{"id":14036,"date":"2025-11-10T17:26:59","date_gmt":"2025-11-10T20:26:59","guid":{"rendered":"https:\/\/docspider.com.br\/?page_id=14036"},"modified":"2025-12-03T16:41:27","modified_gmt":"2025-12-03T19:41:27","slug":"politica-de-seguranca-da-informacao","status":"publish","type":"page","link":"https:\/\/docspider.com.br\/en\/politica-de-seguranca-da-informacao\/","title":{"rendered":"Information Security Policy"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"14036\" class=\"elementor elementor-14036\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ac0ec09 e-flex e-con-boxed e-con e-parent\" data-id=\"ac0ec09\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-eae9ee5 e-con-full e-flex e-con e-child\" data-id=\"eae9ee5\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9600c30 elementor-widget elementor-widget-text-editor\" data-id=\"9600c30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Vers\u00e3o:<\/strong> 2 <strong>V\u00e1lido desde:<\/strong> 19\/11\/2025<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa84339 elementor-widget elementor-widget-text-editor\" data-id=\"fa84339\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>This document constitutes a formal statement from <strong>Docspider Software website,<\/strong> acerca de seu compromisso com a seguran\u00e7a da informa\u00e7\u00e3o, instituindo o <strong>Sistema de Gest\u00e3o de Seguran\u00e7a da Informa\u00e7\u00e3o (SGSI)<\/strong>. Todos os objetivos definidos pelo <strong>SGSI<\/strong> devem ser cumpridos por todos os seus colaboradores, prestadores de servi\u00e7os e parceiros de neg\u00f3cio no desenvolvimento dos seus processos.<\/p><h3><strong>Information Security Objectives:<\/strong><\/h3><p><strong>1.<\/strong> <strong>Ensure Basic Principles:<\/strong> Ensure the availability, confidentiality, and integrity of our processes, aligning them with the strategic objectives of the business.<\/p><p><strong>2.<\/strong> <strong>Adopt Best Practices:<\/strong> Promote the continuous implementation of information security best practices, in accordance with applicable laws, standards, and guidelines.<\/p><p><strong>3.<\/strong> <strong>Security Culture:<\/strong> Foster secure behavior among employees and partners, integrating information security principles into our products and services.<\/p><p><strong>4.<\/strong> <strong>Customer Data Protection:<\/strong> Apply strict controls when handling data, protecting information security principles to safeguard our customers' data.<\/p><p><strong>5.<\/strong> <strong>Secure System Development:<\/strong> Incorporate information security from the design of systems, ensuring that security aspects are integrated throughout the development lifecycle.<\/p><p><strong>6.<\/strong> <strong>Protection Against External Threats:<\/strong> Develop solutions that protect our systems and information from external threats, ensuring that employees and partners operate in a secure environment.<\/p><p><strong>7.<\/strong> <strong>Response to Technological Crises:<\/strong> Act swiftly and effectively when facing technological crises, minimizing impacts on information security principles.<\/p><p><strong>8.<\/strong> <strong>Continuous Improvement:<\/strong> Continuously review and improve assets and the information security management system, following best governance practices.<\/p><p><strong>9.<\/strong> <strong>Access Management:<\/strong> Ensure and monitor that information is accessible only to authorized persons, protecting against unauthorized access.<\/p><p><strong>10.<\/strong> <strong>Integrity and Accuracy:<\/strong> Maintain the accuracy and completeness of information and processing methods, preventing the loss or alteration of critical data.<\/p><p><strong>11.<\/strong> <strong>Information Availability:<\/strong> Ensure that information remains accessible and usable whenever necessary, guaranteeing operational continuity.<\/p><p><strong>12.<\/strong> <strong>Risk Management:<\/strong> Continuously identify, assess, and mitigate information security risks through a proactive approach to threat management.<\/p><p><strong>13.<\/strong> <strong>Regulatory Compliance:<\/strong> Ensuring that all operations comply with relevant laws, regulations, and contractual obligations.<\/p><p><strong>14.<\/strong> <strong>Training and Awareness:<\/strong> Provide ongoing training to employees on secure practices and information security policies, strengthening the organization\u2019s security culture.<\/p><p><strong>15.<\/strong> <strong>Incident Response:<\/strong> Implement and maintain effective processes for responding to security incidents, minimizing impact and rapidly restoring normal operations.<\/p><p><strong>16.<\/strong> <strong>Review and Monitoring:<\/strong> Conduct regular reviews and monitoring of the information security management system, identifying opportunities for improvement.<\/p><p><strong>17.<\/strong> <strong>Protection Against Internal and External Threats:<\/strong> Develop and implement measures that protect the organization against attacks and failures, whether internal or external.<\/p><p><strong>18.<\/strong> <strong>Business Continuity:<\/strong> Establish and maintain processes to ensure the continuity of operations in the event of failures or incidents, minimizing disruptions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Vers\u00e3o: 2 V\u00e1lido desde: 19\/11\/2025 O presente documento constitui uma declara\u00e7\u00e3o formal da Docspider Software acerca de seu compromisso com a seguran\u00e7a da informa\u00e7\u00e3o, instituindo o Sistema de Gest\u00e3o de Seguran\u00e7a da Informa\u00e7\u00e3o (SGSI). Todos os objetivos definidos pelo SGSI devem ser cumpridos por todos os seus colaboradores, prestadores de servi\u00e7os e parceiros de neg\u00f3cio [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":15,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"class_list":["post-14036","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/docspider.com.br\/en\/wp-json\/wp\/v2\/pages\/14036","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/docspider.com.br\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/docspider.com.br\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/docspider.com.br\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/docspider.com.br\/en\/wp-json\/wp\/v2\/comments?post=14036"}],"version-history":[{"count":10,"href":"https:\/\/docspider.com.br\/en\/wp-json\/wp\/v2\/pages\/14036\/revisions"}],"predecessor-version":[{"id":14197,"href":"https:\/\/docspider.com.br\/en\/wp-json\/wp\/v2\/pages\/14036\/revisions\/14197"}],"wp:attachment":[{"href":"https:\/\/docspider.com.br\/en\/wp-json\/wp\/v2\/media?parent=14036"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}