{"id":23830,"date":"2020-08-27T17:05:40","date_gmt":"2020-08-27T20:05:40","guid":{"rendered":"https:\/\/www.epimedsolutions.com\/politica-de-seguranca-da-informacao\/"},"modified":"2021-11-11T08:53:51","modified_gmt":"2021-11-11T10:53:51","slug":"information-security-policy","status":"publish","type":"page","link":"https:\/\/www.epimedsolutions.com\/en\/information-security-policy\/","title":{"rendered":"Information Security Policy"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><p>[vc_row el_id=&#8221;policy-section-summary&#8221;][vc_column width=&#8221;3\/12&#8243;][vc_raw_html]JTVCY2Etc2lkZWJhciUyMGlkJTNEJTIyMTg1ODYlMjIlNUQlMjA=[\/vc_raw_html][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-3967\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-3967\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h3 class=\"mkdf-st-title\" >\n\t\t\t\tInformation Security Policy\t\t\t<\/h3>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<\/p>\n<ol class=\"summary-policy\">\n<li><a href=\"#policy-section-1\"><span style=\"font-weight: 400;\">1. <\/span><\/a><a href=\"#policy-section-1\">INTRODUCTION<\/a><\/li>\n<li><a href=\"#policy-section-2\"><span style=\"font-weight: 400;\">2. <\/span><\/a><a href=\"#policy-section-2\">DEFINITION<\/a><\/li>\n<li><a href=\"#policy-section-3\"><span style=\"font-weight: 400;\">3. <\/span><\/a><a href=\"#policy-section-3\">OBJECTIVE<\/a><\/li>\n<li><a href=\"#policy-section-4\"><span style=\"font-weight: 400;\">4. <\/span><\/a><a href=\"#policy-section-4\">APPLICATION<\/a><\/li>\n<li><a href=\"#policy-section-5\"><span style=\"font-weight: 400;\">5. <\/span><\/a><a href=\"#policy-section-5\">COMPUTER USERS<\/a><\/li>\n<li><a href=\"#policy-section-6\"><span style=\"font-weight: 400;\">6. <\/span><\/a><a href=\"#policy-section-6\">RESPONSIBILITIES<\/a>\n<ol>\n<li><span style=\"font-weight: 400;\">6.1 Users must:<\/span><\/li>\n<li>6.2 Line Managers must:<\/li>\n<li><span style=\"font-weight: 400;\">6.3 The IT Area must:<\/span><\/li>\n<\/ol>\n<\/li>\n<li><a href=\"#policy-section-5\">7. <\/a><a href=\"#policy-section-7\"><span style=\"font-weight: 400;\">IDENTIFICATION \u2013 LOGIN AND PASSWORD<\/span><\/a><\/li>\n<li><a href=\"#policy-section-8\"><span style=\"font-weight: 400;\">8. <\/span><\/a><a href=\"#policy-section-8\">ACCESS REVIEW<\/a><\/li>\n<li><a href=\"#policy-section-9\"><span style=\"font-weight: 400;\">9. <\/span><\/a><a href=\"#policy-section-9\">ACCESS REMOVAL<\/a><\/li>\n<li><a href=\"#policy-section-10\"><span style=\"font-weight: 400;\">10. <\/span><\/a><a href=\"#policy-section-10\">COMPUTER RESOURCES<\/a><\/li>\n<li><a href=\"#policy-section-11\"><span style=\"font-weight: 400;\">11. <\/span><\/a><a href=\"#policy-section-11\">CLEAN DESK AND CLEAR SCREEN<\/a><\/li>\n<li><a href=\"#policy-section-12\"><span style=\"font-weight: 400;\">12. <\/span><\/a><a href=\"#policy-section-12\">DESTRUCTION OF MEDIA AND DATA<\/a><\/li>\n<li><a href=\"#policy-section-13\"><span style=\"font-weight: 400;\">13. <\/span><\/a><a href=\"#policy-section-13\">CONTROL AND RESTRICTION OF USE OF REMOVABLE MEDIA\/USB PORTS.<\/a><\/li>\n<li><a href=\"#policy-section-14\"><span style=\"font-weight: 400;\">14. <\/span><\/a><a href=\"#policy-section-14\">CLASSIFICATION OF INFORMATION<\/a><\/li>\n<li><a href=\"#policy-section-15\"><span style=\"font-weight: 400;\">15. <\/span><\/a><a href=\"#policy-section-15\">ANTIVIRUS<\/a><\/li>\n<li><a href=\"#policy-section-16\"><span style=\"font-weight: 400;\">16. <\/span><\/a><a href=\"#policy-section-16\">FILE STORAGE<\/a><\/li>\n<li><a href=\"#policy-section-17\"><span style=\"font-weight: 400;\">17. <\/span><\/a><a href=\"#policy-section-17\">BACKUP POLICY<\/a><\/li>\n<li><a href=\"#policy-section-18\"><span style=\"font-weight: 400;\">18. <\/span><\/a><a href=\"#policy-section-18\">SAFEKEEPING\/ARCHIVING OF FILES<\/a><\/li>\n<li><a href=\"#policy-section-19\"><span style=\"font-weight: 400;\">19. <\/span><\/a><a href=\"#policy-section-19\">INTERNET USE<\/a><\/li>\n<li><a href=\"#policy-section-20\"><span style=\"font-weight: 400;\">20. <\/span><\/a><a href=\"#policy-section-20\">GAMES<\/a><\/li>\n<li><a href=\"#policy-section-21\"><span style=\"font-weight: 400;\">21. <\/span><\/a><a href=\"#policy-section-21\">PIRATED SOFTWARE<\/a><\/li>\n<li><a href=\"#policy-section-22\"><span style=\"font-weight: 400;\">22. <\/span><\/a><a href=\"#policy-section-22\">SERVER AND USER EQUIPMENT CONFIGURATIONS<\/a><\/li>\n<li><a href=\"#policy-section-23\"><span style=\"font-weight: 400;\">23. <\/span><\/a><a href=\"#policy-section-23\">E-MAIL AND INSTANT MESSAGES<\/a><\/li>\n<li><a href=\"#policy-section-24\"><span style=\"font-weight: 400;\">24. <\/span><\/a><a href=\"#policy-section-24\">AUDITS<\/a><\/li>\n<li><a href=\"#policy-section-25\"><span style=\"font-weight: 400;\">25. <\/span><\/a><a href=\"#policy-section-25\">LOG MANAGEMENT<\/a><\/li>\n<li><a href=\"#policy-section-26\"><span style=\"font-weight: 400;\">26. <\/span><\/a><a href=\"#policy-section-26\">REMOTE OFFICE ACCESS<\/a><\/li>\n<li><a href=\"#policy-section-27\"><span style=\"font-weight: 400;\">27. <\/span><\/a><a href=\"#policy-section-27\">REMOTE DATA CENTER ACCESS<\/a><\/li>\n<li><a href=\"#policy-section-28\"><span style=\"font-weight: 400;\">28. <\/span><\/a><a href=\"#policy-section-28\">OMITTED CASES<\/a><\/li>\n<li><a href=\"#policy-section-29\"><span style=\"font-weight: 400;\">29. <\/span><\/a><a href=\"#policy-section-29\">COMPLIANCE<\/a><\/li>\n<li><a href=\"#policy-section-30\"><span style=\"font-weight: 400;\">30. <\/span><\/a><a href=\"https:\/\/docs.google.com\/document\/d\/1bZJISUka32qNIF3OWFtc5Yj2G7LG1wy-\/edit#heading=h.ihv636\">FINAL PROVISIONS<\/a><\/li>\n<\/ol>\n<p>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-1&#8243; css=&#8221;.vc_custom_1598555296159{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-5797\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-5797\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t1 - INTRODUCTION\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> specializes in solutions for the management of clinical and epidemiological information, which improve the efficiency of hospital care and patient safety. <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> receives from Hospitals, Clinics, Social Health Organizations and other health institutions (&#8220;Health Institution&#8221;), Personal Data and\/or Sensitive Data (&#8220;Data&#8221;) from patients in Health Institutions (&#8220;Patients&#8221;).<\/span><\/p>\n<p><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\">, based on ISO\/IEC 27002 and the General Data Protection Regulation (EU) 2016\/679 (\u201cGDPR\u201d), defined its Information Security Policy (\u201cPolicy\u201d), establishing the necessary norms and procedures for the continuity of its business and protection of the confidentiality of information, in particular of the Personal Data of Patients.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This Policy ratifies all the determinations of the Personal Data Protection and Privacy Policy that do not conflict with what is established here, regardless of the present Policy in novation. All determinations contained in this Policy must be interpreted in accordance with the determinations of the Personal Data Protection and Privacy Policy, which will always prevail when an eventual conflict with the guidelines of this Policy arises.<\/span>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-2&#8243; css=&#8221;.vc_custom_1598555405295{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-3494\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-3494\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t2 - DEFINITION\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<span style=\"font-weight: 400;\">Capitalized terms used, but not defined in this Policy in any other way, will have their meanings assigned to them in the Personal Data Protection and Privacy Policy.<\/span>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-3&#8243; css=&#8221;.vc_custom_1598555420662{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-5363\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-5363\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t3 - OBJECTIVE\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<span style=\"font-weight: 400;\">The objective of the Policy is to establish rules of best practices for Data processing, determine the security, technical and administrative measures to protect the Personal Data of Patients, and also guarantee the confidentiality, integrity and protection of <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> information.<\/span> <span style=\"font-weight: 400;\">Furthermore, it aims to protect <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> Data and information against unauthorized access and accidental or unlawful situations of destruction, loss, alteration, communication or any form of improper or illicit processing.<\/span>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-4&#8243; css=&#8221;.vc_custom_1598555756427{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-2037\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-2037\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t4 - APPLICATION\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<span style=\"font-weight: 400;\">This Policy applies to all persons, natural or legal, employees, service providers, interns or personnel authorized to have access to information, Personal Data and\/or technology resources of <\/span><b>Epimed Solutions <\/b><span style=\"font-weight: 400;\">(\u201c<\/span><span style=\"font-weight: 400;\">Team Members<\/span><span style=\"font-weight: 400;\">\u201d), its customers and\/or Patients of Health Institutions, according to the permissions assigned to them.<\/span>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-5&#8243; css=&#8221;.vc_custom_1598556699767{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-6762\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-6762\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t5 - COMPUTER USERS\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<span style=\"font-weight: 400;\">All persons, natural or legal, collaborators, employees, service providers, self-employed professionals, temporary employees, interns, or personnel authorized to have access to information, Personal Data and\/or technology resources of <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\">, are recognized as users of the IT infrastructure, according to the permissions assigned to them.<\/span>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-6&#8243; css=&#8221;.vc_custom_1598556811421{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-1458\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-1458\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t6 - RESPONSIBILITIES\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> understands that the information security system will only be effective with the commitment of EVERYONE!<\/span><\/p>\n<p><b>6.1 Users must:<\/b><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Respect this Information Security Policy;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Respect Epimed&#8217;s Personal Data Protection and Privacy Policy, in order to guarantee the security and inviolability of Patient Data;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Respect all GDPR rules;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Respond for noncompliance with the procedures for processing Patient Data provided for in the Personal Data Protection and Privacy Policy;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Respond for the safekeeping and protection of the computational resources placed at their disposal for work purposes;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Respond for the exclusive and non-transferable use of their access passwords;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Activate their protection passwords for Electronic Mail and Operating System, under the guidance of Infrastructure Management;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Search for knowledge necessary for the proper use of hardware and software resources;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Promptly report to the IT area any fact or threat to the security of resources, such as breach of security, fragility, malfunction, presence of viruses, etc;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Ensure that the information and Data owned by <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\">, including Patient Data, are not made available to third parties, unless the written authorization of the line manager is given;<\/span><span style=\"font-weight: 400;\">Commit to not assisting any third party or causing an invasion of computers or the Data network, according to principles of the Directive 2013\/40\/EU;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Report to their line managers and the Infrastructure Management, the need for new software to perform their activities accordingly;<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Respond for the loss or damage that <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> or third parties may cause, due to non-compliance with the guidelines and standards referred to in this document.<\/span><\/li>\n<\/ul>\n<p><b>6.2 Line Managers must:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Support and ensure compliance with this Policy, serving as a model of conduct for team member under their management;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Assign, in the hiring and formalization phase of individual contract of employment, provision of services or partnership, the responsibility for complying with the Policy;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Authorize access and define the user&#8217;s profile as established by the Infrastructure Management;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Authorize changes to user&#8217;s profile as established by the Infrastructure Management;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Educate users about information security principles and procedures;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Immediately notify the Infrastructure Management of any vulnerabilities and threats to the breach of security;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ensure training for the proper use of computer resources and information systems;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Formally warn users and apply appropriate sanctions when they violate security principles or procedures, immediately reporting the fact to Infrastructure Management;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Obtain technical approval from Infrastructure Management before requesting the purchase of hardware, software or computer services;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Adapt the rules, processes, procedures and systems under management responsibility to comply with this Policy.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Respect Epimed&#8217;s Personal Data Protection and Privacy Policy;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Respect all GDPR rules;<\/span><\/li>\n<li style=\"font-weight: 400;\"><\/li>\n<\/ul>\n<p><b>6.3 The IT Area must:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Configure equipment and systems to comply with the requirements of this Policy;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Test the effectiveness of the controls used and inform managers of residual risks;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Restrict the existence of people who can exclude the audit logs and trails of their own actions;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ensure security of public access and maintain evidence that allows traceability for audit or investigation;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Generate and maintain audit trails with sufficient detail to track possible failures and fraud;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Administer, protect and test backup copies of programs and Data for <\/span><b>Epimed Solutions&#8217;<\/b><span style=\"font-weight: 400;\"> business;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Manage the disposal of information at the request of custodians;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ensuring that a user&#8217;s information is removed before the user is discarded or changed;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Plan, implement, supply and monitor the storage, processing and transmission capacity necessary to guarantee the security required by the business areas;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Create the logical identity of Team Members in the company;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Assign identifiable accounts and passwords to individuals for use of computers, systems, databases and any other information asset;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Protect all information assets of the company against malicious code and or viruses;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ensure that change processes do not allow vulnerabilities or weaknesses in the production environment;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Define formal rules for installing software and hardware, requiring compliance within the company;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Conduct periodic inspections of technical configurations and risk analysis;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Manage the use, handling and storage of signatures and digital certificates;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Guarantee, as soon as requested, the blocking of access for users due to termination from the company;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Propose development methodologies and specific processes that aim to increase information security;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Promote Team Member awareness regarding the relevance of information security;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Support the assessment and adequacy of information security controls for new systems or services;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Seek alignment with the company&#8217;s corporate guidelines;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Install protection systems that are preventive and detectable, to guarantee the information security and access perimeters;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Deploy monitoring systems on workstations, servers, electronic mail, internet connections, mobile or wireless devices and other network components. Thus, the information generated by these systems can be used to identify users and their accesses, as well as any material manipulated by them;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Monitor the IT environment, the installed capacity of the network and equipment, response time when accessing the internet and <\/span><b>Epimed Solutions&#8217;<\/b><span style=\"font-weight: 400;\"> critical systems, unavailability to critical systems, security incidents (viruses, Trojans, theft, improper access and so on; activity of all Team Member during access to external networks, including internet (for example: websites visited, received\/sent e-mails, uploaded\/downloaded files, among others);<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Make the information obtained by the monitoring and audit systems public, in the case of a judicial requirement, at the request of managers (or higher executive levels), according to the procedure published in the responsibility matrix;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Perform, at any time, physical inspection on the machines owned by the company and under their responsability.<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-7&#8243; css=&#8221;.vc_custom_1598556879259{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-6290\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-6290\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t7 - IDENTIFICATION \u2013 LOGIN AND PASSWORD\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Login and password systems protect the user&#8217;s identity, avoiding and preventing one person from impersonating another.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">If there is a login for use shared by more than one team member, the responsibility will be of the users who share it. If the manager&#8217;s request for shared use is identified, this person should be held responsible.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Users must have a password of variable length, with a minimum of 6 (six) alphanumeric characters, using special characters (@ # $%).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">It is the responsibility of each user to remember their own password, as well as to protect and guard the identification devices assigned to them.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Passwords must not be written down or stored in electronic files (Word, Excel, etc.), they must not be based on personal information, such as the person\u2019s name, family, birth, address, license plate, company name, and or they should not consist of obvious keyboard combinations, such as \u201cabcdefgh\u201d, \u201c123456\u201d, among others.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Users must change their password if they suspect of a breach by a third party or mandatorily every 4 months, otherwise they will have their access blocked automatically.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Login and Password must be immediately blocked when they become unnecessary.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Attempts to breach and circumvent access, encryption or biometric identification passwords, if identified, will be subject to disciplinary action.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">External access to the <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> information network outside working hours will be blocked.<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-8&#8243; css=&#8221;.vc_custom_1598556985893{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-1449\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-1449\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t8 - ACCESS REVIEW\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Every 6 (six) months, the Infrastructure Management must review the registered users to decide on the maintenance, review or revocation of the existing access profiles;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">In the event of transfers or changes in position, function or area, the access profiles are to be reviewed;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Access to information and Data will be restricted to certain access profiles defined by Infrastructure Management;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Access to Patients&#8217; Personal Data will be restricted and limited to what is strictly necessary for the fulfillment of the purpose of Treatment, so that only professionals essential to the functions may have the access allowed by Infrastructure Management.<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-9&#8243; css=&#8221;.vc_custom_1598557107463{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-1278\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-1278\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t9 - ACCESS REMOVAL\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The access of disconnected users of <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> must be removed immediately when the termination is notified by the Human Resources Department.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The removal of access must be registered so that it is possible to determine the date of occurrence, the affected users, as well as the revoked privileges.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The access credentials of users who ended their activities at <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> should not be removed from the registration bases, but must be blocked in a way that it is not possible to use them.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Records must be kept to identify the users responsible for the actions carried out using specific access credentials, even after they are blocked.<\/span><\/li>\n<li style=\"font-weight: 400;\"><\/li>\n<\/ul>\n<p>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-10&#8243; css=&#8221;.vc_custom_1598557164134{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-9540\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-9540\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t10 - COMPUTER RESOURCES\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The IT resources allocated by <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> to its users are used exclusively for work-related activities, and their use for personal purposes is prohibited.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Team Members of <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> are prohibited from using technology equipment, such as computers, tablets, notebooks, netbooks and the like, which are privately owned on the company&#8217;s facilities.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">User intervention for physical or logical maintenance, installation, uninstallation, configuration or modification, as well as the transfer and\/or dissemination of any software, programs or computer instructions to third parties (piracy) is prohibited.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Any computer that is not being used must be sent to the IT area for the removal of information, discard or reuse.<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1598563411169{padding-top: 25px !important;}&#8221; el_id=&#8221;policy-section-11&#8243;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-8722\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-8722\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t11 - CLEAN DESK AND CLEAR SCREEN\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The wallpapers and screen savers of all computers must follow <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> standards.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The user must ensure that documents, media and images on the monitors are not exposed to unauthorized access.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Computers must be password protected when not in use.<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1598563421761{padding-top: 25px !important;}&#8221; el_id=&#8221;policy-section-12&#8243;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-8722\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-8722\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t12 - DESTRUCTION OF MEDIA AND DATA\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Media containing information regarding <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> must be destroyed before being discarded.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">CD\u2019s, DVD\u2019s, and paper documents must be shredded before being thrown away in the trash. HD\u2019s must be sent to the IT Department for destruction of information prior to disposal or reuse.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The Data stored in the <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> database will be discarded in the event of a specific order from the Health Institutions, or in the event of the termination of <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> contractual relationship with the Health Institution, according to the Personal Data Protection and Privacy Policy.<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1598563440074{padding-top: 25px !important;}&#8221; el_id=&#8221;policy-section-13&#8243;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-1914\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-1914\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t13 - CONTROL AND RESTRICTION OF USE OF REMOVABLE MEDIA\/USB PORTS.\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> blocks the use of removable media by default on all workstations.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">When it is necessary to use removable media, the user must open a request with the infrastructure department via a ticket channel (ServiceDesk), which will request approvals necessary for the temporary release of the resource for the specific user. <\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1598563452907{padding-top: 25px !important;}&#8221; el_id=&#8221;policy-section-14&#8243;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-2736\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-2736\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t14 - CLASSIFICATION OF INFORMATION\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The manager of each area must establish the criteria related to the level of confidentiality of the information generated by their area and classify them as Public, Confidential, Restricted or Internal. Patient Data will always be classified as confidential and restricted, receiving special treatment to protect confidentiality.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The information classification process must start with the definition of the necessary degree of protection, based on the four levels of confidentiality defined below:<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">CONFIDENTIAL: Sensitive information that must be kept confidential and handled only by authorized personnel. Information leakage with this classification has an impact on the company and the business as a whole.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">RESTRICTED: Information whose access and handling are only for authorized personnel. If they are disclosed incorrectly, they affect the continuity of one or more of the company&#8217;s business processes. Information Leakage with this classification has an impact on one or more areas within the company.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">INTERNAL: Information with low sensitivity, but that should only circulate internally, not being publicly accessible.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">PUBLIC: Information that may be public knowledge and has no disclosure restrictions.<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1598563467717{padding-top: 25px !important;}&#8221; el_id=&#8221;policy-section-15&#8243;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-5115\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-5115\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t15 - ANTIVIRUS\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\">, through Infrastructure Management, provides installed corporate antivirus software to all users.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The antivirus is automatically updated on the user&#8217;s workstation whenever a new version is made available by the manufacturer through the server application.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Epimed Solutions&#8217;<\/b><span style=\"font-weight: 400;\"> IT department does not recommend that the user remove or change the antivirus settings in order not to compromise the security that the software manufacturer provides.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Periodic checks of the hard drive and workstation are scheduled to run automatically according to IT area definitions in the server application.<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1598563481880{padding-top: 25px !important;}&#8221; el_id=&#8221;policy-section-16&#8243;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-4272\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-4272\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t16 - FILE STORAGE\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">All files contained on users&#8217; network servers or workstations must be of interest to <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> only.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">The creation of personal folders on network servers is prohibited.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">The creation of departmental folders on network servers should reflect the organizational structure of <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> and be requested by the line manager to Infrastructure Management.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Access to departmental folders on network servers requires authorization from the line manager and Infrastructure Management to control the access of each user.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">All files that are not of interest to <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> should be excluded from the equipment\/devices to avoid future problems with audits.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Information classified as CONFIDENTIAL must be stored in an encrypted environment.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The storage of files on the network servers or workstations of <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> users must comply with the rules of the GDPR and the guidelines of this Policy and the Personal Data Protection and Privacy Policy. <\/span>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1598563494593{padding-top: 25px !important;}&#8221; el_id=&#8221;policy-section-17&#8243;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-8245\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-8245\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t17 - BACKUP POLICY\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Epimed&#8217;s Backup policy contemplates the accomplishment of 1 (one) weekly full backup and daily incremental backups of the entire environment with a 30-day retention period.\u00a0<\/span><\/li>\n<li><span style=\"font-weight: 400;\">All backups are performed in Epimed&#8217;s parallel environment storage system, which provide us with a greater speed for validating backups, as well as for restoring Data if necessary.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">If there is any request from Patients or Health Institutions to delete the Data from the <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> database, all Personal Patient Data stored will be erased from any backup, network server, parallel environment storage system and\/or from workstations of <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> users, in accordance with GDPR rules, guidelines of this Policy and the Personal Data Protection and Privacy Policy.<\/span>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1598563504999{padding-top: 25px !important;}&#8221; el_id=&#8221;policy-section-18&#8243;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-9345\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-9345\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t18 - SAFEKEEPING\/ARCHIVING OF FILES\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Infrastructure Management is responsible for creating and maintaining backup copies (backups) exclusively of the Data stored on network servers.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Users must keep <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> documents, spreadsheets, e-mails, presentations, drawings and other critical Data in the departmental folders of network servers.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Users are responsible for the backup and storage of recorded Data from their local workstations.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Patient Personal Data is, under all circumstances, restricted and confidential, and access by persons not authorized by Infrastructure Management is prohibited. It is not permitted to store Personal Patient Data in departmental folders of network servers or at users&#8217; local workstations. It must be stored in places with protection of confidentiality, with limited access to what is strictly necessary and to authorized personnel, as described under Item 8 of this Policy.<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1598563518592{padding-top: 25px !important;}&#8221; el_id=&#8221;policy-section-19&#8243;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-3664\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-3664\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t19 - INTERNET USE\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The internet was installed to facilitate the search for information and streamline certain processes of <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\">. The personal use of this tool is prohibited.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Users are fully liable for internet misuse, and they can be held legally responsible for any damage caused.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The audit of the accesses to the Internet brings reports to line managers with the names of users, pages consulted, consultation time and the content browsed.<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1598563530356{padding-top: 25px !important;}&#8221; el_id=&#8221;policy-section-20&#8243;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-4336\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-4336\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t20 - GAMES\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<span style=\"font-weight: 400;\">Games are strictly prohibited.<\/span>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1598563541724{padding-top: 25px !important;}&#8221; el_id=&#8221;policy-section-21&#8243;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-9441\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-9441\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t21 - PIRATED SOFTWARE\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Software approved and installed on computers and network servers are the exclusive property of <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\">, and full copies, or even partial ones, as well as the installation of pirated software are prohibited.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Piracy is considered a crime and pirated software causes both material and functional damage, in addition to harming the Institution&#8217;s image. For this reason, such actions are strictly prohibited.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The installation of unauthorized software (\u201cPiracy\u201d) is a crime against intellectual property, and the offender is subject to imprisonment and fines according to the local legislation.<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1598563567384{padding-top: 25px !important;}&#8221; el_id=&#8221;policy-section-22&#8243;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-7626\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-7626\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t22 - SERVER AND USER EQUIPMENT CONFIGURATIONS\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">All Server deployments are based on a standard template for each environment and distributed through the <\/span><b>VMware<\/b><span style=\"font-weight: 400;\"> Image Management system.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Workstation Operating Systems are made available through the distribution and configuration tool of the<\/span><b> Kaspersky Security for Business &#8211; Advanced<\/b><span style=\"font-weight: 400;\"> platform.<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1598563580857{padding-top: 25px !important;}&#8221; el_id=&#8221;policy-section-23&#8243;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-9067\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-9067\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t23 - E-MAIL AND INSTANT MESSAGES\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The use of e-mails or instant messages in a manner that is contrary to the law, morals, good customs, public order or that infringes the rights to intellectual or industrial property of third parties is prohibited.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The content and use of e-mails or instant messages must be exclusively professional.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Instant messaging services are allowed only for users authorized by the <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> management.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The protection and confidentiality of the attached content is the exclusive responsibility of the user, and <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> is exempt from such obligation.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The use of e-mail, instant messaging and internal mail software not approved by Infrastructure Management is prohibited. The use of the tools mentioned above is the user&#8217;s responsibility and may pose risks to information security, in addition to hindering technical support.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Any mass communications, advertisements, newsletters, images, and the like, must be previously approved by Infrastructure Management, in order not to be treated as Spam or compromise the functioning of e-mail systems.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\u00a0Messages received from unknown sources must be previously viewed and eliminated immediately, without reading their content, to avoid contamination by viruses and other risks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Users are fully liable for the misuse of e-mails, and they can be held legally responsible for any damage caused.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Under no circunstances, will <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> be liable to any users or third parties for the loss of messages and\/or their content.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The fact that the team member respond to emails outside office hours will not qualify as overtime. For this to happen, it is necessary that <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> demanded, in the request formally sent by e-mail, the accomplishment of such task outside of working hours.<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1598563592815{padding-top: 25px !important;}&#8221; el_id=&#8221;policy-section-24&#8243;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-4113\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-4113\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t24 - AUDITS\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Audits will be carried out and reports will be generated periodically or according to requests following IT procedures.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Remote access, or auditing of local Data, with authorization from the Team Member&#8217;s directors or management, when performed on the Team Member&#8217;s equipment, does not characterize invasion, as the equipment is owned by the company and all information contained in there is the property of <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\">, since users are prohibited from saving personal Data on <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> IT equipment.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">The Board of <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> may request from Infrastructure Management audit reports containing the name, messages exchanged, access to the internet and other user information, provided it is duly based in a potential risk.<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1598563634174{padding-top: 25px !important;}&#8221; el_id=&#8221;policy-section-25&#8243;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-4501\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-4501\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t25 - LOG MANAGEMENT\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> has Log Management Tools, developed internally and third-party solutions such as <\/span><b>ApexSQL Log<\/b><span style=\"font-weight: 400;\"> that allow the identification of all actions performed by users, team members and their systems.<\/span>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1598563646677{padding-top: 25px !important;}&#8221; el_id=&#8221;policy-section-26&#8243;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-8211\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-8211\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t26 - REMOTE OFFICE ACCESS\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Remote access to equipment, software, databases, information, Data, computer programs, e-mails, electronic channels\/addresses, or to any type of file or information existing at <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> facilities (\u201cOffice\u201d), or auditing of local Data, with the authorization from the board or the Team Members\u2019 manager; when carried out on the equipment used by Team Members for the exercise of their function at <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\">, does not characterize invasion, as the equipment is owned by the company, and all information contained therein is the property of <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\">, provided that users are prohibited from saving personal Data and files on <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> IT equipment.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Remote access to information and Data at the <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> Office will be restricted, being treated as an exception, one of which will only be allowed with the prior and exclusive authorization from the Board of <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\">.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The restriction on remote access to the Office is in line with the best practices for information security adopted by <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\">, being a measure for the protection of Data confidentiality applied in compliance with the GDPR and the Personal Data Protection and Privacy Policy.<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1598563658436{padding-top: 25px !important;}&#8221; el_id=&#8221;policy-section-27&#8243;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-8173\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-8173\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t27 - REMOTE DATA CENTER ACCESS\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Remote access to the servers allocated in <\/span><b>Epimed Solutions&#8217;<\/b><span style=\"font-weight: 400;\"> data center (\u201cData Center\u201d) is performed through VPN &#8211; Virtual Private Network connection, (originated from <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> physical facilities).\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">All accesses are performed only by team members of <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\">.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Access control is linked to the network profile of each team member previously authorized by each responsible area.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Remote access to <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\"> Data Center will be restricted, being treated as an exception, one of which will only be allowed with the prior and exclusive authorization from the Board of <\/span><b>Epimed Solutions<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li aria-level=\"1\">The restriction on remote access to the Data Center is in line with the best practices for information security adopted by <b>Epimed Solutions<\/b>, being a measure for the protection of Data confidentiality applied in compliance with the GDPR and the Personal Data Protection and Privacy Policy.<\/li>\n<\/ul>\n<p>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1598563673479{padding-top: 25px !important;}&#8221; el_id=&#8221;policy-section-28&#8243;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-7784\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-7784\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t28 - OMITTED CASES\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Before taking actions that may present a potential risk to <\/span><b>Epimed Solutions&#8217;<\/b><span style=\"font-weight: 400;\"> information and systems, users should consult this Policy and the Personal Data Protection and Privacy Policy, in order to make sure that the activity to be performed is lawful and safe.<\/span> <span style=\"font-weight: 400;\">Unforeseen cases, doubts about information security or regarding the use of software should be referred to the Infrastructure Management area.<\/span><b>\u00a0<\/b><\/li>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">Special situations and\/or requests for exceptions to this Policy must be evaluated by the Executive Board for deliberation, under penalty of violation of the rules and application of fines provided for in Item 29.<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1598563683775{padding-top: 25px !important;}&#8221; el_id=&#8221;policy-section-29&#8243;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-4258\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-4258\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t29 - COMPLIANCE\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Users must be aware of and follow the recommendations of this Policy, interpreting the classification attributed to the information and Data, and ensuring that they receive adequate processing.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Misuse of technology resources characterizes an information security incident and may result in the application of legal and\/or administrative sanctions, depending on the severity and<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">impact of the incident for Epimed Solutions.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Violations of the provisions established in this Policy, if duly verified, may imply:<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">In the application of the sanctions provided for in the labor legislation;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">In applying the sanctions provided for in the GDPR;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">In applying the sanctions provided for in the contract signed by service providers and interns; and<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">In the application of appropriate legal procedures.<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1598563693643{padding-top: 25px !important;}&#8221; el_id=&#8221;policy-section-30&#8243;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;]<div class=\"mkdf-elements-holder   mkdf-one-column  mkdf-responsive-mode-768 \" ><div class=\"mkdf-eh-item    \"  data-item-class=\"mkdf-eh-custom-8702\">\n\t<div class=\"mkdf-eh-item-inner\">\n\t\t<div class=\"mkdf-eh-item-content mkdf-eh-custom-8702\" style=\"padding: 25px\">\n\t\t\t<div class=\"mkdf-section-title-holder  mkdf-st-standard mkdf-st-title-left mkdf-st-normal-space \" >\n\t<div class=\"mkdf-st-inner\">\n\t\t\t\t\t<h4 class=\"mkdf-st-title\" >\n\t\t\t\t30 - FINAL PROVISIONS\t\t\t<\/h4>\n\t\t\t\t\t<\/div>\n<\/div>[vc_column_text]<\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">Safety, just like ethics, must be understood as fundamental part of <\/span><b>Epimed Solutions&#8217;<\/b><span style=\"font-weight: 400;\"> internal culture. In other words, any security incident is understood as someone acting against the ethics and good manners that govern the institution.<\/span><\/li>\n<li aria-level=\"1\"><span style=\"font-weight: 400;\">All practices that threaten information security will be dealt with through the application of disciplinary actions, from verbal warnings to terminations of contract with cause, taking into account factors such as: role performed by the team members, period used, place of use, time of use, actual or potential loss caused to Epimed Solutions, among others.<\/span><\/li>\n<\/ul>\n<p>[\/vc_column_text]\t\t<\/div>\n\t<\/div>\n<\/div><\/div>[\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row]<\/p>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>[vc_row el_id=&#8221;policy-section-summary&#8221;][vc_column width=&#8221;3\/12&#8243;][vc_raw_html]JTVCY2Etc2lkZWJhciUyMGlkJTNEJTIyMTg1ODYlMjIlNUQlMjA=[\/vc_raw_html][\/vc_column][vc_column width=&#8221;7\/12&#8243;][\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-1&#8243; css=&#8221;.vc_custom_1598555296159{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-2&#8243; css=&#8221;.vc_custom_1598555405295{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-3&#8243; css=&#8221;.vc_custom_1598555420662{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-4&#8243; css=&#8221;.vc_custom_1598555756427{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;][\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-5&#8243; css=&#8221;.vc_custom_1598556699767{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;][\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-23830","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>Information Security Policy - Epimed Solutions<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.epimedsolutions.com\/en\/information-security-policy\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Information Security Policy - Epimed Solutions\" \/>\r\n<meta property=\"og:description\" content=\"[vc_row el_id=&#8221;policy-section-summary&#8221;][vc_column width=&#8221;3\/12&#8243;][vc_raw_html]JTVCY2Etc2lkZWJhciUyMGlkJTNEJTIyMTg1ODYlMjIlNUQlMjA=[\/vc_raw_html][\/vc_column][vc_column width=&#8221;7\/12&#8243;][\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-1&#8243; css=&#8221;.vc_custom_1598555296159{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-2&#8243; css=&#8221;.vc_custom_1598555405295{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-3&#8243; css=&#8221;.vc_custom_1598555420662{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-4&#8243; css=&#8221;.vc_custom_1598555756427{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;][\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-5&#8243; css=&#8221;.vc_custom_1598556699767{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;][\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row [&hellip;]\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.epimedsolutions.com\/en\/information-security-policy\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Epimed Solutions\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/epimed\/\" \/>\r\n<meta property=\"article:modified_time\" content=\"2021-11-11T10:53:51+00:00\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:site\" content=\"@epimed\" \/>\r\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"21 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.epimedsolutions.com\/en\/information-security-policy\/\",\"url\":\"https:\/\/www.epimedsolutions.com\/en\/information-security-policy\/\",\"name\":\"Information Security Policy - Epimed Solutions\",\"isPartOf\":{\"@id\":\"https:\/\/www.epimedsolutions.com\/en\/#website\"},\"datePublished\":\"2020-08-27T20:05:40+00:00\",\"dateModified\":\"2021-11-11T10:53:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.epimedsolutions.com\/en\/information-security-policy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.epimedsolutions.com\/en\/information-security-policy\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.epimedsolutions.com\/en\/information-security-policy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/www.epimedsolutions.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.epimedsolutions.com\/en\/#website\",\"url\":\"https:\/\/www.epimedsolutions.com\/en\/\",\"name\":\"Epimed Solutions\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.epimedsolutions.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.epimedsolutions.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.epimedsolutions.com\/en\/#organization\",\"name\":\"Epimed Solutions\",\"url\":\"https:\/\/www.epimedsolutions.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.epimedsolutions.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/epimedsolutions.com\/wp-content\/uploads\/2020\/04\/logo-epimed-1.png\",\"contentUrl\":\"https:\/\/epimedsolutions.com\/wp-content\/uploads\/2020\/04\/logo-epimed-1.png\",\"width\":400,\"height\":193,\"caption\":\"Epimed Solutions\"},\"image\":{\"@id\":\"https:\/\/www.epimedsolutions.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/epimed\/\",\"https:\/\/x.com\/epimed\",\"https:\/\/www.instagram.com\/epimedsolutions\/\",\"https:\/\/www.youtube.com\/user\/epimedsolutions\/\"]}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security Policy - Epimed Solutions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.epimedsolutions.com\/en\/information-security-policy\/","og_locale":"en_US","og_type":"article","og_title":"Information Security Policy - Epimed Solutions","og_description":"[vc_row el_id=&#8221;policy-section-summary&#8221;][vc_column width=&#8221;3\/12&#8243;][vc_raw_html]JTVCY2Etc2lkZWJhciUyMGlkJTNEJTIyMTg1ODYlMjIlNUQlMjA=[\/vc_raw_html][\/vc_column][vc_column width=&#8221;7\/12&#8243;][\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-1&#8243; css=&#8221;.vc_custom_1598555296159{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-2&#8243; css=&#8221;.vc_custom_1598555405295{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-3&#8243; css=&#8221;.vc_custom_1598555420662{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;1\/4&#8243;][\/vc_column][vc_column width=&#8221;1\/2&#8243;][\/vc_column][vc_column width=&#8221;1\/4&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-4&#8243; css=&#8221;.vc_custom_1598555756427{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;][\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row el_id=&#8221;policy-section-5&#8243; css=&#8221;.vc_custom_1598556699767{padding-top: 25px !important;}&#8221;][vc_column width=&#8221;3\/12&#8243;][\/vc_column][vc_column width=&#8221;7\/12&#8243;][\/vc_column][vc_column width=&#8221;2\/12&#8243;][\/vc_column][\/vc_row][vc_row [&hellip;]","og_url":"https:\/\/www.epimedsolutions.com\/en\/information-security-policy\/","og_site_name":"Epimed Solutions","article_publisher":"https:\/\/www.facebook.com\/epimed\/","article_modified_time":"2021-11-11T10:53:51+00:00","twitter_card":"summary_large_image","twitter_site":"@epimed","twitter_misc":{"Est. reading time":"21 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.epimedsolutions.com\/en\/information-security-policy\/","url":"https:\/\/www.epimedsolutions.com\/en\/information-security-policy\/","name":"Information Security Policy - Epimed Solutions","isPartOf":{"@id":"https:\/\/www.epimedsolutions.com\/en\/#website"},"datePublished":"2020-08-27T20:05:40+00:00","dateModified":"2021-11-11T10:53:51+00:00","breadcrumb":{"@id":"https:\/\/www.epimedsolutions.com\/en\/information-security-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.epimedsolutions.com\/en\/information-security-policy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.epimedsolutions.com\/en\/information-security-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/www.epimedsolutions.com\/en\/"},{"@type":"ListItem","position":2,"name":"Information Security Policy"}]},{"@type":"WebSite","@id":"https:\/\/www.epimedsolutions.com\/en\/#website","url":"https:\/\/www.epimedsolutions.com\/en\/","name":"Epimed Solutions","description":"","publisher":{"@id":"https:\/\/www.epimedsolutions.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.epimedsolutions.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.epimedsolutions.com\/en\/#organization","name":"Epimed Solutions","url":"https:\/\/www.epimedsolutions.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.epimedsolutions.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/epimedsolutions.com\/wp-content\/uploads\/2020\/04\/logo-epimed-1.png","contentUrl":"https:\/\/epimedsolutions.com\/wp-content\/uploads\/2020\/04\/logo-epimed-1.png","width":400,"height":193,"caption":"Epimed Solutions"},"image":{"@id":"https:\/\/www.epimedsolutions.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/epimed\/","https:\/\/x.com\/epimed","https:\/\/www.instagram.com\/epimedsolutions\/","https:\/\/www.youtube.com\/user\/epimedsolutions\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.epimedsolutions.com\/en\/wp-json\/wp\/v2\/pages\/23830","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.epimedsolutions.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.epimedsolutions.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.epimedsolutions.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.epimedsolutions.com\/en\/wp-json\/wp\/v2\/comments?post=23830"}],"version-history":[{"count":0,"href":"https:\/\/www.epimedsolutions.com\/en\/wp-json\/wp\/v2\/pages\/23830\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.epimedsolutions.com\/en\/wp-json\/wp\/v2\/media?parent=23830"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}