26 Apr

Information security incidents can be reported by any Stone user or identified by areas of Information Technology “IT”.

Cybersecurity Plan Protect information from unauthorized access, modification, destruction or disclosure. Provide the appropriate classification of information, under the criteria of confidentiality, availability and integrity.

See more: IT Technicians

Ensure that the resources used for the performance of its function are used only for the purposes approved by Stone.Ensure that the systems and information under Stone's responsibility are adequately protected.

Ensure continuity in the processing of critical business information.Select information security mechanisms, balancing risk, technology and cost factors.Immediately report any breaches of the Corporate Cyber Security Policy to the Information Security area.Environmental ProtectionControls and responsibilities must be established for the management and operation of information processing resources that guarantee security in the technological infrastructure of local networks and the Internet, through effective management in monitoring, handling and responding to incidents, to minimize the risk of failures and the secure administration of communications networks, including the management of contracted services for processing and storing data and information in the cloud.Physical and Logical SecurityCritical or sensitive information processing equipment and facilities must be maintained in secure areas, with appropriate levels and access controls, including protection against physical and environmental threats.The security requirements of information systems must be identified and agreed before their development and / or implementation, so that they can be protected in order to maintain their confidentiality, integrity and availability.

Comments
* The email will not be published on the website.
I BUILT MY SITE FOR FREE USING