Establish guidelines on information security by formalizing the relevant aspects of control and monitoring, aiming at the adequate protection of information assets with regard to the aspects of integrity, availability and confidentiality of the information contained in the systems and other IT resources.
This Policy applies to all employees, interns, trainees, temporary workers, suppliers, customers and third parties linked to Regnier.
Information Security Policy.
A feature that allows the user to access the IT environment (networks, systems, etc.) while away from the company, from any location, using specific software/services.
Executives, employees, trainees, apprentices and temporary workers who have a relationship with Regnier.
Guarantee that access to information is obtained only by authorized persons.
Ensuring that authorized users have access to information whenever necessary.
Data that, after being processed or organized, produces facts with a comprehensible meaning. It is an asset and, like any other important business asset, has value to the organization.
Guarantee of accuracy and completeness of information and processing methods.
Computers, Notebooks, Tablets, Smartphones, Printers, Information Systems, Network Drives, DBMS, E-Mail (Electronic Mail), Internet, Intranet and the like.
Database management systems.
A concise or limited-time version of a program intended for sale, giving the customer the option to try it before purchasing.
A free program that allows users to use it as long as they do not sell it. IT: Information Technology.
All those who use information technology resources, and are therefore responsible for the knowledge and application of this PSI, including Regnier Employees, including all outsourced service providers who need to access Regnier's Computing Resources.
User responsible for the functionalities, data and information of one or more Regnier systems, who is responsible for the prior approval of improvements to be made to the system under his/her responsibility, as well as for the classification, definition of the user profile and the type of access to information.
User responsible for managing the access profiles of their business area or internal processes in which they are involved.
Privilege granted to managers by the Human Resources department and known within the organization that defines the limits for the purposes of approving administrative acts related to the management of their areas.
Authorize testing to verify the security level of the Regnier environment.
An employee is any and all individuals, whether employed under the CLT (Consolidation of Labor Laws) or providing services through a legal entity or otherwise, who perform any activity within or outside of Regnier. Each employee will be solely responsible for any loss or damage they may suffer or cause to Regnier and/or third parties as a result of failure to comply with the guidelines and standards set forth herein.
They must understand the risks associated with their special status and strictly comply with the provisions of the approval granted by the Information Security Committee. The approval may be revoked at any time if it is determined that the business justification no longer outweighs the risk associated with the exceptional status or if the employee who received it is not meeting the conditions defined in the approval.
Maintain an exemplary approach to information security as defined in this policy, serving as a role model for employees under your management. Assign employees, during the hiring and formalization of individual employment, service, or partnership contracts, the responsibility for complying with Regnier's ISP. Require employees to sign the Commitment and Acknowledgment Agreement, assuming the duty to follow the established standards and committing to maintain secrecy and confidentiality regarding all Regnier information assets, even when leaving the company. Before granting access to Regnier information, require casual employees and service providers who are not covered by an existing contract to sign a Non-Disclosure Agreement, for example, during the proposal gathering phase.
Adapt the standards, processes, procedures and systems under your responsibility to meet this PSI.
Approve improvements, their classification, define user profile and the type of access to this information in the systems under your responsibility.
Approve the sending of a copy of the system (programs, screens, sources, etc.) in response to any necessary demand, except for the purposes of external auditing of financial statements;
Authorize and ensure the recording of interventions made by IT in the following processes, through specific access profiles:
All systems in the Regnier environment must meet the requirements below, except in cases where technical impediments occur (e.g., legacy systems), duly justified by the IT analyst and/or responsible manager.
The IT Area must ensure that all information systems adhere to the following guidelines:
All systems, IT projects and/or configurations developed to meet the company's needs and interests are the sole and exclusive property of Regnier, and may only be transferred or sold with the approval of the IT Area and the area responsible for the system.
Privacy Policy
Jérémy Matioszek
General Director – Brazil
Establish guidelines on information security by formalizing the relevant aspects of control and monitoring, aiming at the adequate protection of information assets with regard to the aspects of integrity, availability and confidentiality of the information contained in the systems and other IT resources.
This Policy applies to all employees, interns, trainees, temporary workers, suppliers, customers and third parties linked to Regnier.
Information Security Policy.
A feature that allows the user to access the IT environment (networks, systems, etc.) while away from the company, from any location, using specific software/services.
Executives, employees, trainees, apprentices and temporary workers who have a relationship with Regnier.
Guarantee that access to information is obtained only by authorized persons.
Ensuring that authorized users have access to information whenever necessary.
Data that, after being processed or organized, produces facts with a comprehensible meaning. It is an asset and, like any other important business asset, has value to the organization.
Guarantee of accuracy and completeness of information and processing methods.
Computers, Notebooks, Tablets, Smartphones, Printers, Information Systems, Network Drives, DBMS, E-Mail (Electronic Mail), Internet, Intranet and the like.
Database management systems.
A concise or limited-time version of a program intended for sale, giving the customer the option to try it before purchasing.
A free program that allows users to use it as long as they do not sell it. IT: Information Technology.
All those who use information technology resources, and are therefore responsible for the knowledge and application of this PSI, including Regnier Employees, including all outsourced service providers who need to access Regnier's Computing Resources.
User responsible for the functionalities, data and information of one or more Regnier systems, who is responsible for the prior approval of improvements to be made to the system under his/her responsibility, as well as for the classification, definition of the user profile and the type of access to information.
User responsible for managing the access profiles of their business area or internal processes in which they are involved.
Privilege granted to managers by the Human Resources department and known within the organization that defines the limits for the purposes of approving administrative acts related to the management of their areas.
Authorize testing to verify the security level of the Regnier environment.
An employee is any and all individuals, whether employed under the CLT (Consolidation of Labor Laws) or providing services through a legal entity or otherwise, who perform any activity within or outside of Regnier. Each employee will be solely responsible for any loss or damage they may suffer or cause to Regnier and/or third parties as a result of failure to comply with the guidelines and standards set forth herein.
They must understand the risks associated with their special status and strictly comply with the provisions of the approval granted by the Information Security Committee. The approval may be revoked at any time if it is determined that the business justification no longer outweighs the risk associated with the exceptional status or if the employee who received it is not meeting the conditions defined in the approval.
Maintain an exemplary approach to information security as defined in this policy, serving as a role model for employees under your management. Assign employees, during the hiring and formalization of individual employment, service, or partnership contracts, the responsibility for complying with Regnier's ISP. Require employees to sign the Commitment and Acknowledgment Agreement, assuming the duty to follow the established standards and committing to maintain secrecy and confidentiality regarding all Regnier information assets, even when leaving the company. Before granting access to Regnier information, require casual employees and service providers who are not covered by an existing contract to sign a Non-Disclosure Agreement, for example, during the proposal gathering phase.
Adapt the standards, processes, procedures and systems under your responsibility to meet this PSI.
Approve improvements, their classification, define user profile and the type of access to this information in the systems under your responsibility.
Approve the sending of a copy of the system (programs, screens, sources, etc.) in response to any necessary demand, except for the purposes of external auditing of financial statements;
Authorize and ensure the recording of interventions made by IT in the following processes, through specific access profiles:
All systems in the Regnier environment must meet the requirements below, except in cases where technical impediments occur (e.g., legacy systems), duly justified by the IT analyst and/or responsible manager.
The IT Area must ensure that all information systems adhere to the following guidelines:
All systems, IT projects and/or configurations developed to meet the company's needs and interests are the sole and exclusive property of Regnier, and may only be transferred or sold with the approval of the IT Area and the area responsible for the system.
Privacy Policy
Jérémy Matioszek
General Director – Brazil