Our Policies and Commitment to Excellence

We are committed to a ‘Client First’ approach ensuring the quality of our platform, service and security is always a priority.

Our Quality Policy

Our Quality Policy is to provide compliant, ethical, and effective technologies and services, which meet the needs of our clients, and exceed their expectations. We are always mindful of the fact that our software and services are relied on by our clients for their governance, risk, security, audit, and control processes, and that our quality must be consistently high to support these use cases.

Our commitment is to providing evidence-based, defensible, and transparent intelligence which clients can rely on to support their decision-making processes. We commit to designing, running, and supporting AI technology in an ethical way, and in the best interests of clients, partners, and the wider community. 

All of our processes conform to our QMS (including our documented procedures), our statutory and regulatory obligations, best-practices where applicable, and the requirements of our stakeholders.

Our Commitment

We will work to continually improve our processes to ensure they remain aligned with the needs of our external stakeholders, and the changing threat and risk environment. 

Our Quality Policy is formally established and endorsed by the Board. It is communicated with all staff internally on the Intranet, and to external parties on request.


Information Security Management System Policy

Our Information Management Security Policy is to provide secure technologies and services, which meet the needs of our clients, and exceed their expectations. We are always mindful of the fact that our software and services are relied on by our clients for managing sometimes sensitive or classified data, and that our security standards must be consistently high to support these use cases.

Our Commitment

Our commitment to providing evidence-based, defensible, and transparent intelligence which clients can rely on to support their decision-making processes. We commit to designing, operating, and maintaining secure implementations for our clients, and supplying services in a secure manner. All of our security procedures conform to our ISMS, our statutory and regulatory obligations, best practices where applicable and the requirements of our stakeholders.