerability or threats that may exploit this vulnerability.

    • Impact, according to the FundApps Risk Management Matrix (cf. bottom of the page). Further guidance must be taken from the FundApps Data Classification and Handling when referring to impact. This will take into account the Confidentiality, Integrity and Availability requirements of any data asset.

    Residual risk

    The assessment of likelihood and impact places the risk within risk tolerance levels defined in the Risk Management Matrix (cf. bottom of the page).

    Each risk level consists of

    • the likelihood and impact levels

    • a timeframe for review while the risk is open

    • a timeframe for review once the risk is closed

    C- Risk Response

    Based on this categorization we can then design a risk response in order to reduce our residual risk.

    Strategies for responding to the risk can include:

    • Avoid risk – activities with a high likelihood of loss and large business impact. The best response is to avoid the activity.

    • Mitigate risk – activities with a high likelihood of occurring, but business impact is small. The best response is to use management control systems to reduce the risk of potential loss.

    • Transfer risk – activities with low probability of occurring, but with a large business impact. The best response is to transfer a portion or all of the risk to a third party by purchasing insurance, hedging, outsourcing, or entering into partnerships.

    Our risk response may generate information security or business continuity controls which could be technical, procedural or policy based.

    D- Risk and Control Monitoring

    Identified risks and their mitigating controls are monitored and reviewed at least annually in order to ensure the residual risk is within the risk appetite. Should the residual risk change, either due to a change in the intrinsic risk, or due to the control effectiveness, the risk response will be reviewed.

    Risk Management Matrix

    Use of definitions based upon ISACA’s

    Roles, Responsibilities and Organisation

    Roles and Responsibilities

    ISMS Manager

    The CTO shall ensure FundApps allocates the appropriate resources to ensure the ISMS' conformity with the ISO 27001 standard and shall report the performance of the ISMS to the Leadership team.

    Continual Improvement Process

    Objective

    This process aims to allow FundApps to continually improve the suitability, adequacy and effectiveness of the information security management system.

    Scope

    Physical Security

    Data Center Physical Security Overview

    All data hosted in FundApps’ platform is hosted in facilities with top grade physical security. These facilities are located within the EU with Amazon Web Services (AWS). AWS hold industry standard certifications relating to security and availability, including but not limited to ISO 9001, 27001 and SOC I, II certifications. Full details of the certification activities undertaken by our hosting partner are available via AWS compliance.

    Security Exception Management Policy

    Objective

    The purpose of this policy is to define the way in which FundApps raises, approves, records and reviews exceptions to its information security policies.

    Scope

    Information Security in Project Management

    Objective

    The purpose of this policy is to define the way in which FundApps addresses information security in project management.

    Scope

    July 2025

    General Terms > Third Party Data Provider Terms

    Uploading v2 of Refinitiv and new FactSet third party terms for Poison Pills data and LSEG Redist.

    Insurance

    Operational Resilience Statement

    FundApps has prepared this Statement on Operational Resilience to describe how FundApps addresses measures that financial entities themselves need to meet under DORA. This Statement is not an operational document – FundApps has in place its own policies and procedures and the means to implement them. However, this Statement does offer a fair description of the measures that FundApps has in place which are aligned to financial entity requirements under DORA.

    December 2024

    Legal Information > DORA

    Creation of page and subpages for information related to DORA

    Legal Information > General Terms

    Acceptable Use

    At FundApps, we are committed to providing a secure, reliable, and high-performing service for all our users. To uphold this commitment and foster a positive environment, this Acceptable Use Policy (“AUP”) outlines acceptable and unacceptable conduct for our Services. Violations, especially deliberate, repeated, or harmful ones, may lead to suspension or termination of access. By accessing or using the Service, you (the Client and any user) agree to comply with this AUP.

    June 2024

    ISMS > Information Security Management Policy

    Added a section on Data Protection Act

    ISMS > Statement of Applicability

    Privacy Policy

    FundApps' privacy policy is available on .

    Threat-Led Penetration Tests (TLPT) Policy

    This policy outlines FundApps' approach to TLPT testing by external testers and our clients.

    Fair Usage Policy

    Please click below for FundApps Fair Usage Policy related to staging environments.

    May 2025

    Software Development

    Updated screenshots for SAST and OSS license checks to reflect the current current tools used.

    Business Continuity > Business Continuity Documents

    November 2025

    Legal Information > Insurance

    Adding updated insurance cert for US.

    Legal Information > SEC Regulation S-P

    February 2023

    Information Security Policies > Data Retention Policy

    Update language on Client Data retention to align with FundApps' general terms.

    June 2023

    Information Security Policies > Physical Security

    Updated our Physical Security Policy to reflect that the Singapore office door now locks automatically.

    November 2024

    Legal Information > Insurance

    Updated the dates the insurance applies including the insurance confirmation letter

    Additional Information > Legal Information

    August 2023

    Information Security Policies > Employee Guide

    Update our Employee Guide to remove the social media paragraph.

    September 2023

    Additional Information > Frequently Asked Questions

    • FundApps' latest penetration test report and,

    April 2024

    Risk Management > Information Systems Register

    Minor change to reflect that system owners are also called Supplier Relationship Managers.

    Risk Management > Data Classification and Protection Standard

    October 2024

    ISMS > Statement of Applicability

    Added document version to the Statement of Applicability.

    Business Continuity > Business Continuity Documents

    October 2022

    Information Security Policies > Client Services Access to Client Environments

    Updated policy on how our client services team interacts with client environments based on our latest practices.

    ISMS Change Management Process

    Nonconformities of FundApps' Information Security Management System with ISO 27001:2022.

    Policy

    ISMS Change Management Process

    FundApps ensures that all changes to the Information Security Management System are carried out in a planned manner and controlled in accordance with ISO 27001 Clause 6.3.

    To ensure a structured approach to ISMS changes, FundApps follows these key steps:

    1. Identifying & Assessing Changes

    • Changes may be identified through internal reviews, ISMS performance reviews, audits, risk assessments, regulatory updates, or feedback from stakeholders.

    • Each change is assessed for potential impacts on security objectives, risk posture, and existing controls.

    1. Planning & Approval

    • Changes are reviewed and approved by relevant stakeholders before implementation to ensure alignment with security and business objectives.

    1. Implementation & Documentation

    • Approved changes are implemented following a structured approach to minimise security risks and operational disruptions.

    • All changes are documented in accordance with FundApps' record-keeping requirements.

    1. Monitoring & Review

    • The effectiveness of implemented changes is monitored to ensure security objectives are met.

    • Any unintended consequences are reviewed, and corrective actions are taken as necessary.

    1. Control of External Processes

    • Any externally provided processes, products, or services that impact the ISMS are reviewed and controlled to maintain compliance and security integrity.

    Management of nonconformities

    FundApps shall implement the following process when nonconformities arise:

    React to the nonconformity

    FundApps shall react to the nonconformity as applicable by taking action to control and correct it and deal with its consequences.

    Non-conformities will be logged in Shortcut, a ticketing system.

    Non-confirmities can be identified daily through the use of FundApps' compliance monitoring tool, during annual internal audits, during the ISMS performance review and during the annual risk assessment.

    Evaluate the root cause

    FundApps shall evaluate the need for action to eliminate the causes of the nonconformity to ensure it does not occur again.

    To do so FundApps shall:

    • review the nonconformity;

    • determine the cause of the nonconformity; and

    • determine if similar nonconformities exist or could potentially occur.

    The remediation action and a deadline will be logged in Shortcut for each non-conformity.

    Remediate root cause

    FundApps shall implement actions required to address the root cause of the nonconformity.

    Once the action has been implemented, the corresponding Shortcut story will be marked as done.

    Determine effectiveness of the remediation

    FundApps shall review the effectiveness of the remediation actions which have been taken and make further changes to the ISMS if necessary.

    Retain evidence

    FundApps shall retain evidence of:

    • the nature of the nonconformities and any subsequent action taken, and

    • the result of any remediation actions.

    Data Center Access Control

    AWS provides physical data center access only to approved employees. All employees who need data center access must first apply for access and provide a valid business justification. These requests are granted based on the principle of least privilege, where requests must specify to which layer of the data center the individual needs access, and are time-bound. Requests are reviewed and approved by authorized personnel, and access is revoked after the requested time expires. Once granted admittance, individuals are restricted to areas specified in their permissions.

    Third-party access is requested by approved AWS employees, who must apply for third-party access and provide a valid business justification. These requests are granted based on the principle of least privilege, where requests must specify to which layer of the data center the individual needs access, and are time-bound. These requests are approved by authorized personnel, and access is revoked after request time expires. Once granted admittance, individuals are restricted to areas specified in their permissions. Anyone granted visitor badge access must present identification when arriving on site and are signed in and escorted by authorized staff.

    FundApps Offices Physical Security

    All FundApps offices are protected by locked doors which can be opened only with a valid access card or valid fob, and by CCTV. Doors to the building are equipped with alarm systems which trigger if they are forced open. Visitors are escorted throughout their visit to our offices.

    This policy applies to all exceptions to FundApps' security policies.

    Policy

    Raising Exceptions

    All exceptions must be raised to the Head of Information Security, the CTO, or the CEO and approved before the event. Ensure that items are recorded appropriately in either the Security Exception Log or the Incident Log.

    Approving Exceptions

    Exceptions must be approved by the Head of Information Security, the CTO or the CEO.

    Recording Exceptions

    Exceptions must be recorded in the Security Exception Log here[Restricted to FundApps staff].

    Reviewing Exceptions

    Exceptions will be reviewed by the Head of Information Security annually.

    This policy applies to all FundApps projects that have a potential for impacting FundApps Information System or FundApps data as defined in the Data Classification and Protection Standard.

    Policy

    Information Security must be addressed for all FundApps projects in scope of this policy.

    FundApps projects must include information security requirements.

    An information security risk assessment must be conducted at an early stage of the project to identify necessary controls.

    Information security must be applied to all the phases of the applied project methodology.

    A list of requirements for new projects is defined in FundApps knowledge management tool [Accessible only to FundApps Staff]

    Roles and responsibilities

    The product manager is responsible for ensuring the project complies with this policy. The Head of Information Security is responsible for ensuring this policy is aligned with FundApps' business objectives.

    Updating page to reflect 2025 to 2026 insurance certificate.
    Adding the TermScout badge to our 2024 General Terms
    Marked control 7.10 as applicable

    ISMS > Internal Audit Plan for a 3 year cycle

    Updated audit plan with controls from ISO 27001:2022

    Business Continuity > Business Continuity Documents

    Updated the Business Continuity Test report with June 2024 edition.

    Additional Information > General Terms

    Updated the FundApps General Terms January 2022 document with version updating type and formatting issue.

    Updated Business Continuity Policy & uploaded 2025 BCP test.

    Legal Information> AI

    Uploaded an Ai agent policy.

    Addition of section related to descriptions of FundApps compliance with certain laws/regulations.

    Business Continuity > Business Continuity Documents

    Added 2025 Disaster Recovery test report.

    Legal Information > OSFI Guideline B-10

    Addition of section related to descriptions of FundApps compliance with certain laws/regulations.

    Personnel & Safety > Code of Conduct

    Updated our Code of Conduct following a review done by our CEO.

    Business Continuity > Business Continuity Documents

    Updated with the latest version of FundApps' Business Continuity Plan.

    Business Continuity > Business Continuity Policy

    Updated our Business Continuity Policy wording.

    Heading changed to reflect change in types of documents being uploaded under this section.

    Legal Information > General Terms

    Third Party Usage Policy uploaded as subpage, Third Party Data Provider Terms uploaded as subpage, new version of the General Terms added.

    Information Security Policies > Incident Response

    Updated our Incident Response wording.

    Business Continuity > Business Continuity Documents

    Updated with the latest version of FundApps' Business Continuity Test.

    Information Security Management System > Information Security Management Policy

    Update External Factors.\

    FundApps' response to this report.

    Information Security Management System > Roles, Responsibilities and Organisation

    • Updated Roles and responsibilities to replace Information Security Lead with Head of Information Security

    Minor change to reflect that system owners are also called Supplier Relationship Managers.

    Information Security Policies> Third Party Risk Management

    Minor change to reflect that system owners are also called Supplier Relationship Managers.

    Information Security Policies> Cryptographic Policy

    Minor change to reflect that system owners are also called Supplier Relationship Managers.

    FundApps Policies > Technical & Platform Overview

    Added information regarding FundApps' platform being hosted in Ireland and Germany.

    Information Security Policies> Access Control Policy

    Added information regarding Authentication mechanisms supported by FundApps' platform and roles in the platform.

    Information Security Policies> Vulnerability Management Policy

    Updated the policy with a description of several layers of security controls to detect and remediate vulnerabilities.

    Information Security Policies> Cryptographic Policy

    Updated the policy with sections on data encrypted at rest and in transit.

    Additional Information> Frequently Asked Questions

    Removed the Frequently Asked Questions page due to overlap with the Trust Portal.

    Updated the Disaster Recovery Test report.

    Risk Management > Data Classification and Protection Standard

    Updated language.

    Information Security Policies> Incident Response

    Aligned response times with our SLAs.

    Business Continuity > Business Continuity Documents

    Added the latest 2022 Disaster Recovery Test report.

    Frequently Asked Questions

    • FundApps' latest penetration test report and,

    • FundApps' response to this report.

    End of December 2025

    2) Ensure the protection of all FundApps Information Systems against the risks of unauthorised access, misuse, damage and abuse.

    Implement new security practices (i.e., threat modeling & bug bounty).

    Security team

    Budget for Bug bounty program, Engineering time, Security team

    Bug bounty program implemented for a trial period. Teams conducted threat modeling on all new systems.

    End of December 2025

    3) Maintain compliance with security standards.

    Maintain a SOC 2 Type II Report and ISO 27001 attestations.

    Security team

    Internal and External auditors

    Results of an ISO 27001:2022 and SOC 2 audits

    End of December 2025

    4) Maintain a cycle of continuous improvement.

    Remediate findings identified by audits.

    Security team

    Ad-hoc

    All non-conformities have been remediated

    End of December 2025

    5) Foster a culture of security awareness within FundApps.

    Provide team specific Information Security training.

    Security team

    Security team time

    Provided targeted training for staff with higher rates of security incidents. Results of an advanced phishing exercise

    End of December 2025

    6) Demonstrate a high level of competence and expertise in Information Security

    Ensure that our platform upholds top-tier security features.

    Security team

    Security team, Engineering time

    Implemented an audit trail streaming feature to integrate with the client’s SIEM tools

    End of December 2025

    7) Protect FundApps from liability or damage due to an Information Security Incident.

    Reduce the security impact of third party agents

    Security team

    Security team, Engineering time

    Reduced number of third-party agents on endpoints and production infrastructure. Evaluated residual risk of all remaining agents.

    End of December 2025

    (8) Comply with new and upcoming regulations.

    Comply with DORA regulation

    Security team

    Security team, Legal team

    Implemented policies and guidelines that will ensure our compliance with DORA

    January 17, 2025

    (9) Strengthen Platform Resilience and Disaster Recovery

    Broaden scenario coverage, automate DR plan execution, and integrate DR plans into incident management procedures.

    Security team

    Security team, Engineering time

    Reduced time to run Disaster recovery tests. DR plans are integrated into incident management procedures.

    End of December 2025

    As part of everyday working practice

    Accept risk – if cost-benefit analysis determines the cost to mitigate risk is higher than cost to bear the risk, then the best response is to accept and continually monitor the risk.
    Policy
    258KB
    Risk Management Matrix.png
    image
    Open
    Risk Management Matrix 2019
    standard Glossary of Terms
    298KB
    FundApps - Operational Resilience Statement - v1 2024.pdf
    PDF
    Open
    FundApps Operation Resilience Statement
    135KB
    FundApps - Acceptable Use Policy - v1 2025.pdf
    PDF
    Open
    FundApps' public website
    159KB
    FundApps - TLPT Policy 2025.pdf
    PDF
    Open
    100KB
    FundApps - Fair Usage Policy - v1 2024.pdf
    PDF
    Open

    General Terms

    General Terms which govern all Client Agreements and referenced in the relevant Order Form.

    338KB
    FundApps - General Terms - v3 2024 (2).pdf
    PDF
    Open
    284KB
    FundApps_General_Terms_January_2022 (2).pdf
    PDF
    Open
    5MB
    FundApps General Terms_November_2021.pdf
    PDF
    Open

    Third Party Data Provider Terms

    Please click below for details of Third Party Data Provider Terms that apply to the indicated Services.

    115KB
    FundApps - Third Party Data Provider Terms - FactSet - v1 2025.pdf
    PDF
    Open
    Poison Pills Service
    90KB
    FundApps - Third Party Data Provider Terms - BigTXN - v1 2025.pdf
    PDF
    Open
    Sanctions Monitoring and Infrastructure Service
    137KB
    FundApps - Third Party Data Provider Terms - Refinitiv - v2 2025.pdf
    PDF
    Open
    LSEG Redistribution/Refinitiv Shareholding Disclosure Data Service
    97KB
    FundApps - Third Party Data Provider Terms - GICS - v1 2023.pdf
    PDF
    Open
    GICS Enrichment Service
    89KB
    FundApps - Third Party Data Provider Terms - SDL - v1 2024.pdf
    PDF
    Open
    13f-2 Enrichment Service

    Laws and Regulations

    March 2025

    Legal Information > DORA > Subcontractors and Service Location

    Including LEI codes and updating SG address

    Personnel & Safety > The FundApps Code for Third Parties

    Linked the relevant section of the employee guide.

    ISMS > Statement of Applicability

    Corrected the Statement of Applicability to align rows

    ISMS > Information Security Management Policy

    Added a note that changes to ISMS are carried out in a planned manner. Updated the Interested Parties section to address clause 4.2 (which of the requirements will be addressed through the information security management system).

    ISMS > Scope

    Improved the software and application section and updated our list of services and addresses.

    February 2024

    Information Security Management System > Statement of Applicability

    Aligned the controls with the requirements of ISO 27001:2022.

    Security Awareness Program

    FundApps management believes that embedding security into the culture of FundApps is critical to the success of our information security program, and as such this is a management priority.

    FundApps implements the following practices to achieve this objective:

    • New joiners go through an Information Security training when they start at FundApps. This training covers what is Information Security, why it’s important to FundApps and what is expected of FundApps staff and contractors;

    • FundApps staff undergo an annual Information Security Training refresher;

    • Security-themed presentations to all of FundApps’ staff;

    • Technical Security presentations to engineers on most common vulnerabilities;

    • Channels in company communication tool with security news;

    • Monthly security review session for key stakeholders where we actively review security access lists, audit logs and risk register;

    • Culture of continuous improvement across all areas of the business.

    January 2025

    Personnel & Safety > Code of Conduct and FundApps Code for Third Parties

    Updated both Codes.

    Legal Information > DORA > TLPT Policy

    Creation of TLPT policy for DORA.

    November 2023

    Business Continuity > Technical Resilience

    Updated FundApps' technical resilience documentation to reflect changes in the resilience objectives, scenarios, and capabilities.

    September 2025

    FundApps Policies > Acceptable Use

    Adding an updated version of the Acceptable Use Policy to this portal.

    December 2022

    Information Security Management System > Objective Plan

    Updated the ISMS objective plan with 2023 objectives set out during the December ISMS Performance review.

    Information Security Management System > Performance Evaluation

    Updated the ISMS performance evaluation following the December ISMS Performance review.

    December 2025

    Legal Information > Governance

    Creating a new section that outlines FundApps governance structure.

    Statement on Contractual Compliance

    This DORA Statement on Contractual Compliance is designed to assist financial entities track DORA requirements to the FundApps DORA Addendum (the "Addendum"). It aligns clauses from the Addendum and explains how the Addendum is designed to meet financial entity requirements.

    193KB
    FundApps - DORA Statement on Contractual Compliance - v1 2024.pdf
    PDF
    Open
    FundApps DORA Statement on Contractual Compliance

    Residual risks have been assessed correctly and are within FundApps' risk appetite and risk tolerance levels;

  • The agreed actions from the previous audits have been implemented;

  • The ISMS is compliant with ISO 27001.

  • ISMS Scope

    ISMS Implementer

    The Head of Information Security shall maintain the ISMS, assess its conformity with the ISO 27001 standard, define appropriate corrective actions and report its performance to the CTO.

    ISMS Internal Auditor

    The internal auditor, who can be a staff member or a consultant, shall perform an impartial internal audit against the requirements of the ISO 27001 standard, and follow-up on the internal audit results to achieve continual improvement.

    Leadership Team

    The leadership team will ensure the performance of the ISMS aligns with FundApps' business objectives.

    FundApps staff

    Finally all FundApps staff members contribute to the ISMS, FundApps' security policies and procedures.

    Organisation

    The following diagram details the organisation between the staff who have a role in the ISMS.

    Competence

    FundApps assesses the competencies of those who play a role in the ISMS based on the table below:

    Role
    Competencies
    How competencies are assessed
    Criteria to assess competencies
    Action Plan to address shortcomings
    Desired level of competency

    ISMS Manager

    Technical Leadership experience.

    Technical and architectural expertise.

    Experience in an environment with high security requirements.

    Competencies are assessed during recruitment process and during annual review.

    Assess experience against match those set out in competencies column.

    External Information Security Training

    >1 year experience leading a Technology team. Degree in Computer Science >1 year experience working in a company with high security requirements (e.g. Financial Institution).

    ISMS Implementer

    Information Security Leadership experience.

    Information Security expertise.

    Information Security Certifications.

    If gaps are identified with the required competencies, FundApps will define a set of actions to remediate it. These actions may include training, mentoring or hiring or contracting competent persons.

    Scope

    The ISMS applies to the shareholding disclosure, position limits, sensitive industries, annex IV reporting and Filing Manager services, which FundApps delivers to its clients. It also applies to the information assets, processes, teams and external service providers which FundApps relies on to provide these services.

    Services provided

    FundApps’ five main services provided are:

    Shareholding Disclosure

    FundApps’ Shareholding Disclosure service monitors disclosure requirements for major shareholding, short selling and takeover panels. Position data is uploaded daily and users are alerted to new disclosures. Disclosures are made on time without mistakes.

    Position Limits

    FundApps' Position Limits service simplifies the process of monitoring position limits on derivative contracts which are imposed by exchanges across the globe as well as regulators (e.g. CFTC, ESMA via MiFID II). Our service informs our clients on where their positions are versus applicable limits and acts as an early warning system.

    Sensitive Industries

    FundApps simplifies the process of monitoring sensitive industries investment and foreign ownership. Position data is uploaded daily and users are alerted to pre-approval warnings, notifications for disclosure obligations and hard stop breaches.

    Filing Manager

    Filing Manager automates the disclosure process for short selling reporting. It uses the client-provided data and provides a fully audited service to file for the client. It identifies disclosures for short positions once the position file runs and prepares them to be submitted to the relevant regulator.

    Annex IV reporting

    AIFMD Annex IV reporting requires detailed disclosures on investor data, risk exposures, liquidity, and financing to enhance transparency in the alternative investment space. We automate data aggregation, centralise workflows, and provide full calculation visibility at every stage.

    People

    The FundApps departments within the scope of the ISMS are:

    • Client Services – On-board clients and assist them throughout their experience with our software.

    • Regulatory team– Help to ensure rules correctly mirror current regulation.

    • Finance – Manage FundApps’ budget, cash flow, tax planning and record keeping.

    At a high level, the following executives and teams support FundApps’ processes and services:

    • CEO – Assigns authority and responsibility for operating activities and reporting relationships. FundApps’ CEO defines and communicates the company’s objectives.

    • Global Head of Client Services – Takes the lead in owning FundApps client portfolio and drive cross-team collaboration to support FundApps’ objectives.

    • Chief Product Officer – Accountable for all product management and content team activities globally.

    Offices

    FundApps operates out of three offices:

    • 18th Floor, HYLO, 105 Bunhill Row, London, EC1Y 8LZ, United Kingdom

    • 276 5th Ave, Suite 808, New York, NY 10001

    • #13-135, 71 Robinson Road, 068895, Singapore

    Infrastructure

    FundApps services make use of a resilient infrastructure, which is hosted within multiple data centres (availability zones) and regions operated by Amazon Web Services. There are two environments with a primary environment made up of three data centres within a single geographic region, from which the service is provided in normal operation. There is also a secondary environment in an alternate geographic region, which is used in case the primary environment is unavailable. Each of the three data centres within the primary environment have discrete power and Internet connectivity. FundApps’ primary environment is designed to continue to provide its service should two of the three centres suffer concomitant failures. Should the whole primary environment fail, FundApps has procedures to recover its service in the secondary environment. The critical components of this highly available infrastructure include:

    • Proxy servers, which filter inbound traffic and route them to the correct service;

    • Serverless computing elements and containers which perform apply rule sets analysis of FundApps clients’ financial positions and provide clients with a web user interface and an application programming interface (API); and

    • Databases, which store the results of this analysis, as well as objects and events related to client environments.

    Software and Tools

    FundApps relies on various applications, tools, and infrastructure components to support its information security management system.

    FundApps' platform consists of software that supports its applications, including software for our build pipeline, deployment tools used to deploy to AWS environments, and automation software for managing cloud infrastructure changes.

    In addition, FundApps utilises systems for:

    • Identity and Access Management to control authentication and authorisation.

    • Development and Change Management to track and manage software changes securely.

    • Security Monitoring and Threat Detection to protect against, detect, and respond to security threats.

    • Communication and Collaboration to facilitate internal and external information sharing.

    FundApps ensures that all business-critical applications and tools within the ISMS scope are assessed for security risks, aligned with industry best practices, and regularly reviewed to maintain compliance with ISO 27001. A current list of subprocessors is maintained in our .

    Information Transfer Policy

    Objective

    The purpose of this policy is to define the way in which FundApps maintains the security of information transferred within FundApps and with any external entity.

    Scope

    This policy applies to all FundApps Information Systems.

    Policy

    Information transferred within FundApps as well as with external entities must comply with the rules set out in the Transmission section of the , as well as the .

    Information must be transmitted through FundApps Information Systems (which include the FundApps managed email system). Exceptions to this requirement must be validated by the Head of Information Security, the CTO or the CEO.

    Information transmitted to FundApps through email must be scanned for malware before being downloaded by end users.

    Endpoint Detection and Response tools must be deployed to all FundApps devices in order to detect and respond to any malware which may have been transferred to FundApps devices.

    Information transferred must be cryptographically encrypted in line with the .

    Information protected by a strict ACL (Access Control List) must be transferred in a way which continues to guarantee the ACL is maintained. For example, one should share the link to the information system the information is maintained in, rather than the information itself.

    Sensitive information must not be shared over the phone in public places.

    Transferring information with clients

    When transferring sensitive information with clients, usage of FundApps' platform API or User Interface should be privileged. Sending the information through email as an encrypted password protected attachment is an acceptable alternative.

    Upon contract termination, the client may require for FundApps to send information stored in the FundApps platform. The transfer of this information must be made in adherence with any relevant clause in the client contract and the requirements set out in this policy.

    Subcontractors and Service Location

    A description of our subcontractors, service location and sub-processors for the purposes of DORA.

    Subcontractors

    Pursuant to Part 1 Clause of the DORA Addendum, the following aspects of our Services have been subcontracted:

    Subcontractor
    Subcontracted Service
    Storage Location

    Service Location

    Pursuant to Part 1 Clause 5 of the DORA Addendum, the locations from where the Services are to be provided and where Client Data is to be processed, including the storage location, are set out at as follows:

    FundApps Group

    Entity
    Storage Location
    Service

    Subcontractors

    Entity
    Storage Location
    Services

    Sub-processors

    Client Personal Data is processed in accordance with applicable Data Protection Laws and Schedule C of our . For a full list of sub-processors, including locations and transfer mechanisms, please see our .

    Third Party Risk Management

    Objective

    The purpose of this policy is to define the way in which FundApps manages third party risks.

    Scope

    This policy applies to all FundApps third parties which impact FundApps' Information System.

    Policy

    Initial Assessment

    FundApps assess the risk posed by all third party providers which interact with FundApps' Information System.

    This assessment is based on the review of security accreditations the third party might hold (e.g. ISO 27001 certificate, SOC 2 report) as well as specific questions tailored to the Third Party provider.

    Risks identified through this process will be managed in accordance to FundApps' .

    Regular Review

    FundApps reviews the risks posed by critical Third Party providers on an annual basis.

    This review is logged in FundApps' monthly security meeting.

    Roles and Responsibilities

    Role
    Responsibility

    Data Retention Policy

    Objective

    This policy aims to define how FundApps retains data throughout its systems.

    Scope

    The policy applies to all data processed or stored by FundApps.

    Policy

    Personal Data Retention

    Retention of personal data is described in .

    Client Data

    FundApps retains the following sets of data within its production platform during the lifetime of the contract with its clients:

    • Data uploaded to the platform;

    • Application audit trail (i.e. actions performed by users in application).

    Upon contract termination FundApps will securely delete all client data from its infrastructure within 20 working days, insofar as technically feasible. A copy of this data can be provided to the client prior to deletion based on contractual agreements.

    Technical Data

    FundApps stores technical logs and events related to its production infrastructure within a centralised log management platform. Data is retained for at least one year.

    FundApps data

    All other data which do not fall in the previous categories is retained by FundApps within its systems for the length of time deemed adequate by FundApps to provide its service efficiently.

    Client Services Access to Client Environments

    At FundApps, we are dedicated to providing the highest support quality while ensuring consistent data confidentiality, integrity, and availability.

    As such, there are certain actions we can (and cannot) take on your behalf. The following is a list of some of the work practices you can expect from us:

    What we do

    • We use secure virtual desktops to access client platforms.

    • We provide a valid and unambiguous reason every time we log into a client environment (reviewable at any time in the audit trail).

    • We may click the "Validate File" button to troubleshoot failed file validations

    • We may download/export relevant files to conduct necessary analysis to troubleshoot unexpected behaviour (i.e. disclosure documents, positions and portfolio files). These files will only be downloaded to secure virtual desktops and destroyed when no longer required.

    • We may create or edit Companies as part of the environment setup. Subsequent changes must be based on a written request from a client with administrator privileges.

    • We verify all calls made to our support line are from legitimate users of our platform.

    What we are unable to do

    • We cannot create or edit any users (except the initial admin users when setting up the environment)

    • We cannot create or edit any data overrides

    • We cannot upload any files to client environments (except disaggregations & imported disclosures as part of the initial setup)

    • We cannot interact with results, except when downloading already generated documents to support

    Technical Resilience

    FundApps' platform's technical resilience is built to address multiple adverse scenarios and relies on high availability and disaster recovery capabilities.

    Adverse Scenarios

    These scenarios are:

    • Single or multiple data centres (but not all data centres) fail within an AWS region;

    SEC Regulation S-P Amendments (May 2024)

    Effective Date: October 2025


    Summary

    In May 2024, the U.S. Securities and Exchange Commission (SEC) adopted amendments to Regulation S-P: Privacy of Consumer Financial Information and Safeguarding Customer Information. These changes enhance data protection obligations for certain regulated financial institutions and their service providers.

    FundApps position: The amendments do not impact FundApps obligations under Regulation S-P, as FundApps does not process or store any “Customer Information” as defined by the rule and therefore no change to FundApps regulatory obligations or customer data handling practices is required.


    Insurance

    FundApps maintains insurance coverage, which is adequate and proportionate to our type of business from reputable providers throughout the term of our agreements with our clients.

    A summary of our coverage is as follows:

    From 16th July 2025 to 15 July 2026:

    FundApps Limited

    • Employers Liability

      • Indemnity Limit: £10,000,000 any one claim

    Overview

    Onboarding

    We follow a task based process in our HR system that ensures correct checks are carried out and crucial training delivered when onboarding new staff.

    Background checks

    Carbon Neutral

    FundApps recognise our responsibility to the planet. By 2027 we will achieve and maintain Carbon Neutral status.

    How FundApps Will Achieve Carbon Neutrality

    FundApps will seek to reduce emissions as far as is practical by living our values of "Do more with less", "have courage" and "raise the bar"

    1. Ensuring the energy efficiency and sustainability of the FundApps platform. Globally, cloud computing consumes vast amounts of energy. More energy efficient architectures naturally consume less energy and often offer greater performance. Cloud computing emissions comprised approximately 1/3 of FundApps total emissions in 2021. By adopting a "cloud native" approach to providing compute infrastructure and storing data FundApps will reduce carbon emissions and improve performance for clients.

    January 2024

    FundApps Code for Third Parties

    Updated the environmental and social responsibility parts to reflect the latest requirements in this areas that we have of our suppliers.


  • We cannot action any tasks, including approving any rules

  • We cannot download any files from a client’s platform anywhere except a secure virtual desktop.

  • Overview of Regulation S-P

    Regulation S-P sets out privacy and safeguarding standards for specific U.S. financial institutions, including:

    • Registered investment advisers

    • Broker-dealers

    • Investment companies

    • Transfer agents

    The regulation governs the protection of non-public personal information (NPI) belonging to consumers and customers of these institutions.


    Key 2024 Amendments

    The SEC’s May 2024 amendments aim to modernize Regulation S-P and strengthen data protection obligations. Key updates include:

    • New Defined Term – “Customer Information” Replaces “Customer Records and Information” to clarify the scope of protected data. Refers to any record containing non-public personal information about a customer of a financial institution, whether held directly by the institution or by a service provider on its behalf.

    • Expanded Safeguarding Obligations Covered institutions must establish and maintain written policies and procedures to protect and dispose of customer information securely.

    • Service Provider Oversight Financial institutions must ensure that service providers with access to customer information maintain appropriate safeguards and disposal controls.


    Why FundApps Is Not Impacted

    The 2024 amendments to Regulation S-P do not apply to FundApps for the following reasons:

    • FundApps is not a “financial institution” under Regulation S-P, but a service provider.

    • FundApps does not process or store “Customer Information” as defined in the amended rule.

    • Information provided by FundApps clients is limited to employee names and emails (i.e. login credentials) for access control, which does not constitute “consumer financial information” or “customer data” under Regulation S-P.

    Accordingly, FundApps role and data handling practices remain outside the scope of the rule’s privacy, safeguarding, and disposal obligations.

    Prior to employment HR performs background checks which includes, except where local restrictions exist:
    • Professional references

    • Education / academic credentials

    • Right to work in country of employment

    Additionally, for roles deemed high-risk, advanced screening is conducted prior to start date by an external background check provider covering the above, plus:

    • Verification of personal identification

    • Check of criminal and county records

    • Assessment of financial history

    • Employment history

    Contractors are subject to reference checks.

    Confidentiality

    All FundApps employees have a confidentiality clause in their employment contract, which extends beyond the end of their term of employment. Any breach of the above obligations by the employee is regarded very seriously by FundApps Limited and could result in legal proceedings being taken against the offender.

    Training

    As part of the on-boarding process, new starters are trained in office and information security. These are then followed up by the ongoing training we do as an organisation.

    Ongoing training

    We ensure all employees are aware of the importance of maintaining the security of our systems and client data; use of encryption, transferring sensitive information externally whether via the internet or physical removable media, and general security awareness including virus scanners, phishing scams.

    This training includes a regular monthly company-wide meeting to discuss both information security and business continuity issues. You can find more about our security awareness program here

    Access control

    Access is granted to staff on a least privilege basis. Please see our access control section for information on how we manage access to systems.

    Offboarding

    We follow a task based process in our HR system that ensures correct steps are followed out during off-boarding of an employee, with agreed deadlines. Please see our access control section for information on how we manage access to systems.

  • Encouraging our suppliers to implement their own emission reduction strategies. As a SaaS business, all of FundApps emissions are indirectly incurred, through the products and services we consume. Favouring Carbon Neutral or Net Zero providers will incentivise other businesses to do more and so magnify our impact.

  • Implementing reduction strategies to reduce emissions intensity per-employee. We recognise that avoiding emissions is an important part of any climate action. We will take appropriate measures to reduce our employees' emissions

  • For those emissions that cannot be reduced, we will commit to the purchase of long-lived, durable offsets.

    Information Security Management System > Objective Plan

    Defined a new objective plan for 2024. \

    People Operations – Team responsible for employer brand, recruitment and on-boarding through to development, reward and recognition.
  • Product – Design and develop products to achieve the company’s objectives.

  • Engineering – Manage and maintain system architecture and design for all hosted clients.

  • Chief Technology Officer – Provides direction and decision making on what technologies to use, the architecture of the platforms and best technical practices to follow.

  • Chief Revenue Officer– Accountable for all sales activities within the region and as the People Leader for the Regional Sales team.

  • Head of People – Reporting directly to the CEO, the head of People Operations smooths the next phase in growth as FundApps scales.

  • Head of Information Security – Responsible for managing Information Security, Cyber Security and Business Continuity risks potentially impacting FundApps.

  • Customer Support and Relationship Management to manage client interactions and service requests.

    Privacy Policy
    Data Classification and Protection Standard
    Acceptable Use section of the Employee guide
    Cryptographic Policy

    Amazon Web Services Inc

    Address: Seattle, 410 Terry Ave North, United States

    LEI Code: 2549000I2PRQGGIGCA75

    Provision of cloud infrastructure, primary hosting services and data warehousing for our Services.

    Germany and Ireland

    Auth0 Inc

    Address: 100 First Street, Floor 6, San Francisco, CA 94105

    LEI Code (of parent Okta, Inc): 549300N8J06I8MRHU620

    Authentication platform we use that verify a user’s identity before providing them with access to our applications/websites/Services.

    Germany and Ireland

    FundApps Ltd

    Registered Address: 6th Floor 9 Appold Street, London, United Kingdom, EC2A 2AP

    LEI Code: 254900R1ZVJKCYB78L27

    18th Floor, HYLO, 105 Bunhill Row, London EC1Y 8LZ

    Provider of the Services depending on which entity is named in the contract. Includes the provision of the Agreed Service Levels, support and maintenance services across all entities to ensure relevant time zone support access (and out of hours) for clients.

    FundApps Pte Ltd

    Registered Address: 38 Beach Road, #29-11 South Beach Tower, Singapore 189767

    71 Robinson Road, Singapore 068895

    As above

    FundApps Inc

    Registered Address: Corporation Trust Center, 1209 Orange Street, Wilmington, New Castle County, Delaware 19801

    276 5th Ave, #808, New York, NY 10001, USA

    As above

    Amazon Web Services Inc

    Registered Address: Seattle, 410 Terry Ave North, United States

    Germany and Ireland

    Provides cloud infrastructure, primary hosting services and data warehousing for our Services.

    Auth0 Inc

    Registered Address: 100 First Street, Floor 6, San Francisco, CA 94105

    Germany and Ireland

    Authentication platform we use that verify a user’s identity before providing them with access to our applications/websites/Services.

    General Terms
    privacy policy

    Security Team

    Perform risk assessment of third party provider

    System Owner (Supplier Relationship Manager)

    Describe the nature of the third party Relationship Facilitate review of third party provider

    Risk Management Framework
    FundApps' privacy policy

    Public & Products Liability

    • £5,000,000 any one claim and in the aggregate in respect of Products Liability

  • Professional Indemnity

    • £5,000,000 any one claim

  • Cyber and Privacy Liability

    • £5,000,000 any one claim

  • FundApps Inc

    • Professional Indemnity Indemnity Limit: £5,000,000 in the aggregate in respect of claims arising in USA/Canada

    • Cyber and Privacy Liability Indemnity Limit: £5,000,000 in the aggregate in respect of claims arising in USA/Canada

    From 17 October 2025 to 17 October 2026:

    FundApps Inc

    • Commercial General Liability

      • Indemnity Limit: $2,000,000 in the aggregate

    • Automobile Liability

      • Indemnity Limit: $1,000,000 combined single

    • Umbrella Liability

      • Indemnity Limit: $10,000,000 in the aggregate

    Confirmation from our insurance brokers of the above coverage can be found here:

    None of the requirements contained herein as to types, limits, and approval of insurance coverage maintained by FundApps are intended to and will not in any manner limit or qualify the liabilities and obligations assumed by FundApps under our agreement with clients.

    205KB
    2025 - 2026 FundApps Ltd and FundApps Inc - Confirmation of Insurance Letter (1).pdf
    PDF
    Open

    Data loss or database corruption;

  • Breaking changes;

  • Insufficient capacity;

  • Misconfigurations.

  • High Availability

    High availability is achieved through:

    • Highly redundant networking;

    • Compute and data storage distributed across availability zones (*) within an AWS region(Europe (Ireland)).

    Furthermore, the user interface, the API, the compute, and the data storage for client positions use a multi-site active/active strategy. The data storage for client results uses a warm standby strategy.

    This architecture allows an automated response to outage scenarios affecting one or more data centres within an AWS region (Europe (Ireland)).

    Availability Zones(*) consist of one or more discrete data centres, each with redundant power, networking, and connectivity, housed in separate facilities.

    FundApps' platform high availability capabilities

    Disaster Recovery

    Disaster recovery is achieved through the use of one or several of these capabilities:

    • Automated backups stored in multiple data centres across two different AWS regions (Europe (Ireland) and Europe (Frankfurt));

    • Restoring data from backup to a database in the same or a different data centre within an AWS region (Europe (Ireland));

    • Redeploying the last known good version of the platform's software

    Our disaster recovery process is intended to meet a 4-hour RTO (Recovery Time Objective) and a 30-minute RPO (Recovery Point Objective).

    These capabilities are tested every 12 months to ensure RTO and RPO can be met, and reports are available on our policy portal.

    FundApps' platform's disaster recovery capabilities

    Continual Improvement

    The existing technical environment is designed to be resilient, but there are always risks that could impact the availability of our service. These known risks are recorded on a risk register in accordance with our risk management framework and monitored for change in status. Opportunities for improvement are sought as part of the ongoing risk management process and the strategic development of the business.

    Competencies are assessed during recruitment process and during annual review.

    Assess experience, expertise and certifications against match those set out in competencies column.

    External Information Security Training

    >1 year experience leading an Information Security team Degree in Information Security Management Systems Information Security Certification

    ISMS Internal Auditor

    Auditor experience.

    ISO 27001 expertise.

    Competencies are assessed during recruitment/purchasing process for Internal auditor and/or during annual review.

    Assess experience and expertise.

    External Information Security Training

    >1 year experience as auditor ISO 27001 Lead Auditor certification

    Leadership Team,

    FundApps Staff

    Knowledge of FundApps' Information Security Policies

    Knowledge on how to react to most common security threats (e.g. react to phishing emails)

    Competencies are assessed during annual Information Security Test.

    Assess compliance with Information Security Test.

    FundApps InfoSec Training

    Pass annual Information Security Test

    Data Classification and Protection Standard

    In order to preserve the appropriate confidentiality, integrity and availability of FundApps information assets, we must make sure they are protected against unauthorized access, disclosure or modification. This is critical for all personal data, client data and FundApps proprietary data we deal with across the FundApps business.

    This standard applies to all FundApps information, irrespective of the data location or the type of device it resides on.

    Approach

    We maintain an information asset register detailing all key information assets at FundApps, who owns them, the business processes they are used in, and any external service providers that may utilise or store the information.

    As a result, we can see at a glance

    • What information assets fall under which data classification

    • What information systems hold data falling under those classifications

    • The controls that we expect each system to have in place

    Responsibilities

    FundApps & third parties

    All FundApps employees, contractors and third parties who interact with information held by and on behalf of the FundApps are responsible for assessing and classifying the information they work with and applying the appropriate controls. Individuals must respect the security classification of any information as defined and must report the inappropriate situation of information to the Information Security Manager or Head of Security as quickly as possible.

    System Owners

    Each System has an owner (Supplier Relationship Manager) responsible for assessing the information it contains and classifying its sensitivity. Systems owners are then responsible for ensuring the appropriate controls are in place in conjunction with the Head of Security.

    Security Team

    Responsible for advising on and recommending information security standards on data classification and ensuring these are regularly reviewed.

    Classification and Protection Guidance

    The latest classification guidance can be found below.

    Public
    Open
    Restricted
    Confidential

    Reporting Violations

    Report suspected violations of this policy to the Head of Information Security, the CTO or the CEO. Reports of violations are considered Restricted data until otherwise classified.

    Cryptographic Policy

    Objective

    The purpose of this policy is to define the way in which FundApps manages cryptographic controls to protect the confidentiality, authenticity and/or the integrity of information.

    Scope

    The policy applies to all FundApps Information Systems.

    Policy

    FundApps will implement cryptographic controls to protect information as defined in the Data Classification and Protection Standard.

    Information which requires encryption

    The following tables summarises when cryptography must be used:

    Public
    Open
    Restricted
    Confidential

    Encryption of data in transit

    All client data sent to or generated inside our platform follows an encrypted data lifecycle and all interactions with the system occur over an encrypted protocol: Secure HTTP (HTTPS). We keep supported cipher suites for the SSL encryption used for HTTPS in line with industry standards and regularly run external tests to verify this, the results of these tests are .

    Encryption of data at rest

    All client data is encrypted at rest. FundApps employs a key management system which allows us to rotate the keys used for the encryption of these volumes on a regular basis. Backups are also stored encrypted at rest, meaning your data is never available in cleartext. Data is encrypted using AES-256-GCM, a symmetric algorithm based on Advanced Encryption Standard (AES) in Galois Counter Mode (GCM) with 256-bit keys.

    Encryption ciphers and key lengths

    FundApps supports TLS v1.2 and TLS v1.3. The full list of supported ciphers are available on

    Encryption ciphers and key lengths used to protect information must comply with requirements set out in .

    The minimum length of a symmetric key to encrypt restricted client data at rest is 256 bits.

    Cryptographic Key Management

    Cryptographic keys must be generated, transmitted, stored and managed in a secure manner that prevents loss, unauthorised access, or compromise.

    Access: Access to cryptographic keys must be restricted to authorised staff only.

    Distribution: Private and symmetric keys must be distributed securely such as through the use secure email or out of band techniques like phone conversations with known individuals. Physical transportation of private and symmetric keys will require that they will be encrypted

    Physical security: Equipment used to generate, store and archive keys must be physically protected using appropriate, secure access controls.

    Key rotation: Cryptographic keys must be rotated at a minimum every 3 years.

    Compromised keys: In the event of a cryptographic key being compromised, a new key (or key pair) must be generated and the existing key must be revoked.

    Backup: Backup of cryptographic keys must be maintained to recover them should they be lost.

    Logging and auditing: All accesses to cryptographic keys as well as modifications to these keys must be logged. Logs must be audited for anomalous activity.

    Roles and responsibilities

    The system owner (Supplier Relationship Manager), as defined in , is responsible for ensuring information to protected by cryptographic controls as set out in this policy.

    The Head of Information Security is responsible for ensuring the policy is aligned to FundApps' business objectives.

    Vulnerability Management Policy

    Objective

    The purpose of this policy is to define the way in which FundApps detects, classifies, mitigates and corrects vulnerabilities on its Information System. Effective implementation of this policy will allow to reduce the probability and/or impact of vulnerabilities affecting the FundApps Information System

    Scope

    This policy applies to applications and infrastructure which makes up FundApps’ production environment. Physical vulnerability management is out of scope of this policy and managed by our hosting provider (AWS).

    Vulnerability Detection

    FundApps uses several layers of security controls to detect and remediate vulnerabilities:

    • A human-led penetration test performed by a CREST-accredited company is performed annually.

    • Static Application Security Testing (SAST) is performed against any change before being deployed to production.

    • Dynamic Application Security Testing (DAST) is performed against our platform weekly.

    • Infrastructure vulnerability scanning is performed against our infrastructure weekly.

    FundApps' latest penetration test report and response to this report can be found in

    Vulnerability Severity Ratings

    • Applications

      Application vulnerabilities are rated based on their impact and likelihood. Possible vulnerability ratings are Low, Medium, High and Critical. The rating system is based on the OWASP Risk Rating Methodology ().

    • Infrastructure

      Infrastructure vulnerabilities are rated using the Common Vulnerability Scoring System (). Possible vulnerability ratings are None (0.0), Low (0.1 - 3.9), Medium (4.0 - 6.9), High (7.0 - 8.9) and Critical (9.0 - 10.0).

    Vulnerability Acceptance, Mitigation and Correction

    • Process

      Once vulnerabilities have been identified, rated and formalised, FundApps will manage risk treatment based on the following diagram:

    By default, and as a maximum, the vulnerability acceptance period will be one year.

    • Applications

      FundApps will endeavour to address vulnerabilities based on their severity as defined in the following table:

    Critical
    High
    Medium
    Low

    (*) number of working days after application vulnerability report is formalised. (**) Critical or High vulnerabilities will not be accepted. In the worst case scenario FundApps will mitigate these to reduce the risk to Medium.

    • Infrastructure

      FundApps will endeavour to address infrastructure vulnerabilities based on their severity as defined in the following table:

    Critical
    High
    Medium
    Low

    (*) number of working days after vulnerability has been identified.

    FundApps Assistant (Intercom)

    1. What is FundApps Assistant?

    FundApps Assistant is an AI agent which is provided by Intercom, FundApps’ client support ticketing platform. FundApps Assistant acts as an intelligent virtual assistant which can provide immediate, automated assistance with:

    • Answering Frequently Asked Questions (FAQs): Get answers to common queries about FundApps products, features, and platform functionality.

    • Providing Troubleshooting Assistance: FundApps Assistant can guide you through self-service troubleshooting steps for issues you may encounter.

    • Help with Account Management: Learn more about your account settings, features, and how to use the platform effectively.

    • Recommending Resources: It can direct you to relevant articles, guides, and support materials within the FundApps Help Centre.

    FundApps Assistant provides an automated service, available 24/7, for faster responses and general assistance.

    2. How Does FundApps Assistant Work?

    FundApps Assistant works by leveraging large language models (LLMs) to aggregate information from the FundApps Help Centre, analyse your request, and respond with relevant information, suggested actions, or links to further resources.

    While FundApps Assistant can assist with basic queries, it is not a replacement for human expert support. If your issue is complex or requires a more in-depth response, you will be directed to a human FundApps representative.

    3. Data Privacy

    We take your privacy seriously. When using FundApps Assistant, you should know the following:

    • Data Collection: Basic interaction data is collected, such as the questions you ask and the responses it provides. This helps improve the accuracy of the support provided.

    • Data Sources: FundApps Assistant leverages FundApps Help Centre articles and your Intercom support ticket information to answer your questions. It does not have access to your or that of other clients, or the Intercom support ticket information of other clients, and cannot provide you with answers relating to this.

    • Sensitive Data: Do not share sensitive personal or financial information (e.g., position files, portfolio files, account passwords, financial details) by typing or uploading it into your conversation with FundApps Assistant. If your issue is complex or requires the sharing of these types of information, please reach out to a human FundApps representative.

    For more information, please read our .

    4. Limitations of FundApps Assistant

    While FundApps Assistant can provide immediate assistance, please note:

    • Not a Replacement for Expert Support: FundApps Assistant is designed to handle general inquiries and basic troubleshooting. It cannot replace a human representative for complex or personalised assistance.

    • Response Accuracy: FundApps Assistant provides answers based on available data from the FundApps Help Centre and may not always have the most up-to-date or comprehensive answers for every situation. If you need more precise or specific information, a representative will be happy to assist.

    • Availability: FundApps Assistant may be unavailable during technical maintenance or system updates.

    5. How to Access FundApps Assistant

    FundApps Assistant will be available to users from 15 July 2025, unless an admin user has contacted requesting to opt out their organisation. Admin users can opt out, and may opt back in, at any time.

    Individual users will need to acknowledge that they are aware they will be interacting with an AI agent, that they have read and understand this Policy Portal page on the FundApps Assistant, and consent to using FundApps Assistant when starting each conversation.

    If you ever feel that FundApps Assistant cannot fully resolve your issue, you can always escalate to a live support representative.

    6. Consent to Use FundApps Assistant

    If you consent to use FundApps Assistant, you acknowledge and agree to the following:

    • You are aware of how FundApps Assistant works and how your data will be used.

    • You understand the limitations of FundApps Assistant and acknowledge that it cannot replace human support for more complex issues.

    • You understand that you should not upload sensitive data, including position files and portfolio files, to FundApps Assistant or Intercom.

    • You can choose to stop using FundApps Assistant at any time by simply exiting the conversation or reaching out to our support team for assistance.

    Access Control

    Access Control

    FundApps implements physical and logical access controls across its IT systems and services in order to provide authorised, granular, audit-able and appropriate user access, and to ensure appropriate preservation of data confidentiality, integrity and availability in accordance with our Information Security Policy.

    This policy covers all FundApps IT systems and information not classified as 'Public' in our .

    Each information system is recorded in FundApps' which includes:

    Social Media

    Introduction

    Whatever part of FundApps we work in we are ambassadors for our company.

    Lots of us are having conversations and sharing through social media or online communities. We approach the online world in the same way we do the physical one – by using sound judgement, respect and common sense.

    OSFI Guideline B-10 (2023)

    Effective Date: November 2025


    Summary

    In 2023, the Canadian Office of the Superintendent of Financial Institutions (OSFI) adopted amendments to Guideline B-10: Third-Party Risk Management. These changes are applicable to vendors who provide services to regulated financial institutions, specifically concerning the vendors' use of subcontractors.

    FundApps position: Taken together, FundApps’ subcontractor management, Sub-processor oversight, Change of Control provisions, and ISO/SOC 2-aligned security practices fully satisfy the subcontractor governance obligations set out in Annex 2 of OSFI Guideline B-10. No additional contractual terms are required to meet OSFI expectations.


    Who’s this policy for?

    It applies to anyone working for and on behalf of FundApps. This policy doesn’t form part of your contract and may be amended at any time.

    What types of social media does this cover?

    This policy covers the use of any online platform which can be used for networking, sharing information or opinions. This includes posting comments, pictures, videos, blogging, using forums, sending private messages relating to FundApps its clients or colleagues, endorsing other people’s content and re-tweeting/circulating posts. It covers platforms like YouTube, LinkedIn, Facebook, Twitter, Instagram, Pinterest, Yammer and Instant Messaging services e.g. WhatsApp, etc., or any other existing or new social media platforms, whether it’s internal or external on your own or a work device.

    Can I say that I work for FundApps on my profile?

    If you want to then yes you can; just make sure it’s clear that you’re not speaking on behalf of FundApps and say that ‘all views are my own’ somewhere on your profile.

    How should I use social media (including internal sites)?

    Be yourself

    If your profile mentions FundApps, be honest about who you are and what you do. Never share your login details or let others post on your behalf. If you’re leaving, remember to update your profile with your new company name or employment status.

    Be respectful

    Be respectful to other people, even if you disagree with their opinion.

    Don’t post things or send messages that could damage our reputation, bring the company into disrepute or cause actual or likely harm to the company or colleagues.

    Don’t use statements, photos, videos, audio or send messages that reasonably could be viewed as malicious, abusive, offensive, obscene, threatening, intimidating or contain nudity or images of a sexual nature, or that could be seen as bullying, harassment or discrimination.

    Use common sense

    You’re responsible for what you put online and any impact it has on others so set up privacy settings if you need to. Never give out personal or private information about colleagues or clients. As a general rule, if you wouldn’t say or show it to your manager, then it’s probably not appropriate to post or send it online!

    And remember, what you post or send can be difficult to delete once it’s online.

    Be aware

    Help us protect our company and reputation by thinking carefully about what you put online. If you see something online that concerns you please talk to the senior management team.

    Did you know?

    Even when you say something is your personal opinion we can still be held liable, so pause and think before you post.

    You should never assume your social media content won’t reach a wider, public audience. Even if it was originally meant for a small group of friends or for a private message, colleagues or clients may have access to things you put online.

    Disseminating confidential or sensitive information; or posting, sharing or endorsing inappropriate messages about your colleagues or FundApps, could result in disciplinary action, which could lead to your dismissal.

    Protecting our business

    To help protect our business anything you develop or create, including programs or documentation, whilst working for us remains the property of FundApps and must not be used or shared on social media sites or online forums, unless you have specific permission from your director to do so.

    Never reveal confidential or sensitive information including anything that is given to us in confidence by suppliers or third parties.

    This includes information about FundApps which is not in the public domain.

    Respect intellectual property laws

    Intellectual property laws (which include copyright and trademarks) are in place to protect the ideas people have, create or develop so that other people can’t steal or use them without permission. For example, FundApps is our trademark, which means we can stop other people from using it on their products.

    We must always take care to protect intellectual property rights and respect the rights of others. Stealing someone’s idea can reflect badly on FundApps and damage client trust.

    Most forms of published information are protected by copyright, which means you shouldn’t re-use it without getting the owner’s permission first.

    Copyright applies to stuff that’s used both internally and externally so make sure you always respect copyright and see permission first – even if it’s only being used within FundApps. Copyright can also apply when sharing content on Twitter and Facebook, so be mindful when doing this.

    Can I use my FundApps email address when I’m using social media?

    You should use your personal e-mail address unless you’re speaking on behalf of the company (and are authorised to do so).

    Can I use the company logo, brand name or pictures of the office etc. in my posts?

    Yes, as long as it’s connected with work, appropriate to post, does not reveal confidential information and any people in the photo are happy for it to be posted.

    Can I use social media during working hours?

    Yes, if you’re using social media for part of your job or it’s related to work (for example, to help a client). Otherwise, using social media during working hours must be reasonable and shouldn’t interfere with you carrying out your job.

    What should I do if I see a colleague has posted something offensive or inappropriate on line?

    If it’s something that’s personally offensive to you, you should speak to the person involved, if you’re comfortable to do so, and ask them to remove the post. If the posts aren’t removed or it happens again you should speak to your manager about it. If the post is directly about you, and has been posted without your consent or you’re offended by it, or it’s inappropriate, please speak to your manager or the senior management team.

    If you endorse, share or send an offensive or inappropriate comment or message about FundsApps or your colleagues, it will be investigated and may result in us taking disciplinary action against you, which could lead to your dismissal.

    If the post contains company information which you believe to be confidential (basically something which isn’t already in the public domain), you should report this immediately to our CTO and [email protected].

    Is social media monitored?

    Yes. Social media sites are scanned for any mention of FundApps, our products and services or inappropriate comments about the company, our colleagues, managers or clients. If you spot anything that’s been posted about our business that concerns you please contact the senior management team.

    Inappropriate behaviour including posting confidential or sensitive information will be investigated, and may result in us taking disciplinary action against you which could lead to your dismissal. You will be asked to co-operate with any investigation.

    If it comes to our attention that any inappropriate posts, comments or messages have been made/sent by you or can be viewed on your profile, then we reserve the right to access these posts and to take copies of them. You may also be asked to remove any content that we consider to be a breach of this policy. If you don’t remove the content when asked, it may result in disciplinary action. Any such posts may be used in internal proceedings and/or legal action.

    We treat the online world the same as the physical one, so if your post, comment or message would breach our policies in another forum it will breach it in an online forum too.

    For anyone else not directly employed by FundApps: if you breach this policy we may terminate the arrangements we have with you for your services.

    Overview of Guideline B-10

    Federally regulated financial institutions (FRFIs) must effectively manage the risks associated with outsourcing business activities to external parties, as required by OSFI.

    Key Requirements:

    • Accountability: FRFIs retain full accountability for all outsourced activities.

    • Supervisory Authority: OSFI's supervisory powers remain unchanged, even when activities are outsourced.

    • Documentation: Written agreements with third parties must comply with OSFI's risk management Guideline expectations.

    • Reporting: FRFIs are required to provide OSFI with requested information and promptly report any substantive issues that could impact critical operations.


    Key 2023 Amendments

    For arrangements deemed high-risk and critical, OSFI mandates that FRFIs incorporate the provisions outlined in Annex 2 of this Guideline into their written agreements. These agreements must, as a minimum requirement, clearly define the respective rights and responsibilities of the parties involved, establish specific roles related to technology, set clear limits for the engagement of subcontractors, and require the third party to inform the FRFI of any use of subcontracting. Additionally, the FRFI must retain the authority to perform due diligence to evaluate the implications of any proposed change in service.

    Specifically, Annex 2 of the 2023 amendments states:

    ”Use of subcontractors: The agreement should establish parameters on the use of subcontractors and require the third-party to notify the Federally regulated financial institutions (FRFI) of any subcontracting of services. The FRFI should have the ability to conduct due diligence, in order to evaluate the impacts from the change in service.”


    How This Applies To FundApps

    FundApps’ subcontractor and Sub-processor governance framework fully aligns with the subcontractor-related requirements set out in the 2023 amendments to OSFI Guideline B-10, including the expectations in Annex 2 regarding notification, parameters, and due-diligence rights. As such, no additional contractual terms are required for FundApps to meet OSFI expectations.

    1. Subcontractor/Sub-processor Accountability Per Section 15.4 of our General Terms, FundApps may utilize subcontractors to fulfil any of its obligations under the Agreement, while remaining fully accountable for all their actions and omissions. A current list of our Subcontractors is available here. Given the nature of our services, many of these subcontractors also function as Sub-processors, as defined in our Privacy Policy and Section 4 of Schedule C of the General Terms.

    FundApps is contractually required to:

    • Maintain full responsibility for all Sub-processors;

    • Keep an updated list of Sub-processors and provide at least 30 days’ notice prior to the addition of a new Sub-processor; and

    • Provide clients a 30-day objection window for valid data-protection concerns, with either party able to terminate on 30 days’ notice if concerns cannot be resolved. A lack of objection within this period constitutes approval.

    2. Security, Certifications, and Due Diligence FundApps performs comprehensive due diligence on all new subcontractors and Sub-processors prior to onboarding, including assessments of technical, organizational, and security controls in line with our internal Third Party Risk Management framework. This process is reinforced by our ISO 27001 certification and SOC 2 Type II accreditation, both of which require documented, audited procedures for supplier assessment, monitoring, and risk management.

    Additionally, FundApps complies with security and assurance requirements under Clause 3.1 of the General Terms, including:

    • Procurement and maintenance of an SSL certificate;

    • Provision of SOC 2 Type II Report and ISO 27001 certificate for the Software; and

    • Ensuring the hosting provider, AWS, one of our subcontractors, maintains ISO 27001 certification or its equivalent.

    FundApps also undergoes annual due-diligence questionnaires (DDQs) from clients’ compliance teams, further validating the robustness and transparency of our subcontractor oversight practices.

    3. Change of Control (CoC) Governance The remaining Subcontractors listed are FundApps Affiliates. Under Section 15.5 of the General Terms, FundApps may assign or transfer the Agreement or its rights to:

    (a) an Affiliate for purposes of providing services, with FundApps remaining fully accountable for the Affiliate’s actions; or (b) an acquirer of all or a majority of FundApps’ equity interests, assets, or business related to this Agreement (“Change of Control”), with prior written notice to the client. In the event of a Change of Control, the client may terminate the Agreement on 30 days’ notice only if they provide reasonable evidence that the Change of Control would have a materially adverse effect.

    This provision ensures clients maintain OSFI-aligned oversight of material changes in service delivery while FundApps retains accountability for any Affiliate or acquirer acting under the Agreement.

    4. Regulatory Alignment Beyond OSFI Our subcontractor oversight and due-diligence practices are also aligned with the requirements under the EU Digital Operational Resilience Act (DORA), providing a comprehensive and harmonized approach to third-party risk management across multiple regulatory frameworks.

    Intercom: FundApps Assistant is provided by Intercom, FundApps’ client support ticketing platform. Our written agreement with Intercom includes a robust data processing agreement, and Intercom’s security accreditations have been assessed as meeting our high security standards, and will be reviewed annually.

  • AI providers: Intercom utilises Microsoft’s Azure OpenAI Service and Google to provide FundApps Assistant. Intercom does not allow these providers to use your data for training of the underlying AI model or otherwise improving the provider’s services.

  • confidential Client Data
    Privacy Policy
    [email protected]

    - Regulatory information - Publicly available information on a company.

    - FundApps policies, - List of clients, - Development and test data, - Prospective client visitor data and analytics, - Task lists, potential future work - FundApps ISMS and asset register.

    - Employee contracts, passports, salaries, bank records, - Engineering Source Code, - FundApps’ rule package, - Client portfolio, structures, - Client queries, - Server event logs, application logs, exception logs.

    - Client positions - Client results (disclosures, breaches etc) and data overrides - Encryption keys and infrastructure credentials

    Current services included in this classification

    - OneLogin - Aosphere.

    - Amazon AWS Development, - OneDrive, - HubSpot, - GitBook, - Bonusly, - Google Analytics.

    - GitHub, - Intercom, - Google Mail, - Google Drive, - Slack, - Kingston Smith, - HSBC, - Datadog SIEM, - Sentry.

    - Amazon AWS Production, - Octopus, - Client environments.

    Data access & control

    No access restrictions. Data is available for public access.

    Available to FundApps prospects and clients (under NDA) and staff.

    Available only to specified FundApps staff.

    Access is controlled and restricted to specific FundApps staff, following a 'need to know' and 'least privilege' basis.

    Legal requirements

    Protection of data is at the discretion of the owner or custodian.

    Protection of data is at the discretion of the owner or custodian.

    Protection of data is required by law or at the discretion of the owner or custodian.

    Protection of data is required by law or at the discretion of the owner or custodian.

    Transmission

    No other protection is required for public information.

    Data must be shared through systems which restrict access to the intended audience. If this is not possible (e.g. data needs to be shared through internal chat or email), data must be sent encrypted (e.g. password protected encrypted archive where password is sent through unrelated channel) or through the means of a link to a system which implements the appropriate access control (link to Google Docs drive).

    Data must be shared through systems which restrict access to the intended audience. If this is not possible (e.g. data needs to be shared through internal chat or email), data must be sent encrypted (e.g. password protected encrypted archive where password is sent through unrelated channel) or through the means of a link to a system which implements the appropriate access control (link to Google Docs drive).

    Transmission through email, support tickets, internal chat tools is prohibited. Transmission may only be made through approved channels that are authenticated and encrypted (HTTPS or VPN).

    Audit controls

    No audit controls required.

    Information owners must periodically monitor and review their systems and procedures for potential misuse and/or unauthorized access.

    Information owners must periodically monitor and review their systems and procedures for potential misuse and/or unauthorized access. Audit trails for the purposes of non-repudiation must be in place.

    Systems must be actively monitored and reviewed for potential misuse and/or unauthorized access. Audit trails for the purposes of non-repudiation must be in place.

    Storage

    No restrictions.

    No restrictions. Care must always be taken when storing this information on mobile devices.

    Encryption is required if stored on a system without access control.

    Encryption at rest mandatory for all data not within a physically secure ISO 27001 environment. Storage is prohibited on unapproved computing equipment.

    Backup & Recovery procedures

    Not required.

    Documented backup and recovery procedures are required in line with FundApps' Service Levels.

    Documented backup and recovery procedures are required in line with FundApps' Service Levels.

    Documented backup and recovery procedures are required, including automated failover wherever feasible in order to achieve FundApps' Service Levels.

    Disposal (digital file)

    No restrictions.

    Standard deletion from media

    Standard deletion from media

    Delete all files or data using a secure delete tool (such as Eraser).

    Disposal (physical medium)

    No restrictions.

    Media must be erased before disposal

    Media must be erased before disposal. Cryptographic keys must be deleted for encrypted media. Media must be disposed of securely using state of the art approved solutions for the permanent removal of data (e.g. shredding or physical destruction).

    Media must be erased before disposal. Cryptographic keys must be deleted for encrypted media. Media must be disposed of securely using state of the art approved solutions for the permanent removal of data (e.g. shredding or physical destruction).

    Transport

    Normal mail service

    Normal mail service

    Must never be printed. Transport of media or devices containing such data must be done through a trusted courier.

    Must never be printed. Transport of media or devices containing such data must be done through a trusted courier.

    Storage

    No requirements

    Secure office or other location. Room need not be locked if access to the building or floor is restricted to employees and authorised non-employees.

    Must never be printed

    Must never be printed

    Disposal

    No requirements

    Information must be disposed of securely using strip-cut shredders or confidential waste bins which are certified for secure destruction.

    Must never be printed

    Must never be printed

    Description

    Publicly available data.

    Accessible only to FundApps staff, authorised clients and partners.

    Access restricted to specific FundApps teams. Data which the data owner has not decided to make public; data that is legally regulated and requires some level of access control, and data protected by contractual obligations.

    Access restricted to specific FundApps staff on a ‘need to know’ basis. Data which if disclosed publicly could cause significant financial or reputational damage to FundApps or our clients; data which is legally regulated requiring an extremely high level of protection; data protected by contractual obligations.

    Impact

    None

    Low

    Medium

    High

    Current data in this classification

    -

    -

    Mandatory

    Mandatory

    Encryption in transit

    -

    Mandatory

    Mandatory

    Mandatory

    Encryption at rest

    -

    -

    -

    Mandatory

    publicly available
    this website.
    NIST Special Publication 800-131A Revision 2
    FundApps' Information System Inventory [restricted to FundApps staff]

    Encryption at rest on removable media

    An owner responsible for managing user access

  • The types of data it holds and therefore the data classification and controls required to protect that information.

  • Status of basic controls such as SSO and two-factor

  • Access to each information system is on a least-privilege and as-needed basis. These are managed by the nominated owner of the system and access to each system is managed through FundApps' Identity and Access Management system [Restricted to FundApps staff]. These are reviewed as part of our monthly security stakeholder meeting.

    FundApps' Identity and Access Management system allows to simplify and automate the on-boarding and off-boarding processes in terms of provisioning and de-provisioning accesses to systems.

    Logical access controls for FundApps Platform

    Data stored in the FundApps platform is classified as 'FundApps Confidential' (see data classification policy).

    User Interface

    Support staff access the platform through the same interface our clients do. As such, controls in place include:

    • Access via HTTPS only;

    • Named accounts using Single sign-on (SSO) and two-factor authentication;

    • Audit logs of support staff accessing the system, which is visible to our clients;

    • Access is granted on a least-privilege and need-to-know basis;

    • Ongoing ;

    • Access review by head of Client Services on a quarterly basis.

    Additionally, we provide clients with the option to enable Just-In-Time (JIT) access feature. This is a dynamic access control method that allows our Client Services staff to have temporary permissions to a client's environment only when necessary and for the duration required to complete specific tasks.

    JIT has a number of benefits:

    • FundApps staff do not have default access to client data.

    • Access is granted and revoked by clients with the Administrator role.

    • Application access is restricted to predetermined time periods and designated FundApps staff members only.

    • Access is time-limited, automatically expiring once the predetermined period concludes.

    • As is currently the case, access is documented in the audit trail.

    It is important to note that if you ask us to enable JIT and subsequently fail to grant CS access for support purposes in a timely manner, this may result in missed service levels or other consequential issues for which we cannot be held responsible. It is imperative that all necessary access permissions are granted promptly to ensure our ability to meet agreed-upon service standards.

    More information about JIT is available in our Help Centre.

    Production

    Access to our production network is restricted to a very small set of staff. Controls in place include:

    • All credentials and accounts are provisioned through a configuration change management system that requires approval of the change;

    • Access to the network must be made via a secure connection through the use of multi-factor authentication.

    • Each member of operational staff uses a named account to each server where access is required which is separately provisioned from the above network access;

    • Access is granted on a least-privilege and need-to-know basis;

    • Access is subject to Just-In-Time (JIT) and peer approval;

    • All access to and key administrative actions on production servers are logged to a centralised audit store;

    • Access review by CTO on a quarterly basis.

    Logical access controls for all IT systems

    Our data classification policy classifies data stored across all our IT Systems. Principles we follow include:

    • Named accounts are mandatory, unless an exception is granted by the data owner responsible.

    • Any built-in, default accounts should be disabled or renamed and passwords changed

    • Single-sign-on should be enabled and mandatory wherever possible

    • Two-factor should be enabled and mandatory whenever possible

    • Passwords should not be re-used across systems. Passwords should be stored using an approved password management tool with a strong master password.

    • Use secure passwords (minimum 12 characters in length).

    • Audit logs must provide non-repudiation for changes and access to FundApps Restricted and Confidential data

    See our data classification policy for more information on the specific controls in place.

    Physical access controls

    See physical security page.

    Types of Authentication mechanisms supported by FundApps' platform

    FundApps encourages its clients to implement Single Sign-On in order to automate provisioning/deprovisioning of their accesses, and provide their users with a seamless authentication process. Alternatively FundApps supports two-factor authentication as well as traditional user/password credentials. More information is available on FundApps' Help Centre.

    Roles and privileges in FundApps' platform

    In FundApps' platform, privileges are provided through roles which are assigned to users. More information on these roles and the privileges they grant is available on FundApps' Help Centre.

    data classification policy
    Information Systems Register [Restricted to FundApps staff]

    Vulnerability mitigated, corrected or accepted (**)

    <=2 (*)

    <=5 (*)

    <=20 (*)

    <=20 (*)

    Vulnerability mitigated, corrected or accepted

    <=20 (*)

    <=40 (*)

    <=60 (*)

    Best effort

    FundApps' Trust Portal.
    https://www.owasp.org/index.php/OWASP_Risk_Rating_Methodology
    https://www.first.org/cvss/user-guide

    Performance Evaluation

    What will be monitored & measured
    Methods for monitoring & measurement
    Metrics used to measure
    Target
    When will it be done
    Who shall monitor & measure

    Protection of sensitive data managed by FundApps' Information Systems

    Incident register

    # of data breaches in last 12 months

    0

    Annually and after incident occurred

    Security Team

    Analysis of performance

    Based on these indicators, FundApps will assess whether its ISMS is performing efficiently and whether root causes of underperformance are being identified and managed appropriately.

    Management Review

    At least once per calendar year, a review of the ISMS will be done to ensure its continuing suitability, adequacy and effectiveness.

    Attendees

    The annual management review meeting will have the following attendees:

    • the ISMS Implementer,

    • the ISMS Manager, and

    • at least one member from the Leadership Team, which can be the ISMS Manager.

    Agenda

    The agenda will include the following topics:

    1. Status of actions from previous management reviews

    2. Relevant changes in external and internal issues

    3. Performance of the ISMS

      1. Audit results, non-conformities and corrective actions

    Health and Safety

    Overview

    • Please read this information with regards Health and Safety

    • Please assess your own workstation [Restricted to FundApps staff]

    Risk assessement

    We maintain a

    Location of critical items

    Item
    Location

    Health and Safety Policy

    Andrew White has overall and final responsibility for Health and Safety

    Hana Sekerez has day-to-day responsibility for ensuring this policy is practiced

    Statement of general policy
    Who
    Action/Arrangements

    Accidents and ill health at work reported under (Reporting of Injuries, Diseases and Dangerous Occurrences Regulations).

    FundApps Group Structure Overview

    📝This page gives a clear overview of the FundApps Group structure and ownership chain as of Dec 2025.

    At a glance

    • The ultimate controlling investors sit above the Rio Group entities. There are no external minority investors at the operating‑company level.

    Business Continuity Management System

    Overview

    Our clients include high profile companies with high availability and service expectations. It is therefore vital that FundApps maintain service and in the event of disruption, are able to effectively manage the incident and communicate with all key interested parties.

    Any loss of service from the data centres or our key services will impact the reputation of FundApps, result in loss of revenue through service credits and other compensations, and potentially damage FundApps irreparably in the marketplace.

    NOTE: This document describes the management systems framework intended for compliance with ISO 22301. It is designed to provide some documentation that is needed by ISO 22301, with pointers to the other key documents, and is aligned in structure to ISO 22301 for ease of assessing compliance.

    The FundApps Code for Third Parties

    As a business, we set ourselves high standards both in what we aspire to achieve and how we behave. The FundApps Code (“Code”) acts as a guide for our economic, social and environmental responsibility and business ethics. Our company follows the Code in spirit and letter and endeavours to always act in ways that supports and promotes and our culture of care.

    As a supplier, you are an extension of our organisation, and as such are expected to not only follow your contractual obligations, but also the principles of the Code or your own equivalent standards, whether in your daily business activities or in the provision of goods and services to us/our clients. By working together, we aim to uphold the highest standards of integrity and fairness, ensuring that every partnership contributes to a sustainable and equitable future.

    WE BUILD TRUST IN HOW WE DO BUSINESS

    CONFLICT OF INTEREST

  • Monitoring and measurement results

  • Information Security Objectives

  • Feedback from interested parties

  • Results of risk assessment and status of the risk treatment plan

  • Opportunities for continual improvement

  • Information Systems misused, damaged or abused.

    Incident register

    # of C1 or C2 security incidents in the last 12 months

    0

    Annually and after incident occurred

    Security Team

    Information Systems misused, damaged or abused.

    Incident register

    # of C1, C2 or C3 security incidents in the last 12 months linked to a third-party supplier.

    0

    Annually and after incident occurred

    Security Team

    Demonstrate a high level of competence and expertise in Information Security

    Client dissatisfaction of security practices

    # of clients lost due to Information Security issues in last 12 months

    0

    Annually

    Security Team

    Demonstrate a high level of competence and expertise in Information Security

    Prospect dissatisfaction of security practices

    # of deals with prospects lost due to Information Security issues in last 12 months

    <5% closed lost deals

    Annually

    Security Team

    Compliance with security standards.

    ISO certification audit

    ISO 27001 certification maintained

    Yes

    Annually

    Security Team

    Compliance with security standards.

    SOC 2 Type II Report

    SOC 2 Type II Report maintained in last 12 months

    Yes

    Annually

    Security Team

    Foster a culture of security awareness within FundApps

    Incident register

    # of C1, C2, C3 or Internal security incidents resulting from lack of security awareness (e.g. phishing) in last 12 months

    0 C1 0 C2 0 C3 <10 internals

    Annually and after incident occurred

    Security Team

    Foster a culture of security awareness within FundApps

    Phishing test

    % of users who click on test phishing emails

    <5%

    After each phishing test

    Security Team

    Foster a culture of security awareness within FundApps

    Phishing test

    % of users who report a test phishing email

    >20%

    After each phishing test

    Security Team

    Information Security and Business Continuity Risks

    Risk assessments and reviews

    # of risks above the risk tolerance level

    0

    Annually and following risk is identified

    Security Team

    Audit Findings

    Internal or external audit

    # and severity of findings identified during last internal audit

    0 major non-conformities

    Following internal or external audit

    Security Team

    Liability due to an Information Security Incident.

    Law suits

    # of law suits, fines or losses due to a security incident in last 12 months

    0

    Annually and following law suit

    Security Team

    Business Continuity Plan Effectiveness

    BCP test report

    Impact the last activation of BCP had on business activity and clients

    No impact

    Annually

    Security Team

    Disaster Recovery Plan Effectiveness

    DR test report

    Service return time during last DR Test

    All components RTOs met All components RPOs met

    Annually

    Security Team

    Security of FundApps' platform

    Penetration test report

    # and severity of findings in last penetration test

    0 Critical and High vulnerabilities

    Annually

    Security Team

    security awareness training

    FundApps is committed to identifying and addressing real and potential conflicts of interests to ensure we engage in ethical business practices and avoid serious commercial, reputational or client relationship issues. When conducting work for FundApps, you must always act with objectivity and in FundApps’ best interests. Should you encounter an actual or potential conflict of interest that may impact your work for or with FundApps, we request they be disclosed as soon as reasonably possible.

    UNFAIR BUSINESS PRACTICES

    FundApps does not condone nor tolerate any form of anti-competitive business practice. In the spirit of encouraging fair competition, you shall comply with all applicable competition laws, including but not limited to those relating to teaming and information sharing with competitors, price fixing and rigging bids.

    ANTI-CORRUPTION AND ANTI-BRIBERY

    FundApps conducts its business transparently, honestly and fairly and we expect that any third party we engage with does the same. We expect you to take a zero-tolerance approach towards unethical practices and comply with all applicable laws, statutes, regulations and codes relating to anti-bribery and anti-corruption. We understand that exchanging gifts or hospitality may sometimes occur in global business. However, no gifts, hospitality, or benefits should be exchanged that could be perceived as a bribe, create a sense of obligation, or influence behaviour. We strictly prohibit the acceptance of cash, cash equivalents, stocks, or any unlawful or improper benefits to ensure integrity in all business practices.

    ANTI-MONEY LAUNDERING, FACILITATION OF TAX EVASION AND FRAUD

    We are always on alert for any potentially suspicious or illegal transactions, requests and activities which could result in our business being used to facilitate money laundering, fraud or tax evasion. We refuse to do business with money that was acquired through illegal activities, and we expect all our business partners to comply with laws and regulations governing the fight against illegal financial activities.

    SANCTIONS

    You must fully comply with all applicable sanctions, export controls, and trade laws, including restrictions on transactions with sanctioned countries, entities, or individuals designated by authorities such as the United Nations, the European Union, or national governments. You are required to implement controls to prevent and detect violations, and to immediately notify us of any breaches.

    WHISTLEBLOWING

    As a company that values transparency, we encourage our suppliers to monitor its compliance with the Code and report any breaches as soon as possible. You shall not retaliate or take disciplinary action against any worker that has, in good faith, reported breaches of this Code or questionable behaviour, or who has sought advice regarding this Code.

    WE ACT RESPONSIBLY

    EQUALITY, DIVERSITY AND INCLUSION

    FundApps believes in employing individuals based solely upon merit and qualification directly related to professional competence. We require our suppliers to prohibit discrimination in any employment practice based on characteristics other than the individual’s ability to perform the job, subject to any accommodations required or permitted by law.

    FREEDOM OF ASSOCIATION AND COLLECTIVE BARGAINING

    You shall not interfere with the right of workers to decide whether to lawfully associate with groups of their choice, including the right to form or join trade unions and to engage in collective bargaining.

    FAIR COMPENSATION, WORK HOURS AND PERFORMANCE ASSESSMENT

    FundApps values fair compensation and seeks to work with suppliers who exceed minimum wage standards by adopting benchmarks such as living wage recommendations, industry standards, or collective agreements. You must ensure that working hours comply with applicable laws, are not excessive, and allow for adequate rest periods, aligning with international standards for worker welfare. Additionally, you are expected to maintain a transparent and consistent link between performance and reward, using a framework that assesses outcomes against individual and team objectives and evaluates alignment with company values through demonstrable behaviours.

    HUMAN RIGHTS, SLAVERY, HUMAN TRAFFICKING AND CHILD LABOUR

    FundApps is committed to protecting human rights and requires suppliers to uphold the same principles. You must ensure that their operations and supply chains are free from forced labour, slavery, human trafficking, and child labour. All work must be freely chosen, and workers must not be subjected to threats, coercion, or exploitation. You are responsible for implementing policies and controls to prevent human rights abuses, ensuring that all workers are of legal working age and employed under fair and lawful conditions.

    HEALTH AND SAFETY AT WORK

    The safety, health and wellbeing of our team members, business partners and others we work with is of paramount importance to us. We all have a responsibility to act in a way that does not compromise the safety and well-being of people - this is why we implement health and safety protocols to ensure workplace safety and expect you to do the same. You must provide a safe and healthy working environment for all workers, complying with all applicable laws and regulations. This includes taking proactive measures to identify, assess, and mitigate health and safety risks in the workplace. You must ensure workers have access to appropriate safety equipment, training, and facilities, as well as adequate rest breaks and emergency procedures. You are also encouraged to promote mental well-being and create a culture of health and safety awareness throughout their operations.

    ENVIRONMENT AND CLIMATE PROTECTION

    As a company that’s conscious of its impact on the environment, we expect our suppliers to comply with all applicable environmental laws and regulations. In line with our values, we strive to work with suppliers who go above this requirement and:

    1. assess the impact of all historical, current and likely future operations;

    2. proactively improve environmental performance, reduce pollution, emissions and waste; and

    3. raise awareness and train workers on environmental matters.

    CONFIDENTIALITY

    As part of the work you do for FundApps you may access information about our business or clients or business that is confidential. You are expected to maintain the highest standards of confidentiality regarding all sensitive information shared by FundApps. You must take appropriate measures to safeguard this information, ensuring it is not disclosed to unauthorised individuals or third parties, both during and after the course of their engagement with FundApps.

    ANTI-HARASSMENT, BULLYING AND VICTIMISATION

    You must adhere to a zero-tolerance approach to discrimination, harassment, bullying, victimisation, and violence in any form. All workers have the right to a safe and respectful work environment where they feel valued and supported. You are expected to uphold these principles by fostering a culture of respect and dignity throughout their operations. Any violations of this standard must be addressed promptly and may result in serious consequences, including the termination of the business relationship with FundApps.

    WE KEEP DATA SAFE

    INFORMATION SECURITY

    In line with the expectations of our clients, we have created a robust and effective control environment by adamantly incorporating security into all of our processes. Similarly, we expect you to have appropriate information security measures, commensurate with the complexity of our arrangement. Examples of steps we would expect you to take include:

    1. Implement technical measures on devices that are used to access FundApps systems (cf. Security Musts)

    2. Having technical and organisational measures to protect the availability, integrity and confidentiality of information (including information belonging to or supplied by FundApps) held on your systems;

    3. Measures to prevent the unauthorised access of information by third parties including your representatives; and

    4. Run background checks on all roles who have direct access to our client’s confidential information.

    DATA PROTECTION

    We take the privacy of our clients, employees and others with whom we conduct business seriously. We therefore expect you to handle any personal information you receive from us with care and comply with all applicable data privacy laws.

    RESPONSIBLE USE OF AI

    You must inform FundApps when AI is used in the services provided and cooperate fully with any inquiries related to our security review process. We expect suppliers to use AI responsibly, ensuring it aligns with ethical standards, legal regulations, and the core values of FundApps. You must avoid biases, respect data privacy, and ensure transparency in AI-driven decision-making. AI systems should be secure, regularly reviewed for vulnerabilities, and used in a way that maintains fairness, safeguards personal data, and upholds the highest ethical standards.

    YOUR RESPONSIBILITIES UNDER THIS CODE

    PROCUREMENT

    You must conduct thorough due diligence before engaging any subcontractors or third-party representatives, ensuring they meet the minimum standards and principles outlined in this Code or your equivalent standards. If you engage subcontractors to perform services critical to those provided to FundApps, we must be informed of any material changes in these relationships. Contracts with subcontractors should outline compliance expectations, the consequences of non-compliance, and ensure systems are in place to monitor adherence and address any breaches or deficiencies promptly.

    TRAINING, CERTIFYING COMPLIANCE AND AUDIT

    You are required to provide ongoing training to all staff on the relevant principles of this Code or your equivalent standards. On request, you will also provide written confirmation that you have implemented measures necessary to monitor your compliance and no major concerns regarding such ability have been raised. We also reserve the right to request any additional third-party or self-certifications that are reasonably required to demonstrate such compliance.

    REPORTING OF BREACHES

    You must monitor your compliance accordingly and report any actual or suspected breaches without undue delay to [email protected]. Where FundApps becomes aware of a breach of this Code or your equivalent standards, we may either:

    1. Terminate the business relationship with you (including any contracts); or

    2. Require you to produce a remediation plan specifying the actions you will take that will lead to compliance and present it to us within 30 days of being requested to do so. Failure to produce the remediation plan or to implement it without undue delay may result in the immediate termination of our business relationship (including any contracts).

    WHO TO CONTACT IF YOU HAVE ANY QUESTIONS ABOUT THE CODE

    Should you have any queries about the Code, please do not hesitate to contact your Supplier Relationship Manager or e-mail us at [email protected].

    FundApps’ values

    Implement emergency procedures – evacuation in case of fire or other significant incident. You can find help with your fire risk assessment

    HS

    Escape routes well signed and kept clear at all times. Evacuation plans are tested from time to time and updated as necessary.

    Maintain safe and healthy working conditions, provide and maintain plant, equipment and machinery, and ensure safe storage/use of substances

    HS

    Toilets, washing facilities and drinking water provided. System in place for routine inspections and testing of equipment and machinery and for ensuring that action is promptly taken to address any defects.

    Health and safety law poster

    Kitchen

    First-aid box is located

    Kitchen. Second box in General Office cabinet under large TV

    Accident book

    Located here [Restricted to FundApps staff]

    Prevent accidents and cases of work-related ill health by managing the health and safety risks in the workplace

    HS

    Relevant risk assessments completed and actions arising out of those assessments implemented. (Risk assessments reviewed when working habits or conditions change.)

    Provide clear instructions and information, and adequate training, to ensure employees are competent to do their work

    HS

    Staff & subcontractors given necessary health and safety induction and provided with appropriate training (including working at height, asbestos awareness and electrical safety) and personal protective equipment. We will ensure that suitable arrangements are in place to cover employees engaged in work remote from the main company site.

    Engage and consult with employees on day-to-day health and safety conditions

    HS

    Staff routinely consulted on health and safety matters as they arise but also formally consulted at regular health and safety performance review meetings or sooner if required.

    health and safety risk register here [Restricted to FundApps staff]
    RIDDOR
    The operating businesses are FundApps and SteelEye, with regional subsidiaries for certain markets.
  • All operating subsidiaries are wholly owned, except where local law requires a nominal share to be held by a local director (noted below). None of the local formalities impact the group's control of its subsidiaries.

  • There are no registrable beneficial owners; the company is controlled by its Board. Senior managing officials are disclosed as required under PSC/UBO regulations (see below).


  • Ultimate beneficial ownership (UBO)

    • Ownership is held via institutional holding companies within the Rio Group.

    • No single natural person meets the 25% UBO threshold. No individual directly or indirectly owns or controls 25% or more of the shares or voting rights in FundApps Ltd or SteelEye Limited.

    • Control is exercised collectively by the Board; the directors may be treated as UBOs in their capacity as senior managing officials (SMOs).

    • As no natural person can be identified via ownership or control, the following directors of Rio Group Topco Ltd are recorded as Persons with Significant Control in the capacity of Senior Managing Officials (SMOs):

      • Tom Gavin (Independent Chairman)

      • Brad Bernstein, Richard Earnshaw, Max Weber (FTV)

      • Vivek Syal, Andrew White (FundApps)

    • If you require Director identification details (such as certified passport), please send your request to .


    UK Persons with Significant Control (PSC)

    • FundApps Ltd: Registrable PSC is Rio Group Topco Limited (Company No. 16541855), registered office 18th Floor, Hylo 105 Bunhill Row, London, England, EC1Y 8LZ. [1]

    • SteelEye Limited: Registrable PSC is Rio Group Topco Limited (Company No. 16541855), registered office 18th Floor, Hylo 105 Bunhill Row, London, England, EC1Y 8LZ. [1]


    Ownership chain (top to operating companies)

    1

    FTV VIII, L.P. (Delaware)

    Top-level investor entity.

    2

    Rio TopCo, L.P. (Delaware)

    Held under the FTV VIII, L.P. structure.

    3

    Rio Group Topco Limited (England & Wales)

    Holds 100% of Midco.

    4

    Rio Group Midco Limited (England & Wales)

    Holds 100% of Bidco.

    5

    Rio Group Bidco Limited (England & Wales)

    Holds 100% of Falcon Group Bidco Limited and FundApps Ltd.

    6

    Falcon Group Bidco Limited (England & Wales)

    Holds 100% of SteelEye Limited.


    Operating companies and subsidiaries

    Entity
    Jurisdiction
    Ownership
    Notes

    FundApps Ltd

    England & Wales

    100%

    Owned by Rio Group Bidco Limited

    FundApps Inc

    Delaware, USA

    100%

    Owned by FundApps Ltd

    FundApps Pte Ltd

    Singapore

    100%


    Registered numbers and addresses

    Entity
    Company / Registration Number
    Registered Address
    Office Address
    Jurisdiction

    FundApps Ltd

    07380035

    6th Floor 9 Appold Street, London, United Kingdom, EC2A 2AP

    18th Floor, HYLO, 105 Bunhill Row, London EC1Y 8LZ

    United Kingdom

    FundApps Inc

    6128527

    Corporation Trust Center, 1209 Orange Street, Wilmington, New Castle County, Delaware 19801

    276 5th Ave, #808, New York, NY 10001, USA

    Delaware, USA


    Visual chart


    Contacts

    For confirmations required in RFPs, DDQs, identification documents or contractual schedules, please reach out to the Legal team on [email protected].

    Scope

    The scope of the Business Continuity Management System includes:

    • The following locations:

      • FundApps offices (London, GB; New York, USA; Singapore, Singapore)

      • Amazon data centres in:

        • Dublin

        • Frankfurt

    • Included in the scope are all FundApps staff and any key contractors working on behalf of FundApps

    All data centre provision and hardware operations are outsourced to Amazon Web Services. FundApps do not have cause to visit these locations. All data centre staff and operations are outside the scope. All of FundApps’ products and services are within scope.

    Leadership

    Top management commitment

    Top management commitment is demonstrated through the policy endorsed by the management team including Andrew White, CEO, Toby O'Rourke, CTO, and the participation of the top management team in the Crisis Management Team and their active involvement in the associated exercising alongside operational teams.

    Management commitment

    Management commitment is shown by:

    • Policy and objectives endorsed by the CEO;

    • Integration of business continuity into the FundApps process model;

    • Promoting the improvement of the existing business continuity provisions to meet good practice as now recognized in ISO 22301;

    • Committing all business areas to supporting business continuity development;

    • Participation of management in BIA process and encouraging relevant team members to contribute too;

    • Participation of management, deputies and team members in exercising at business unit level.

    As part of establishing the BCMS the following has been undertaken:

    • Establishing roles, responsibilities and competencies and associated training programme;

    • Defining acceptable risk;

    • Establishing internal audit procedures and programme;

    • Establishing management review processes that monitor the effectiveness of the BCMS;

    • Demonstrating continual improvement.

    Staff welfare

    Following a disruptive incident, our highest priority is staff welfare, so they are safe and able to address the other matters arising from the incident.

    This includes ensuring safe evacuation from affected premises, safe containment within affected premises, ensuring that staff are paid in a timely manner, and managing all issues arising from disruptive incidents that directly impact on staff.

    Awareness of the BCMS

    FundApps’s management team have experience from other organisations that promoted an awareness of the need for business continuity and consequently the resilience of the service has always been a key consideration. This has been re-enforced by some planned activities such as moving office, recent transport strikes and planned maintenance in the data centre requiring a planned failover to the alternate data centre. All such events are recorded within the BCMS.

    Needs and expectations of interested parties

    FundApps considered all potential interested parties and referred to Figure 2 to ensure comprehensive coverage.

    Figure 2: Potential interested parties (from ISO 22313)

    FundApps’s key interested parties include:

    • FundApps’ shareholders – FundApps is a privately held company and not quoted on the LSE or elsewhere;

    • FundApps’ staff;

    • FundApps’ clients;

    • Financial Services regulators who preside over the activities of FundApps’ clients.

    Media handling

    Media handling is undertaken directly by the CEO. Further media handling during an incident is undertaken within the Crisis Management process, with specific guidance in the Crisis Management Plan.

    Neighbours

    Neighbours activities have been considered as part of the risk assessment, in order to identify any areas where neighbours’ activities may pose risks to FundApps operations. FundApps have liaised with the landlord’s agents and other building occupants regarding business continuity issues, in particular rehearsing evacuation procedures, sharing information and liaising with the emergency services.

    Emergency services

    Emergency Services will in most circumstances deal with the landlords – i.e. the hosting provider at the data centres and the landlord’s agents at FundApps office. In some circumstances, FundApps may specifically be contacted and one such circumstance was explored during the 2014 Crisis Management exercise which required working with the Ambulance, Police and HPA.

    FundApps Staff

    FundApps’s staff have expectations that FundApps will continue to employ them and treat them fairly with due care in the event of a disruptive incident.

    All staff are required to provide emergency contact details and these are held in our internal portal, providing a means of contacting staff outside of the normal channels and allowing FundApps to provide information to the emergency services should the need arise.

    Pressure groups

    FundApps have not been specifically targeted by pressure groups but are aware that they and their clients may be targeted due to the general discontent with financial services firms following the financial crisis. This is specifically reviewed as part of the business continuity risk assessment and is under constant review as part of the maintenance and enhancement of the ISMS.

    Compliance with relevant laws & regulations

    FundApps complies with all applicable UK Laws including Health and Safety at Work Act 1974 and these are detailed in the ISMS. FundApps have no specific legal and regulatory obligations to implement business continuity management. This is reviewed annually as part of the overall BCMS review. This review is a simple process:

    1. Identify any key changes to legislation that may apply to FundApps;

    2. Review new clients or changes to existing clients’ business to determine if there are any legal and regulatory requirements on them that may imply new or changed requirements on FundApps;

    3. Any issues that arise are included as non-conformities within the BCMS where they will be assigned ownership and resolved.

    FundApps Clients

    New clients’ legal and regulatory requirements are always considered during the sales process.

    FundApps’ target clients are Financial Services Firms who have advanced business continuity programmes including There is an expectation in clients that FundApps will have business continuity management in place, this forming an implicit or explicit part of the contractual relationship with the clients.

    Clients are responsible for the IT DR relating to their services. FundApps offer and will build resilient services with appropriate IT DR. A plan has been lodged with FundApps within its BCMS. FundApps are therefore contractually obligated to enact these when a major incident occurs. Clients therefore have a reasonable expectation that FundApps have the capacity and capability to do this.

    Shareholders

    FundApps’s shareholders have a reasonable expectation that the company will continue to operate and make returns on capital. Consequently ensuring that unexpected and difficult incidents are managed effectively is an implied requirement on FundApps of their financial backers.

    Information Security Management Policy

    FundApps is committed to a robust implementation of Information Security Management. All our hosting environments are certified to ISO 27001. As an organisation we are endeavour to align our processes to ISO 27001 and the NIST Cyber Security Framework.

    We are specifically committed to preserving the confidentiality, integrity and availability of data and documentation supplied by, generated by and held on behalf of our clients. The principles defined in this policy will be applied to all of the physical and electronic information assets for which the FundApps is responsible.

    Our senior management team are directly responsible for ensuring that all FundApps staff have been made aware of these procedures and their contents.

    All employees have access to this information, are required to abide by them, and are encouraged to regularly review and update these in their relevant areas.

    Business Continuity Policy

    The Business Continuity Policy is maintained by the security team and is endorsed by:

    • Andrew White, CEO,

    • Toby O'Rourke, CTO.

    It is an open document and available to all employees through our internal portal and on request to any interested party.

    here

    Owned by FundApps Ltd

    SteelEye Limited

    England & Wales

    100%

    Owned by Falcon Group Bidco Limited

    SteelEye US Inc.

    Delaware, USA

    100%

    Owned by SteelEye Limited

    SteelEye Singapore Private Limited

    Singapore

    100%

    Owned by SteelEye Limited

    SteelEye Portugal Unipessoal, LDA

    Portugal

    100%

    Owned by SteelEye Limited

    SteelEye India Private Limited

    India

    99.9%*

    *One equity share is held by a local director to meet local law. SteelEye Limited retains a call option over that share.

    FundApps Pte Limited

    202301523G

    38 Beach Road, #29-11 South Beach Tower, Singapore 189767

    71 Robinson Road, Singapore 068895

    Singapore

    SteelEye Limited

    10581067

    5th Floor, 55 Strand, London, WC2N 5LR

    5th Floor, 55 Strand, London, WC2N 5LR

    England & Wales

    SteelEye US Inc.

    5421210

    919 North Market Street, Suite 725, Wilmington, County of New Castle, Delaware 19801, USA

    600 Fifth Avenue, New York, NY 10020, USA

    Delaware, USA

    SteelEye Singapore Private Limited

    202408545M

    600 NORTH BRIDGE ROAD #23-01 PARKVIEW SQUARE SINGAPORE 188778

    600 NORTH BRIDGE ROAD #23-01 PARKVIEW SQUARE SINGAPORE 188778

    Singapore

    SteelEye Portugal Unipessoal, LDA

    516372009

    Avenida da República, Nº 50, 10º, 1069-211 Lisboa, Portugal

    Avenida da República, Nº 50, 10º, 1069-211 Lisboa, Portugal

    Portugal

    SteelEye India Private Limited

    U74999KA2018FTC109662

    No 7 KSRTC LAYOUT, CHIKKALASANDRA, BANGALORE, Bangalore, Karnataka, India, 560061

    No 7 KSRTC LAYOUT, CHIKKALASANDRA, BANGALORE, Bangalore, Karnataka, India, 560061

    India

    [email protected]
    Definitions

    Information security is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. It focuses primarily on the confidentiality, integrity and availability of data.

    FundApps Data, for the purposes of this policy, is data owned, processed or held by FundApps, whether primary or secondary, irrespective of storage location. It is used interchangeably with the term ‘information’.

    Context of the organisation

    FundApps, headquartered in London, United Kingdom, helps investment managers to harness the power of community and technology to automate regulatory compliance.

    There are a number of internal and external factors that create uncertainty that gives rise to risk. These include:

    Internal Issues

    Information

    • FundApps processes the following types of information which require adequate protection:

      • sensitive client information,

      • personal data,

      • Sensitive FundApps Intellectual property.

    People

    • Staff turnover,

    • Induction of new joiners,

    • Staff role changes,

    • High rate of recruitment due to rapid growth.

    Organisation

    • Use of contractors,

    • Staff working in different time zones.

    Products/Services

    • Alignment of products with evolving regulations,

    • FundApps services’ competitive advantage relies partly on its intellectual property.

    Systems and Processes

    • Security or resilience issues with FundApps' information systems,

    • Lack of process documentation.

    External Issues

    Political Factors

    • War in Eastern Europe,

    • Divergence of regulations between the UK and EU following Brexit,

    • Changes made to regulations.

    • Commercial war between the USA and China

    Economic Factors

    • Economic recession,

    • Market conditions affect our client's ability to subscribe to FundApps’ services,

    • Higher staff costs due to increasing demand for software engineers or regulatory experts in a constrained market.

    Social Factors

    • Increase in working from home and bring your own devices practices.

    • Public services industrial action in the UK.

    Technological Factors

    • Fast-evolving threat landscape (e.g. ransomware campaigns),

    • Increased expectations from clients to manage their own security (e.g. Bring Your Own Key, feed export logs to client SIEM).

    • Rise of Artificial Intelligence.

    Environmental Factors

    • Pandemic affects how people work.

    Legal Factors

    • Regulations affecting FundApps' relations with its clients and providers (e.g. DORA)

    • More lenient financial regulations makes our products less appealing.

    • Regulations on personal data such as GDPR

    • Regulations on access to MNPI and insider trading.

    • Technology related legislation, such as the Computer Misuse Act 1990 or Freedom of Information Act 2000

    • Intellectual property concerns related to the use of open source software.

    Objectives

    The objectives of the ISMS are:

    Objective
    Measurement

    1) Ensure the protection of sensitive data managed by FundApps' Information Systems.

    Zero data breaches.

    2) Ensure the protection of all FundApps Information Systems against the risks of unauthorised access, misuse, damage and abuse.

    Zero FundApps Information Systems compromised, misused, damaged or abused.

    3) Demonstrate a high level of competence and expertise in Information Security

    Zero clients lost due to Information Security issues.

    4) Maintain compliance with security standards.

    Maintain ISO 27001 certification and SOC 2 Type II Reports.

    5) Foster a culture of security awareness within FundApps.

    Zero security incident resulting from lack of security awareness (e.g. phishing).

    6) Protect FundApps from liability or damage due to an Information Security Incident.

    Zero law suits, fines or losses due to a security incident.

    The plan to achieve these objectives is described in the Objective Plan.

    Scope

    cf. ISMS Scope

    Information security principles

    The following eight information security principles provide overarching governance for the security and management of information at FundApps.

    1. Information should be recorded in our information asset register, with the Information Systems which make use of it, classified in accordance with our data classification policy and in accordance with relevant legislative, regulatory and contractual requirements.

    2. Risks to information security should be assessed and assigned an owner in accordance with our risk management framework

    3. Staff with particular responsibilities for information are responsible for ensuring the classification of that information; for handling that information in accordance with its classification level; and for any policies, procedures or systems for meeting those responsibilities.

    4. All users covered by the scope of this policy must handle information appropriately and in accordance with its classification level.

    5. As far as is reasonably possible, endeavours must be made to ensure data is complete, relevant, accurate, timely and consistent.

    6. Information should be both secure and available to those with a legitimate need for access in accordance with its classification level.

    7. Information will be protected against unauthorized access and processing in accordance with its classification level.

    8. Information will be protected against loss or corruption.

    9. Breaches of this policy must be reported

    Legal & Regulatory Obligations

    FundApps has a responsibility to abide by and adhere to all current UK and EU legislation as well as a variety of regulatory and contractual requirements. Relevant legislation includes: • The Computer Misuse Act 1990 • General Data Protection Regulation 2018 • Data Protection Act 2018 • The Freedom of Information Act 2000 • Regulation of Investigatory Powers Act 2000 • Copyright, Designs and Patents Act 1988 • Defamation Act 1996 • Obscene Publications Act 1959 • Protection of Children Act 1978 • Criminal Justice Act 1988 • Digital Economy Act 2010

    A non-exhaustive summary of the legislation and regulatory and contractual obligations that contribute to the form and content of this policy is provided below. Related policies will detail other applicable legislative requirements or provide further detail on the obligations arising from the legislation summarised below.

    Key Legislation Summary

    The Computer Misuse Act 1990 defines offences in relation to the misuse of computers as:

    1. Unauthorised access to computer material.

    2. Unauthorised access with intent to commit or facilitate commission of further offences.

    3. Unauthorised modification of computer material. 3ZA: Unauthorised acts causing, or creating risk of, serious damage 3A: Making, supplying or obtaining articles for use in offence under section 1, 3 or 3ZA

    The General Data Protection Regulation 2018 (GDPR) defines obligations for businesses and organisations that collect, process and stored individuals' personal data. GDPR outlines seven data protection principles which relate to:

    1. Lawfulness, fairness and transparency

    2. Purpose limitation

    3. Data minimisation

    4. Accuracy

    5. Storage limitation

    6. Integrity and confidentiality (security)

    7. Accountability

    Data Protection Act 2018

    GDPR and DPA 2018 are based on the same principles. The main differences between the two are around:

    • Freedom of information,

    • Compliance reports,

    • Data subject access request,

    • Age of consent,

    • Information Commissioner’s Office codes of practice,

    • National security and crime.

    Supporting Policies, Codes of Practice, Procedures and Guidelines

    • Data Classification Policy

    • Incident Response Policy

    • ISMS Risk Register [Restricted to FundApps Staff]

    Compliance, Policy Awareness and Disciplinary Procedures

    Any security breach of FundApps information systems could lead to the possible loss of confidentiality, integrity and availability of personal or other confidential data stored on these information systems. The loss or breach of confidentiality of personal data is an infringement of the Data Protection Act 1998, contravenes FundApps Data Protection Policy, and may result in criminal or civil action against FundApps.

    The loss or breach of confidentiality of contractually assured information may result in the loss of business, financial penalties or criminal or civil action against FundApps. Therefore it is crucial that all users of the FundApps information systems adhere to the Information Security Policy and its supporting policies as well as the Information Classification Standards.

    All current staff and other authorised users will be informed of the existence of this policy and the availability of supporting policies, codes of practice and guidelines.

    Any security breach will be handled in accordance with all relevant FundApps policies, including the Conditions of Use of IT Facilities at FundApps and the appropriate disciplinary policies.

    Incident Handling

    If a member staff is aware of an information security incident then they must report it to the Head of Information Security, the CEO or the CTO immediately. For more information, please see our Incident Response Policy.

    Review and Development

    This policy, and its subsidiaries, shall be reviewed by FundApps and updated regularly to ensure that they remain appropriate in the light of any relevant changes to the law, organisational policies or contractual obligations.

    FundApps ensures that all changes to the ISMS are carried out in a planned and controlled manner, in alignment with our Continual Improvement Process.

    Interested Parties

    The list of interested parties in FundApps' ISMS and their requirements are as follows:

    Interested Party
    Requirements on the ISMS
    Which of these requirements will be addressed through the information security management system.

    Clients

    Provide service in line with contractual Service Level Agreements.

    Protect client data from unauthorised access.

    All – Managed through security controls, data protection measures, and compliance frameworks.

    Staff and contractors

    Provide a secure Information System to allow them to perform their jobs.

    All – Addressed through access controls, security policies, and infrastructure protections.

    Owners and Investors

    Provide a cost-effective, safe and secure Information System which allows to FundApps to be profitable, attract new clients and develop new services.

    All – Managed through risk management, security governance, and business continuity planning.

    Suppliers

    Roles, responsibilities and authorities

    The Business Continuity Management System (BCMS) is the responsibility of the security team. It is his responsibility to ensure that the BCMS is established, implemented, operated and maintained.

    The BCMS defines the incident response structure and what supporting business continuity plans are required. The BCMS defines the Exercise Programme which is agreed for each coming calendar year and approved by management through the business continuity management forum. Each plan has a designated owner.

    Each business continuity plan owner and they are responsible for:

    • Defining impacts to their business area that may arise following a disruptive incident

    • Identifying risks to their business

    • Defining their requirements following any disruptive incident

    • Populating a standard FundApps business continuity plan and maintaining this plan

    • Reviewing their business continuity plan on a 6 monthly basis and when significant changes occur to ensure details are current

    • Undertaking basic exercises as required in the Exercise Programme according to the guidelines provided

    • Participating in other exercises as agreed in the annual Exercise Programme

    • Notifying the Head of Information Security of issues arising from reviews, exercises or any other pertinent matters.

    Risks and opportunities

    FundApps currently has three offices in London, New York and Singapore. The team work from home and away from the office on a regular basis and no data is uniquely held in the office or on the laptops with which they access the systems. Consequently, there is little direct dependence on the office and the team are able to work away from this location with little difficulty.

    Business continuity objectives

    FundApps’ business continuity objectives are:

    • Ensure the safety of staff and other occupants for which they are responsible within the buildings;

    • Minimize disruption to clients and hence protect reputation and standing;

    • Enable a return to normal operations in the shortest practical time with the minimum of disruption;

    • Establish, implement and maintain a BCMS compliant with ISO22301.

    Awareness and Communication

    FundApps raise awareness about Business Continuity needs to staff during induction and through regularly planned BCP tests.

    This is to ensure staff:

    • Are aware of their role in business continuity and what will be expected of them following a disruptive incident

    • Understand their role in maintaining and improving the BCMS.

    Staff who hold specific roles receive training and take part in exercising to ensure that they are ready to fulfil those roles. Any enquiries from staff requiring further details are passed to the security team or CTO.

    External communication includes existing and prospective clients and suppliers:

    • Existing and prospective clients will be informed of FundApps’ business continuity arrangements in outline and will receive a copy of the policy on request.

    • Suppliers are asked to provide information on their business continuity arrangements during the procurement process.

    Client enquiries are initially dealt with by the business teams. Where additional detail is required, these are referred to the security team or CTO.

    Any communication with the local community would be by the landlord or the emergency services. Media communications are dealt with by the CEO.

    The Environment Agency and the Met Office provide information on flooding and weather, and these have been identified as the only regional or national threat advisory systems. FundApps monitor these when necessary, i.e. when a warning is issued that is pertinent to FundApps. As no direct flood risk has been identified, the focus of the monitoring is on the effect it may have on staff and travel disruptions. This is considered business as usual activity and is incorporated into the incident response when necessary, and is included in the exercising programme too.

    FundApps have recognised that communication following a disruptive incident can be challenging and that normal means of communication may not suffice. In order to address this, FundApps have sought to ensure that many communication channels are available including but not limited to:

    • Slack which enables rapid communication through a messaging system and details of who is available.

    • Mobile phones. Mobile phone numbers are the main point of contact for clients to senior management, for sales and technical staff.

    • Email (both personal and FundApps) can be used to communicate to all staff and to clients and suppliers.

    • SMS Text messaging to provide short messages.

    • Landline numbers where possible for staff.

    It is recognised that in extreme circumstances all of these channels can become unavailable. Communication methods are exercised as part of the exercise programme and reviewed following incidents.

    Incident Detection

    Incidents which can lead to a crisis can be detected in several ways as described hereafter:

    • Incidents within the data centres are detected by:

      • FundApps own monitoring detects the external availability of our service and the internal availability and correct functioning of our internal services. Alerts will be raised through our monitoring software and dealt with through the incident management process.

      • Data centre staff and automated monitoring also notify FundApps of underlying issues with infrastructure via a public status page.

    • Incidents at the FundApps office are detected by:

      • The landlords’ agents follow their procedure to notify occupants of the building, specifically via FundApps facilities

      • Directly by FundApps staff who raise this with FundApps facilities or the MMC out of hours.

    • Incidents externally are detected by:

      • Media coverage

      • Directly by contact with the Emergency Services.

      • Once notified, the relevant personnel assess whether the incident is managed through normal business-as-usual procedures or whether further escalation is required. This is based on both experience and knowledge of the individuals and by reference to the impact criteria table in the Crisis Management Plan where necessary.

    • When the Crisis Management Team (as defined in the ) is activated, the initial incident details are recorded on the Incident Report Form and subsequent updates are recorded on the “Status Report Form”. The Crisis Management Team (CMT) keep a record of issues, actions and communications and log all activity as part of the process.

    • The provides supporting information for the CMT to Assemble, Meet and Manage the incident including monitoring the situation and developments. It also explicitly requires consideration of closing the incident and reviewing what has been learned. Further details can be found in the .

    • The CMT have received training and have responded to several challenging incidents. Post-incident reports are available.

    • Ongoing exercising is designed to ensure that the CMT are well equipped to deal with incidents of all sorts and this includes relevant deputies. Similarly, every business area has undertaken basic training and exercising, has had to respond to real incidents and ongoing exercising is aimed at ensuring that the whole incident response structure operates effectively.

    Maintenance of staff contact details

    In the event of an incident which requires the full or partial invocation of the Business Continuity Plan, it is vital that the Company is able to contact all of its personnel quickly and efficiently.

    In preparation for this, a number of actions take place:

    • Employee contact information is stored in the Google Drive which is externally hosted.

    • In addition, each employee has contact numbers already stored in their mobile phones.

    FundApps Documentation

    In order to maintain consistency, legibility and accessibility all BCMS documentation is held as an electronic copy within FundApps’s document management system GitHub.

    A summary of the main documents and its owner can be found in this document. Each document will be approved by the owner prior to issue, as will any subsequent updates. The approval process will typically be conducted via email.

    GitHub has built-in version control which allows anyone with sufficient access to view previous versions and therefore facilitates comparison between versions. Unwanted documents are removed from the repository but are retrievable by IT. Documents can only be checked out for updates by those with appropriate access. Each document has an assigned Owner and GitHub tracks whether documents have been appropriately approved.

    Risk and Impact Assessment

    Please see our risk management section for information about how we assess risks, their likelihood impact and our risk appetite.

    Establish and implement business continuity procedures

    These are documented as a set of documents which together support the incident response. There is a Business Continuity Plan to support the Crisis Management Team (CMT) and plans to support IT Recovery in the event of a data centre failure. A short plan for the management of the immediate response has also been developed.

    Exercising and testing

    An annual programme of exercising is documented and agreed. This is then executed by the security team and the relevant business areas. Audit processes ensure that business exercises are completed and are effective. Actions arising are captured by the security team and ownership is assigned for execution.

    The team undertake regular tests of the IT recovery and these are recorded in Google Drive. Any issues arising are tracked through the raising of tickets as part of business-as-usual fault resolution.

    Monitoring and management of risks

    Identified Business Continuity risks and associated action plans are discussed during the monthly security meetings. These meetings have the following attendees:

    • CTO

    • Security team

    BCMS Review

    The security team reviews the FundApps Business Continuity Management System and submits changes to the management forum for validation, at a minimum, on an annual basis.

    Code of Conduct

    THE FUNDAPPS CODE

    As a business, we set ourselves high standards both in what we aspire to achieve and how we behave. The FundApps Code (“Code”) acts as a guide for our economic, social and environmental responsibilities and business ethics. Our company follows the Code in spirit and letter and endeavours to always act in ways that supports and promotes and our culture of care.

    WE ALL PLAY A PART

    Every employee, regardless of role or location, represents FundApps. We uphold our values, the Code, and legal standards in every business relationship, transaction, and interaction.

    We encourage open communication and expect everyone to raise concerns promptly, knowing they’ll be heard without fear of retaliation. Every FundApper is responsible for knowing and adhering to the Code.

    Employee Guide

    Whether it's a USB stick left on a train, a website hack leading to stolen confidential information, or phishing attacks compromising accounts - IT security is in the news more and more.

    FundApps is privy to sensitive client information daily, and therefore it’s important a proactive approach to security is taken. Our policies captured in this living document are therefore the responsibility of everyone in the Company to uphold and update. With suggestions and improvements be raised and addressed as required with the team and the CTO.

    NOTE: Security doesn't stop when you leave the office. This policy applies to both FundApps provided equipment, but also any other equipment you may use to access FundApps systems or software.

    7) Maintain a cycle of continuous improvement.

    All non-conformities with ISO 27001 standard are prioritised for remediation.

    Operate a secure Information System which prevents security incidents from impacting the supplier's Information System (e.g. malware propagation).

    All – Addressed through vendor security assessments, integration controls, and incident response measures.

    Regulators

    Operate a secure Information System which complies with applicable laws and regulations.

    All – Ensured through ISMS policies, audits, and regulatory compliance programs.

    Business Continuity Plan
    Business Continuity Plan
    Business Continuity Plan

    Managers lead with integrity, ensuring their teams understand the Code, feel empowered to speak up, and are supported in doing so.

    Business partners, including consultants and suppliers, must also align with the principles of the Code or their own equivalent standards.

    WE CREATE OUR WORKPLACE

    We are one team, but we represent many ideas, experiences and backgrounds. Essential to our ability to advance our objectives and growth plans is for all FundAppers to have an equal chance to succeed. It is through the diversity and talents of our people that we are successful, so keeping a positive and inclusive work environment is vital.

    EQUALITY, DIVERSITY AND INCLUSION

    Employment at FundApps is based solely upon individual merit and qualifications directly related to professional competence. We are committed to attracting, maintaining and supporting a diverse business.

    We strictly prohibit discrimination in hiring, compensation, training, advancement or promotion, termination, retirement or any employment practice based on any characteristic other than the individual’s ability to perform the job, subject to any accommodations required or permitted by law.

    ANTI-HARASSMENT, BULLYING AND VICTIMISATION

    FundApps takes a zero-tolerance approach to discrimination, harassment, bullying, victimisation and violence at work in any form. All employees have the right to work in an environment where they feel safe and valued. We expect all staff to uphold these principles and foster a culture of respect and dignity. Any violations will be taken seriously and may result in disciplinary action, up to and including termination.

    PERFORMANCE, REWARD AND EMPLOYEE ENGAGEMENT

    We provide a transparent, consistent and easy to follow link between performance and reward through a performance assessment framework based on:

    1. Performance - measured against what is achieved and delivered (rather than effort) against individual and team objectives; and

    2. Our Company values - measured by way of demonstrable examples of day–to-day behaviour.

    This rating tool allows us to calibrate across teams and people leaders for consistent application of salary and bonus outcomes, whilst still allowing for some flexibility for individual circumstances. Our people leaders are trained and equipped with the skills to provide clear goals, regular feedback, and fair appraisals ensure accountability and growth.

    We are a Living Wage accredited employer. By paying the real Living Wage, we are voluntarily taking a stand to ensure our employees can earn a wage which is enough to live on. Fairness and being the right thing to do is at the heart of what the Living Wage campaign is trying to achieve and why we choose to go further than the government minimum. The foundation currently covers UK based companies only; however we follow the same principles in all other regions where we operate.

    We value employee engagement and encourage open communication, collaboration, and participation in shaping our workplace culture. We run regular engagement surveys to get under the skin of what we’re doing well and what we can do better, helping us to group the feedback into themes which we explore and prioritise based on team needs and feasibility.

    STATEMENT ON WORK HOURS

    At FundApps, we are committed to providing a work environment that supports a healthy work-life balance while maintaining our operational effectiveness. We believe in the importance of clear, fair, and flexible work hours that respect the needs of our employees, our clients, and our business objectives.

    Our standard working hours are 40 hours per week, from 9am to 6pm, Monday through Friday. We also recognize that flexible working arrangements can enhance employee productivity and well-being, and we offer options such as hybrid working, flexible hours, working from another location or part-time work where applicable.

    Overtime work may be required at times to meet business demands, but we are committed to ensuring that all overtime is voluntary and compensated in accordance with applicable labour laws. We encourage employees to communicate openly with their managers regarding their availability and any concerns about their work schedules.

    NEUTRALITY STATEMENT ON WORKERS' RIGHT TO BARGAIN COLLECTIVELY AND FREEDOM OF ASSOCIATION

    FundApps respects and supports the right of our employees to freely associate and organise in accordance with applicable laws and regulations. We maintain a neutral stance on employees' decisions to form or join labour organisations, bargain collectively, or refrain from such activities.

    Our role as an employer is to provide a fair and respectful environment where employees feel empowered to make their own choices about representation without fear of retaliation, interference, or discrimination. We are committed to fostering open dialogue and cooperation, ensuring that all employees’ voices are heard and respected in any discussions concerning workplace conditions.

    WE ACT RESPONSIBLY

    HUMAN RIGHTS, SLAVERY, HUMAN TRAFFICKING AND CHILD LABOUR

    FundApps believes that all human beings should be treated with dignity and respect. We are committed to upholding internationally recognised human rights in all areas of operation of all people. We do not use, support or engage with any form of forced, child or involuntary labour in any part of our supply chain and comply with the Modern Slavery Act 2015 and any other relevant anti-slavery and human trafficking laws and regulations.

    We use all reasonable efforts to avoid causing or contributing to adverse human rights impacts that may arise from operations, products, services and/or business relationships and will act diligently to help remediate any impacts that may occur.

    HEALTH AND SAFETY AT WORK

    The safety, health and wellbeing of our team members, business partners and others we work with is of paramount importance to us. We all have a responsibility to act in a way that does not compromise the safety and well-being of people - this is why we implement health and safety protocols to ensure workplace safety.

    ENVIRONMENT AND CLIMATE PROTECTION

    We are dedicated to minimising our environmental impact and creating a more sustainable future. We see this as our collective responsibility and require all team members to be aware and contribute with their actions in every way they can, both in and outside the workplace.

    FundApps is committed to achieving Carbon Neutral status by 2027, which is significantly ahead of target deadlines of the Paris Agreement. To achieve this, we will:

    • Reduce emissions by adopting energy-efficient practices, including optimising our cloud platform for sustainability.

    • Encourage suppliers to adopt their own emission reduction strategies and favour Carbon Neutral or Net Zero providers.

    • Implement emission reduction strategies per employee, promoting sustainable practices across our workforce.

    • Offset unavoidable emissions by investing in long-lived, durable carbon offsets.

    RESPECTING COMPANY FACILITIES

    Employees are encouraged to maintain a positive and respectful environment by treating all company facilities, equipment, and property with care. This includes keeping shared spaces tidy, minimising waste, recycling as instructed and promptly reporting any maintenance or damage issues. A well-maintained workplace fosters a comfortable and productive atmosphere for everyone, and we ask that our employees help us uphold this standard.

    KEEPING ACCURATE RECORDS

    FundApps Ltd is the parent company of FundApps Inc and FundApps Pte Ltd and is subject to a financial audit every year. Our independently audited financial statements are publicly available on Companies House.

    We are all responsible in making sure that the records we create on behalf of the company are accurate, complete, recorded in a timely manner and in accordance with established procedures and applicable accounting standards. Our documents and reports must contain the necessary information relating to all transactions and be stored in accordance with corporate guidelines and relevant laws and regulations.

    INSIDE INFORMATION

    As part of the services FundApps provides, we may come into information about our clients or business partners that has not been made public but if it was, it might influence someone to buy, sell or hold shares. Trading shares on inside information is against the law and employees are strictly prohibited from using inside information for personal gain or sharing such information with others.

    We run background checks for all roles that are deemed sensitive. That includes those who have access directly to client data and client production environments, as well as a handful of roles that deal with commercial/sensitive matters. All employees are expected to maintain the confidentiality of sensitive information and act with integrity to avoid conflicts of interest and uphold the trust of our clients, partners, and stakeholders.

    WE PROTECT FUNDAPPS

    ANTI-CORRUPTION AND ANTI-BRIBERY

    FundApps conducts its business transparently, honestly and fairly and we expect that any third party we engage with does the same. We take a zero-tolerance approach towards unethical practices and comply with all applicable laws, statutes, regulations and codes relating to anti-bribery and anti-corruption.

    GIFTS, HOSPITALITY AND OTHER BENEFITS

    We recognise that it is the nature of global business that we may give or receive gifts or hospitality as part of maintaining relationships with our clients, suppliers and partners. However, we do not give or receive gifts, hospitality or other benefits which could be perceived as a bribe, or which may create a sense of obligation, or appear an incentive to behave in a certain way. We never accept cash, cash equivalents, stocks or other securities, or generally any other gifts, payments or benefits that are unlawful or improper.

    ℹ️ Employees must declare any gifts and hospitality over the threshold set in our Anti-Bribery and Corruption Policy via our Gifts and Hospitality Register.

    CONFLICT OF INTEREST

    We must always act in FundApps’ best interests and avoid even the appearance of a conflict that may cause others to doubt our fairness and have a negative effect on our business. Our teams are asked to avoid any situations where their actions or interactions outside of the workplace might interfere with the work that they do inside the workplace or impact on the ability to make an objective decision. We request that all such potential conflicts are disclosed to FundApps as soon as they are recognised so that we may properly consider it and take the right action.

    ANTI-MONEY LAUNDERING, FACILITATION OF TAX EVASION AND FRAUD

    We are always on alert for any potentially suspicious or illegal transactions, requests and activities which could result in our business being used to facilitate money laundering, fraud or tax evasion. We refuse to do business with money that was acquired through illegal activities, and we expect all our business partners to comply with laws and regulations governing the fight against illegal financial activities. All employees are responsible for being vigilant in identifying such suspicious activities and must report any concerns immediately.

    SANCTIONS

    FundApps is committed to adhering to all applicable sanctions laws and regulations. Employees must not engage in any business activities with sanctioned individuals, entities, or countries and are expected to conduct due diligence to ensure compliance. Any potential violations must be promptly reported.

    WHISTLEBLOWING

    We have a formal whistleblowing policy that encourages our staff and others who have serious concerns about or suspect any wrongdoing on the part of FundApps to report those concerns, in the knowledge that their concerns will be taken seriously and investigated appropriately, and that their confidentiality will be respected. We provide a number of ways in which concerns can be raised: with their manager, senior leadership, our People team or via our confidential and anonymous reporting tool.

    WE KEEP DATA SAFE

    Each of us is entrusted to safeguard our own, our clients’ and our suppliers’ assets and resources, to use them responsibly and appropriately, and to protect them from loss, unauthorised use, disclosure, alteration or access. Everyone at FundApps is dedicated to safeguarding the confidentiality, integrity, and availability of all company, client, and employee data.

    DATA PROTECTION

    We respect the privacy of our clients, employees and others with whom we conduct business, and we handle their personal information with care. We observe and comply with all applicable data privacy laws that prescribe how to responsibly collect, store, use, share, transfer and dispose of personal information as well as our internal rules and policies. Employees are required to abide by our Information Security Employee Policy and our Data Protection Policy and understand that they play a part in protecting the integrity, availability and confidentiality of data.

    INFORMATION SECURITY

    We have created a robust and effective control environment by adamantly incorporating security into all of our processes. Our security controls are reviewed by a third party auditor resulting in our ISO 27001:2022 certification and SOC 2 Type 2 Report.

    Every employee plays a crucial role in maintaining a secure information environment and as such must attend all training relating to security to ensure we maintain the confidentiality, integrity and availability of information and information systems. When engaging third party suppliers, FundApps upholds the same high information security standards and expects them to implement and maintain robust security measures to protect any data shared or processed on our behalf.

    FundApps encourages the responsible use of AI, ensuring it aligns with ethical standards, legal regulations, and our core values. Employees must avoid biases, respect data privacy, and ensure transparency when AI is used in decision-making. AI systems should be secure, regularly reviewed for vulnerabilities, and used in a way that maintains fairness and safeguards personal data.

    SOCIAL MEDIA

    Respect, tolerance, honesty and integrity toward colleagues, customers and the general public which we exercise in our daily interactions also apply to our use of social media and any internal communications tools. We strictly prohibit any misuse of intellectual property or unauthorised publication of confidential or internal data and information, as outlined in our Social Media Policy.

    WE DO WELL BY DOING GOOD

    COMMUNITY AND VOLUNTEERING

    We lead with true, honest and effective commitment towards using business as a force for good - both environmentally and socially. We encourage our team members to get involved with volunteering in the local community and support charities which are close to the hearts and values of FundApps.

    B CORPORATION

    FundApps is proud to be a Certified B Corporation (B Corp), demonstrating our commitment to high standards of social and environmental performance, accountability, and transparency. As part of our B Corp Certification, we hold ourselves to the highest ethical and sustainability practices across all areas of our business.

    • Commitment to Impact: All employees are expected to support and align with the principles that underpin our B Corp Certification, including responsible business practices, community engagement, environmental sustainability, and transparency.

    • Continuous Improvement: We strive to continuously improve our practices to uphold and exceed the standards required for B Corp Certification. Employees are encouraged to contribute ideas and take actions that align with our mission to create a positive impact.

    • Transparency and Accountability: As a B Corp, we are committed to being transparent in our operations and holding ourselves accountable to the public, our clients, and our employees.

    All staff are expected to understand and uphold these commitments as we work together to maintain our B Corp Certification and contribute to a sustainable and ethical future.

    AUDIT AND RECERTIFICATION

    To maintain this status, we go through the rigorous process of recertification once every three years where B Corp performs a detailed independent audit of how we adhere to their principles, and we share evidence in the form of policy and supporting data.

    We find the process to be an invaluable tool to guide and monitor our efforts for continuous improvement. This is best demonstrated through our latest score, which at 90.3 points is 6.5 points higher than our result from 2018. For comparison, the median score for ordinary businesses who complete the assessment is currently 50.9.

    WHO TO CONTACT IF YOU HAVE QUESTIONS ABOUT THE CODE

    Please contact our Legal team on [email protected].

    \

    FundApps’ values
    Guiding principles & security awareness

    Top tips

    • Better safe than sorry. Use common sense. If you're not sure whether something is a good idea (downloading a piece of software, opening an email, leaving a laptop unattended, using a particular third-party service) - it probably isn't. Discuss it with the team!

    • Be aware of the kinds of information we look after as a company and how we protect them. You can find more in our data classification policy.

    • Be aware of social engineering - don't trust an attachment or a hyperlink in an email just because it comes from someone you know or an organisation you trust. Better to type the URL into the browser window yourself and avoid that unexpected attachment.

    • Educate yourself - read about a security breach? Find out how it happened and why. Think about whether there's anything we could do differently at FundApps to stop it from happening here. Also, see "other reading".

    • If you know or suspect a loss or theft of confidential information has occurred or the security or integrity of any system has potentially been compromised - report it immediately to the Head of Information Security, CTO and CEO. Keep trying until they confirm they are aware.

    • Familiarize yourself with our

    Raising others awareness

    Don't just educate yourself, share with the team.

    • Join our #ask-security channel in Slack

    • Read about a recent security breach at a company? Find a link that talks about what happened in detail and share it in Slack with the company

    • See someone leaving their screen unlocked? Lock it for them, and make sure they know you did!

    Security Musts

    This applies to all computers you access FundApps platforms from, not just your work computer.

    • Hard disk encryption enabled (BitLocker, FileVault).

    • Windows update enabled and configured for automatic update installs.

    • Anti-virus software must be installed and configured for automatic updates.

    • Make sure your computer password meets our minimum security requirements. It should be at least 12 characters.

    • must be installed and used for all passwords.

    • Set your PC so it will automatically lock after 5 minutes.

    • If you use your mobile phone for accessing company systems (including email) your mobile phone must have a PIN set and remote-wipe software installed. You must never store data classified as FundApps Confidential on your phone. You can find more in our .

    • Only install applications from official application stores (e.g. Microsoft Store, App Store, Google Play).

    Daily habits

    • Lock your computer whenever you leave it unattended.

    • Keep your desks clear of any printed material and keep those containing sensitive data locked away.

    • Do not store FundApps confidential data on any removable media or equipment in accordance with our data classification policy.

    Policies

    Credentials

    • Use a different password for each service you access.

    • Use two-factor authentication whenever available (we enforce this for services where we can, such as Google Mail and GitHub).

    • Use secure passwords (minimum 12 characters in length).

    • Never share individual account credentials.

    • Immediately change compromised credentials and report the compromise to the Information security team.

    • In order to facilitate this, use for securely storing passwords.

    Bring your own device

    • Any mobile device accessing FundApps email must have a secure PIN set and remote-wipe software installed.

    • Any device you use to access the FundApps platform or related services must comply with our security checklist (cf. Security Musts) - this includes but is not limited to - hard disk encryption, antivirus, a secure password and a 5-minute lock timeout.

    • You must comply with our data classification policy and ensure you do not store data in breach of this. In particular, never store confidential data on BYODs.

    • Bring Your Own Devices compliant with these rules may be used to access all FundApps systems, provided access to production systems is done through virtualised systems or bastion hosts.

    • Confidential data must not be stored on BYODs.

    Email

    • Email is not a secure medium. You should be conscious of this and consider how emails might be used by others. Emails can be spoofed (not come from the person you expect) and intercepted.

    • Two factor authentication is enforced for your FundApps email. Instructions are here.

    • If your Email account is breached this is often a route into accessing many other services (given the reliance on email-based password resetting). You should never use your email password for other services.

    • When sending attachments containing FundApps confidential information, you should use a password-protected archive and share the password via a secondary, unrelated channel (such as SMS)

    • Remember that emails can easily be taken out of context, that once an email is sent you cannot control what the recipients might do with it, and that it is very easy to forward large amounts of information.

    • Similarly, you should not necessarily trust what you receive in an email - in particular, you must never respond to an email request to give a username or password.

    Physical security

    • Lock your computer whenever you leave it unattended.

    • Any computer equipment should be secured behind locked doors when left unattended.

    • Any unattended portable equipment should be physically secure if possible, for example, locked in an office or a desk drawer. When being transported in a vehicle they should be hidden from view. Staff should avoid storing sensitive information on portable equipment whenever possible (see data security section).

    • Enable 5-minute screen savers on your computer. (Go to Screen Saver settings, wait 5 minutes, and check On resume, display logon screen).

    Data security

    FundApps attaches great importance to the secure management of the data it holds and generates and will hold staff accountable for any inappropriate mismanagement or loss of it.

    • If a client emails you sensitive portfolio data, please advise them that they should not be doing this.

    • Do not create users for clients, even if you know them. Every client has an Admin user who can create users for themselves.

    • Client data, particularly portfolio data should be treated with great care and in accordance with our data classification policy.

      • If you need to debug client portfolio data, you should use our secure VMs in our production environment.

      • Client data (of any kind) should never be stored on mobile devices or taken off-site (with the exception of email).

      • Failure to comply with these requirements will be considered a serious breach of this policy.

    Acceptable use

    Internet access is provided as a critical aspect of our business. It should be used in a responsible manner and any personal use should be reasonable. The Internet may not be accessed and used for any of the following:

    • Any activity that would violate the laws and regulations of the UK

    • Sending offensive or harassing material to other users

    • Any activity that would violate the privacy of others

    • Cause damage or disruption to organisational systems

    Monitoring

    Monitoring software is in use to protect the effectiveness, security, availability and integrity of FundApps systems. We monitor the type and volume of internet and network traffic. The information recorded can be used to identify an individual user and the website domain being accessed.

    Working from outside the office

    Whether you are working from home or from a public place (e.g. whilst travelling) you must ensure you keep our data and Information System secure. This means that you must:

    • lock your laptop whenever you leave it unattended;

    • ensure others cannot read sensitive information (e.g. Client data) by looking over your shoulder (order a privacy screen if needed);

    • ensure sensitive conversations cannot be overheard by others;

    • do not let anyone use your corporate devices.

    Breaches of security

    If you know or suspect a loss or theft of confidential information has occurred, or the security or integrity of any system has potentially been compromised - report it to the Head of Information Security, the CTO or the CEO. This could include

    • The disclosure of confidential information to any unauthorised person.

    • The integrity of any system or data being put at risk (for example virus, malware, hacking).

    • Availability of the system or information being put at risk.

    • Loss of any system, laptop, mobile phone or other portable device.

    • Finding doors and/or windows broken and/or forced entry gained to a secure room/building in which computer equipment exists.

    Further reading

    For general awareness, we recommend the following sites.

    • Google's Stay Safe Online resources (developed in association with The UK's Citizen's Advice Bureau)

    • The UK Government-sponsored Get Safe Online website

    • SANS OUCH! Security Awareness Monthly Newsletters

    • SANS Security Awareness Video (changes monthly)

    For more technical information, check out

    • OWASP Top 10 Project

    • Security, Cryptography and Privacy (Google)

    • SANS reading room

    social media policy
    1Password
    data classification policy
    1Password

    Incident Response

    A rapid response to incidents that threaten the confidentiality, integrity, and availability (CIA) of FundApps information assets, information systems and the networks that deliver the information is required to protect those assets. Without a rapid response, those assets could be compromised and FundApps could be in breach of legislation, our own stated policies, and the potential of of breaching the trust of our clients and users.

    Information Security incidents will occur that require full participation of FundApps technical staff as well as management leadership to properly manage the outcome. To accomplish this FundApps has established an incident response policy and procedures that will ensure appropriate leadership and technical resources are involved to:

    • assess of the seriousness of an incident

    • assess the extent of damage

    • identify the vulnerability created

    • estimate what additional resources are required to mitigate the incident

    It will also ensure that proper follow-up reporting occurs and that procedures are adjusted so that responses to future incidents are improved.

    1. Scope & Objectives

    The primary emphasis of processes and activities described within this policy is the return to a normal (secure) state as quickly as possible, whilst minimising the adverse impact to FundApps. The capture and preservation of incident relevant data (e.g., network flows, data on drives, access logs, etc.) is performed primarily for the purpose of problem determination and resolution. Strict forensic measures are not used in the data capture and retention. Forensic measures will be determined on a case by case basis.

    Contingency Planning, Business Continuity and Disaster Recovery are governed by a different set of policies. An event may initially be declared an ‘Information Security Incident’ and subsequently declared to be a ‘Disaster’. In this case, the activities described below will be included in the Disaster Recovery process.

    2. Information Security Incidents

    An Information Security Incident is generally defined as any known or highly suspected circumstance that affect the confidentiality, integrity or availability of sensitive information managed or belonging to FundApps.

    Sensitive data is considered anything classified as Confidential or Restricted by our .

    Examples of an Information Security Incident may include but are not limited to:

    • the theft or physical loss of computer equipment known to hold files containing sensitive client or company information

    • a server known to hold sensitive data is accessed or otherwise compromised by an unauthorised party

    • the FundApps network is subjected to a Distributed Denial of Service (DDoS) attack

    • a firewall is accessed by an unauthorised entity

    2.1 Categories

    For the purposes of this protocol, incidents are categorised as “Unauthorised Access” or “Unauthorised Acquisition” and can be recognised by associated characteristics.

    Unauthorised Access

    The unauthorised access to or disclosure of FundApps or client information through network and/or computing related infrastructure, or misuse of such infrastructure, to include access to related components (e.g., network, server, workstation, router, firewall, system, application, data, etc.). Characteristics of security incidents where unauthorised access might have occurred may include but are not limited to:

    • Evidence (e‐mail, system log) of disclosure of sensitive data

    • Anomalous traffic to or from the suspected target

    • Unexpected changes in resource usage

    • Increased response time

    Unauthorised Acquisition

    The unauthorised physical access to, disclosure or acquisition of assets containing or providing access to FundApps or client information (e.g., removable drives or media, hardcopy, file or document storage, server hardware, etc.)/ Characteristics of security incidents where unauthorised acquisition might have occurred may include but are not limited to:

    • Theft of computer equipment where sensitive data is stored

    • Loss of storage media (removable drive, flash drive, etc)

    • Illegal entry (burglary)

    • Suspicious or foreign hardware is connected to the network

    2.2 Criticality

    Incidents assigned a criticality rating according to the actual and potential impact on the business of FundApps.

    Incidents are assigned a criticality rating according to the actual and potential impact on the business of FundApps. Incident categories and response times are described in (Schedule A).

    2.3 Roles and Responsibilities

    Key roles and responsibilities of those who form part of the Incident Response Team (IRT) have been defined below:

    Role
    Responsibilities

    3. Key components of our Critical Incident Response Protocol

    The Critical Incident Response Protocol consists of these key components

    • Detection

    • Activation of team

    • Containment

    • Notification of non-IRT team members

    3.1 Detection

    Timely detection of incidents is critical to containment and minimizing its impact on our business and clients. Please see our IT security policy and specific controls regarding how we detect security incidents.

    3.2 Activation of Team

    All suspected security incidents are reported to the Incident Response Team Lead, mobilization will be immediate and based on initial orientation and observation. Notification of the rest of the team should occur via direct communication - that is any form of communication where you get a response from the other party (ie voicemail or email are not considered direct notification). Team members should rely on usual company communication channels to ensure they have up to date information.

    3.3 Containment

    The IRT will determine and cause to be executed the appropriate activities and processes required to quickly contain and minimise the immediate impact on FundApps and our clients.

    Containment activities are designed with the primary objectives of:

    • Counteract the immediate threat

    • Prevent propagation or expansion of the incident

    • Minimise actual and potential damage

    • Restrict knowledge of the incident to authorised personnel

    Containment Activities - Unauthorised Access

    Activities that may be required to contain the threat presented to systems where unauthorised access may have occurred:

    • A1. Disconnect the system or appliance from the network or access to other systems.

    • A2. Isolate the affected IP address from the network.

    • A3. Power off the appliance(s) if unable to otherwise isolate.

    • A4. Disable the affected application(s).

    Containment Activities - Unauthorised Acquisition

    Activities that may be required to contain the threat presented to assets where unauthorised acquisition may have occurred:

    • B1. Identify missing or compromised assets.

    • B2. Gather, remove, recover and secure sensitive materials to prevent further loss or access.

    • B3. Power down, recycle or remove equipment known to be compromised.

    • B4. Where possible, secure the premises for possible analysis by local management and law enforcement.

    3.4 Notification of non-IRT members

    Designated persons will take action to notify the appropriate internal parties as necessary. All internal & external communication must be approved by the IRT Lead

    3.5 Assessment

    The IRT will determine the category and severity of the Incident and undertake discussions and activities to determine the next best course of action best, i.e., decide if protocol execution is required. Once the IRT is assembled, the Assessment Checklist is executed and reviewed to ensure all pertinent facts are established. All discussions, decisions and activities are to be documented.

    Assessment should consist of the following at a minimum:

    Incident data

    • The current date and time and a brief description of the Incident

    • Who discovered the incident, and how?

    Types of information

    • What is the nature of the data?

    • Was the data held by FundApps or a third party?

    • How was the information held? Was the data encrypted or otherwise obfuscated?

    Risk

    • Can we reasonably determine the risk or exposure?

    • To what degree are we certain that the data has or has not been released?

    • Can we identify and do we have contact with the party that received the data or caused the compromise? Describe what is known.

    • Identify the impacted clients, if possible.

    Next Steps

    • Do we have enough information to establish the category and severity of the Incident?

    • If additional data collection data is required, assign responsibility to an IRT member for the collection

    • Is there any deadline or reporting requirement (self‐imposed or regulatory) we need to address?

    • What communications need to be established? Provide details

    3.7 Gathering Forensic Evidence

    If the incident will have legal impacts which require a case to go to court, forensic evidence will need to be collected. This should be done by an accredited Cyber Incident Response third-party company. A list can be found .

    The following rules should be enforced when interacting with potential evidence:

    • Save the original materials: You should always work on copies of the digital evidence as opposed to the original. This ensures that you are able to compare your work products to the original that you preserved unmodified.

    • Take photos of physical evidence: Photos of physical (electronic) evidence establish the chain of custody and make it more authentic.

    • Take screenshots of digital evidence content: In cases where the evidence is intangible, taking screenshots is an effective way of establishing the chain of custody.

    3.6 Notification of external parties

    Designated persons will take action to notify the appropriate internal and external parties, as necessary. Communications may include meetings, video conferencing, teleconferencing, e‐mail, telephone/messaging, voice recordings or other means as deemed appropriate. All external communication must be approved by the IRT Lead. FundApps will endeavour to notify clients of any potential incidents impacting the confidentiality, integrity or availability of the client's data, stored in the FundApps platform, no later than 48 hours after having first detected an anomaly.

    • Clients - IRT Lead or CEO will establish communication with Clients, as appropriate for the circumstance

    • Other affected parties - IRT Lead or CEO will establish communication with other affected parties (such as hosting providers) as appropriate for the circumstance

    • Law enforcement - IRT Lead will establish if law enforcement is required and take appropriate action

    3.7 Corrective Measures

    The IRT will determine and cause to be executed the appropriate activities and processes required to quickly restore circumstances to a normal (secure) state.

    Corrective measures are designed with the primary objectives of:

    • Secure the processing environment

    • Restore the processing environment to its normal state

    Corrective Measures - Unauthorised Access

    Activities that may be required to return conditions from unauthorised access to a normal and secure processing state.

    • A1. Change passwords on all local user and administrator accounts or otherwise disable the accounts as appropriate.

    • A2. Change passwords for all administrator accounts where the account uses the same password across multiple appliances or systems (servers, firewalls, routers).

    • A3. Re-image systems to a secure state.

    Corrective Measures - Unauthorised Acquisition

    Activities that may be required to return conditions from an unauthorised acquisition to a normal and secure processing state.

    • B1. Retrieve or restore assets where possible.

    • B2. Store all sensitive materials in a secure manner (e.g., lockable cabinets or storage areas/containers).

    • B3. Install/replace locks and issue keys only to authorised personnel.

    • B4. Restore security devices and/or apparatus to working condition.

    3.8 Washup and lessons learned

    After the incident has been dealt with, a subsequent washup session will be run in order to identify if any further lessons can be learnt or actions taken aside from the immediate corrective measures.

    3.9 Closure

    The IRT will stay actively engaged throughout the life cycle of the Information Security Incident to assess the progress/status of all containment and corrective measures and determine at what point the incident can be considered resolved.

    Recommendations for improving processes, policies, procedures, etc., will exist beyond the activities required for incident resolution and should not delay closing the Information Security Incident.

    Business Continuity Risk Register

    FundApps has performed a business impact analysis and maintains a risk register as part of our business continuity management system. The full risk register is maintained here [Restricted to FundApps staff]. We do not include the full details here, but below is a summary of the risks that we have analysed.

    Ref
    Risk Identified
    Guidance notes
    Risk type

    1

    Pandemic (flu like infection)

    Widespread flu

    National

    2

    Terrorist attack against UK generally

    Dealt with under location risks

    National

    3

    Regional or national power failure

    National

    4

    Fuel supply crisis

    Political instability at home or abroad makes petrol/diesel difficult to acquire

    National

    5

    Solar weather

    Major flares from the Sun can disrupt networks, electricity grids and infrastructure in unpredicatble ways

    National

    6

    Criminal activity aimed specifically against Fund Apps

    Organizations someitmes targeted to move funds or act as a trusted party fronting for criminal activity

    Organisational

    7

    Espionage against Fund Apps for high profile clients

    Organizations are sometimes targetted for espionage in order to gain insight into confidential information in client

    Organisational

    8

    Malicious damage by member of staff

    Staff who are being disciplined or recently dismissed or suffering mental illness

    Organisational

    9

    Loss of key individuals

    Staff may be ill, have accidents or leave for other work

    Organisational

    10

    Earthquake

    Location - Natural

    11

    Volcano

    Identified as a National Risk too

    Location - Natural

    12

    Fluvial flooding

    Flooding from rivers

    Location - Natural

    13

    Flash (pluvial) flooding

    Flash floods follow intense rain

    Location - Natural

    14

    Severe weather (snow)

    Snow fall over large part of the area and remaining for 1 week

    Location - Natural

    15

    Severe weather (prolonged low temperatures)

    Persistent low temperatures

    Location - Natural

    16

    Severe weather (Heat Wave)

    Temperatures exceeding 32C and minimum overnight exceeding 15C over 5 days

    Location - Natural

    17

    Severe weather (drought)

    Prolonged shortage of rainfall or failure in water supply

    Location - Natural

    18

    Outbreak of severe illness or communicable disease

    May arise from local transmission of disease or collective exposure to food pathogens or legionella et al

    Location - Health

    19

    Impact to building from road traffic accident

    Location - traffic

    20

    Road traffic accident blocking access roads

    Road intersection few LGVs

    Location - traffic

    21

    Road traffic incident with hazardous chemicals

    Construction traffic may pass, petrol station opposite office

    Location - traffic

    22

    Road traffic incident or fire with gas/gas cylinders

    Construction traffic with gas cylinders almost certainly passes office

    Location - traffic

    23

    Rail accident

    Old Street Tube Station only nearby line

    Location - traffic

    24

    Air accident

    Aircraft directly impacting site

    Location - traffic

    25

    Neighbouring businesses

    Activities of neighbours may expose Fund Apps to risks

    Location

    26

    Criminal activity against site

    Opportunistic or directed activity

    Location

    27

    Terrorist action in vicinity

    Fund Apps not targeted but impacted by nearby attack

    Location

    28

    Terrorist action against site

    Fund Apps not target per se, but site attacked for some perceived connections

    Location

    29

    Effectiveness of Physical security

    Criminals, terrorists, demonstrators can all be discouraged and prevented by effective perimeter security

    Perimeter

    30

    Utility supply to site - Electricity

    Liable to localised mains failure, substation fire and disturbance through ground works

    Perimeter

    31

    Utility supply to site - Gas

    Liable to disturbance through ground works

    Perimeter

    32

    Utility supply to site - Water

    Liable to disturbance through ground works. Loss through systemic failures in distribution system.

    Perimeter

    33

    Utility supply to site - Sewerage

    Liable to disturbance through ground works

    Perimeter

    34

    Utility supply to site - Telecomms

    Liable to disturbance through ground works and loss of local exchange

    Perimeter

    35

    Building roof

    Roofs may leak giving rise to structural damage or flooding

    Building

    36

    Building structure

    Overall structure must be sound to withstand severe weather, tremors etc.

    Building

    37

    Building structure

    Asbestos - danger to health and needs controlled operations for works

    Building

    38

    Building basement areas

    May be liable to flood from above or groundwater

    Building

    39

    Building - internal water supplies

    Pipes and tanks must be in good condition and not positioned where they will cause significant damage

    Building

    40

    Building - M&E

    M&E provides the air handling, chillers, boilers and electrical infrastructure for the operation of the premises

    Building

    41

    Fire within building

    Rare but highly disruptive and damaging with a risk to life

    Building

    42

    Loss or disruption to key supplier

    Suppliers, distributors and others are key to any business operation

    3rd parties

    43

    Loss of local IT infrastructure services

    Office IT loss

    IT

    44

    Loss of IT applications

    Servers or storage failures in DCs

    IT

    45

    Cyber attack

    Fund Apps targetted or simply collateral damage to other attack(s)

    IT

  • a network outage is attributed to the activities of an unauthorised entity

  • System slowdown or failure

  • Changes in default or user‐defined settings

  • Unexplained or unexpected use of system resources

  • Unusual activities appearing in system or audit logs

  • Changes to or appearance of new system files

  • New folders, files, programs or executables

  • User lock out

  • Appliance or equipment failure

  • Unexpected enabling or activation of services or ports

  • Protective mechanisms disabled (firewall, anti‐virus)

  • Normally secured storage areas found unsecured

  • Broken or non‐functioning locking mechanisms

  • Presence of unauthorised personnel in secured areas

  • Disabled security cameras or devices

  • Assessment

  • Notification of external parties

  • Corrective Measures

  • Washup & lessons learned

  • Closure

  • Preserve information relevant to the incident

    A5. Discontinue or disable remote access.

  • A6. Stop services or close ports that are contributing to the incident.

  • A7. Remove drives or media known or suspected to be compromised.

  • A8. Where possible, capture and preserve system, appliance and application logs, network flows, drives and removable media for review.

  • A9. Notify IRT of status and any action taken.

  • B5. Gather and secure any evidence of illegal entry for review by local management and law enforcement.

  • B6. Where possible, record the identities of all parties who were possible witnesses to events.

  • B7. Preserve camera logs and sign‐in logs for review by local management and law enforcement.

  • B8. Notify IRT of the disposition of assets and any action taken.

  • What is the risk or exposure to FundApps?

  • What is the risk or exposure to the client?

  • Are there any immediate issues that have not been addressed? Describe

  • Recap all work and responsibility assignment

  • When do we meet again to follow up? Provide details

  • Is this incident going to have legal impacts, requiring forensic evidence to be gathered? If so, refer to the section Gathering Forensic Evidence.

  • Document the date, time, and any other information of receipt. Recording the timestamps of whoever has had the evidence allows investigators to build a reliable timeline of where the evidence was prior to being obtained. In the event that there is a hole in the timeline, further investigation may be necessary.

  • Provide third-party company with a bit-for-bit clone of digital evidence. This ensures that they have a complete duplicate of the digital evidence in question.

  • Perform a hash test analysis to further authenticate the working clone.

  • Government or Regulatory Bodies - IRT Lead will establish if government notification (e.g. Information Commissioner) is required and take appropriate action
  • Media interest - The CEO will deal with any communications with the Media.

  • A4. Restore systems with data known to be of high integrity.
  • A5. Apply OS and application patches and updates.

  • A6. Modify access control lists as deemed appropriate.

  • A7. Implement IP filtering as deemed appropriate.

  • A8. Modify/implement firewall rule sets as deemed appropriate.

  • A9. Ensure the anti‐virus is enabled and current.

  • A10. Make all personnel “security aware”.

  • A11. Monitor/scan systems to ensure problems have been resolved.

  • A12. Notify IRT of status and any action taken.

  • B5. Remove and retain unauthorised equipment from the network/area.

  • B6. Implement physical security devices and improvements (e.g., equipment cables, alarms) as deemed appropriate.

  • B7. Make all personnel “security aware”.

  • B8. Notify IRT of status and any action taken.

  • CTO or Head of Information Security

    Incident response team lead (IRTL)

    CEO

    Participates in incident response team, leading external communications.

    IT Team / Security Team / Engineering

    Normally form part of the incident response team, subject to CTO approval after initial assessment.

    data classification policy
    FundApps' General Terms
    here

    Statement of Applicability

    Statement of Applicability version 2025-02. The following table summarises the controls that are relevant and applicable to FundApps' Information Security Management System in accordance with the requirements of ISO 27001:2022.

    ISO Control
    Description
    Applicable
    Business Requirement
    Contractual Requirement
    Legal Requirement
    Implemented

    5.1

    Policies for information security Information security policy and topic-specific policies shall be defined, approved by management, published, communicated to and

    acknowledged by relevant personnel and relevant interested parties, and reviewed at planned intervals and if significant changes occur.

    Yes

    X

    X

    Yes

    5.2

    Information security roles and responsibilities Information security roles and responsibilities shall be defined and allocated according to the FundApps' needs.

    Yes

    X

    X

    Yes

    5.3

    Segregation of duties Conflicting duties and conflicting areas of responsibility shall be segregated.

    Yes

    X

    X

    Yes

    5.4

    Management responsibilities Management shall require all personnel to apply information security

    in accordance with the established information security policy, topic-specific policies and procedures of the organization.

    Yes

    X

    X

    Yes

    5.5

    Contact with authorities FundApps shall establish and maintain contact with relevant authorities.

    Yes

    X

    X

    Yes

    5.6

    Contact with special interest groups FundApps shall establish and maintain contact with special interest groups or other specialist security forums and professional associations.

    Yes

    X

    Yes

    5.7

    Threat Intelligence Information relating to information security threats shall be collected and analysed to produce threat intelligence.

    Yes

    X

    Yes

    5.8

    Information security in project management Information security shall be integrated into project management.

    Yes

    X

    X

    Yes

    5.9

    Inventory of information and other associated assets An inventory of information and other associated assets, including owners, shall be developed and maintained.

    Yes

    X

    X

    Yes

    5.10

    Acceptable use of information and other associated assets Rules for the acceptable use and procedures for handling information and other associated assets shall be identified, documented and implemented.

    Yes

    X

    Yes

    5.11

    Return of assets Personnel and other interested parties as appropriate shall return all the organization’s assets in their possession upon change or termination of their employment, contract or agreement.

    Yes

    X

    Yes

    5.12

    Classification of information Information shall be classified according to the information security needs of the organization based on confidentiality, integrity, availability and relevant interested party requirements.

    Yes

    X

    X

    Yes

    5.13

    Labelling of information An appropriate set of procedures for information labelling shall be

    developed and implemented in accordance with the information classification scheme adopted by the organization.

    Yes

    X

    Yes

    5.14

    Information transfer Information transfer rules, procedures, or agreements shall be in place for all types of transfer facilities within the organization and between the organization and other parties.

    Yes

    X

    X

    Yes

    5.15

    Access control Rules to control physical and logical access to information and other

    associated assets shall be established and implemented based on business and information security requirements.

    Yes

    X

    X

    Yes

    5.16

    Identity management The full life cycle of identities shall be managed.

    Yes

    X

    X

    Yes

    5.17

    Authentication information Allocation and management of authentication information shall be controlled by a management process, including advising personnel on appropriate handling of authentication information.

    Yes

    X

    X

    Yes

    5.18

    Access rights Access rights to information and other associated assets shall be provisioned, reviewed, modified and removed in accordance with the organization’s topic-specific policy on and rules for access control.

    Yes

    X

    X

    Yes

    5.19

    Information security in supplier relationships Processes and procedures shall be defined and implemented to manage the information security risks associated with the use of supplier’s products or services.

    Yes

    X

    X

    Yes

    5.20

    Addressing information security within supplier agreements Relevant information security requirements shall be established and agreed with each supplier based on the type of supplier relationship.

    Yes

    X

    X

    Yes

    5.21

    Managing information security

    in the information and communication technology (ICT) supply

    chain Processes and procedures shall be defined and implemented to manage the information security risks associated with the ICT products and services supply chain.

    Yes

    X

    X

    Yes

    5.22

    Monitoring, review and change management of supplier services The organization shall regularly monitor, review, evaluate and manage change in supplier information security practices and service delivery.

    Yes

    X

    X

    Yes

    5.23

    Information security for use of cloud services Processes for acquisition, use, management and exit from cloud services shall be established in accordance with the organization’s information security requirements.

    Yes

    X

    Yes

    5.24

    Information security incident

    management planning and preparation The organization shall plan and prepare for managing information security incidents by defining, establishing and communicating information security incident management processes, roles and responsibilities.

    Yes

    X

    X

    Yes

    5.25

    Assessment and decision on information security events The organization shall assess information security events and decide if they are to be categorized as information security incidents.

    Yes

    X

    X

    Yes

    5.26

    Response to information security incidents Information security incidents shall be responded to in accordance with the documented procedures.

    Yes

    X

    X

    Yes

    5.27

    Learning from information security incidents Knowledge gained from information security incidents shall be used to strengthen and improve the information security controls.

    Yes

    X

    Yes

    5.28

    Collection of evidence The organization shall establish and implement procedures for the identification, collection, acquisition and preservation of evidence related

    to information security events.

    Yes

    X

    Yes

    5.29

    Information security during disruption The organization shall plan how to maintain information security at an appropriate level during disruption.

    Yes

    X

    X

    Yes

    5.30

    ICT readiness for business continuity ICT readiness shall be planned, implemented, maintained and tested based on business continuity objectives and ICT continuity requirements.

    Yes

    X

    Yes

    5.31

    Legal, statutory, regulatory and contractual requirements Legal, statutory, regulatory and contractual requirements relevant to information security and the organization’s approach to meet these requirements shall be identified, documented and kept up to date.

    Yes

    X

    X

    X

    Yes

    5.32

    Intellectual property rights The organization shall implement appropriate procedures to protect intellectual property rights.

    Yes

    X

    Yes

    5.33

    Protection of records Records shall be protected from loss, destruction, falsification, unauthorized access and unauthorized release.

    Yes

    X

    Yes

    5.34

    Privacy and protection of personal identifiable information (PII) The organization shall identify and meet the requirements regarding the preservation of privacy and protection of PII according to applicable laws and regulations and contractual requirements.

    Yes

    X

    X

    X

    Yes

    5.35

    Independent review of information security The organization’s approach to managing information security and its implementation including people, processes and technologies shall be reviewed independently at planned intervals, or when significant changes occur.

    Yes

    X

    Yes

    5.36

    Compliance with policies, rules and standards for information security Compliance with the organization’s information security policy, topic-specific policies, rules and standards shall be regularly reviewed.

    Yes

    X

    X

    Yes

    5.37

    Documented operating procedures Operating procedures for information processing facilities shall be documented and made available to personnel who need them.

    Yes

    X

    X

    Yes

    6.1

    Screening

    Background verification checks on all candidates to become personnel shall be carried out prior to joining the organization and on an ongoing basis taking into consideration applicable laws, regulations and ethics and be proportional to the business requirements, the classification of the information to be accessed and the perceived risks.

    Yes

    X

    X

    Yes

    6.2

    Terms and conditions of employment

    The employment contractual agreements shall state the personnel’s

    Yes

    X

    X

    X

    Yes

    6.3

    Information security awareness, education and training

    Personnel of the organization and relevant interested parties shall receive appropriate information security awareness, education and training and regular updates of the organization's information security policy, topic-specific policies and procedures, as relevant for their job function.

    Yes

    X

    X

    Yes

    6.4

    Disciplinary process A disciplinary process shall be formalized and communicated to take actions against personnel and other relevant interested parties who have committed an information security policy violation.

    Yes

    X

    X

    Yes

    6.5

    Responsibilities after termination or change of employment

    Information security responsibilities and duties that remain valid after termination or change of employment shall be defined, enforced and communicated to relevant personnel and other interested parties.

    Yes

    X

    X

    Yes

    6.6

    Confidentiality or non-disclosure agreements Confidentiality or non-disclosure agreements reflecting the organization’s needs for the protection of information shall be identified,

    documented, regularly reviewed and signed by personnel and other relevant interested parties.

    Yes

    X

    X

    X

    Yes

    6.7

    Remote working Security measures shall be implemented when personnel are working remotely to protect information accessed, processed or stored outside the organization’s premises.

    Yes

    X

    Yes

    6.8

    Information security event reporting The organization shall provide a mechanism for personnel to report observed or suspected information security events through appropriate channels in a timely manner.

    Yes

    X

    X

    Yes

    7.1

    Physical security perimeters

    Security perimeters shall be defined and used to protect areas that contain information and other associated assets.

    Yes

    X

    X

    Yes

    7.2

    Physical entry

    Secure areas shall be protected by appropriate entry controls and access points.

    Yes

    X

    X

    Yes

    7.3

    Securing offices, rooms and facilities

    Physical security for offices, rooms and facilities shall be designed and implemented.

    Yes

    X

    X

    Yes

    7.4

    Physical security monitoring

    Premises shall be continuously monitored for unauthorized physical access.

    Yes

    X

    X

    Yes

    7.5

    Protecting against physical and environmental threats

    Protection against physical and environmental threats, such as natural disasters and other intentional or unintentional physical threats to infrastructure shall be designed and implemented.

    Yes

    X

    X

    X

    Yes

    7.6

    Working in secure areas

    Security measures for working in secure areas shall be designed and implemented.

    Yes

    X

    X

    Yes

    7.7

    Clear desk and clear screen

    Clear desk rules for papers and removable storage media and clear screen rules for information processing facilities shall be defined and appropriately enforced.

    Yes

    X

    X

    Yes

    7.8

    Equipment siting and protection

    Equipment shall be sited securely and protected.

    No

    N/A - managed by a third-party

    7.9

    Security of assets off premises

    Off-site assets shall be protected.

    No

    N/A - managed by a third-party

    7.10

    Storage media

    Storage media shall be managed through their life cycle of acquisition, use, transportation and disposal in accordance with the organization’s classification scheme and handling requirements.

    Yes

    X

    N/A - managed by a third-party

    7.11

    Supporting utilities

    Information processing facilities shall be protected from power failures and other disruptions caused by failures in supporting utilities.

    No

    N/A - managed by a third-party

    7.12

    Cabling security

    Cables carrying power, data or supporting information services shall be protected from interception, interference or damage.

    No

    N/A - managed by a third-party

    7.13

    Equipment maintenance

    Equipment shall be maintained correctly to ensure availability, integrity and confidentiality of information.

    No

    N/A - managed by a third-party

    7.14

    Secure disposal or reuse of equipment

    Items of equipment containing storage media shall be verified to ensure that any sensitive data and licensed software have been removed

    or securely overwritten prior to disposal or reuse.

    No

    N/A - managed by a third-party

    8.1

    User end point devices

    Information stored on, processed by or accessible via user end point devices shall be protected.

    Yes

    X

    X

    Yes

    8.2

    Privileged access rights

    The allocation and use of privileged access rights shall be restricted and managed.

    Yes

    X

    X

    Yes

    8.3

    Information access restriction

    Access to information and other associated assets shall be restricted in accordance with the established topic-specific policy on access control.

    Yes

    X

    X

    Yes

    8.4

    Access to source code

    Read and write access to source code, development tools and software libraries shall be appropriately managed.

    Yes

    X

    X

    Yes

    8.5

    Secure authentication

    Secure authentication technologies and procedures shall be implemented based on information access restrictions and the topic-specific policy on access control.

    Yes

    X

    X

    Yes

    8.6

    Capacity management

    The use of resources shall be monitored and adjusted in line with current and expected capacity requirements.

    Yes

    X

    X

    Yes

    8.7

    Protection against malware

    Protection against malware shall be implemented and supported by appropriate user awareness.

    Yes

    X

    X

    Yes

    8.8

    Management of technical vulnerabilities

    Information about technical vulnerabilities of information systems in use shall be obtained, the organization’s exposure to such vulnerabilities shall be evaluated and appropriate measures shall be taken.

    Yes

    X

    X

    Yes

    8.9

    Configuration management

    Configurations, including security configurations, of hardware, software, services and networks shall be established, documented, implemented, monitored and reviewed.

    Yes

    X

    X

    Yes

    8.10

    Information deletion

    Information stored in information systems, devices or in any other storage media shall be deleted when no longer required.

    Yes

    X

    X

    Yes

    8.11

    Data masking

    Data masking shall be used in accordance with the organization’s topic-specific policy on access control and other related topic-specific policies, and business requirements, taking applicable legislation into consideration.

    Yes

    X

    X

    Yes

    8.12

    Data leakage prevention

    Data leakage prevention measures shall be applied to systems, networks and any other devices that process, store or transmit sensitive

    information.

    Yes

    X

    X

    Yes

    8.13

    Information backup

    Backup copies of information, software and systems shall be maintained and regularly tested in accordance with the agreed topic-specific policy on backup.

    Yes

    X

    X

    Yes

    8.14

    Redundancy of information processing facilities

    Information processing facilities shall be implemented with redundancy sufficient to meet availability requirements.

    Yes

    X

    X

    Yes

    8.15

    Logging Control

    Logs that record activities, exceptions, faults and other relevant events shall be produced, stored, protected and analysed.

    Yes

    X

    X

    Yes

    8.16

    Monitoring activities

    Networks, systems and applications shall be monitored for anomalous

    behaviour and appropriate actions taken to evaluate potential infor- mation security incidents.

    Yes

    X

    X

    Yes

    8.17

    Clock synchronization

    The clocks of information processing systems used by the organization shall be synchronized to approved time sources.

    Yes

    X

    Yes

    8.18

    Use of privileged utility programs

    The use of utility programs that can be capable of overriding system and application controls shall be restricted and tightly controlled.

    Yes

    X

    X

    Only on production infrastructure

    8.19

    Installation of software on operational systems

    Procedures and measures shall be implemented to securely manage software installation on operational systems.

    Yes

    X

    X

    Yes

    8.20

    Networks security

    Networks and network devices shall be secured, managed and controlled to protect information in systems and applications.

    Yes

    X

    X

    Yes

    8.21

    Security of network services

    Security mechanisms, service levels and service requirements of network services shall be identified, implemented and monitored.

    Yes

    X

    X

    Yes

    8.22

    Segregation of networks

    Groups of information services, users and information systems shall be segregated in the organization’s networks.

    Yes

    X

    X

    Yes

    8.23

    Web filtering

    Access to external websites shall be managed to reduce exposure to malicious content.

    Yes

    X

    X

    Only on systems used to access client data.

    8.24

    Use of cryptography

    Rules for the effective use of cryptography, including cryptographic key management, shall be defined and implemented.

    Yes

    X

    X

    Yes

    8.25

    Secure development life cycle

    Rules for the secure development of software and systems shall be established and applied.

    Yes

    X

    X

    Yes

    8.26

    Application security requirements

    Information security requirements shall be identified, specified and approved when developing or acquiring applications.

    Yes

    X

    X

    Yes

    8.27

    Secure system architecture and engineering principles

    Principles for engineering secure systems shall be established, documented, maintained and applied to any information system development

    activities.

    Yes

    X

    X

    Yes

    8.28

    Secure coding

    Secure coding principles shall be applied to software development.

    Yes

    X

    X

    Yes

    8.29

    Security testing in development and acceptance

    Security testing processes shall be defined and implemented in the development life cycle.

    Yes

    X

    X

    Yes

    8.30

    Outsourced development

    The organization shall direct, monitor and review the activities related to outsourced system development.

    Yes

    X

    X

    N/A - development is not outsourced

    8.31

    Separation of development, test and production environments Development, testing and production environments shall be separated and secured.

    Yes

    X

    X

    Yes

    8.32

    Change management

    Changes to information processing facilities and information systems shall be subject to change management procedures.

    Yes

    X

    X

    Yes

    8.33

    Test information

    Test information shall be appropriately selected, protected and managed.

    Yes

    X

    Yes

    8.34

    Protection of information systems during audit testing

    Audit tests and other assurance activities involving assessment of operational systems shall be planned and agreed between the tester and

    appropriate management.

    Yes

    X

    Yes