{"id":36633,"date":"2023-04-11T21:27:02","date_gmt":"2023-04-12T00:27:02","guid":{"rendered":"https:\/\/dev.conexled.com\/infografico-privacidade\/"},"modified":"2025-04-24T09:22:34","modified_gmt":"2025-04-24T12:22:34","slug":"infografico-privacidade","status":"publish","type":"page","link":"https:\/\/dev.conexled.com\/en\/infografico-privacidade\/","title":{"rendered":"Privacy infographic"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"36633\" class=\"elementor elementor-36633 elementor-2294\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3f22003 e-con-full e-flex e-con e-parent\" data-id=\"3f22003\" data-element_type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t<div class=\"elementor-element elementor-element-9c28c2b e-con-full e-flex e-con e-child\" data-id=\"9c28c2b\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b68b6a8 e-flex e-con-boxed e-con e-child\" data-id=\"b68b6a8\" data-element_type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-814fb1f elementor-widget elementor-widget-text-editor\" data-id=\"814fb1f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<span style=\"font-weight: 400;\">Information security measures are a fundamental part of creating a culture of data protection, while at the same time meeting legal and regulatory requirements. Some of these measures are simple. Conexled already has Rules of Conduct, which are yet to be improved, and is creating a variety of policies, from privacy to retention, but until then, we&#8217;ve listed some measures of special attention below.  <\/span>\n<h4><br><b>BEWARE OF PHISHING<\/b><\/h4>\n<span style=\"font-weight: 400;\">Many leaks occur because people are careless and end up being &#8220;hooked&#8221; by links sent in messages, emails, etc. Don&#8217;t click on links of unknown origin. If in doubt, contact your company&#8217;s IT manager.  <\/span>\n<h4><br><b>PASSWORDS<\/b><\/h4>\n<span style=\"font-weight: 400;\">Another major problem is the way we handle our passwords. Take care of your passwords, don&#8217;t share them with anyone and always try to create passwords that are strong enough to make it difficult for hackers. Never expose or share your terminal and system access passwords.  <\/span>\n<h4><br><b>DOWNLOAD FILES<\/b><\/h4>\n<span style=\"font-weight: 400;\">Be very careful when downloading files from the internet and attached to emails and messages. Only open them if they come from an absolutely reliable source. DO NOT DOWNLOAD FILES ON YOUR MACHINE if they are not work-related and come from reliable sources.  <\/span>\n<h4><br><b>INFORMATION, DATA AND DOCUMENTS<\/b><\/h4>\n<span style=\"font-weight: 400;\">Information, data, files, documents can only be provided by regular means or, exceptionally, by those expressly authorized by the Company&#8217;s Board of Directors. Therefore: <\/span>\n<h4><br><b>RULES OF CONDUCT<\/b><\/h4>\n<ul>\n \t<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do not use private devices (cell phone, notebook, tablet, etc.) to communicate or exchange data, information, documents, etc. with clients;<\/span><\/li><br> \t<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do not photograph, copy, print, film, etc. screens and\/or documents of the company and its systems;<\/span><\/li><br> \t<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do not provide information containing personal data by telephone unless you have been expressly authorized to do so and the recipient of the information is properly identified.<\/span><\/li><br> \t<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Don&#8217;t click on links in emails and messages whose origin you are unsure of and which are not work-related;<\/span><\/li><br> \t<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Don&#8217;t share your passwords, don&#8217;t leave them exposed, create strong passwords;<\/span><\/li><br> \t<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do not access non-secure sites or applications;<\/span><\/li><br> \t<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do not receive or send data, information or files by private device, unless expressly authorized;<\/span><\/li><br> \t<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do not provide or confirm information by telephone, unless expressly authorized to do so;<\/span><\/li><br> \t<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Always check that your protection software (anti-virus, firewall, etc.) is active;<\/span><\/li><br> \t<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Do not download files sent by messages, e-mails or external devices unless expressly authorized to do so;<\/span><\/li><br> \t<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">When you leave your computer, lock the machine, leaving no screens or data exposed;<\/span><\/li><br> \t<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">It is forbidden to copy, print, photograph, film, transfer to an external device, etc., any documents or system screens, other than to fulfill an obligation or collect evidence authorized by a superior;<\/span><\/li><br> \t<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">If an incident occurs, report it immediately.<\/span><\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-42c52eb e-flex e-con-boxed e-con e-child\" data-id=\"42c52eb\" data-element_type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d7a9986 elementor-widget elementor-widget-text-editor\" data-id=\"d7a9986\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>If you have any questions, just get in touch via email &#8211; <a href=\"mailto:lgpd@dev.conexled.com.br\">lgpd@dev.conexled.com.br<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Information security measures are a fundamental part of creating a culture of data protection, while at the same time meeting legal and regulatory requirements. Some of these measures are simple. Conexled already has Rules of Conduct, which are yet to be improved, and is creating a variety of policies, from privacy to retention, but until [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-36633","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/dev.conexled.com\/en\/wp-json\/wp\/v2\/pages\/36633","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dev.conexled.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dev.conexled.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dev.conexled.com\/en\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/dev.conexled.com\/en\/wp-json\/wp\/v2\/comments?post=36633"}],"version-history":[{"count":0,"href":"https:\/\/dev.conexled.com\/en\/wp-json\/wp\/v2\/pages\/36633\/revisions"}],"wp:attachment":[{"href":"https:\/\/dev.conexled.com\/en\/wp-json\/wp\/v2\/media?parent=36633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}