Terms of Service
1. Introduction
At , we develop innovative technological solutions, including a private blockchain based on the EVM (Ethereum Virtual Machine) standard, to offer secure and efficient financial services.
Our commitment is to apply in-depth defense strategies, implementing multiple layers of protection, and ensuring the confidentiality, integrity, and availability of information, promoting the trust of our customers, partners, and collaborators.
2. Objectives
- Protect Digital Assets: Ensure the security of infrastructure, data, and systems, including our private EVM blockchain.
- Ensure Regulatory Compliance: Meet the requirements of the Central Bank of Brazil, LGPD, and other applicable standards.
- Mitigate Risks: Identify, prevent, and respond to cybersecurity incidents.
- Promote Awareness: Encourage a culture of security among all employees and partners.
3. Scope
This policy applies to all employees, partners, suppliers, and third parties who interact with the company's data, systems, or infrastructure, including services offered by the private EVM blockchain.
4. Security Principles
- Confidentiality: Ensure that sensitive information is accessible only to authorized persons.
- Integrity: Protect data against improper changes, whether accidental or intentional.
- Availability: Ensure that systems and information are accessible and usable whenever needed.
5. Guidelines
5.1. Access Management
- Implement multi-factor authentication (MFA) on all critical systems.
- Adopt One-Time Password (OTP) as an additional layer of authentication for sensitive transactions and accesses.
- Follow the principle of least privilege, ensuring that each user has access only to what is essential.
- Perform periodic reviews of access permissions and deactivate inactive accounts.
- Implement trusted device registration tools, allowing authentication based on previously authorized devices.
5.2. Data and Infrastructure Protection
- Use robust cryptographic algorithms to protect data at rest, in transit, and in use.
- Configure automated and secure backup of critical systems, including the private blockchain.
- Segregate critical environments, such as production databases, with appropriate access controls.
- Ensure end-to-end encryption (E2EE) for all sensitive communications.
5.3. Monitoring and Detection
- Deploy continuous monitoring tools to identify anomalous behaviors and vulnerabilities.
- Enable detailed logs for auditing all activities in the systems, including transactions made on the blockchain.
- Implement intrusion detection and prevention solutions (IDS/IPS).
5.4. Facial Recognition and Biometrics
- Adopt facial recognition tools for user authentication on digital platforms.
- Use biometrics as an additional layer of security, especially for high-risk operations.
5.5. Incident Response Plan
- Create a detailed plan for identifying, containing, analyzing, and recovering from cyber incidents.
- Report relevant incidents to the Cybersecurity Committee and, if necessary, to regulatory authorities.
5.6. Secure Development
- Adopt secure practices in software development, including code review and security testing.
- Evaluate the security of new technologies before implementing them in the production environment.
5.7. Training and Capacity Building
- Offer mandatory annual cybersecurity training for all employees.
- Promote regular workshops to raise awareness about threats such as phishing, malware, and social engineering.
6. Private EVM Blockchain
- Advanced Encryption: All transactions and data are protected with state-of-the-art algorithms.
- Record Immutability: Assurance that all recorded transactions are tamper-proof.
- Real-Time Monitoring: Tools to track malicious activities and prevent attacks.
- Environment Isolation: Blockchain nodes are segregated by security layers, with strict access control.
7. Governance and Compliance
- Cybersecurity Committee: Oversees policy implementation, assesses risks, and manages incidents.
- External Audits: Hiring specialized third parties to ensure that security standards are maintained.
8. Security Recommendations for Users
- Use complex passwords and avoid reusing them in other services.
- Activate multi-factor authentication (MFA) and, if possible, use OTP or biometrics as additional security.
- Register your trusted devices and avoid accessing the platform through public or insecure devices.
- Keep devices updated and use reliable antivirus.
- Avoid clicking on suspicious links or providing sensitive information to third parties.
9. Review and Update
The Cybersecurity Policy will be reviewed annually or whenever there are significant changes in the regulatory environment or cyber threat landscape.