{"id":3716,"date":"2024-08-19T13:08:04","date_gmt":"2024-08-19T13:08:04","guid":{"rendered":"https:\/\/elos.vc\/site\/?page_id=3716"},"modified":"2024-08-28T12:57:37","modified_gmt":"2024-08-28T12:57:37","slug":"seguranca-da-informacao","status":"publish","type":"page","link":"https:\/\/elos.vc\/site\/en\/seguranca-da-informacao\/","title":{"rendered":"Information Security"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"3716\" class=\"elementor elementor-3716\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-34b19e17 e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"34b19e17\" data-element_type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6cc7903b elementor-widget elementor-widget-heading\" data-id=\"6cc7903b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 08-05-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">General Information Security Policy<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-65bd2eb3 e-flex e-con-boxed e-con e-child\" data-id=\"65bd2eb3\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d930e4 elementor-widget elementor-widget-heading\" data-id=\"6d930e4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Introduction<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a43fc5c termos elementor-widget elementor-widget-text-editor\" data-id=\"6a43fc5c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 08-05-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><span style=\"font-weight: 400;\">Mconf's mission is to foster connections and expand business through technology. Among our core values, integrity stands out as a fundamental aspect, highlighting the importance of information security in ensuring the quality and reliability of our products and providing the best working environment for our employees and partners.<\/span><\/p><p><span style=\"font-weight: 400;\">We recognize that handling data and information exposes us to various levels of risk as they traverse different communication, storage, and processing channels. Therefore, it is crucial to maintain good practices and standards in line with this General Information Security Policy to ensure adequate protection levels for this valuable resource, an indispensable part of our management system.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad6b0cf elementor-widget elementor-widget-heading\" data-id=\"ad6b0cf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Purpose<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89ac152 termos elementor-widget elementor-widget-text-editor\" data-id=\"89ac152\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">This document aims to formalize the guidelines of Mconf's General Information Security Policy, intending to protect information assets safely and transparently through prevention, detection, and risk reduction. This approach aligns with the business needs, complexity, and size of the company.<\/span><\/p><p><span style=\"font-weight: 400;\">Furthermore, this Policy is a strategic document establishing the concepts and guidelines to promote the secure use of information assets by all Mconf employees and partners. It requires implementing multidisciplinary solutions, adhering to applicable standards and regulations, and preserving the confidentiality, integrity, and availability of information for incident resolution and decision-making procedures.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-70453b9 elementor-widget elementor-widget-heading\" data-id=\"70453b9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Recipients<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-770c6a4 termos elementor-widget elementor-widget-text-editor\" data-id=\"770c6a4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">This Policy applies to all partners, directors, managers, administrators, employees, service providers, agents, subcontractors, and any other individuals or legal entities involved, directly or indirectly, in the daily activities and business of Mconf, including customers and users of products developed by Mconf.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26f5543 elementor-widget elementor-widget-heading\" data-id=\"26f5543\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Principles and guidelines<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b7f527 termos elementor-widget elementor-widget-text-editor\" data-id=\"5b7f527\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">For this Policy, Mconf and its recipients will adhere to the best General Information Security practices, governed by the principles of diligence, confidentiality, adequacy, availability, authenticity, protection, and continuity, along with the following guidelines:<\/span><\/p><ul><li>Confidentiality: Only authorized users, as designated by the information manager, should have access to the information, respecting segregation of duties.<\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Adequacy: Ensure that information remains unchanged from its creation to its use. Any changes, deletions, or additions must be authorized by Mconf information management.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Availability: Ensure that information is always available to its owner.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Authenticity: Guarantee the sender's identity, ensuring non-repudiation and that the sender cannot deny authorship of the message (irrevocability).<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Combating Cyber Risks: Continuously and diligently map and scan for cyber attack risks.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Protection: Safeguard information against unauthorized access, modification, destruction, or disclosure.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Classification: Appropriately classify information based on confidentiality, integrity, and availability criteria.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Adequate and Secure Resources: Ensure that resources are used only for their intended purposes and that systems and information are adequately protected.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Compliance with Standards: Adhere to laws regulating Mconf's activities and its operating market.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Information Security: Select information security mechanisms by balancing risk factors, technology, and cost.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Continuity: Ensure the continuity of processing critical business information;<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Incident Reporting: Immediately report any cybersecurity incidents or non-compliance with this Policy to the responsible parties.<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">Mconf's objective in information security management is to ensure systematic and effective management of all aspects related to information security, supporting business operations and minimizing risks and their potential impacts. To achieve this, the board, management, and other coordinators are committed to effective management and adopt all necessary measures to ensure that this Policy is communicated, understood, and followed at all levels of Mconf.<\/span><\/p><p><span style=\"font-weight: 400;\">In addition to this General Information Security Policy document, complementary policies (both public and internal) and standards are systematically applied to ensure compliance with Mconf's confidentiality, integrity, and availability requirements. The company is also available to assist employees, partners, customers, and the general public in understanding and adapting to this Policy and other complementary policies and standards.<\/span><\/p><p><span style=\"font-weight: 400;\">Equally important, Mconf is committed to maintaining high-quality service standards, building solid, mutually beneficial relationships with all stakeholders, and fostering innovation while ensuring compliance with this General Information Security Policy.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba149ad elementor-widget elementor-widget-heading\" data-id=\"ba149ad\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Rules and procedures<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d9da71 termos elementor-widget elementor-widget-text-editor\" data-id=\"4d9da71\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Mconf is dedicated to continuously improving cybersecurity procedures, always striving to comply with legal and regulatory standards. This commitment is guided by the principles, concepts, values, and practices outlined here, aiming to ensure the confidentiality, integrity, and availability of company data.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71d0d30 elementor-widget elementor-widget-heading\" data-id=\"71d0d30\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Roles and responsibilities<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9fba8f5 termos elementor-widget elementor-widget-text-editor\" data-id=\"9fba8f5\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">All recipients and Mconf are responsible for adopting and complying with the applicable guidelines, duties, controls, and practices in this Policy. They must ensure all ethical and legal standards are met by those they work with and promptly report any violations for appropriate action based on severity.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e3d96c elementor-widget elementor-widget-heading\" data-id=\"9e3d96c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Updates and validity<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d18562 termos elementor-widget elementor-widget-text-editor\" data-id=\"3d18562\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">This Policy is effective from the date of its publication and availability and will be reviewed and updated periodically, at least once every 12 months. <\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-479db61 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"479db61\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.21.0 - 08-05-2024 *\/\n.elementor-widget-divider{--divider-border-style:none;--divider-border-width:1px;--divider-color:#0c0d0e;--divider-icon-size:20px;--divider-element-spacing:10px;--divider-pattern-height:24px;--divider-pattern-size:20px;--divider-pattern-url:none;--divider-pattern-repeat:repeat-x}.elementor-widget-divider .elementor-divider{display:flex}.elementor-widget-divider .elementor-divider__text{font-size:15px;line-height:1;max-width:95%}.elementor-widget-divider .elementor-divider__element{margin:0 var(--divider-element-spacing);flex-shrink:0}.elementor-widget-divider .elementor-icon{font-size:var(--divider-icon-size)}.elementor-widget-divider .elementor-divider-separator{display:flex;margin:0;direction:ltr}.elementor-widget-divider--view-line_icon .elementor-divider-separator,.elementor-widget-divider--view-line_text .elementor-divider-separator{align-items:center}.elementor-widget-divider--view-line_icon .elementor-divider-separator:after,.elementor-widget-divider--view-line_icon .elementor-divider-separator:before,.elementor-widget-divider--view-line_text .elementor-divider-separator:after,.elementor-widget-divider--view-line_text .elementor-divider-separator:before{display:block;content:\"\";border-block-end:0;flex-grow:1;border-block-start:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--element-align-left .elementor-divider .elementor-divider-separator>.elementor-divider__svg:first-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-left .elementor-divider-separator:before{content:none}.elementor-widget-divider--element-align-left .elementor-divider__element{margin-left:0}.elementor-widget-divider--element-align-right .elementor-divider .elementor-divider-separator>.elementor-divider__svg:last-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-right .elementor-divider-separator:after{content:none}.elementor-widget-divider--element-align-right .elementor-divider__element{margin-right:0}.elementor-widget-divider--element-align-start .elementor-divider .elementor-divider-separator>.elementor-divider__svg:first-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-start .elementor-divider-separator:before{content:none}.elementor-widget-divider--element-align-start .elementor-divider__element{margin-inline-start:0}.elementor-widget-divider--element-align-end .elementor-divider .elementor-divider-separator>.elementor-divider__svg:last-of-type{flex-grow:0;flex-shrink:100}.elementor-widget-divider--element-align-end .elementor-divider-separator:after{content:none}.elementor-widget-divider--element-align-end .elementor-divider__element{margin-inline-end:0}.elementor-widget-divider:not(.elementor-widget-divider--view-line_text):not(.elementor-widget-divider--view-line_icon) .elementor-divider-separator{border-block-start:var(--divider-border-width) var(--divider-border-style) var(--divider-color)}.elementor-widget-divider--separator-type-pattern{--divider-border-style:none}.elementor-widget-divider--separator-type-pattern.elementor-widget-divider--view-line .elementor-divider-separator,.elementor-widget-divider--separator-type-pattern:not(.elementor-widget-divider--view-line) .elementor-divider-separator:after,.elementor-widget-divider--separator-type-pattern:not(.elementor-widget-divider--view-line) .elementor-divider-separator:before,.elementor-widget-divider--separator-type-pattern:not([class*=elementor-widget-divider--view]) .elementor-divider-separator{width:100%;min-height:var(--divider-pattern-height);-webkit-mask-size:var(--divider-pattern-size) 100%;mask-size:var(--divider-pattern-size) 100%;-webkit-mask-repeat:var(--divider-pattern-repeat);mask-repeat:var(--divider-pattern-repeat);background-color:var(--divider-color);-webkit-mask-image:var(--divider-pattern-url);mask-image:var(--divider-pattern-url)}.elementor-widget-divider--no-spacing{--divider-pattern-size:auto}.elementor-widget-divider--bg-round{--divider-pattern-repeat:round}.rtl .elementor-widget-divider .elementor-divider__text{direction:rtl}.e-con-inner>.elementor-widget-divider,.e-con>.elementor-widget-divider{width:var(--container-widget-width,100%);--flex-grow:var(--container-widget-flex-grow)}<\/style>\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06214a5 elementor-widget elementor-widget-heading\" data-id=\"06214a5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Last updated August 2024<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>General Information Security Policy Introduction Mconf\u2019s mission is to enable connections and expand business through technology. Among our values, integrity as a fundamental aspect reflects how information security is essential to ensure the quality and reliability of our products, as well as to guarantee the best environment [\u2026]<\/p>","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/elos.vc\/site\/en\/wp-json\/wp\/v2\/pages\/3716"}],"collection":[{"href":"https:\/\/elos.vc\/site\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/elos.vc\/site\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/elos.vc\/site\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/elos.vc\/site\/en\/wp-json\/wp\/v2\/comments?post=3716"}],"version-history":[{"count":16,"href":"https:\/\/elos.vc\/site\/en\/wp-json\/wp\/v2\/pages\/3716\/revisions"}],"predecessor-version":[{"id":3745,"href":"https:\/\/elos.vc\/site\/en\/wp-json\/wp\/v2\/pages\/3716\/revisions\/3745"}],"wp:attachment":[{"href":"https:\/\/elos.vc\/site\/en\/wp-json\/wp\/v2\/media?parent=3716"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}