{"id":35235,"date":"2025-11-05T17:04:20","date_gmt":"2025-11-05T20:04:20","guid":{"rendered":"https:\/\/site.senior.com.br\/en\/?page_id=35235"},"modified":"2025-11-07T11:59:18","modified_gmt":"2025-11-07T14:59:18","slug":"information-security-policy","status":"publish","type":"page","link":"https:\/\/site.senior.com.br\/en\/information-security-policy\/","title":{"rendered":"Information Security Policy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"35235\" class=\"elementor elementor-35235\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5bc08c2f e-flex e-con-boxed e-con e-parent\" data-id=\"5bc08c2f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6f86c4b0 e-con-full e-flex e-con e-child\" data-id=\"6f86c4b0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-412df70e elementor-widget elementor-widget-heading\" data-id=\"412df70e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Information Security Policy<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58e7a4a1 elementor-widget elementor-widget-heading\" data-id=\"58e7a4a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Last Update: October 2025.<br>\nInformation Classification: Public Use.<\/br>\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7b74a0d4 e-flex e-con-boxed e-con e-parent\" data-id=\"7b74a0d4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-28dc2288 e-con-full e-flex e-con e-child\" data-id=\"28dc2288\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-25a78ce0 elementor-widget elementor-widget-heading\" data-id=\"25a78ce0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Definition<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6edb5982 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"6edb5982\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">This document describes guidelines on the Information Security Policy of Grupo Senior, whose rules and procedures are confidential and published internally. Such guidelines define the acceptable use of the institution\u2019s information assets, based on the principles of confidentiality, integrity, and availability.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-400f24cd e-con-full e-flex e-con e-child\" data-id=\"400f24cd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2941a8c3 elementor-widget elementor-widget-heading\" data-id=\"2941a8c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Target Audience<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78754c89 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"78754c89\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Grupo Senior, Third Parties, Service Providers, Clients, Partners, and Channels.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-766bcd8b e-con-full e-flex e-con e-child\" data-id=\"766bcd8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-43c0a33 elementor-widget elementor-widget-heading\" data-id=\"43c0a33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Objective<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5629df3c elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"5629df3c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u2022\tEstablish Information Security guidelines and standards that enable Senior employees to adopt secure behavior patterns, suitable for their goals and needs;<br>\n\u2022\tGuide employees in adopting controls and processes to meet Information Security requirements;<br>\n\u2022\tTrain Senior employees regarding prevention, detection, and response to Information Security incidents;<br>\n\u2022\tPrevent possible causes of Information Security incidents;<br>\n\u2022\tProtect Senior's information and\/or technological assets, ensuring confidentiality, integrity, and availability requirements;<br>\n\u2022\tMinimize risks of financial loss, loss of customer trust, or any other negative impact on Senior\u2019s business as a result of security failures.\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7f645de6 e-con-full e-flex e-con e-child\" data-id=\"7f645de6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3da78054 elementor-widget elementor-widget-heading\" data-id=\"3da78054\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Responsibilities<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72d84d0 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"72d84d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Information Security Policy of Grupo Senior addresses the general responsibilities of the institution, its employees, third parties, and Senior Management.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-69f5ef4f e-con-full e-flex e-con e-child\" data-id=\"69f5ef4f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1620a6a5 elementor-widget elementor-widget-heading\" data-id=\"1620a6a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Information Security Awareness and Training<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3bc0cbd5 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"3bc0cbd5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Grupo Senior defines continuous education guidelines for the cultivation of good security practices to be used in employees' daily activities, both professionally and personally. The Policy covers procedures used in the institution\u2019s awareness program, such as internal training and communications.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-78c317df e-con-full e-flex e-con e-child\" data-id=\"78c317df\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-106cbb8f elementor-widget elementor-widget-heading\" data-id=\"106cbb8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Information Security Risk Management<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51e00d16 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"51e00d16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber risk management is the responsibility of the Information Security area. This process identifies security requirements related to the institution\u2019s needs. Cyber risk management is continuous and defines internal and external contexts for evaluation, in addition to treating identified risks so that they are reduced to acceptable levels.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-43672155 e-con-full e-flex e-con e-child\" data-id=\"43672155\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-595c10dc elementor-widget elementor-widget-heading\" data-id=\"595c10dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Password Management<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-675a7f3e elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"675a7f3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Grupo Senior uses best practices for password usage, requiring a defined level of complexity to create them, as well as preventing the reuse of previous passwords.\nPasswords are generated with a minimum number of required characters, are subject to lockout after failed attempts, and must be changed periodically.\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3253dc16 e-con-full e-flex e-con e-child\" data-id=\"3253dc16\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fc2db33 elementor-widget elementor-widget-heading\" data-id=\"fc2db33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Asset Management<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18b460e elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"18b460e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Grupo Senior keeps its information assets identified, updated, classified, and assigned with responsible owners for their acceptable use, in accordance with internal policy.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-33a22a82 e-con-full e-flex e-con e-child\" data-id=\"33a22a82\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-59aed6dc elementor-widget elementor-widget-heading\" data-id=\"59aed6dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Information Protection and Classification<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7fe14abd elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"7fe14abd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Grupo Senior establishes guidelines for classifying, handling, and labeling the company\u2019s information assets. The internal document outlines all guidelines used for information classification, describes its categories, includes handling and disposal procedures, describes rules on data leakage prevention, data backup and restore policies, as well as encryption.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-50cdb0da e-con-full e-flex e-con e-child\" data-id=\"50cdb0da\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-26fcef72 elementor-widget elementor-widget-heading\" data-id=\"26fcef72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Acceptable Use of Technological Resources<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58451595 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"58451595\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Grupo Senior\u2019s technological resources must be used in a professional, ethical, and legal manner, as defined in the applicable responsibility agreement. The Information Security Policy defines the technological resources and the rules regarding their usage, which must be followed by employees and third parties at Senior.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5ef5ad27 e-con-full e-flex e-con e-child\" data-id=\"5ef5ad27\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-41a7f932 elementor-widget elementor-widget-heading\" data-id=\"41a7f932\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Identity and Access Management<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-78ac5ea7 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"78ac5ea7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Grupo Senior establishes general guidelines for accessing information assets and systems. All access management is the responsibility of the IT department and is based on the principle of access necessity for employees to perform their work activities.\nThe Policy defines guidelines such as:<br>\n\u2022\tBusiness Area Access Profiles;<br>\n\u2022\tEmployee Onboarding or Department Transfer Processes;<br>\n\u2022\tEmployee Offboarding Process;<br>\n\u2022\tThird-Party, Visitor, and Temporary Access;<br>\n\u2022\tDatabase Access;<br>\n\u2022\tRemote Access;<br>\n\u2022\tPhysical Access;<br>\n\u2022\tAccess Review;<br>\n\u2022\tPassword Settings; and<br>\n\u2022\tMulti-Factor Authentication.\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8c579 e-con-full e-flex e-con e-child\" data-id=\"8c579\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4b8d8e61 elementor-widget elementor-widget-heading\" data-id=\"4b8d8e61\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Encryption<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-418db206 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"418db206\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Senior\u2019s information assets are encrypted appropriately to ensure protection throughout the information lifecycle, in compliance with regulatory security standards.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6b312fe9 e-con-full e-flex e-con e-child\" data-id=\"6b312fe9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5717549c elementor-widget elementor-widget-heading\" data-id=\"5717549c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Software Development<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14440aae elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"14440aae\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Grupo Senior develops its applications in accordance with internal procedures, documents, and work instructions, following information security practices aligned with the internal Security Policy.\nProduction environments are segregated from other environments, and access is granted only to previously authorized users or approved tools.\nAll systems or applications purchased from third parties must follow the guidelines defined in the Information Security Policy and be properly approved.\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1728006a e-con-full e-flex e-con e-child\" data-id=\"1728006a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4e4ca903 elementor-widget elementor-widget-heading\" data-id=\"4e4ca903\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protection Against Malicious Code<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21335ab1 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"21335ab1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Senior defines guidelines and uses industry-leading tools for protection against malicious code (malware). In addition, Grupo Senior uses AI-based security solutions to identify, detect, and immediately respond to threats.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-48c6275e e-con-full e-flex e-con e-child\" data-id=\"48c6275e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ae42f93 elementor-widget elementor-widget-heading\" data-id=\"5ae42f93\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Monitoring<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-45893709 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"45893709\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Information Security Policy covers security monitoring, describing the necessary aspects for identifying potential threats. Grupo Senior relies on effective practices, procedures, and processes to monitor security-related activities.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-286017fe e-con-full e-flex e-con e-child\" data-id=\"286017fe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5518fecb elementor-widget elementor-widget-heading\" data-id=\"5518fecb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Remote Work<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8819173 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"8819173\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Grupo Senior imposes requirements for remote work, such as the use of Virtual Private Network (VPN).<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-26facf4e e-con-full e-flex e-con e-child\" data-id=\"26facf4e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c39f70 elementor-widget elementor-widget-heading\" data-id=\"3c39f70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Vulnerability and Compliance Management<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-564f32eb elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"564f32eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Grupo Senior has vulnerability and compliance management processes, with the following established guidelines:<br>\n\u2022\tVulnerability Management;<br>\n\u2022\tCompliance Management;<br>\n\u2022\tPeriodic Security Testing; and<br>\n\u2022\tSecurity Patch Management.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3c33cdc7 e-con-full e-flex e-con e-child\" data-id=\"3c33cdc7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-40aa9526 elementor-widget elementor-widget-heading\" data-id=\"40aa9526\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Backup<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3193cee6 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"3193cee6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Grupo Senior uses Backup and Disaster Recovery solutions to protect its data against loss of information.\nPeriodic tests are performed to ensure data integrity, verify process effectiveness, and promote improvements.\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2c37b47 e-con-full e-flex e-con e-child\" data-id=\"2c37b47\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1478eb53 elementor-widget elementor-widget-heading\" data-id=\"1478eb53\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Incident Response<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5054136b elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"5054136b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Grupo Senior defines guidelines to prevent, respond, and properly handle security incidents that impact or may impact the institution\u2019s information assets\/services or technological resources.\nThis topic covers responsibilities of different areas in incident prevention and response.\nThe Policy also describes rules on prioritization and severity regarding possible incidents, procedures on authority designation, and rules for developing business continuity test scenarios.\nIt is worth noting that Grupo Senior has an Incident Response Plan, containing methodology and guidelines for handling cybersecurity incidents.\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-533b1f52 e-con-full e-flex e-con e-child\" data-id=\"533b1f52\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3612e0b4 elementor-widget elementor-widget-heading\" data-id=\"3612e0b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Business Continuity Management<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c9712f elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"7c9712f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Grupo Senior performs business continuity management with solutions, strategies, and procedures to be executed during contingency scenarios aligned with the institution\u2019s purpose and strategic goals. To this end, Senior maintains a Business Continuity Plan (BCP) defined in internal documents.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-37b0ad15 e-con-full e-flex e-con e-child\" data-id=\"37b0ad15\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-63e873f8 elementor-widget elementor-widget-heading\" data-id=\"63e873f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Third-Party Management<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5fded654 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"5fded654\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Grupo Senior establishes guidelines for third-party professionals in its premises or for service contracting.\nGrupo Senior has additional due diligence rules for relevant third parties, defined as those who store or process critical data in non-Senior technology infrastructure.\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2d884138 e-con-full e-flex e-con e-child\" data-id=\"2d884138\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-59dba521 elementor-widget elementor-widget-heading\" data-id=\"59dba521\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Mobile Device Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e6b808c elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"6e6b808c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Grupo Senior defines guidelines for the secure use of mobile devices, as well as the responsibilities of the areas in charge of monitoring.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2fd00e1b e-con-full e-flex e-con e-child\" data-id=\"2fd00e1b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-54ea32b1 elementor-widget elementor-widget-heading\" data-id=\"54ea32b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Network Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2da6feb elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"2da6feb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Grupo Senior maintains security tools capable of detecting and responding to intrusion attempts in its environment. This topic also includes rules for corporate and public wireless networks.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3762591e e-con-full e-flex e-con e-child\" data-id=\"3762591e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5f597a03 elementor-widget elementor-widget-heading\" data-id=\"5f597a03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Personal Data Privacy<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5725d8cf elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"5725d8cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Grupo Senior ensures that the purpose of processing personal data is neither unlawful nor abusive, and guarantees fundamental privacy rights according to LGPD \u2013 Brazilian General Data Protection Law (Law No. 13.709, August 14, 2018).<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-38e0aa7 e-con-full e-flex e-con e-child\" data-id=\"38e0aa7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-47c260c9 elementor-widget elementor-widget-heading\" data-id=\"47c260c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Sanctions and Penalties<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c49823c elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"2c49823c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Information Security area continuously monitors the technological environment through various methods to ensure compliance with this Policy. In case of violation of the rules stated herein, as well as other Information Security norms and procedures, even by omission or attempted actions, such violation may be classified as an Information Security incident and may result in penalties.\nOther sanctions and penalties for non-compliance with the Information Security rules are described in the internal Policy\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Information Security Policy Last Update: October 2025. Information Classification: Public Use. Definition This document describes guidelines on the Information Security Policy of Grupo Senior, whose rules and procedures are confidential and published internally. Such guidelines define the acceptable use of the institution\u2019s information assets, based on the principles of confidentiality, integrity, and availability. Target Audience [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-35235","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information Security Policy - Senior Systems<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/site.senior.com.br\/en\/information-security-policy\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security Policy - Senior Systems\" \/>\n<meta property=\"og:description\" content=\"Information Security Policy Last Update: October 2025. Information Classification: Public Use. Definition This document describes guidelines on the Information Security Policy of Grupo Senior, whose rules and procedures are confidential and published internally. Such guidelines define the acceptable use of the institution\u2019s information assets, based on the principles of confidentiality, integrity, and availability. Target Audience [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/site.senior.com.br\/en\/information-security-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Senior Systems\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-07T14:59:18+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/site.senior.com.br\/en\/information-security-policy\/\",\"url\":\"https:\/\/site.senior.com.br\/en\/information-security-policy\/\",\"name\":\"Information Security Policy - Senior Systems\",\"isPartOf\":{\"@id\":\"https:\/\/site.senior.com.br\/en\/#website\"},\"datePublished\":\"2025-11-05T20:04:20+00:00\",\"dateModified\":\"2025-11-07T14:59:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/site.senior.com.br\/en\/information-security-policy\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/site.senior.com.br\/en\/information-security-policy\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/site.senior.com.br\/en\/information-security-policy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/site.senior.com.br\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/site.senior.com.br\/en\/#website\",\"url\":\"https:\/\/site.senior.com.br\/en\/\",\"name\":\"Senior Systems\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/site.senior.com.br\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security Policy - Senior Systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/site.senior.com.br\/en\/information-security-policy\/","og_locale":"pt_BR","og_type":"article","og_title":"Information Security Policy - Senior Systems","og_description":"Information Security Policy Last Update: October 2025. Information Classification: Public Use. Definition This document describes guidelines on the Information Security Policy of Grupo Senior, whose rules and procedures are confidential and published internally. Such guidelines define the acceptable use of the institution\u2019s information assets, based on the principles of confidentiality, integrity, and availability. Target Audience [&hellip;]","og_url":"https:\/\/site.senior.com.br\/en\/information-security-policy\/","og_site_name":"Senior Systems","article_modified_time":"2025-11-07T14:59:18+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. tempo de leitura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/site.senior.com.br\/en\/information-security-policy\/","url":"https:\/\/site.senior.com.br\/en\/information-security-policy\/","name":"Information Security Policy - Senior Systems","isPartOf":{"@id":"https:\/\/site.senior.com.br\/en\/#website"},"datePublished":"2025-11-05T20:04:20+00:00","dateModified":"2025-11-07T14:59:18+00:00","breadcrumb":{"@id":"https:\/\/site.senior.com.br\/en\/information-security-policy\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/site.senior.com.br\/en\/information-security-policy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/site.senior.com.br\/en\/information-security-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/site.senior.com.br\/en\/"},{"@type":"ListItem","position":2,"name":"Information Security Policy"}]},{"@type":"WebSite","@id":"https:\/\/site.senior.com.br\/en\/#website","url":"https:\/\/site.senior.com.br\/en\/","name":"Senior Systems","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/site.senior.com.br\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"}]}},"_links":{"self":[{"href":"https:\/\/site.senior.com.br\/en\/wp-json\/wp\/v2\/pages\/35235","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/site.senior.com.br\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/site.senior.com.br\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/site.senior.com.br\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/site.senior.com.br\/en\/wp-json\/wp\/v2\/comments?post=35235"}],"version-history":[{"count":11,"href":"https:\/\/site.senior.com.br\/en\/wp-json\/wp\/v2\/pages\/35235\/revisions"}],"predecessor-version":[{"id":35363,"href":"https:\/\/site.senior.com.br\/en\/wp-json\/wp\/v2\/pages\/35235\/revisions\/35363"}],"wp:attachment":[{"href":"https:\/\/site.senior.com.br\/en\/wp-json\/wp\/v2\/media?parent=35235"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}