Summary
1. Introduction
The purpose of this high-level Policy is to define the purpose, direction, principles, and basic rules for information security management and to ensure that information is adequately protected.
It defines the rules for the use of cryptographic controls, as well as the rules for the use of cryptographic keys, to protect the confidentiality, integrity, authenticity, and non-repudiation of information.
It also defines the rules for preventing unauthorized access to information in workplaces, as well as shared facilities and equipment.
This policy applies to the entire Information Security Management System (ISMS), as defined in the ISMS scope document.
2. Information Security and Privacy
TM Tecnologia is committed to implementing an Information Security and Privacy Management System, meeting all applicable requirements of ISO 27001 and ISO 27701, compatible with the organization’s context.
This commitment is applied by all employees, leaders, and board members, focusing not only on system implementation but also on continuous improvement, which aims to maintain and promote ongoing preventive and corrective actions based on data analysis, indicators, nonconformities, and internal audits.
TM Tecnologia guarantees the security and privacy of information in its custody, which is handled or stored in the media over which TM Tecnologia has full administrative, physical, logical, and legal control.
Data handling is carried out in accordance with specific internal standards or as defined in this policy.
3. Asset Management
TM Tecnologia ‘s assets must be used primarily for the company’s interests and business.
Assets containing confidential information must be recorded, stored, protected, and, depending on the need, disposed of in a controlled manner, in accordance with applicable legislation.
4. Access Management
Logical access to computer systems provided by TM Tecnologia must be identified and controlled, observing the principles of information integrity, confidentiality, and availability, ensuring the traceability and effectiveness of authorized access.
Passwords for access to TM Tecnologia ‘s information assets/services or computing resources are personal and non-transferable, and it is the user’s duty to ensure their safekeeping and confidentiality.
5. Physical and Environmental Security
Access to TM Tecnologia ‘s facilities must be controlled. Passwords and badges are personal and non-transferable, and cannot be shared.
All employees, partners, and suppliers are responsible for the information and data stored at their workstations (desk and computer) and must ensure their security.
Remote work is authorized by the company’s senior management. Access authorization must be authorized by the area manager, as defined in the “Physical and Environmental Security” procedure.
All laptops and cell phones provided by TM Tecnologia must be registered and configured with a unique identification, security standards, and a user responsible for their use, as defined in the “Physical and Environmental Security” procedure.
The use of employee or partner mobile devices (BYOD) is authorized by the company’s senior management. Access authorization must be authorized by the area manager, informing which resources or corporate data will be accessed by the device, as defined in the “
6. Operational Safety
Communications:
Operations:
Systems Acquisition, Development and Maintenance:
Technical Vulnerabilities and Malware:
Encryption:
7. Risk Management
TM Tecnologia conducts actions to identify and classify the organization’s Information Security risks by mapping vulnerabilities, threats, impact and probability of occurrence, as well as adopting controls for mitigation and contingency.
8. Clean Screen
All professionals, employees and partners are responsible for the information stored at their workstations (desk, computer and mobile devices) and must ensure its security, not leaving confidential information accessible to others.
9. Event and Incident Management
Any TM Tecnologia professional can identify observed or suspected information security vulnerabilities in the systems or services in which they are working.
10. Information security in project management
TM Tecnologia guarantees effective and efficient controls in projects and operations.
11. Change Management
TM Tecnologia monitors planned changes, analyzing their consequences and taking action to mitigate any adverse effects.
12. Business Continuity Management
TM Tecnologia has a business continuity plan, with actions and responsibilities to minimize the impacts resulting from incidents, including the implementation of risk mitigation and contingency measures.
+55 (11) 4195-2102
+55 (21) 4040-4172
+55 (81) 4040-4044
+55 (85) 4042-1816
+55 (11) 4195-2102
+55 (21) 4040-4172
+55 (81) 4040-4044
+55 (85) 4042-1816