Dock Ltd. and its subsidiaries, hereafter only "Dock", because of its commitment to the protection of the information it owns and is responsible for, aims to establish guidelines for the treatment of information assets and acceptable levels of reliability.
It is aimed at all its employees, interns, and Third Parties, who work under contract, and who, in their duties and/or contract execution, make use of business or administrative information.
All information is protected according to the rules defined in this policy. The adoption of procedures that ensure Information Security is a constant priority in Dock's areas, in order to reduce failures and damages that may compromise its image or bring losses to others.
This policy ensures that applicable Central Bank regulations and circulars are monitored and complied with by Dock and that the processes involved in handling card data have the controls defined by the Payment Card Industry – Data Security Standard (PCI-DSS).
The principles of Information Security cover the following aspects:
Confidentiality: Ensuring that access to information is obtained only by authorized persons.
Integrity: Ensuring that information is maintained in its original state, aiming to protect it, in the process, transport, and storage, against undue alterations, whether intentional or accidental.
Availability: Ensuring that authorized employees gain access to the corresponding information and assets whenever necessary.
Authenticity: It validates the user's authorization (through credentials and authentication process) to access, transmit, and receive certain information, confirming the identity of employees before releasing access to systems and resources, ensuring that they do not impersonate unauthorized persons.
Non-repudiation: Or non-retractability. It ensures that a person or entity cannot deny authorship of the information provided, as in the case of using digital certificates for online transactions and signing electronic documents.
Dock has awareness and training programs with the objective of raising the level of training of all its employees on the themes of cyber-attacks and Information Security guidelines.
All information is classified and controlled so that the principles of integrity, confidentiality, availability, authenticity, and non-repudiation are applied, ensuring traceability according to its degree of secrecy.
All access to the Dock environment is controlled, monitored, restricted, periodically reviewed, and revoked in a timely manner at the end of the employee's or Third Party's employment contract.
Dock areas and facilities are classified into security levels for physical access control purposes. The cryptographic key ceremony complies with the security requirements defined in the latest version of the PCI-DSS.
At Dock, the use of cloud services is an important strategy to gain availability, reliability, and scale in its services.
Dock develops and implements cryptographic controls, strong encryption standards in transit and on standby, key management and ceremonial, according to the best practices of security frameworks, current legislation and internal rules.
Dock has security guidelines for the development and maintenance of applications and systems, in order to direct the creation and execution of these processes in a secure way, ensuring a higher level of service reliability.
Dock works to provide the highest level of security and availability for its products. All information and systems necessary for the support and continuity of Dock's services are submitted to backup processes and Business Continuity Plan for permanent restoration and recovery of operations and activities during a service interruption event.
Dock ensures the continuity of its critical processes through the Business Continuity Plan (BCP), aligned with the Business Continuity Management Policy. The BCP guarantees the security and availability of Dock’s products, minimizing the impact of potential disruptions.
Dock periodically conducts internal and external intrusion tests, ensuring that its environments meet Information Security needs.
At Dock, networks and subnets are segmented to ensure restricted access control, protection and isolation of critical environments, according to PCI-DSS best practices to ensure secure communication.
The electronic mail service, messaging, as well as other means of communication made available shall be used exclusively to meet Dock's specific business purposes, support, services and objectives.
Dock periodically runs environment scans in order to identify possible weaknesses and vulnerabilities that could compromise the systems. In addition, it has the analysis of security requirements from the conception (security by design) of new products.
The Dock has monitoring and auditing mechanisms for workstations, servers, email, Internet connections, and mobile devices. As well as protective, preventive, detective, and corrective mechanisms and practices to ensure the security of Dock's information.
In order to prevent data leakage, Dock uses solutions specialized in monitoring alerts about suspicious atypical movements, including information transfers via e-mail.
Dock has Antivirus and Antispyware solutions installed on all its servers and employee workstations.
All processes involving the life cycle of corporate systems, including Dock hardware and software, follow best practices and recommendations in Information Security.
Dock has strategies for monitoring, observing, and responding to Information Security incidents, covering all critical products, and always observing the legislation in force that is applicable to the operation.
Dock conducts tabletop testing in order to prove the effectiveness of cyber-attack response plans, for relevant scenarios. In addition, continuous improvements are made according to the observed results.
The privacy of customers, employees, and partners is a priority issue for Dock. For more details on how personal data is handled, collected, used, and disclosed, please visit Dock's Privacy Portal.
Dock Ltd. and its subsidiaries/Dock: They include all the companies and CNPJs in the Dock Tech group, Dock Ip, Bpp, Cacao, Dock Colombia, and the other Latam companies.
PCI DSS: Acronym for the Payment Card Industry Data Security Standard was developed to encourage, enhance the security of cardholder data, and promote the widespread adoption of consistent data security measures worldwide.
Logical Access: A set of hardware and software controls designed to protect information and provide access only to those employees who have permission.
Third Parties: Supplier companies, service providers, business partners or third parties in the strict sense (Human resource, a simple legal person that is not part of Dock's internal organizational structure, allocated for a certain period to provide the service).