{"id":23809,"date":"2020-08-27T17:04:55","date_gmt":"2020-08-27T20:04:55","guid":{"rendered":"https:\/\/www.epimedsolutions.com\/politica-de-gestao-de-riscos-de-seguranca-da-informacao\/"},"modified":"2021-11-11T08:52:44","modified_gmt":"2021-11-11T10:52:44","slug":"information-security-risk-management-policy","status":"publish","type":"page","link":"https:\/\/www.epimedsolutions.com\/en\/information-security-risk-management-policy\/","title":{"rendered":"Information Security Risk Management Policy"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row el_id=&#8221;policy-section-summary&#8221;][vc_column width=&#8221;3\/12&#8243;][vc_raw_html]JTVCY2Etc2lkZWJhciUyMGlkJTNEJTIyMTg1ODYlMjIlNUQ=[\/vc_raw_html][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-1627\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-1627\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h3 class=\"mkdf-st-title\" >\n\t\t\t\tInformation Security Risk Management Policy\t\t\t<\/h3>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<\/p>\n<ol class=\"summary-policy\">\n<li><a href=\"#policy-section-1\"><span style=\"font-weight: 400;\">1. <\/span><\/a><a href=\"#policy-section-1\">OBJECTIVE<\/a><\/li>\n<li><a href=\"#policy-section-2\"><span style=\"font-weight: 400;\">2. <\/span><\/a><a href=\"#policy-section-2\">SCOPE<\/a><\/li>\n<li><a href=\"#policy-section-3\"><span style=\"font-weight: 400;\">3. <\/span><\/a><a href=\"#policy-section-3\">DEFINITIONS<\/a><\/li>\n<li><a href=\"#policy-section-4\"><span style=\"font-weight: 400;\">4. <\/span><\/a><a href=\"#policy-section-4\">GUIDELINES<\/a>\n<ol class=\"summary-policy\">\n<li><span style=\"font-weight: 400;\">4.1 Risk Identification<\/span><\/li>\n<li><span style=\"font-weight: 400;\">4.2 Risk Assessment<\/span><\/li>\n<li><span style=\"font-weight: 400;\">4.3 Risk Strategy<\/span><\/li>\n<li><span style=\"font-weight: 400;\">4.4 Validation Controls<\/span><\/li>\n<li><span style=\"font-weight: 400;\">4.5 Risk Treatment<\/span><\/li>\n<li><span style=\"font-weight: 400;\">4.6 Risk Monitoring<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Risk Communication<\/span><\/li>\n<\/ol>\n<\/li>\n<li><a href=\"#policy-section-5\"><span style=\"font-weight: 400;\">5. RESPONSIBILITIES<\/span><\/a>\n<ol>\n<li><span style=\"font-weight: 400;\">5.1 Epimed Solutions management and directors must:<\/span><\/li>\n<li><span style=\"font-weight: 400;\">5.2 Epimed Solutions Risk Management Committee must:<\/span><\/li>\n<li><span style=\"font-weight: 400;\">5.3 The workforce must:<\/span><\/li>\n<li><span style=\"font-weight: 400;\">5.4 Customers must:<\/span><\/li>\n<\/ol>\n<\/li>\n<li><a href=\"#policy-section-6\">6. DISCIPLINARY PROCESS<\/a><\/li>\n<\/ol>\n<p>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-1&#8243; css=&#8221;.vc_custom_1598562047774{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-4385\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-4385\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t1 - OBJECTIVE\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<span style=\"font-weight: 400;\">This document aims to establish guidelines and responsibilities to be observed in the <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> Information Security Risk Management process, in order to enable the identification, assessment, treatment, monitoring and communication of operational, technological and imaging risks. <\/span>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-2&#8243; css=&#8221;.vc_custom_1598562058550{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-8894\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-8894\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t2 - SCOPE\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<span style=\"font-weight: 400;\">This policy is applicable to all organizational levels of <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> that integrate its risk management process directly or indirectly.<\/span>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-3&#8243; css=&#8221;.vc_custom_1598562069034{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-8777\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-8777\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t3 - DEFINITIONS\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<\/p>\n<table>\n<tbody>\n<tr>\n<td><strong><b>Term<\/b><\/strong><\/td>\n<td><strong><b>Definition<\/b><\/strong><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Risk<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Possibility of an event that negatively affects the achievement of the objectives of the Company or its processes<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Risk Appetite<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Degree of exposure to risks that the Company is willing to accept in order to achieve its strategic objectives and generate value for its cooperative members.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Team Members<\/span><\/td>\n<td><span style=\"font-weight: 400;\">They are all people who provide services internally or externally to the company, whether as temporary or full-time employees, including service providers. The following are examples of team members: directors, cooperative members, employees, interns, third parties who work within the facilities of the company.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Third Parties<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Outsourced service providers, permanent or temporary, that provide services to <b>Epimed Solutions<\/b>.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Risk Analysis<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Systematic use of information to identify sources and estimate risk.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Risk Identification<\/span><\/td>\n<td><span style=\"font-weight: 400;\">It is the process used to locate, list and characterize elements of the risk.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Risk Estimate<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Process used to assign values to the probability and consequences of a risk.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Risk Management<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Coordinated activities to direct and control an organization in terms of risk.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Risk Reduction<\/span><\/td>\n<td><span style=\"font-weight: 400;\">A form of risk treatment in which actions are taken to reduce the likelihood, the negative consequences, or both, associated with risks.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Information<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Knowledge presented to a person in a way that can be understood. Data that has been processed or organized to have meaning. Information is like any other important asset for business, it has value for the organization and, therefore, needs to be adequately protected. <\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Integrity<\/span><\/td>\n<td><span style=\"font-weight: 400;\">It is the principle of security through which the authenticity of information is guaranteed.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Information Security<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Preservation of confidentiality, integrity and availability of information.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-4&#8243; css=&#8221;.vc_custom_1598562078616{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-3672\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-3672\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t4 - GUIDELINES\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<\/p>\n<div class=\"mkdf-section-title-holder mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \">\n<div class=\"mkdf-st-inner\">\n<h4 class=\"mkdf-st-title\"><span style=\"color: #868686; font-size: 15px;\"><span style=\"font-weight: 400;\">The guidelines presented in this policy define and characterize the macro stages of the <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> Information Security Risk Management process.<\/span><\/span><\/h4>\n<\/div>\n<\/div>\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<p><b>4.1 Risk Identification<br \/>\n<\/b><span style=\"font-weight: 400;\">The identification of risks aims to recognize and describe the risks to which the Company is exposed.\u00a0<\/span><\/p>\n<p><b>4.2 Risk Assessment<br \/>\n<\/b><span style=\"font-weight: 400;\">After identifying the risks, qualitative and quantitative analyzes are carried out, aiming at defining the impact and probability attributes, used in prioritizing the risks to be addressed.<\/span><\/p>\n<p><b>4.3 Risk Strategy<br \/>\n<\/b><\/p>\n<p><span style=\"font-weight: 400;\">After risk assessment, risk treatment strategies are carried out, aiming at defining the items below:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Reducing<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Accepting<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Transferring<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Avoiding<\/span><\/li>\n<\/ul>\n<p><b>4.4 Validation Controls<br \/>\n<\/b><span style=\"font-weight: 400;\">This stage includes the degree of importance in the implementation of a control over the risk, as well as the survey and analysis of existing controls.<\/span><\/p>\n<p><b><\/b><b>4.5 Risk Treatment<br \/>\n<\/b><span style=\"font-weight: 400;\">After the validation control stage, the way risks will be handled is defined and also how they must be monitored and communicated to the different parties involved.<\/span><\/p>\n<p><b>4.6 Risk Monitoring<br \/>\n<\/b><span style=\"font-weight: 400;\">Aiming at the continuous improvement of Risk Management, the monitoring process consists of following up on the performance of risk indicators, supervising the implementation and maintenance of action plans and the achievement of established goals, through continuous management activities and\/or independent assessments.<\/span><\/p>\n<p><b>4.7 Risk Communication<br \/>\n<\/b><span style=\"font-weight: 400;\">Communication during all stages of the integrated risk management process reaches all interested parties. It is carried out clearly and objectively, respecting the good practices of governance required by the market.<\/span><\/p>\n<\/div>\n<\/div>\n<p>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-5&#8243; css=&#8221;.vc_custom_1598562092618{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-8706\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-8706\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t5 - RESPONSIBILITIES\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<b>5.1.1 Epimed Solutions management and directors must:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Approve the level of risk appetite of <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> and the tolerance ranges for deviations from acceptable risk level;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Approve the Information Security Risk Management Policy of <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\">, as well as any future reviews.<\/span><\/li>\n<\/ul>\n<p><b>5.1.2 Epimed Solutions Risk Management Committee must:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Monitor risk management, periodically validating and reviewing the risk matrix of <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\">, as well as the structure of internal controls capable of minimizing the occurrence of risks;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Define the risks to be prioritized for treatment, based on the level of risk exposure;\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Evaluate the performance of the risk indicators, in order to align them with the strategic objectives of the Company;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Provide the alignment of strategic and operational matters in the integrated risk management (IRM) process;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Review and evaluate the effectiveness of the IRM work processes;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Report to the Executive Board the results of the risk management process;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Review the Information Security Risk Management Policy of Epimed Solutions;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Indicate risk owners;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Approve the action plans to mitigate the risks of the Company&#8217;s areas;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Disseminate the risk management culture, making Team Member aware of the risks inherent in the business and their responsibilities in the IRM process;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\u00a0Evaluate, monitor and propose procedures that mitigate the risks of violation of personal data collected, stored and distructed of.<\/span><\/li>\n<\/ul>\n<p><b>5.1.3 The workforce must:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Manage the risks inherent to the business processes for which they are responsible;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Optimize risk-based decisions;\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Seek opportunities, aiming to obtain competitive advantage and increase value for customers.<\/span><\/li>\n<\/ul>\n<p><b>5.1.4 Customers must:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Ensure basic security measures to avoid risky situations.<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-6&#8243; css=&#8221;.vc_custom_1598562105167{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-2799\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-2799\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t6 - DISCIPLINARY PROCESS\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Failure by Team Member to comply with this Information Security Risk Management Policy will result in the application of penalties as assessed by the \u201cEthics Committee\u201d in accordance with the Company&#8217;s Code of Ethics and Conduct.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Failure by third parties to comply with this Information Security Risk Management Policy will result in disciplinary action, as provided for in the contract, or termination thereof.<\/span><\/li>\n<li style=\"font-weight: 400;\"><\/li>\n<\/ul>\n<p>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row el_id=&#8221;policy-section-summary&#8221;][vc_column width=&#8221;3\/12&#8243;][vc_raw_html]JTVCY2Etc2lkZWJhciUyMGlkJTNEJTIyMTg1ODYlMjIlNUQ=[\/vc_raw_html][\/vc_column][vc_column width=&#8221;7\/12&#8243;][\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-1&#8243; css=&#8221;.vc_custom_1598562047774{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-2&#8243; css=&#8221;.vc_custom_1598562058550{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-3&#8243; css=&#8221;.vc_custom_1598562069034{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;][\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-4&#8243; css=&#8221;.vc_custom_1598562078616{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;][\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-5&#8243; css=&#8221;.vc_custom_1598562092618{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;][\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-23809","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>Information Security Risk Management Policy - Epimed Solutions<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.epimedsolutions.com\/en\/information-security-risk-management-policy\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Information Security Risk Management Policy - Epimed Solutions\" \/>\r\n<meta property=\"og:description\" content=\"[vc_row el_id=&#8221;policy-section-summary&#8221;][vc_column width=&#8221;3\/12&#8243;][vc_raw_html]JTVCY2Etc2lkZWJhciUyMGlkJTNEJTIyMTg1ODYlMjIlNUQ=[\/vc_raw_html][\/vc_column][vc_column width=&#8221;7\/12&#8243;][\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-1&#8243; css=&#8221;.vc_custom_1598562047774{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-2&#8243; css=&#8221;.vc_custom_1598562058550{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-3&#8243; css=&#8221;.vc_custom_1598562069034{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;][\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-4&#8243; css=&#8221;.vc_custom_1598562078616{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;][\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-5&#8243; css=&#8221;.vc_custom_1598562092618{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;][\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row [&hellip;]\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.epimedsolutions.com\/en\/information-security-risk-management-policy\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Epimed Solutions\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/epimed\/\" \/>\r\n<meta property=\"article:modified_time\" content=\"2021-11-11T10:52:44+00:00\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:site\" content=\"@epimed\" \/>\r\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.epimedsolutions.com\/en\/information-security-risk-management-policy\/\",\"url\":\"https:\/\/www.epimedsolutions.com\/en\/information-security-risk-management-policy\/\",\"name\":\"Information Security Risk Management Policy - Epimed Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/www.epimedsolutions.com\/en\/#website\"},\"datePublished\":\"2020-08-27T20:04:55+00:00\",\"dateModified\":\"2021-11-11T10:52:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.epimedsolutions.com\/en\/information-security-risk-management-policy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.epimedsolutions.com\/en\/information-security-risk-management-policy\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.epimedsolutions.com\/en\/information-security-risk-management-policy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/www.epimedsolutions.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security Risk Management Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.epimedsolutions.com\/en\/#website\",\"url\":\"https:\/\/www.epimedsolutions.com\/en\/\",\"name\":\"Epimed Solutions\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.epimedsolutions.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.epimedsolutions.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.epimedsolutions.com\/en\/#organization\",\"name\":\"Epimed Solutions\",\"url\":\"https:\/\/www.epimedsolutions.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.epimedsolutions.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/epimedsolutions.com\/wp-content\/uploads\/2020\/04\/logo-epimed-1.png\",\"contentUrl\":\"https:\/\/epimedsolutions.com\/wp-content\/uploads\/2020\/04\/logo-epimed-1.png\",\"width\":400,\"height\":193,\"caption\":\"Epimed Solutions\"},\"image\":{\"@id\":\"https:\/\/www.epimedsolutions.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/epimed\/\",\"https:\/\/x.com\/epimed\",\"https:\/\/www.instagram.com\/epimedsolutions\/\",\"https:\/\/www.youtube.com\/user\/epimedsolutions\/\"]}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security Risk Management Policy - Epimed Solutions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.epimedsolutions.com\/en\/information-security-risk-management-policy\/","og_locale":"en_US","og_type":"article","og_title":"Information Security Risk Management Policy - Epimed Solutions","og_description":"[vc_row el_id=&#8221;policy-section-summary&#8221;][vc_column width=&#8221;3\/12&#8243;][vc_raw_html]JTVCY2Etc2lkZWJhciUyMGlkJTNEJTIyMTg1ODYlMjIlNUQ=[\/vc_raw_html][\/vc_column][vc_column width=&#8221;7\/12&#8243;][\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-1&#8243; css=&#8221;.vc_custom_1598562047774{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-2&#8243; css=&#8221;.vc_custom_1598562058550{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-3&#8243; css=&#8221;.vc_custom_1598562069034{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;][\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-4&#8243; css=&#8221;.vc_custom_1598562078616{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;][\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-5&#8243; css=&#8221;.vc_custom_1598562092618{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;][\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row [&hellip;]","og_url":"https:\/\/www.epimedsolutions.com\/en\/information-security-risk-management-policy\/","og_site_name":"Epimed Solutions","article_publisher":"https:\/\/www.facebook.com\/epimed\/","article_modified_time":"2021-11-11T10:52:44+00:00","twitter_card":"summary_large_image","twitter_site":"@epimed","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.epimedsolutions.com\/en\/information-security-risk-management-policy\/","url":"https:\/\/www.epimedsolutions.com\/en\/information-security-risk-management-policy\/","name":"Information Security Risk Management Policy - Epimed Solutions","isPartOf":{"@id":"https:\/\/www.epimedsolutions.com\/en\/#website"},"datePublished":"2020-08-27T20:04:55+00:00","dateModified":"2021-11-11T10:52:44+00:00","breadcrumb":{"@id":"https:\/\/www.epimedsolutions.com\/en\/information-security-risk-management-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.epimedsolutions.com\/en\/information-security-risk-management-policy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.epimedsolutions.com\/en\/information-security-risk-management-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/www.epimedsolutions.com\/en\/"},{"@type":"ListItem","position":2,"name":"Information Security Risk Management Policy"}]},{"@type":"WebSite","@id":"https:\/\/www.epimedsolutions.com\/en\/#website","url":"https:\/\/www.epimedsolutions.com\/en\/","name":"Epimed Solutions","description":"","publisher":{"@id":"https:\/\/www.epimedsolutions.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.epimedsolutions.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.epimedsolutions.com\/en\/#organization","name":"Epimed Solutions","url":"https:\/\/www.epimedsolutions.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.epimedsolutions.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/epimedsolutions.com\/wp-content\/uploads\/2020\/04\/logo-epimed-1.png","contentUrl":"https:\/\/epimedsolutions.com\/wp-content\/uploads\/2020\/04\/logo-epimed-1.png","width":400,"height":193,"caption":"Epimed Solutions"},"image":{"@id":"https:\/\/www.epimedsolutions.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/epimed\/","https:\/\/x.com\/epimed","https:\/\/www.instagram.com\/epimedsolutions\/","https:\/\/www.youtube.com\/user\/epimedsolutions\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.epimedsolutions.com\/en\/wp-json\/wp\/v2\/pages\/23809","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.epimedsolutions.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.epimedsolutions.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.epimedsolutions.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.epimedsolutions.com\/en\/wp-json\/wp\/v2\/comments?post=23809"}],"version-history":[{"count":0,"href":"https:\/\/www.epimedsolutions.com\/en\/wp-json\/wp\/v2\/pages\/23809\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.epimedsolutions.com\/en\/wp-json\/wp\/v2\/media?parent=23809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}