Backup and Cloud


Information protection is guaranteed within the security standards guaranteed by the service providers we use in the cloud from providers such as Amazon and Microsoft, provided they are properly configured following the best practices and processes for their use.

Internally our systems have strict authentication and authorization controls to ensure that only the right employees can have the degree of access and visibility of the information strictly necessary for the scope of their activities. Each access (reading), editing, or creating a new record action, whether a transaction or a new customer record, generates a log information that we call auditing. That is, even an access that does not change information in our database, such as a query, generates an audit record that identifies the employee who made that access. In this way, we have the history for a probable investigation about the access of our information.

An error has occurred. This application may no longer respond until reloaded. Recarregue ou aperte F5 para continuar.

Connectando ao servidor.

Conex√£o perdida. Recarregue ou aperte F5.

Recarregue ou aperte F5 para continuar.