{"id":30578,"date":"2025-02-27T09:06:58","date_gmt":"2025-02-27T12:06:58","guid":{"rendered":"https:\/\/regniergroup.com.br\/?page_id=30578"},"modified":"2025-07-01T22:17:31","modified_gmt":"2025-07-02T01:17:31","slug":"lgpd","status":"publish","type":"page","link":"https:\/\/regniergroup.com.br\/en\/lgpd\/","title":{"rendered":"LGPD"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"30578\" class=\"elementor elementor-30578\" data-elementor-post-type=\"page\">\n\t\t\t\t\r\n\t\t<div class=\"default no-position show_shadow rs-sticky-default elementor-element elementor-element-0e03842 e-flex e-con-boxed e-con e-parent\" data-id=\"0e03842\" data-element_type=\"container\" data-e-type=\"container\" id=\"CUE\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\r\n\t\t\t\t<div class=\"elementor-element elementor-element-dace6bb elementor-widget elementor-widget-heading\" data-id=\"dace6bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">LGPD \u2013 General Data Protection Law<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\r\n\t\t<div class=\"default no-position show_shadow rs-sticky-default elementor-element elementor-element-7a3b700 e-con-full e-flex e-con e-child\" data-id=\"7a3b700\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\r\n\t\t\t\t<div class=\"elementor-element elementor-element-0e1f8df elementor-widget__width-inherit elementor-widget elementor-widget-rs-tab-advanced\" data-id=\"0e1f8df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"rs-tab-advanced.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\n\n        <div class=\"rstab-main horizontal tab_0e1f8df auto_switch_no full_tab_item  style1\">\n            <nav class=\"tab-menu-wrapper\">\n                <div class=\"nav nav-tabs all-menu-after-border\" id=\"nav-tab-0e1f8df\" role=\"tablist\">\n                                            <button class=\"nav-link active count_number_no\" id=\"nav-home-1-3272348\" data-bs-toggle=\"tab\" data-bs-target=\"#tab1-3272348\" type=\"button\" role=\"tab\" aria-controls=\"nav-home-1-3272348\" aria-selected=\"true\">\n                            \n                            Objective                        <\/button>\n\n                                            <button class=\"nav-link  count_number_no\" id=\"nav-home-2-3272348\" data-bs-toggle=\"tab\" data-bs-target=\"#tab2-3272348\" type=\"button\" role=\"tab\" aria-controls=\"nav-home-2-3272348\" aria-selected=\"true\">\n                            \n                            Scope                        <\/button>\n\n                                            <button class=\"nav-link  count_number_no\" id=\"nav-home-3-3272348\" data-bs-toggle=\"tab\" data-bs-target=\"#tab3-3272348\" type=\"button\" role=\"tab\" aria-controls=\"nav-home-3-3272348\" aria-selected=\"true\">\n                            \n                            Definitions                        <\/button>\n\n                                            <button class=\"nav-link  count_number_no\" id=\"nav-home-4-3272348\" data-bs-toggle=\"tab\" data-bs-target=\"#tab4-3272348\" type=\"button\" role=\"tab\" aria-controls=\"nav-home-4-3272348\" aria-selected=\"true\">\n                            \n                            Responsibilities                        <\/button>\n\n                                            <button class=\"nav-link  count_number_no\" id=\"nav-home-5-3272348\" data-bs-toggle=\"tab\" data-bs-target=\"#tab5-3272348\" type=\"button\" role=\"tab\" aria-controls=\"nav-home-5-3272348\" aria-selected=\"true\">\n                            \n                            Guidelines                        <\/button>\n\n                                            <button class=\"nav-link  count_number_no\" id=\"nav-home-6-3272348\" data-bs-toggle=\"tab\" data-bs-target=\"#tab6-3272348\" type=\"button\" role=\"tab\" aria-controls=\"nav-home-6-3272348\" aria-selected=\"true\">\n                            \n                            References                        <\/button>\n\n                                            <button class=\"nav-link  count_number_no\" id=\"nav-home-7-3272348\" data-bs-toggle=\"tab\" data-bs-target=\"#tab7-3272348\" type=\"button\" role=\"tab\" aria-controls=\"nav-home-7-3272348\" aria-selected=\"true\">\n                            \n                            Approval                        <\/button>\n\n                                    <\/div>\n            <\/nav>\n            <div class=\"tab-content\" id=\"nav-tabContent-0e1f8df\">\n                                    <div class=\"tab-pane fade show active\" id=\"tab1-3272348\" role=\"tabpanel\" aria-labelledby=\"nav-home-1-3272348\">\n\n\n                                                                            <div class=\"content--teb-area full-sec\">\n                                \n                                <div class=\"content--left-area\">\n\n                                    \n                                                                            <div class=\"title\">1. Objective<\/div>\n                                                                        <div class=\"desc_btn_wrapper\">\n                                                                                    <p>Establish guidelines on information security by formalizing the relevant aspects of control and monitoring, aiming at the adequate protection of information assets with regard to the aspects of integrity, availability and confidentiality of the information contained in the systems and other IT resources.<\/p>                                                                            <\/div>\n\n                                                                    <\/div>\n                            <\/div>\n                                            <\/div>\n\n                                    <div class=\"tab-pane fade\" id=\"tab2-3272348\" role=\"tabpanel\" aria-labelledby=\"nav-home-2-3272348\">\n\n\n                                                                            <div class=\"content--teb-area full-sec\">\n                                \n                                <div class=\"content--left-area\">\n\n                                    \n                                                                            <div class=\"title\">2. Scope<\/div>\n                                                                        <div class=\"desc_btn_wrapper\">\n                                                                                    <p>This Policy applies to all employees, interns, trainees, temporary workers, suppliers, customers and third parties linked to Regnier.<\/p>                                                                            <\/div>\n\n                                                                    <\/div>\n                            <\/div>\n                                            <\/div>\n\n                                    <div class=\"tab-pane fade\" id=\"tab3-3272348\" role=\"tabpanel\" aria-labelledby=\"nav-home-3-3272348\">\n\n\n                                                                            <div class=\"content--teb-area full-sec\">\n                                \n                                <div class=\"content--left-area\">\n\n                                    \n                                                                            <div class=\"title\">3. Definitions<\/div>\n                                                                        <div class=\"desc_btn_wrapper\">\n                                                                                    <h6><strong>3.1. PSI<\/strong><\/h6><p>Information Security Policy.<\/p><h6><strong>3.2. Remote Access<\/strong><\/h6><p>A feature that allows the user to access the IT environment (networks, systems, etc.) while away from the company, from any location, using specific software\/services.<\/p><h6><strong>3.3. Collaborators<\/strong><\/h6><p>Executives, employees, trainees, apprentices and temporary workers who have a relationship with Regnier.<\/p><h6><strong>3.4. Confidentiality<\/strong><\/h6><p>Guarantee that access to information is obtained only by authorized persons.<\/p><h6><strong>3.5. Availability<\/strong><\/h6><p>Ensuring that authorized users have access to information whenever necessary.<\/p><h6><strong>3.7. Information<\/strong><\/h6><p>Data that, after being processed or organized, produces facts with a comprehensible meaning. It is an asset and, like any other important business asset, has value to the organization.<\/p><h6><strong>3.8. Integrity<\/strong><\/h6><p>Guarantee of accuracy and completeness of information and processing methods.<\/p><h6><strong>3.9. Computing Resources<\/strong><\/h6><p>Computers, Notebooks, Tablets, Smartphones, Printers, Information Systems, Network Drives, DBMS, E-Mail (Electronic Mail), Internet, Intranet and the like.<\/p><h6><strong>3.10. DBMS<\/strong><\/h6><p>Database management systems.<\/p><h6><strong>3.11. Software and Shareware<\/strong><\/h6><p>A concise or limited-time version of a program intended for sale, giving the customer the option to try it before purchasing.<\/p><h6><strong>3.12. Freeware software<\/strong><\/h6><p>A free program that allows users to use it as long as they do not sell it. IT: Information Technology.<\/p><h6><strong>3.13. Users<\/strong><\/h6><p>All those who use information technology resources, and are therefore responsible for the knowledge and application of this PSI, including Regnier Employees, including all outsourced service providers who need to access Regnier&#039;s Computing Resources.<\/p><h6><strong>3.14. Normative User<\/strong><\/h6><p>User responsible for the functionalities, data and information of one or more Regnier systems, who is responsible for the prior approval of improvements to be made to the system under his\/her responsibility, as well as for the classification, definition of the user profile and the type of access to information.<\/p><h6><strong>3.15. Key User<\/strong><\/h6><p>User responsible for managing the access profiles of their business area or internal processes in which they are involved.<\/p><h6><strong>3.16. Support Level<\/strong><\/h6><p>Privilege granted to managers by the Human Resources department and known within the organization that defines the limits for the purposes of approving administrative acts related to the management of their areas.<\/p>                                                                            <\/div>\n\n                                                                    <\/div>\n                            <\/div>\n                                            <\/div>\n\n                                    <div class=\"tab-pane fade\" id=\"tab4-3272348\" role=\"tabpanel\" aria-labelledby=\"nav-home-4-3272348\">\n\n\n                                                                            <div class=\"content--teb-area full-sec\">\n                                \n                                <div class=\"content--left-area\">\n\n                                    \n                                                                            <div class=\"title\">4. Responsibilities<\/div>\n                                                                        <div class=\"desc_btn_wrapper\">\n                                                                                    <h6>4.1. IT Manager<\/h6><p>Authorize testing to verify the security level of the Regnier environment.<\/p><h6>4.2. Collaborators<\/h6><p>An employee is any and all individuals, whether employed under the CLT (Consolidation of Labor Laws) or providing services through a legal entity or otherwise, who perform any activity within or outside of Regnier. Each employee will be solely responsible for any loss or damage they may suffer or cause to Regnier and\/or third parties as a result of failure to comply with the guidelines and standards set forth herein.<\/p><h6>4.3. Temporary and\/or Outsourced Employees<\/h6><p>They must understand the risks associated with their special status and strictly comply with the provisions of the approval granted by the Information Security Committee. The approval may be revoked at any time if it is determined that the business justification no longer outweighs the risk associated with the exceptional status or if the employee who received it is not meeting the conditions defined in the approval.<\/p><h6>4.4. Process and People Managers<\/h6><p>Maintain an exemplary approach to information security as defined in this policy, serving as a role model for employees under your management. Assign employees, during the hiring and formalization of individual employment, service, or partnership contracts, the responsibility for complying with Regnier&#039;s ISP. Require employees to sign the Commitment and Acknowledgment Agreement, assuming the duty to follow the established standards and committing to maintain secrecy and confidentiality regarding all Regnier information assets, even when leaving the company. Before granting access to Regnier information, require casual employees and service providers who are not covered by an existing contract to sign a Non-Disclosure Agreement, for example, during the proposal gathering phase.<\/p><p>Adapt the standards, processes, procedures and systems under your responsibility to meet this PSI.<\/p><h6>4.5. Normative User or Key User<\/h6><ul><li>Authorize the release of access rights compatible with the functions performed by users, through differentiated access profiles;<\/li><li>Periodically review the access granted to the resources for which you are responsible, and may request the removal and\/or readjustment of profiles for users who already have access, as well as readjustment of the permissions of the profile itself (without the need for management approval).<\/li><\/ul><h6>4.6. Normative User<\/h6><p>Approve improvements, their classification, define user profile and the type of access to this information in the systems under your responsibility.<\/p><h6>4.7. IT Analyst<\/h6><p>Approve the sending of a copy of the system (programs, screens, sources, etc.) in response to any necessary demand, except for the purposes of external auditing of financial statements;<\/p><p>Authorize and ensure the recording of interventions made by IT in the following processes, through specific access profiles:<\/p><ul><li>In controlling the flow of electronic tax documents (NFe, CTe, MDFe, etc.) between Regnier&#039;s systems and the different State Finance Departments and vice versa, ensuring that the flow of information exchange occurs between the different environments;<\/li><li>In messages exchanged between systems, which includes but is not limited to ERPs and\/or automation systems, ensuring that the flow of information exchange occurs between environments;<\/li><li>Execution of archiving processes (removing data from production bases and taking them to another platform integrated with the ERP):<\/li><li>Record keeping in system configuration tables.<\/li><\/ul>                                                                            <\/div>\n\n                                                                    <\/div>\n                            <\/div>\n                                            <\/div>\n\n                                    <div class=\"tab-pane fade\" id=\"tab5-3272348\" role=\"tabpanel\" aria-labelledby=\"nav-home-5-3272348\">\n\n\n                                                                            <div class=\"content--teb-area full-sec\">\n                                \n                                <div class=\"content--left-area\">\n\n                                    \n                                                                            <div class=\"title\">5. Guidelines<\/div>\n                                                                        <div class=\"desc_btn_wrapper\">\n                                                                                    <h6>5.1. General Principles and Definitions<\/h6><ul><li>Information Security is everyone&#039;s responsibility. Likewise, it must be reflected in habits, attitudes, responsibilities, and constant care when using, requesting, and approving resources.<\/li><li>The IT area is responsible for maintaining and promoting the implementation of this Policy, as well as guiding users on the information security precepts to be observed by all employees, with greater or lesser integration with the rest of the organization;<\/li><li>The use of information and computing resources must always be compatible with ethics, confidentiality, and the purpose of the activities performed by the user, following standards and procedures defined by Regnier, to guarantee the availability and performance of applications;<\/li><li>The connection of third-party equipment to Regnier&#039;s network will only be permitted if it does not present a risk to the corporate environment and is in accordance with the Company&#039;s policies applicable to other equipment;<\/li><li>Improper use of computing resources may result in suspension of access, must be notified to the Information Security area and, if necessary, the internal investigation team may initiate an investigation regarding this non-compliance;<\/li><li>Any violation of any of the guidelines and directions expressed in this policy may result in appropriate disciplinary measures, as well as internal investigations, and will subject the user to administrative penalties and those provided for in civil, labor and criminal legislation.<\/li><\/ul><h6>5.2. Information Security Management<\/h6><ul><li>All employees are responsible for the security of the Company&#039;s information;<\/li><li>Each Regnier manager is the Regulatory User of the information within their authority domain and can delegate the functions of granting access rights\/approval of changes to systems and other IT resources. To do so, they must formalize these delegations by submitting a request to the IT Manager.<\/li><\/ul><h6>5.3. Physical Security within Regnier facilities<\/h6><ul><li>For the movement of equipment that is part of the basic structure of the company&#039;s computing environment (servers, routers, switches, hubs, controllers, printers, optical and magnetic backup media, etc.), it is mandatory for the requesting employee&#039;s manager to request authorization from the IT manager.<\/li><li>Data Processing Centers (DPCs) must have risk prevention devices such as physical access control, fire control, smoke control, and others. It is the IT Manager&#039;s responsibility to define these protection devices, considering regional characteristics and the criticality of the<br \/>information and technological resources involved.<\/li><\/ul><h6>5.4. Logical Security<\/h6><ul><li>It is the responsibility of the IT Department to require that all logical environments (operating systems, DBMSs and information systems) have their access restricted by passwords, in compliance with the guidelines described in this Policy, except in situations where there are prohibitive technical restrictions;<\/li><li>Every program or transaction developed or acquired for execution in the Regnier environment must meet the security requirements defined in the development standard document. Exceptions must be handled jointly by Regnier&#039;s IT departments and Management.<\/li><li>No personal password may be stored in the source code of programs, nor in files or tables intended for other purposes. Specific tables\/files for storing passwords must be stored securely using encryption;<\/li><li>Note: Access\u2014even for simple queries\u2014to password files or tables will not be permitted under any circumstances to any employee. Such restriction must be provided by security mechanisms (e.g., encryption, database access restrictions, etc.).<\/li><li>Any access account that has not been used for more than 45 days may be disabled without prior authorization from the owner or their Manager, in order to free up physical resources and\/or allocated software licenses. The exception to this rule is for management and\/or board members, who will be contacted before the resource is disabled;<\/li><li>From 45 days after the date of termination, users may have their access deleted, without the need for prior approval;<\/li><li>It is prohibited to uninstall software and\/or hardware on user stations that are used to perform physical and logical control of available resources;<\/li><li>Only resources approved and authorized by the company will be permitted to be used, provided they are individually identified, inventoried, with up-to-date documentation, and comply with applicable legislation. Therefore, any user who exposes the company to legal sanctions by using unapproved software, regardless of its classification (shareware, freeware, demo, etc.) without the support of the respective licenses, is subject to disciplinary measures, as well as internal investigations, and the sanctions provided for by law.<\/li><li>In the case of standard access accounts that cannot be deleted or changed, the standard passwords (which come with the product) must be changed immediately after the system and\/or environment is made available, without any specific request to do so;<\/li><li>The existence of Security and infrastructure documentation for the implementation of information systems is mandatory, in accordance with the current methodology, and they will not be implemented if they bring weaknesses that compromise the Regnier environment;<\/li><li>Only duly authorized users with justification may be administrators of their respective workstations.<\/li><\/ul><h6>5.5. Password Creation and Use<\/h6><p>All systems in the Regnier environment must meet the requirements below, except in cases where technical impediments occur (e.g., legacy systems), duly justified by the IT analyst and\/or responsible manager.<\/p><ul><li>The following criteria will be adopted to generate passwords:<\/li><li>Minimum length of 8 characters;<\/li><li>They can never be null or blank;<\/li><li>Never visible on the screen where they are informed for update;<\/li><li>Minimum of 2 numeric digits;<\/li><li>Minimum of 2 alphabetic characters;<\/li><li>Prohibit the reuse of the last 5 (or more) passwords used;<\/li><li>Being blocked after 5 consecutive and unsuccessful access attempts.<\/li><li>All individual passwords will expire every 90 days at most. Additionally, all initial passwords will be created with an expiration date and must be changed upon each user&#039;s first login.<\/li><li>Personal passwords can be changed by the user, regardless of their expiration date. However, they must not be changed more than once in a single day;<\/li><li>No employee may use their hierarchical or functional superiority over another to determine or force them to share their individual access password with anyone.<\/li><li>Sharing individual passwords is prohibited at all levels of the organization. Likewise, opening an authenticated connection to allow someone else to use it is prohibited. Under no circumstances may a user share their individual password. Once detected, such activity will be duly reported to Regnier&#039;s Board of Directors.<\/li><li>Any attempt to *crack* (try to discover) another person&#039;s individual access password, or even to invade environments or systems whose access is denied, will be notified to the Ethics Committee and may result in appropriate disciplinary measures, as set out in the Company&#039;s Code of Ethics, as well as in internal investigations;<\/li><li>It is everyone&#039;s duty to keep their authentication passwords confidential, as well as to choose strong passwords that make it difficult for someone else to easily discover them;<\/li><li>Exceptions to these minimum security requirements must be approved and validated by the IT Department in conjunction with the Board of Directors.<\/li><\/ul><h6>5.6. Access Security<\/h6><ul><li>Each person&#039;s access account and password are unique, individual and non-transferable, being recognized as equivalent to their signature and representing the level of delegation granted for the performance of their functions;<\/li><li>External access to company resources (remote access by employees, third parties, suppliers, customers and other cases that may arise) will only be granted upon prior authorization through corporate technical solutions approved by Regnier;<\/li><li>Internet access is only permitted through the corporate security system. Direct Internet access through external providers while connected to the corporate network is prohibited;<\/li><li>Any interconnections between networks (physically and\/or logically) involving automation and\/or information processes should only occur using corporate solutions defined by the IT area, in order to guarantee the availability, integrity and confidentiality of the environments.<\/li><\/ul><h6>5.7. Access Control<\/h6><ul><li>The IT department must ensure that no employee or service provider obtains access rights without proper approvals;<\/li><li>The Human Resources department, in conjunction with the IT department, will define a standard for user identification. This identification will be used to uniquely associate each access right with the person who holds it;<\/li><li>Access rights compatible with the roles performed by users will be granted through differentiated access profiles. These profiles aim to restrict available data and operations, and their definition will be carried out in conjunction with Regulatory Users.<\/li><\/ul><h6>5.8. Segregation of Environment and Functions<\/h6><p>The IT Area must ensure that all information systems adhere to the following guidelines:<\/p><ul><li>IT processing environments must keep the production environment segregated from others;<\/li><li>In the Production environment, IT Area users and service providers who perform support activities may only have consultation access, except for exceptions that must be authorized directly between the management involved, the IT Area and the Board of Directors;<\/li><li>Access to change databases in production environments will be granted solely through information systems. Any type of direct access is strictly prohibited. In extreme cases where authorization is required, the requester&#039;s IT Manager and the Board of Directors will jointly approve the changes, with the latter having veto power.<\/li><li>Changes to Regnier&#039;s production computing environment must be carried out in accordance with the change management processes approved by the respective managers.<\/li><\/ul><h6>5.9. Intellectual Property<\/h6><p>All systems, IT projects and\/or configurations developed to meet the company&#039;s needs and interests are the sole and exclusive property of Regnier, and may only be transferred or sold with the approval of the IT Area and the area responsible for the system.<\/p><h6>5.10. Audit and Investigation<\/h6><ul><li>All users must be aware that the information stored in Regnier&#039;s technological resources belongs to Regnier and may be monitored at any time without prior notice;<\/li><li>Internal Audit and Investigation may access any information stored in the logical environment (operating systems, DBMSs, and information systems). If any activity that could compromise the security of the IT environment is suspected, the Board of Directors may request an Audit and Investigation procedure, which may investigate and monitor any user&#039;s activities on demand, in addition to inspecting their files and access logs whenever deemed necessary.<\/li><li>Systems must be developed or acquired with the aim of having audit trail resources, and these must be protected against unauthorized access and must contain at least the following information: User identifier, date and time of the operation, operation, changed data.<\/li><\/ul>                                                                            <\/div>\n\n                                                                    <\/div>\n                            <\/div>\n                                            <\/div>\n\n                                    <div class=\"tab-pane fade\" id=\"tab6-3272348\" role=\"tabpanel\" aria-labelledby=\"nav-home-6-3272348\">\n\n\n                                                                            <div class=\"content--teb-area full-sec\">\n                                \n                                <div class=\"content--left-area\">\n\n                                    \n                                                                            <div class=\"title\">6. References<\/div>\n                                                                        <div class=\"desc_btn_wrapper\">\n                                                                                    <p>Privacy Policy<\/p>                                                                            <\/div>\n\n                                                                    <\/div>\n                            <\/div>\n                                            <\/div>\n\n                                    <div class=\"tab-pane fade\" id=\"tab7-3272348\" role=\"tabpanel\" aria-labelledby=\"nav-home-7-3272348\">\n\n\n                                                                            <div class=\"content--teb-area full-sec\">\n                                \n                                <div class=\"content--left-area\">\n\n                                    \n                                                                            <div class=\"title\">7. Approval<\/div>\n                                                                        <div class=\"desc_btn_wrapper\">\n                                                                                    <p><em><strong>J\u00e9r\u00e9my Matioszek<\/strong><\/em><br \/>General Director \u2013 Brazil<\/p>                                                                            <\/div>\n\n                                                                    <\/div>\n                            <\/div>\n                                            <\/div>\n\n                            <\/div>\n        <\/div>\n        \n        <div class=\"accordion tab-menu-wrapper accordion-menu-wrapper rs_horizontal\" id=\"accordionExample-0e1f8df\">\n\n                            <div class=\"accordion-item nav-tabs\">\n                    \n                    <div class=\"accordion-headerd\" id=\"heading_1-3272348\">\n                        <button class=\"nav-link accordion-button collapsed show\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#collapse_1-3272348\" aria-expanded=\"true\" aria-controls=\"collapse_1-3272348\">\n                                                        Objective                        <\/button>\n                    <\/div>\n\n                    <div id=\"collapse_1-3272348\" class=\"accordion-collapse collapse show\" aria-labelledby=\"heading_1-3272348\" data-bs-parent=\"#accordionExample-0e1f8df\">\n                        <div class=\"tab-pane\">\n\n\n                                                                                    <div class=\"content--teb-area full-sec\">\n                                \n                                <div class=\"content--left-area\">\n\n                                    \n                                                                            <div class=\"title\">1. Objective<\/div>\n                                                                        <div class=\"desc_btn_wrapper\">\n                                                                                    <p>Establish guidelines on information security by formalizing the relevant aspects of control and monitoring, aiming at the adequate protection of information assets with regard to the aspects of integrity, availability and confidentiality of the information contained in the systems and other IT resources.<\/p>                                                                            <\/div>\n                                                                    <\/div>\n                            <\/div>\n                                                    <\/div>\n                    <\/div>\n                <\/div>\n                            <div class=\"accordion-item nav-tabs\">\n                    \n                    <div class=\"accordion-headerd\" id=\"heading_2-3272348\">\n                        <button class=\"nav-link accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#collapse_2-3272348\" aria-expanded=\"true\" aria-controls=\"collapse_2-3272348\">\n                                                        Scope                        <\/button>\n                    <\/div>\n\n                    <div id=\"collapse_2-3272348\" class=\"accordion-collapse collapse\" aria-labelledby=\"heading_2-3272348\" data-bs-parent=\"#accordionExample-0e1f8df\">\n                        <div class=\"tab-pane\">\n\n\n                                                                                    <div class=\"content--teb-area full-sec\">\n                                \n                                <div class=\"content--left-area\">\n\n                                    \n                                                                            <div class=\"title\">2. Scope<\/div>\n                                                                        <div class=\"desc_btn_wrapper\">\n                                                                                    <p>This Policy applies to all employees, interns, trainees, temporary workers, suppliers, customers and third parties linked to Regnier.<\/p>                                                                            <\/div>\n                                                                    <\/div>\n                            <\/div>\n                                                    <\/div>\n                    <\/div>\n                <\/div>\n                            <div class=\"accordion-item nav-tabs\">\n                    \n                    <div class=\"accordion-headerd\" id=\"heading_3-3272348\">\n                        <button class=\"nav-link accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#collapse_3-3272348\" aria-expanded=\"true\" aria-controls=\"collapse_3-3272348\">\n                                                        Definitions                        <\/button>\n                    <\/div>\n\n                    <div id=\"collapse_3-3272348\" class=\"accordion-collapse collapse\" aria-labelledby=\"heading_3-3272348\" data-bs-parent=\"#accordionExample-0e1f8df\">\n                        <div class=\"tab-pane\">\n\n\n                                                                                    <div class=\"content--teb-area full-sec\">\n                                \n                                <div class=\"content--left-area\">\n\n                                    \n                                                                            <div class=\"title\">3. Definitions<\/div>\n                                                                        <div class=\"desc_btn_wrapper\">\n                                                                                    <h6><strong>3.1. PSI<\/strong><\/h6><p>Information Security Policy.<\/p><h6><strong>3.2. Remote Access<\/strong><\/h6><p>A feature that allows the user to access the IT environment (networks, systems, etc.) while away from the company, from any location, using specific software\/services.<\/p><h6><strong>3.3. Collaborators<\/strong><\/h6><p>Executives, employees, trainees, apprentices and temporary workers who have a relationship with Regnier.<\/p><h6><strong>3.4. Confidentiality<\/strong><\/h6><p>Guarantee that access to information is obtained only by authorized persons.<\/p><h6><strong>3.5. Availability<\/strong><\/h6><p>Ensuring that authorized users have access to information whenever necessary.<\/p><h6><strong>3.7. Information<\/strong><\/h6><p>Data that, after being processed or organized, produces facts with a comprehensible meaning. It is an asset and, like any other important business asset, has value to the organization.<\/p><h6><strong>3.8. Integrity<\/strong><\/h6><p>Guarantee of accuracy and completeness of information and processing methods.<\/p><h6><strong>3.9. Computing Resources<\/strong><\/h6><p>Computers, Notebooks, Tablets, Smartphones, Printers, Information Systems, Network Drives, DBMS, E-Mail (Electronic Mail), Internet, Intranet and the like.<\/p><h6><strong>3.10. DBMS<\/strong><\/h6><p>Database management systems.<\/p><h6><strong>3.11. Software and Shareware<\/strong><\/h6><p>A concise or limited-time version of a program intended for sale, giving the customer the option to try it before purchasing.<\/p><h6><strong>3.12. Freeware software<\/strong><\/h6><p>A free program that allows users to use it as long as they do not sell it. IT: Information Technology.<\/p><h6><strong>3.13. Users<\/strong><\/h6><p>All those who use information technology resources, and are therefore responsible for the knowledge and application of this PSI, including Regnier Employees, including all outsourced service providers who need to access Regnier&#039;s Computing Resources.<\/p><h6><strong>3.14. Normative User<\/strong><\/h6><p>User responsible for the functionalities, data and information of one or more Regnier systems, who is responsible for the prior approval of improvements to be made to the system under his\/her responsibility, as well as for the classification, definition of the user profile and the type of access to information.<\/p><h6><strong>3.15. Key User<\/strong><\/h6><p>User responsible for managing the access profiles of their business area or internal processes in which they are involved.<\/p><h6><strong>3.16. Support Level<\/strong><\/h6><p>Privilege granted to managers by the Human Resources department and known within the organization that defines the limits for the purposes of approving administrative acts related to the management of their areas.<\/p>                                                                            <\/div>\n                                                                    <\/div>\n                            <\/div>\n                                                    <\/div>\n                    <\/div>\n                <\/div>\n                            <div class=\"accordion-item nav-tabs\">\n                    \n                    <div class=\"accordion-headerd\" id=\"heading_4-3272348\">\n                        <button class=\"nav-link accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#collapse_4-3272348\" aria-expanded=\"true\" aria-controls=\"collapse_4-3272348\">\n                                                        Responsibilities                        <\/button>\n                    <\/div>\n\n                    <div id=\"collapse_4-3272348\" class=\"accordion-collapse collapse\" aria-labelledby=\"heading_4-3272348\" data-bs-parent=\"#accordionExample-0e1f8df\">\n                        <div class=\"tab-pane\">\n\n\n                                                                                    <div class=\"content--teb-area full-sec\">\n                                \n                                <div class=\"content--left-area\">\n\n                                    \n                                                                            <div class=\"title\">4. Responsibilities<\/div>\n                                                                        <div class=\"desc_btn_wrapper\">\n                                                                                    <h6>4.1. IT Manager<\/h6><p>Authorize testing to verify the security level of the Regnier environment.<\/p><h6>4.2. Collaborators<\/h6><p>An employee is any and all individuals, whether employed under the CLT (Consolidation of Labor Laws) or providing services through a legal entity or otherwise, who perform any activity within or outside of Regnier. Each employee will be solely responsible for any loss or damage they may suffer or cause to Regnier and\/or third parties as a result of failure to comply with the guidelines and standards set forth herein.<\/p><h6>4.3. Temporary and\/or Outsourced Employees<\/h6><p>They must understand the risks associated with their special status and strictly comply with the provisions of the approval granted by the Information Security Committee. The approval may be revoked at any time if it is determined that the business justification no longer outweighs the risk associated with the exceptional status or if the employee who received it is not meeting the conditions defined in the approval.<\/p><h6>4.4. Process and People Managers<\/h6><p>Maintain an exemplary approach to information security as defined in this policy, serving as a role model for employees under your management. Assign employees, during the hiring and formalization of individual employment, service, or partnership contracts, the responsibility for complying with Regnier&#039;s ISP. Require employees to sign the Commitment and Acknowledgment Agreement, assuming the duty to follow the established standards and committing to maintain secrecy and confidentiality regarding all Regnier information assets, even when leaving the company. Before granting access to Regnier information, require casual employees and service providers who are not covered by an existing contract to sign a Non-Disclosure Agreement, for example, during the proposal gathering phase.<\/p><p>Adapt the standards, processes, procedures and systems under your responsibility to meet this PSI.<\/p><h6>4.5. Normative User or Key User<\/h6><ul><li>Authorize the release of access rights compatible with the functions performed by users, through differentiated access profiles;<\/li><li>Periodically review the access granted to the resources for which you are responsible, and may request the removal and\/or readjustment of profiles for users who already have access, as well as readjustment of the permissions of the profile itself (without the need for management approval).<\/li><\/ul><h6>4.6. Normative User<\/h6><p>Approve improvements, their classification, define user profile and the type of access to this information in the systems under your responsibility.<\/p><h6>4.7. IT Analyst<\/h6><p>Approve the sending of a copy of the system (programs, screens, sources, etc.) in response to any necessary demand, except for the purposes of external auditing of financial statements;<\/p><p>Authorize and ensure the recording of interventions made by IT in the following processes, through specific access profiles:<\/p><ul><li>In controlling the flow of electronic tax documents (NFe, CTe, MDFe, etc.) between Regnier&#039;s systems and the different State Finance Departments and vice versa, ensuring that the flow of information exchange occurs between the different environments;<\/li><li>In messages exchanged between systems, which includes but is not limited to ERPs and\/or automation systems, ensuring that the flow of information exchange occurs between environments;<\/li><li>Execution of archiving processes (removing data from production bases and taking them to another platform integrated with the ERP):<\/li><li>Record keeping in system configuration tables.<\/li><\/ul>                                                                            <\/div>\n                                                                    <\/div>\n                            <\/div>\n                                                    <\/div>\n                    <\/div>\n                <\/div>\n                            <div class=\"accordion-item nav-tabs\">\n                    \n                    <div class=\"accordion-headerd\" id=\"heading_5-3272348\">\n                        <button class=\"nav-link accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#collapse_5-3272348\" aria-expanded=\"true\" aria-controls=\"collapse_5-3272348\">\n                                                        Guidelines                        <\/button>\n                    <\/div>\n\n                    <div id=\"collapse_5-3272348\" class=\"accordion-collapse collapse\" aria-labelledby=\"heading_5-3272348\" data-bs-parent=\"#accordionExample-0e1f8df\">\n                        <div class=\"tab-pane\">\n\n\n                                                                                    <div class=\"content--teb-area full-sec\">\n                                \n                                <div class=\"content--left-area\">\n\n                                    \n                                                                            <div class=\"title\">5. Guidelines<\/div>\n                                                                        <div class=\"desc_btn_wrapper\">\n                                                                                    <h6>5.1. General Principles and Definitions<\/h6><ul><li>Information Security is everyone&#039;s responsibility. Likewise, it must be reflected in habits, attitudes, responsibilities, and constant care when using, requesting, and approving resources.<\/li><li>The IT area is responsible for maintaining and promoting the implementation of this Policy, as well as guiding users on the information security precepts to be observed by all employees, with greater or lesser integration with the rest of the organization;<\/li><li>The use of information and computing resources must always be compatible with ethics, confidentiality, and the purpose of the activities performed by the user, following standards and procedures defined by Regnier, to guarantee the availability and performance of applications;<\/li><li>The connection of third-party equipment to Regnier&#039;s network will only be permitted if it does not present a risk to the corporate environment and is in accordance with the Company&#039;s policies applicable to other equipment;<\/li><li>Improper use of computing resources may result in suspension of access, must be notified to the Information Security area and, if necessary, the internal investigation team may initiate an investigation regarding this non-compliance;<\/li><li>Any violation of any of the guidelines and directions expressed in this policy may result in appropriate disciplinary measures, as well as internal investigations, and will subject the user to administrative penalties and those provided for in civil, labor and criminal legislation.<\/li><\/ul><h6>5.2. Information Security Management<\/h6><ul><li>All employees are responsible for the security of the Company&#039;s information;<\/li><li>Each Regnier manager is the Regulatory User of the information within their authority domain and can delegate the functions of granting access rights\/approval of changes to systems and other IT resources. To do so, they must formalize these delegations by submitting a request to the IT Manager.<\/li><\/ul><h6>5.3. Physical Security within Regnier facilities<\/h6><ul><li>For the movement of equipment that is part of the basic structure of the company&#039;s computing environment (servers, routers, switches, hubs, controllers, printers, optical and magnetic backup media, etc.), it is mandatory for the requesting employee&#039;s manager to request authorization from the IT manager.<\/li><li>Data Processing Centers (DPCs) must have risk prevention devices such as physical access control, fire control, smoke control, and others. It is the IT Manager&#039;s responsibility to define these protection devices, considering regional characteristics and the criticality of the<br \/>information and technological resources involved.<\/li><\/ul><h6>5.4. Logical Security<\/h6><ul><li>It is the responsibility of the IT Department to require that all logical environments (operating systems, DBMSs and information systems) have their access restricted by passwords, in compliance with the guidelines described in this Policy, except in situations where there are prohibitive technical restrictions;<\/li><li>Every program or transaction developed or acquired for execution in the Regnier environment must meet the security requirements defined in the development standard document. Exceptions must be handled jointly by Regnier&#039;s IT departments and Management.<\/li><li>No personal password may be stored in the source code of programs, nor in files or tables intended for other purposes. Specific tables\/files for storing passwords must be stored securely using encryption;<\/li><li>Note: Access\u2014even for simple queries\u2014to password files or tables will not be permitted under any circumstances to any employee. Such restriction must be provided by security mechanisms (e.g., encryption, database access restrictions, etc.).<\/li><li>Any access account that has not been used for more than 45 days may be disabled without prior authorization from the owner or their Manager, in order to free up physical resources and\/or allocated software licenses. The exception to this rule is for management and\/or board members, who will be contacted before the resource is disabled;<\/li><li>From 45 days after the date of termination, users may have their access deleted, without the need for prior approval;<\/li><li>It is prohibited to uninstall software and\/or hardware on user stations that are used to perform physical and logical control of available resources;<\/li><li>Only resources approved and authorized by the company will be permitted to be used, provided they are individually identified, inventoried, with up-to-date documentation, and comply with applicable legislation. Therefore, any user who exposes the company to legal sanctions by using unapproved software, regardless of its classification (shareware, freeware, demo, etc.) without the support of the respective licenses, is subject to disciplinary measures, as well as internal investigations, and the sanctions provided for by law.<\/li><li>In the case of standard access accounts that cannot be deleted or changed, the standard passwords (which come with the product) must be changed immediately after the system and\/or environment is made available, without any specific request to do so;<\/li><li>The existence of Security and infrastructure documentation for the implementation of information systems is mandatory, in accordance with the current methodology, and they will not be implemented if they bring weaknesses that compromise the Regnier environment;<\/li><li>Only duly authorized users with justification may be administrators of their respective workstations.<\/li><\/ul><h6>5.5. Password Creation and Use<\/h6><p>All systems in the Regnier environment must meet the requirements below, except in cases where technical impediments occur (e.g., legacy systems), duly justified by the IT analyst and\/or responsible manager.<\/p><ul><li>The following criteria will be adopted to generate passwords:<\/li><li>Minimum length of 8 characters;<\/li><li>They can never be null or blank;<\/li><li>Never visible on the screen where they are informed for update;<\/li><li>Minimum of 2 numeric digits;<\/li><li>Minimum of 2 alphabetic characters;<\/li><li>Prohibit the reuse of the last 5 (or more) passwords used;<\/li><li>Being blocked after 5 consecutive and unsuccessful access attempts.<\/li><li>All individual passwords will expire every 90 days at most. Additionally, all initial passwords will be created with an expiration date and must be changed upon each user&#039;s first login.<\/li><li>Personal passwords can be changed by the user, regardless of their expiration date. However, they must not be changed more than once in a single day;<\/li><li>No employee may use their hierarchical or functional superiority over another to determine or force them to share their individual access password with anyone.<\/li><li>Sharing individual passwords is prohibited at all levels of the organization. Likewise, opening an authenticated connection to allow someone else to use it is prohibited. Under no circumstances may a user share their individual password. Once detected, such activity will be duly reported to Regnier&#039;s Board of Directors.<\/li><li>Any attempt to *crack* (try to discover) another person&#039;s individual access password, or even to invade environments or systems whose access is denied, will be notified to the Ethics Committee and may result in appropriate disciplinary measures, as set out in the Company&#039;s Code of Ethics, as well as in internal investigations;<\/li><li>It is everyone&#039;s duty to keep their authentication passwords confidential, as well as to choose strong passwords that make it difficult for someone else to easily discover them;<\/li><li>Exceptions to these minimum security requirements must be approved and validated by the IT Department in conjunction with the Board of Directors.<\/li><\/ul><h6>5.6. Access Security<\/h6><ul><li>Each person&#039;s access account and password are unique, individual and non-transferable, being recognized as equivalent to their signature and representing the level of delegation granted for the performance of their functions;<\/li><li>External access to company resources (remote access by employees, third parties, suppliers, customers and other cases that may arise) will only be granted upon prior authorization through corporate technical solutions approved by Regnier;<\/li><li>Internet access is only permitted through the corporate security system. Direct Internet access through external providers while connected to the corporate network is prohibited;<\/li><li>Any interconnections between networks (physically and\/or logically) involving automation and\/or information processes should only occur using corporate solutions defined by the IT area, in order to guarantee the availability, integrity and confidentiality of the environments.<\/li><\/ul><h6>5.7. Access Control<\/h6><ul><li>The IT department must ensure that no employee or service provider obtains access rights without proper approvals;<\/li><li>The Human Resources department, in conjunction with the IT department, will define a standard for user identification. This identification will be used to uniquely associate each access right with the person who holds it;<\/li><li>Access rights compatible with the roles performed by users will be granted through differentiated access profiles. These profiles aim to restrict available data and operations, and their definition will be carried out in conjunction with Regulatory Users.<\/li><\/ul><h6>5.8. Segregation of Environment and Functions<\/h6><p>The IT Area must ensure that all information systems adhere to the following guidelines:<\/p><ul><li>IT processing environments must keep the production environment segregated from others;<\/li><li>In the Production environment, IT Area users and service providers who perform support activities may only have consultation access, except for exceptions that must be authorized directly between the management involved, the IT Area and the Board of Directors;<\/li><li>Access to change databases in production environments will be granted solely through information systems. Any type of direct access is strictly prohibited. In extreme cases where authorization is required, the requester&#039;s IT Manager and the Board of Directors will jointly approve the changes, with the latter having veto power.<\/li><li>Changes to Regnier&#039;s production computing environment must be carried out in accordance with the change management processes approved by the respective managers.<\/li><\/ul><h6>5.9. Intellectual Property<\/h6><p>All systems, IT projects and\/or configurations developed to meet the company&#039;s needs and interests are the sole and exclusive property of Regnier, and may only be transferred or sold with the approval of the IT Area and the area responsible for the system.<\/p><h6>5.10. Audit and Investigation<\/h6><ul><li>All users must be aware that the information stored in Regnier&#039;s technological resources belongs to Regnier and may be monitored at any time without prior notice;<\/li><li>Internal Audit and Investigation may access any information stored in the logical environment (operating systems, DBMSs, and information systems). If any activity that could compromise the security of the IT environment is suspected, the Board of Directors may request an Audit and Investigation procedure, which may investigate and monitor any user&#039;s activities on demand, in addition to inspecting their files and access logs whenever deemed necessary.<\/li><li>Systems must be developed or acquired with the aim of having audit trail resources, and these must be protected against unauthorized access and must contain at least the following information: User identifier, date and time of the operation, operation, changed data.<\/li><\/ul>                                                                            <\/div>\n                                                                    <\/div>\n                            <\/div>\n                                                    <\/div>\n                    <\/div>\n                <\/div>\n                            <div class=\"accordion-item nav-tabs\">\n                    \n                    <div class=\"accordion-headerd\" id=\"heading_6-3272348\">\n                        <button class=\"nav-link accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#collapse_6-3272348\" aria-expanded=\"true\" aria-controls=\"collapse_6-3272348\">\n                                                        References                        <\/button>\n                    <\/div>\n\n                    <div id=\"collapse_6-3272348\" class=\"accordion-collapse collapse\" aria-labelledby=\"heading_6-3272348\" data-bs-parent=\"#accordionExample-0e1f8df\">\n                        <div class=\"tab-pane\">\n\n\n                                                                                    <div class=\"content--teb-area full-sec\">\n                                \n                                <div class=\"content--left-area\">\n\n                                    \n                                                                            <div class=\"title\">6. References<\/div>\n                                                                        <div class=\"desc_btn_wrapper\">\n                                                                                    <p>Privacy Policy<\/p>                                                                            <\/div>\n                                                                    <\/div>\n                            <\/div>\n                                                    <\/div>\n                    <\/div>\n                <\/div>\n                            <div class=\"accordion-item nav-tabs\">\n                    \n                    <div class=\"accordion-headerd\" id=\"heading_7-3272348\">\n                        <button class=\"nav-link accordion-button collapsed\" type=\"button\" data-bs-toggle=\"collapse\" data-bs-target=\"#collapse_7-3272348\" aria-expanded=\"true\" aria-controls=\"collapse_7-3272348\">\n                                                        Approval                        <\/button>\n                    <\/div>\n\n                    <div id=\"collapse_7-3272348\" class=\"accordion-collapse collapse\" aria-labelledby=\"heading_7-3272348\" data-bs-parent=\"#accordionExample-0e1f8df\">\n                        <div class=\"tab-pane\">\n\n\n                                                                                    <div class=\"content--teb-area full-sec\">\n                                \n                                <div class=\"content--left-area\">\n\n                                    \n                                                                            <div class=\"title\">7. Approval<\/div>\n                                                                        <div class=\"desc_btn_wrapper\">\n                                                                                    <p><em><strong>J\u00e9r\u00e9my Matioszek<\/strong><\/em><br \/>General Director \u2013 Brazil<\/p>                                                                            <\/div>\n                                                                    <\/div>\n                            <\/div>\n                                                    <\/div>\n                    <\/div>\n                <\/div>\n                    <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\r\n\t\t<div class=\"default no-position show_shadow rs-sticky-default elementor-element elementor-element-b4827dc e-con-full e-flex e-con e-child\" data-id=\"b4827dc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\r\n\t\t\t\t<div class=\"elementor-element elementor-element-e7549a2 elementor-alert-info elementor-widget elementor-widget-alert\" data-id=\"e7549a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"alert.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-alert\" role=\"alert\">\n\n\t\t\t\t\t\t<span class=\"elementor-alert-title\">Notice<\/span>\n\t\t\t\n\t\t\t\t\t\t<span class=\"elementor-alert-description\">This document contains confidential information owned by REGNIER SERVI\u00c7OS INDUSTRIAIS LTDA. Any reproduction, in whole or in part, sharing, or improper use of this content without the author&#039;s prior authorization and\/or beyond the limits defined in the Service Provision Agreement is expressly prohibited and will subject the violating party to the penalties defined in the Agreement.<\/span>\n\t\t\t\n\t\t\t\t\t\t<button type=\"button\" class=\"elementor-alert-dismiss\" aria-label=\"Dispensar este alerta.\">\n\t\t\t\t\t\t\t\t\t<span aria-hidden=\"true\">\u00d7<\/span>\n\t\t\t\t\t\t\t<\/button>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>LGPD \u2013 Lei Geral de Prote\u00e7\u00e3o de Dados Objetivo Abrang\u00eancia Defini\u00e7\u00f5es Responsabilidades Diretrizes Refer\u00eancias Aprova\u00e7\u00e3o 1. Objetivo Estabelecer as diretrizes sobre seguran\u00e7a da informa\u00e7\u00e3o formalizando os aspectos relevantes de controle e monitoramento, visando a prote\u00e7\u00e3o adequada dos ativos da informa\u00e7\u00e3o com rela\u00e7\u00e3o aos aspectos de integridade, disponibilidade e confidencialidade das informa\u00e7\u00f5es contidas nos sistemas e&#8230;<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"nf_dc_page":"","rs_blank_template":"","rs_page_bg_color":"","slide_template_v7":"","footnotes":""},"class_list":["post-30578","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/regniergroup.com.br\/en\/wp-json\/wp\/v2\/pages\/30578","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/regniergroup.com.br\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/regniergroup.com.br\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/regniergroup.com.br\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/regniergroup.com.br\/en\/wp-json\/wp\/v2\/comments?post=30578"}],"version-history":[{"count":5,"href":"https:\/\/regniergroup.com.br\/en\/wp-json\/wp\/v2\/pages\/30578\/revisions"}],"predecessor-version":[{"id":30665,"href":"https:\/\/regniergroup.com.br\/en\/wp-json\/wp\/v2\/pages\/30578\/revisions\/30665"}],"wp:attachment":[{"href":"https:\/\/regniergroup.com.br\/en\/wp-json\/wp\/v2\/media?parent=30578"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}