{"id":29431,"date":"2025-07-23T18:30:49","date_gmt":"2025-07-23T21:30:49","guid":{"rendered":"https:\/\/isend.co\/security-policy\/"},"modified":"2025-11-08T22:02:06","modified_gmt":"2025-11-09T01:02:06","slug":"security-policy","status":"publish","type":"page","link":"https:\/\/isend.co\/en\/security-policy\/","title":{"rendered":"Security Policy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"29431\" class=\"elementor elementor-29431 elementor-25814\" data-elementor-post-type=\"page\">\n\t\t\t\t<div data-dce-background-image-url=\"https:\/\/isend.co\/wp-content\/uploads\/2021\/07\/02-cabecalho-politica-seguranca.jpg\" class=\"elementor-element elementor-element-e47b859 e-flex e-con-boxed e-con e-parent\" data-id=\"e47b859\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-245df96 e-con-full elementor-hidden-tablet elementor-hidden-mobile e-flex e-con e-child\" data-id=\"245df96\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-905f34a e-con-full elementor-hidden-tablet elementor-hidden-mobile e-flex e-con e-child\" data-id=\"905f34a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-701e7d8 elementor-nav-menu__align-end menu-banner elementor-nav-menu--dropdown-tablet elementor-nav-menu__text-align-aside elementor-nav-menu--toggle elementor-nav-menu--burger elementor-widget elementor-widget-nav-menu\" data-id=\"701e7d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;layout&quot;:&quot;vertical&quot;,&quot;submenu_icon&quot;:{&quot;value&quot;:&quot;&lt;svg aria-hidden=\\&quot;true\\&quot; class=\\&quot;e-font-icon-svg e-fas-caret-down\\&quot; viewBox=\\&quot;0 0 320 512\\&quot; xmlns=\\&quot;http:\\\/\\\/www.w3.org\\\/2000\\\/svg\\&quot;&gt;&lt;path d=\\&quot;M31.3 192h257.3c17.8 0 26.7 21.5 14.1 34.1L174.1 354.8c-7.8 7.8-20.5 7.8-28.3 0L17.2 226.1C4.6 213.5 13.5 192 31.3 192z\\&quot;&gt;&lt;\\\/path&gt;&lt;\\\/svg&gt;&quot;,&quot;library&quot;:&quot;fa-solid&quot;},&quot;toggle&quot;:&quot;burger&quot;}\" data-widget_type=\"nav-menu.default\">\n\t\t\t\t\t\t\t\t<nav aria-label=\"Menu\" class=\"elementor-nav-menu--main elementor-nav-menu__container elementor-nav-menu--layout-vertical e--pointer-framed e--animation-fade\">\n\t\t\t\t<ul id=\"menu-1-701e7d8\" class=\"elementor-nav-menu sm-vertical\"><li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-25841\"><a href=\"https:\/\/isend.co\/politica-privacidade\/\" class=\"elementor-item\">Privacy Policy<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-25842\"><a href=\"https:\/\/isend.co\/politica-seguranca\/\" class=\"elementor-item\">Security Policy<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-25843\"><a href=\"https:\/\/isend.co\/cookies\/\" class=\"elementor-item\">Cookies<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-25844\"><a href=\"https:\/\/isend.co\/termo-uso\/\" class=\"elementor-item\">Terms of use<\/a><\/li>\n<\/ul>\t\t\t<\/nav>\n\t\t\t\t\t<div class=\"elementor-menu-toggle\" role=\"button\" tabindex=\"0\" aria-label=\"Menu Toggle\" aria-expanded=\"false\">\n\t\t\t<svg aria-hidden=\"true\" role=\"presentation\" class=\"elementor-menu-toggle__icon--open e-font-icon-svg e-eicon-menu-bar\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M104 333H896C929 333 958 304 958 271S929 208 896 208H104C71 208 42 237 42 271S71 333 104 333ZM104 583H896C929 583 958 554 958 521S929 458 896 458H104C71 458 42 487 42 521S71 583 104 583ZM104 833H896C929 833 958 804 958 771S929 708 896 708H104C71 708 42 737 42 771S71 833 104 833Z\"><\/path><\/svg><svg aria-hidden=\"true\" role=\"presentation\" class=\"elementor-menu-toggle__icon--close e-font-icon-svg e-eicon-close\" viewBox=\"0 0 1000 1000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M742 167L500 408 258 167C246 154 233 150 217 150 196 150 179 158 167 167 154 179 150 196 150 212 150 229 154 242 171 254L408 500 167 742C138 771 138 800 167 829 196 858 225 858 254 829L496 587 738 829C750 842 767 846 783 846 800 846 817 842 829 829 842 817 846 804 846 783 846 767 842 750 829 737L588 500 833 258C863 229 863 200 833 171 804 137 775 137 742 167Z\"><\/path><\/svg>\t\t<\/div>\n\t\t\t\t\t<nav class=\"elementor-nav-menu--dropdown elementor-nav-menu__container\" aria-hidden=\"true\">\n\t\t\t\t<ul id=\"menu-2-701e7d8\" class=\"elementor-nav-menu sm-vertical\"><li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-25841\"><a href=\"https:\/\/isend.co\/politica-privacidade\/\" class=\"elementor-item\" tabindex=\"-1\">Privacy Policy<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-25842\"><a href=\"https:\/\/isend.co\/politica-seguranca\/\" class=\"elementor-item\" tabindex=\"-1\">Security Policy<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-25843\"><a href=\"https:\/\/isend.co\/cookies\/\" class=\"elementor-item\" tabindex=\"-1\">Cookies<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-25844\"><a href=\"https:\/\/isend.co\/termo-uso\/\" class=\"elementor-item\" tabindex=\"-1\">Terms of use<\/a><\/li>\n<\/ul>\t\t\t<\/nav>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2873f19 e-con-full elementor-hidden-tablet elementor-hidden-mobile e-flex e-con e-child\" data-id=\"2873f19\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b735b5d e-con-full e-flex e-con e-child\" data-id=\"b735b5d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-9e0f900 e-con-full e-flex e-con e-child\" data-id=\"9e0f900\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-511114f e-con-full e-flex e-con e-child\" data-id=\"511114f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div data-dce-title-color=\"#FFFFFF\" class=\"elementor-element elementor-element-20c265d elementor-widget elementor-widget-heading\" data-id=\"20c265d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Policy<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-942195c e-con-full e-flex e-con e-child\" data-id=\"942195c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-81c8926 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"81c8926\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/isend.co\/en\/meet-isend\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">GET TO KNOW ISEND<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36a1a64 elementor-align-right elementor-widget elementor-widget-button\" data-id=\"36a1a64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/isend.co\/compre\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">BUY NOW<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5efa866 animated-fast e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"5efa866\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f8cfcda elementor-widget elementor-widget-heading\" data-id=\"f8cfcda\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"><span style=\"font-size: 24px\">We present here the Security Policy of our company Intelly and our iSend product.<\/span><\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d93c36f e-con-full e-flex e-con e-child\" data-id=\"d93c36f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ae63971 elementor-widget elementor-widget-text-editor\" data-id=\"ae63971\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Reliability and care for information security have always been important parts of our mission, where we have always adopted an approach based on the pillars of<strong> Trust, Security, Compliance and Transparency<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4409538 animated-fast e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"4409538\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cd831f0 e-con-full e-flex e-con e-child\" data-id=\"cd831f0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dc6ce8a elementor-widget elementor-widget-heading\" data-id=\"dc6ce8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">INTRODUCTION<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-40ffa4a e-con-full e-flex e-con e-child\" data-id=\"40ffa4a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7ce8d9c elementor-widget elementor-widget-text-editor\" data-id=\"7ce8d9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Our iSend product has been in the market for more than 10 years and we are very proud that over all these years, with the hundreds of customers we have, never in our history has there been a single major security incident. This shows that our security and privacy policies, as well as transparency, have proven to be efficient. <\/p><p>We understand that compliance with data protection regulations (LGPD\/GDPR) and other existing standards is a shared responsibility and therefore, we are committed to this compliance in all our iSend services and products.<\/p><p>We are also committed to sharing our expertise around regulatory compliance to help you design the best path for your business to succeed in meeting the privacy requirements of these regulations along with our services and products.<\/p><p>As part of our commitment to partner with you during our journey around the pursuit of security, reliability, compliance, and transparency, we have developed a growing list of actions, policies, and processes that we adopt. These actions offer an overview of our performance in the face of these various initiatives, describe what we are doing, how to prepare ourselves and outline a guide to work on this journey towards excellence in safety. With each new advance, with each new milestone reached, this documentation and the entire set of processes will be updated and will be at your disposal.  <\/p><p>Estamos ansiosos para compartilhar atualiza\u00e7\u00f5es adicionais sobre como podemos ajud\u00e1-lo a adequar-se e, durante o processo, aprimorar as prote\u00e7\u00f5es de dados pessoais entre nossas empresas. Vamos juntos tornar o ambiente da tecnologia da informa\u00e7\u00e3o, cada vez mais seguro. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b739544 e-flex e-con-boxed e-con e-parent\" data-id=\"b739544\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-09beac9 e-con-full e-flex e-con e-child\" data-id=\"09beac9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-893e326 elementor-widget elementor-widget-heading\" data-id=\"893e326\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">APPLICATION SECURITY<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-52c7cbd e-con-full e-flex e-con e-child\" data-id=\"52c7cbd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d78867a elementor-widget elementor-widget-heading\" data-id=\"d78867a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PASSWORDS AND CREDENTIAL STORAGE<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b03d7b e-con-full e-flex e-con e-child\" data-id=\"5b03d7b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a3badee elementor-widget elementor-widget-text-editor\" data-id=\"a3badee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>We process the information with the most modern security techniques, through our iSend (www.iSend.com.br) product that take into account SSL, Encryption Passwords, Encrypted Links, among others.<br><span style=\"letter-spacing: 0.1px;\"><br>All servers involved in iSend products have encryption enabled, which follow strong cryptographic methods:<br><\/span><span style=\"letter-spacing: 0.1px;\"><br>     &#8211; Key algorithm: 256-bit symmetric key <\/span><a href=\"https:\/\/pt.wikipedia.org\/wiki\/Algoritmo_de_chave_sim%C3%A9trica\" target=\"_blank\" class=\"custom-link\" rel=\"noopener\" style=\"letter-spacing: 0.1px; background-color: rgb(255, 255, 255);\">To learn more, visit this content<\/a><br> <span style=\"letter-spacing: 0.1px;\">     &#8211; Key algorithm: 2048-bit RSA Asymmetric Key <\/span><a href=\"https:\/\/pt.wikipedia.org\/wiki\/Criptografia_de_chave_p%C3%BAblica\" target=\"_blank\" class=\"custom-link\" rel=\"noopener\" style=\"letter-spacing: 0.1px; background-color: rgb(255, 255, 255);\">To learn more, visit this content<\/a><br><span style=\"letter-spacing: 0.1px;\">&nbsp; &nbsp; &nbsp;&#8211; 2048-bit Cryptographic Hashing Algorithms<br><\/span><span style=\"letter-spacing: 0.1px;\">&nbsp; &nbsp; &nbsp;&#8211; We use TLS 1.3 with legacy support for TLS 1.1.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-893b19c e-con-full e-flex e-con e-child\" data-id=\"893b19c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bb76b83 elementor-widget elementor-widget-heading\" data-id=\"bb76b83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CONTEXT SEPARATION<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-49e84c6 e-con-full e-flex e-con e-child\" data-id=\"49e84c6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7c05b53 elementor-widget elementor-widget-text-editor\" data-id=\"7c05b53\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>All product modules have mechanisms that restrict the source and destination of data traffic by protecting the internal layers of the application from improper access, where our environments are segregated through VPCs and their subnets. In each subnet there are Security Groups (Microsoft Azure Firewall) with rules that allow only certain origins. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-58ecd48 e-con-full e-flex e-con e-child\" data-id=\"58ecd48\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b5f3d1d elementor-widget elementor-widget-heading\" data-id=\"b5f3d1d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">APPLICATION<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0ca12c9 e-con-full e-flex e-con e-child\" data-id=\"0ca12c9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cf896c4 elementor-widget elementor-widget-text-editor\" data-id=\"cf896c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>All users of the solution have a unique identity that is not shared with other users. The format of composition and validity of the passwords is parameterizable by users and complies with the criteria described above. Passwords are stored in cryptographic hash form that are protected from unauthorized access.  <\/p><p>All application communication interfaces are authenticated through a secure method and protocol where we use HTTPS and access control and permission managed in the application backend.<\/p><p>Access Profiles have mechanisms that allow the creation and assignment of different access profiles for each entity.<\/p><p>We have mechanisms that enable the creation of identity authorization rules and access profiles based on the following attributes:<\/p><p>  &#8211; Who (identity or access profile)<br><span style=\"letter-spacing: 0.1px;\">     <\/span>&#8211; What (actions you will perform)<br><span style=\"letter-spacing: 0.1px;\">     <\/span>&#8211; When (in what time period actions are allowed)<br><span style=\"letter-spacing: 0.1px;\">     <\/span>&#8211; Where from (origins that are authoritative)<br><span style=\"letter-spacing: 0.1px;\">     <\/span>&#8211; Which (to which destinations or objects the rule will apply)<br><span style=\"letter-spacing: 0.1px;\">     <\/span>&#8211; Action (allow or deny access)<\/p><p>All products are accessed by registered users who have parameterization of profiles defined by the customer&#8217;s administrator user. There is no external access from other applications, except APIs documented in the product and referenced herein. <\/p><p>We have traceability of the actions performed by users where the main requests and actions of the interface are properly stored.<\/p><p>We also have granular access control by users. All application access rules follow the principle of least privilege, they are denied by default unless explicitly allowed, registered and validated, that is, when a user is registered (Automatically or by Operator) it starts with minimum privileges for the features of the product in question, with the exception of the administrator users of the customers in the tool. Users with more privileges need to have their privileges set granularly.  <\/p><p>Our applications properly handle all errors and exceptions securely without causing sensitive data to leak to the user. All error messages are standardized, revealing no data or source code snippets, only error messages and codes. <\/p><p>The products have in their codes a layer of sanitization of sensitive data restricted by permission even before sending to an external source or front-end.<\/p><p>Secure access to the database is through the use of parameterizable queries, the Application Servers have access to the database through a private subnet. Other accesses are only allowed to the company&#8217;s IP using an encrypted channel. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-53d258b e-con-full e-flex e-con e-child\" data-id=\"53d258b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-976a473 elementor-widget elementor-widget-heading\" data-id=\"976a473\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">INFORMATION LIFE CYCLE<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6959c59 e-con-full e-flex e-con e-child\" data-id=\"6959c59\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ee46a72 elementor-widget elementor-widget-text-editor\" data-id=\"ee46a72\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Our products have secure mechanisms for the correct maintenance of the information life cycle: production, reception, use, reproduction, transportation, transmission, distribution, destination, archiving and disposal.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-22c1c6a elementor-widget elementor-widget-text-editor\" data-id=\"22c1c6a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>&#8211; Handling: The information is only handled by authorized users registered in the products<br>&#8211; Storage: All information trafficked\/handled on the platform is stored securely. Access to the database and servers occurs in a controlled manner, without direct exposure to the Internet. In addition, with data segregation occurring at the application level, as well as segregation of environments at the network level (with VPCs and their subnets), we have a secure infrastructure for storing information<br>&#8211; Transport: The flow of information on the platform occurs in an encrypted way, where we adopt TLS v1.2 or higher (with a valid certificate) by default in communications (sender and receiver of information). The partners that integrate with us also need to use this encryption, so that we have a completely secure environment<br>&#8211; Discard: All actions performed on the platform, as well as other static files, are stored for a maximum of 1,095 days.   <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5cbc9a6 e-con-full e-flex e-con e-child\" data-id=\"5cbc9a6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-49021b3 elementor-widget elementor-widget-heading\" data-id=\"49021b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">WEB-SERVICES\/APIs<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-55d375c e-con-full e-flex e-con e-child\" data-id=\"55d375c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8c6a3d5 elementor-widget elementor-widget-text-editor\" data-id=\"8c6a3d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The data produced by a user in software integrated with iSend, is visible only in that integration and context.<span style=\"letter-spacing: 0.1px;\"> <\/span><\/p><p>Our Web-Services\/APIs are built under the SOAP standard and feature:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bd5cb04 e-con-full e-flex e-con e-child\" data-id=\"bd5cb04\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-28726fc elementor-widget elementor-widget-text-editor\" data-id=\"28726fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>&#8211; Access limits per time interval (rate-limit)<br>&#8211; Sensitive information such as passwords, tokens, and API keys does not appear in the composition of the URI<br>&#8211; This information is transmitted through headers or through the HTTP request body<br>&#8211; All security HTTP headers are included in API request responses and follow SOAP recommendations<br>&#8211; All audit logs before and after security events (e.g., authentication failures, token validation errors, etc.) as well as all calls made through the API are logged.<br>&#8211; OS Web-Services\/APIs respond to errors by stating the cause of the errors and with messages that do not reveal the details of the error (e.g., stack trace, application paths and variables, etc.)<br>&#8211; We only expose our Web-Services\/APIs externally for business needs, we do not maintain public access pages to these services.<br>&#8211; For validation of response parameters, our applications have in their codes a layer of sanitization of sensitive data restricted by permission even before sending to an external source or front-end<br>&#8211; An API request or response contains the explicitly declared Content-type header.<br>&#8211; The services contain mechanisms that allow you to properly validate all information received from external sources (users or other applications), that is, all parameters and objects sent go through a content and schema verification mechanism.<br>&#8211; All calls from services are authenticated using session tokens.<br>&#8211; All session tokens are obtained through authentication (who?) and authorization (what, how, where and when?), are generated through user credentials and have a TTL (finite validity) of 24h.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-27c331f e-con-full e-flex e-con e-child\" data-id=\"27c331f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-33e879c elementor-widget elementor-widget-text-editor\" data-id=\"33e879c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>To learn more about the <a class=\"custom-link\" href=\"https:\/\/pt.wikipedia.org\/wiki\/SOAP\" target=\"_blank\" rel=\"noopener\">SOAP protocol, access this information<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-47dddd6 animated-fast e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"47dddd6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ed99aad e-con-full e-flex e-con e-child\" data-id=\"ed99aad\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d689f6f elementor-widget elementor-widget-heading\" data-id=\"d689f6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">INFRASTRUCTURE SECURITY<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1113534 e-con-full e-flex e-con e-child\" data-id=\"1113534\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-191316c elementor-widget elementor-widget-heading\" data-id=\"191316c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DATA HOSTING AND STORAGE<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2f18c82 e-con-full e-flex e-con e-child\" data-id=\"2f18c82\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dc0ac24 elementor-widget elementor-widget-text-editor\" data-id=\"dc0ac24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The Applications and Data of iSend products are stored on Microsoft Azure Brasil Southeast servers and Message Send servers distributed between Microsoft Azure Brasil Southeast and Amazon Web Services (AWS) &#8211; located in the sa-east-1 region (S\u00e3o Paulo &#8211; Brazil).<\/p>\n<p>In this way, we have compliance with a vast number of legal and regulatory standards meeting various security requirements and controls described in ISO27001, ISO27017, ISO27018, ISO27701, ISO20000-1, PCI Level 1, HIPAA, SOC 1, SOC 2, SOC 3, TIER 3, CSA STAR \u2013 Cloud Security Alliance, among many others.<\/p>\n<p>To learn more about the compliances we have, please visit this additional documentation:<\/p>\n<p>&nbsp; &nbsp; &nbsp;&#8211; <a class=\"custom-link\" href=\"https:\/\/docs.microsoft.com\/pt-br\/azure\/compliance\/\" target=\"_blank\" rel=\"noopener\">See in this link how Microsoft Azure compliance works<\/a><br>     &#8211; <a class=\"custom-link\" href=\"https:\/\/aws.amazon.com\/pt\/compliance\/data-center\/controls\/\" target=\"_blank\" rel=\"noopener\">See how AWS compliance works in this link<\/a><\/p>\n<p><a class=\"custom-link\" href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security\/fundamentals\/physical-security\" target=\"_blank\" rel=\"noopener\">To learn more about Physical Infrastructure and Facilities, visit this documentation<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-862350c e-con-full e-flex e-con e-child\" data-id=\"862350c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1e4638f elementor-widget elementor-widget-heading\" data-id=\"1e4638f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SEGREGATION OF ARCHITECTURE<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-60e1c6e e-con-full e-flex e-con e-child\" data-id=\"60e1c6e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ede67e elementor-widget elementor-widget-text-editor\" data-id=\"5ede67e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>We have segregation between the different layers of the application architecture (e.g., web, application, bank, backup, monitoring, etc.), and the traffic between the layers is controlled by traffic filter.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1749d04 e-con-full e-flex e-con e-child\" data-id=\"1749d04\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-171026d elementor-widget elementor-widget-heading\" data-id=\"171026d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">VULNERABILITIES AND SCANS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6b0dbeb e-con-full e-flex e-con e-child\" data-id=\"6b0dbeb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-437464d elementor-widget elementor-widget-text-editor\" data-id=\"437464d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>All elements of the applications support the execution of vulnerability scans to identify security holes that have not yet been mitigated. Our infrastructure can be scanned either remotely (Microsoft Azure and Amazon AWS instances) or locally (Codes, Containers, etc.). We perform Static Analysis of the code of our application on Bitbucked.  <\/p><p>We also use Bitbucked as a versioning platform that connects to the container environment and performs a complete scan of our infrastructure.<\/p><p>In addition, we have adopted the best market practices, both in technology and internal processes, not having in more than 20 years of company, a single incident of leakage of any type of information or violation of customer assets.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0c31b4d e-con-full e-flex e-con e-child\" data-id=\"0c31b4d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f26cbe elementor-widget elementor-widget-heading\" data-id=\"0f26cbe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">VIRTUAL PRIVATE NETWORK<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-40da5fd e-con-full e-flex e-con e-child\" data-id=\"40da5fd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cb69579 elementor-widget elementor-widget-text-editor\" data-id=\"cb69579\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>All of our servers are in our own virtual private network (VPC) with access controls that prevent unauthorized requests from reaching this internal network.<\/p><p>We use good practices for communication with our production servers.<\/p><p>We use jumpservers for the administration of the environment with remote access being performed via SSH (port knocking) and private\/public key. We do not use username and password and the root user does not have permission to log in. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0a8b2a9 e-con-full e-flex e-con e-child\" data-id=\"0a8b2a9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-832584c elementor-widget elementor-widget-heading\" data-id=\"832584c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CONTINGENCY, BACKUP AND MONITORING PLAN\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b7aaacf e-con-full e-flex e-con e-child\" data-id=\"b7aaacf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-103e196 elementor-widget elementor-widget-text-editor\" data-id=\"103e196\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>All our products have a contingency plan, both for technical and operational issues.<\/p><p><span style=\"letter-spacing: 0.1px;\">The core infrastructure of the products is hosted on MS Azure Southeast servers with replication in MS Azure South.<br><br><\/span><a class=\"custom-link\" style=\"letter-spacing: 0.1px; background-color: #f7f7f7;\" href=\"https:\/\/azure.microsoft.com\/en-us\/global-infrastructure\/data-residency\/#select-geography\" target=\"_blank\" rel=\"noopener\">To learn more about continence and replication, visit this documentation<\/a><\/p><p>We also use, for messaging functionalities (E-mail, SMS, VOICE) scalability through servers that we host on Amazon (AWS) and Microsoft Azure so as not to be dependent on a single supplier.<\/p><p>We have redundancy in the supply of SMS and VOICE with more than one supplier per type of message channel and for the E-mail channel through our own solution.<\/p><p>We have automated backup of all products, applications, databases, contents, etc., performed daily and replicated between the Data-Centers with end-to-end versioning and encryption.<\/p><p>We carry out constant monitoring of our infrastructure (Physical, Network, Deliverability&#8230;) in an active way for the detection of anomalies through our specialized team (Owned) relying on systems and tools such as <a class=\"custom-link\" href=\"https:\/\/en.wikipedia.org\/wiki\/Zabbix\" target=\"_blank\" rel=\"noopener\">Zabbix<\/a>, where we keep under control several KPIs in the area.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d4736b5 e-con-full e-flex e-con e-child\" data-id=\"d4736b5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dec6280 elementor-widget elementor-widget-heading\" data-id=\"dec6280\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">ANTI-DDOS PROTECTION\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4fcdc4f e-con-full e-flex e-con e-child\" data-id=\"4fcdc4f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8bbc005 elementor-widget elementor-widget-text-editor\" data-id=\"8bbc005\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>We have mechanisms for identifying and defending against layer 3 denial-of-service attacks (network protocols) and detection of traffic anomalies.<\/p><p>We have control in our VPC (with security groups) and at layer 7 (application), with request throttling and anomaly detection (alarms via Zabbix).<\/p><p>We also have all the standard Azure protocols for DDOS <a class=\"custom-link\" href=\"https:\/\/docs.microsoft.com\/pt-br\/azure\/ddos-protection\/ddos-protection-overview\" target=\"_blank\" rel=\"noopener\">that can be checked at the link<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9e4649d e-con-full e-flex e-con e-child\" data-id=\"9e4649d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-94b11e8 elementor-widget elementor-widget-heading\" data-id=\"94b11e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">TRAFFIC FILTER<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-25c8085 e-con-full e-flex e-con e-child\" data-id=\"25c8085\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7dc2ef0 elementor-widget elementor-widget-text-editor\" data-id=\"7dc2ef0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tOur solutions have real-time stateful traffic filtering mechanisms through pre-established and customizable rules, based on source, destination, protocol, port, application, etc. For this we use <a href=\"https:\/\/docs.microsoft.com\/pt-br\/azure\/virtual-network\/network-security-groups-overview\" target=\"_blank\" class=\"custom-link\" rel=\"noopener\">Microsoft Azure Security Groups<\/a> \t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-79e3b30 e-con-full e-flex e-con e-child\" data-id=\"79e3b30\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d25f428 elementor-widget elementor-widget-heading\" data-id=\"d25f428\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">AUTHENTICATION AND AUTHORIZATION<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9c1c5be e-con-full e-flex e-con e-child\" data-id=\"9c1c5be\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-621ea20 elementor-widget elementor-widget-text-editor\" data-id=\"621ea20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Only employees with the proper credentials and responsibilities defined by us (Unit Managers) have access to the Infrastructure.<\/p><p>These employees access the infrastructure using two-factor authentication (2FA) on their access accounts.<\/p><p>Each employee has access to only what is necessary for the execution of their tasks.<\/p><p>iSend Platform Accesses: We provide at least three types of Multifactor authentication on our platforms (Email, SMS and Microsoft Authenticator), and all accesses made by users are authenticated using one of these methods. We do not allow access without Multi-Factor Authentication. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a56553d e-con-full e-flex e-con e-child\" data-id=\"a56553d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c5ae09b elementor-widget elementor-widget-heading\" data-id=\"c5ae09b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CRYPTOGRAPHY<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e448cae e-con-full e-flex e-con e-child\" data-id=\"e448cae\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-12f1994 elementor-widget elementor-widget-text-editor\" data-id=\"12f1994\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>We process the information with the most modern security techniques, through our iSend product (www.iSend.com.br) that take into account SSL, Encryption Passwords, Encrypted Links, etc.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5507031 e-con-full e-flex e-con e-child\" data-id=\"5507031\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bd9d9f2 elementor-widget elementor-widget-heading\" data-id=\"bd9d9f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">TRANSIT<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8eabd01 e-con-full e-flex e-con e-child\" data-id=\"8eabd01\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0f123f6 elementor-widget elementor-widget-text-editor\" data-id=\"0f123f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Our Application endpoints and APIs have mechanisms that ensure the secure transmission of data based on cryptographic tunnels (TLS 1.3) and TLS\/SSL security policies recommended by MS Azure.  <a class=\"custom-link\" href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/security\/fundamentals\/operational-security\" target=\"_blank\" rel=\"noopener\">To learn more, access this content<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a2b5fe1 e-con-full e-flex e-con e-child\" data-id=\"a2b5fe1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ade4b41 elementor-widget elementor-widget-heading\" data-id=\"ade4b41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">REST<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2ab90d8 e-con-full e-flex e-con e-child\" data-id=\"2ab90d8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d9c06da elementor-widget elementor-widget-text-editor\" data-id=\"d9c06da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"gray_block\"><div class=\"uk-container uk-container-center\"><div class=\"uk-grid padding_blocks uk-scrollspy-init-inview uk-scrollspy-inview uk-animation-slide-right\" data-uk-scrollspy=\"{cls:'uk-animation-slide-right' , delay:400}\"><div class=\"uk-width-small-1-1\"><p>Data travels over HTTPS and is encrypted at rest (AES-256) just like stored files.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c66589e animated-fast e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"c66589e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7f57c60 e-con-full e-flex e-con e-child\" data-id=\"7f57c60\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-adb9c42 elementor-widget elementor-widget-heading\" data-id=\"adb9c42\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">RISK MATRIX<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1378978 e-con-full e-flex e-con e-child\" data-id=\"1378978\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b48b861 elementor-widget elementor-widget-text-editor\" data-id=\"b48b861\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Intelly&#8217;s Risk Matrix is an essential tool for identifying, assessing, prioritizing, and mitigating risks associated with our business operations, technologies, and activities. Its main objective is to ensure SAFETY, REGULATORY COMPLIANCE, and CONTINUITY of OPERATIONS, helping to prevent incidents and protect valuable assets. <\/p><p>In addition, it supports informed decision-making, ensures compliance with legal requirements, and fosters a culture of continuous improvement, adapting to new threats and challenges.<\/p><p>Our risk matrix is critical to protecting our company and our customers&#8217; data from potential threats and ensuring its resilience and sustainability.<\/p><p>Our risk matrix is critical to protecting our company and our customers&#8217; data from potential threats and ensuring its resilience and sustainability.<\/p><p>We work with the following topics in our actions:<\/p><p>  1. RISK IDENTIFICATION<br> 2. RISK ANALYSIS<br> 3. RISK TREATMENT<br> 4. MONITORING AND REVIEW<br> 5. RISK MANAGEMENT POLICY    <\/p><p>Our matrix has mitigating actions taking into account the impact and probability for each type of risk identified by us. If you want to know more, please contact <a class=\"custom-link\" href=\"mailto:dpo@intelly.com.br\" target=\"_blank\" rel=\"noopener\">dpo@intelly.com.br<\/a> or through our <a class=\"custom-link\" href=\"https:\/\/isend.co\/atendimento\/\">Call Center<\/a>. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-39d7946 animated-fast e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"39d7946\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9854f83 e-con-full e-flex e-con e-child\" data-id=\"9854f83\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6b964b9 elementor-widget elementor-widget-heading\" data-id=\"6b964b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SECURITY INCIDENTS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8b31e0f e-con-full e-flex e-con e-child\" data-id=\"8b31e0f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3b8cffb elementor-widget elementor-widget-text-editor\" data-id=\"3b8cffb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>At Intelly and our iSend product, data security is our top priority, and we are committed to full compliance with the General Data Protection Law (LGPD\/GPDR). In the event of a security incident, we take the following measures: <\/p><p><strong>&#8211; COMMUNICATION AND TRANSPARENCY<\/strong>: As required by current legislation, we notify our client in a timely manner and in the cases applied to the National Data Protection Authority. We then notify the affected data subject, informing them of the measures taken and the actions necessary to jointly restore the security of their data. <\/p><p><strong>&#8211; USER COLLABORATION<\/strong>: Security is a shared responsibility. If you identify or suspect a security incident involving our company and the iSend family of products, please inform us immediately by emailing: <a class=\"custom-link\" href=\"mailto:dpo@intelly.com.br\" target=\"_blank\" rel=\"noopener\">dpo@intelly.com.br<\/a> or through our <a class=\"custom-link\" href=\"https:\/\/isend.co\/atendimento\/\">Service Center<\/a>. <\/p><p><strong>&#8211; INTERNAL SECURITY MEASURES:<\/strong> All Intelly employees are trained and oriented on information security practices, ensuring that they are prepared to act effectively in the event of incidents.<\/p><p><strong>&#8211; INCIDENT RESPONSE PLAN<\/strong>: In case of information security incidents, we have processes and response plans prepared to meet these important demands. As soon as an incident is proven, our teams begin to apply the protocols and processes carefully prepared for mitigation as soon as possible. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d25c75 animated-fast e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"4d25c75\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b3f6154 e-con-full e-flex e-con e-child\" data-id=\"b3f6154\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c759bc7 elementor-widget elementor-widget-heading\" data-id=\"c759bc7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">INVENT\u00c1RIO DE SOFTWARE<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-61434a2 e-con-full e-flex e-con e-child\" data-id=\"61434a2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3277172 elementor-widget elementor-widget-text-editor\" data-id=\"3277172\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>We maintain inventory, reviewed every six months, with software authorized for use by Intelly employees.<\/p><p>We check that the software is being updated and maintained by the manufacturer, through the OCS Inventory tool, to keep our computers safe at all times.<\/p><p>All libraries, dependencies, and frameworks are downloaded from secure sources, inventoried, updated to not have any publicly known vulnerabilities.<\/p><p>We check that the software is being updated and maintained by the manufacturer to keep our computers safe at all times.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d932477 e-flex e-con-boxed e-con e-parent\" data-id=\"d932477\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-63c73dd e-con-full e-flex e-con e-child\" data-id=\"63c73dd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1be82f4 elementor-widget elementor-widget-heading\" data-id=\"1be82f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">HARDWARE INVENTORY<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5c48244 e-con-full e-flex e-con e-child\" data-id=\"5c48244\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ff5a1d7 elementor-widget elementor-widget-text-editor\" data-id=\"ff5a1d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"gray_block\"><div class=\"uk-container uk-container-center\"><div class=\"uk-grid padding_blocks uk-scrollspy-init-inview uk-scrollspy-inview uk-animation-slide-right\" data-uk-scrollspy=\"{cls:'uk-animation-slide-right' , delay:400}\"><p>We maintain an inventory with the attributes of all devices used at Intelly, as well as the employee\/department responsible.<\/p><\/div><\/div><\/div><div class=\"uk-container uk-container-center\"><div class=\"uk-grid padding_blocks uk-scrollspy-init-inview uk-scrollspy-inview uk-animation-slide-left\" data-uk-scrollspy=\"{cls:'uk-animation-slide-left' , delay:400}\"> <\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7a9745e animated-fast e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"7a9745e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-aa35db4 e-con-full e-flex e-con e-child\" data-id=\"aa35db4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-40e77d2 elementor-widget elementor-widget-heading\" data-id=\"40e77d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SECURE DEVELOPMENT<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-73755d3 e-con-full e-flex e-con e-child\" data-id=\"73755d3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2d81263 elementor-widget elementor-widget-text-editor\" data-id=\"2d81263\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"uk-container uk-container-center\"><div class=\"uk-grid padding_blocks uk-scrollspy-init-inview uk-scrollspy-inview uk-animation-slide-left\" data-uk-scrollspy=\"{cls:'uk-animation-slide-left' , delay:400}\"><p>Focused on our own development since the birth of our iSend products and with years of experience, our team has several standards, best market practices and development environments in order to deliver the most secure and consistent code, for this we work some fronts such as:<\/p><\/div><\/div><div class=\"gray_block\"><div class=\"uk-container uk-container-center\"><div class=\"uk-grid padding_blocks uk-scrollspy-init-inview uk-scrollspy-inview uk-animation-slide-right\" data-uk-scrollspy=\"{cls:'uk-animation-slide-right' , delay:400}\"> <\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e7b8adc e-flex e-con-boxed e-con e-parent\" data-id=\"e7b8adc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a2532cd e-con-full e-flex e-con e-child\" data-id=\"a2532cd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d473d92 elementor-widget elementor-widget-heading\" data-id=\"d473d92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SYSTEMS DEVELOPMENT METHODOLOGY<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4242206 e-con-full e-flex e-con e-child\" data-id=\"4242206\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d08d0d3 elementor-widget elementor-widget-text-editor\" data-id=\"d08d0d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"gray_block\"><div class=\"uk-container uk-container-center\"><div class=\"uk-grid padding_blocks uk-scrollspy-init-inview uk-scrollspy-inview uk-animation-slide-right\" data-uk-scrollspy=\"{cls:'uk-animation-slide-right' , delay:400}\"><p>Intelly employs in its Systems Development Center (NDS), responsible for the development of iSend products, tested and certified methodologies in the development of electronic information systems.<\/p><p>The center always acts with the following basic goal:<br>&#8220;To define, develop, implement and improve the best practices used in Software Development, thus supporting all the company&#8217;s Business Lines.&#8221;<\/p><p>(CMMi | IRUP | ISO) From a successful study of the main systems development methodologies, Intelly arrived at its own system development standard, which can be summarized as follows:<\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b3642ca e-con-full e-flex e-con e-child\" data-id=\"b3642ca\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-01e870c dce_masking-none elementor-widget elementor-widget-image\" data-id=\"01e870c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/isend.co\/wp-content\/uploads\/elementor\/thumbs\/nds-metodologias-r9adtp70kezw5rvfampnfi86sokqvks781bsumvv9e.jpg\" title=\"nds-metodologias\" alt=\"nds-metodologias\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f09808d e-con-full e-flex e-con e-child\" data-id=\"f09808d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7c770e6 elementor-widget elementor-widget-text-editor\" data-id=\"7c770e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"gray_block\"><div class=\"uk-container uk-container-center\"><div class=\"uk-grid padding_blocks uk-scrollspy-init-inview uk-scrollspy-inview uk-animation-slide-right\" data-uk-scrollspy=\"{cls:'uk-animation-slide-right' , delay:400}\"><p>The development cycle of any technological artifact is always carried out using the practices and methodologies already listed, very focused on the project management methodology, and always respecting the development cycles, as established in the figure below:<\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cbbe606 e-con-full e-flex e-con e-child\" data-id=\"cbbe606\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-da6ee05 dce_masking-none elementor-widget elementor-widget-image\" data-id=\"da6ee05\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/isend.co\/wp-content\/uploads\/elementor\/thumbs\/nds-ciclo-r9adtmdhzwwgy4c7zo9yowbwwsda47w7t8eh66mkuc.png\" title=\"nds-ciclo\" alt=\"nds-ciclo\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7482492 e-con-full e-flex e-con e-child\" data-id=\"7482492\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-aea6209 elementor-widget elementor-widget-text-editor\" data-id=\"aea6209\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"gray_block\"><div class=\"uk-container uk-container-center\"><div class=\"uk-grid padding_blocks uk-scrollspy-init-inview uk-scrollspy-inview uk-animation-slide-right\" data-uk-scrollspy=\"{cls:'uk-animation-slide-right' , delay:400}\"><p>Below is a breakdown of the methodology with regard to the flows of interactions:<\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-62627a5 e-con-full e-flex e-con e-child\" data-id=\"62627a5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-da8d990 dce_masking-none elementor-widget elementor-widget-image\" data-id=\"da8d990\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/isend.co\/wp-content\/uploads\/elementor\/thumbs\/nds-metodologia-det-r9adtfsmo2nx24h7iydjj4np2612n1r1j48cfm4bac.jpg\" title=\"nds-metodologia-det\" alt=\"nds-metodologia-det\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-87540de animated-fast e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"87540de\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9153a89 e-con-full e-flex e-con e-child\" data-id=\"9153a89\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3324b24 elementor-widget elementor-widget-heading\" data-id=\"3324b24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CODE CONTROLS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5c4e71f e-con-full e-flex e-con e-child\" data-id=\"5c4e71f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f033993 elementor-widget elementor-widget-text-editor\" data-id=\"f033993\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"uk-container uk-container-center\"><div class=\"uk-grid padding_blocks uk-scrollspy-init-inview uk-scrollspy-inview uk-animation-slide-left\" data-uk-scrollspy=\"{cls:'uk-animation-slide-left' , delay:400}\"><p>All elements of the applications have control mechanisms against malicious code (anti-malware, IPS, firewall, etc.) where we use Bitbucket&#8217;s static solution. Scanning our code is always performed during the build process, and is a necessary step to be followed before the code is put into production. <\/p><\/div><\/div><div class=\"gray_block\"><div class=\"uk-container uk-container-center\"><div class=\"uk-grid padding_blocks uk-scrollspy-init-inview uk-scrollspy-inview uk-animation-slide-right\" data-uk-scrollspy=\"{cls:'uk-animation-slide-right' , delay:400}\"> <\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d3332f animated-fast e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"4d3332f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2f06914 e-con-full e-flex e-con e-child\" data-id=\"2f06914\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e42f245 elementor-widget elementor-widget-heading\" data-id=\"e42f245\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">HOMOLOGATION\/CODE REVIEW<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bee153a e-con-full e-flex e-con e-child\" data-id=\"bee153a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2f920ee elementor-widget elementor-widget-text-editor\" data-id=\"2f920ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"gray_block\"><div class=\"uk-container uk-container-center\"><div class=\"uk-grid padding_blocks uk-scrollspy-init-inview uk-scrollspy-inview uk-animation-slide-right\" data-uk-scrollspy=\"{cls:'uk-animation-slide-right' , delay:400}\"><div class=\"gray_block\"><div class=\"uk-container uk-container-center\"><div class=\"uk-grid padding_blocks uk-scrollspy-init-inview uk-scrollspy-inview uk-animation-slide-right\" data-uk-scrollspy=\"{cls:'uk-animation-slide-right' , delay:400}\"><p>For a code, written by a developer, to be considered production-ready, it needs to be approved or reviewed by at least one person on the development team<\/p><\/div><\/div><\/div><div class=\"uk-container uk-container-center\"><div class=\"uk-grid padding_blocks uk-scrollspy-init-inview uk-scrollspy-inview uk-animation-slide-left\" data-uk-scrollspy=\"{cls:'uk-animation-slide-left' , delay:400}\"> <\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-04fc322 animated-fast e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"04fc322\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9c8fcb4 e-con-full e-flex e-con e-child\" data-id=\"9c8fcb4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-83aa823 elementor-widget elementor-widget-heading\" data-id=\"83aa823\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DEPLOY<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7f1e6cc e-con-full e-flex e-con e-child\" data-id=\"7f1e6cc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8735ecf elementor-widget elementor-widget-text-editor\" data-id=\"8735ecf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"uk-container uk-container-center\"><div class=\"uk-grid padding_blocks uk-scrollspy-init-inview uk-scrollspy-inview uk-animation-slide-left\" data-uk-scrollspy=\"{cls:'uk-animation-slide-left' , delay:400}\"><div class=\"uk-width-small-1-1\"><p>It is only possible to submit signed code to our code repositories, ensuring its authorship.<\/p><\/div><\/div><\/div><div class=\"gray_block\"><div class=\"uk-container uk-container-center\"><div class=\"uk-grid padding_blocks uk-scrollspy-init-inview uk-scrollspy-inview uk-animation-slide-right\" data-uk-scrollspy=\"{cls:'uk-animation-slide-right' , delay:400}\"> <\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-69c74d2 animated-fast e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"69c74d2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-26e4346 e-con-full e-flex e-con e-child\" data-id=\"26e4346\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e457c15 elementor-widget elementor-widget-heading\" data-id=\"e457c15\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">UPGRADES AND MAINTENANCE<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6e58435 e-con-full e-flex e-con e-child\" data-id=\"6e58435\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1de9032 elementor-widget elementor-widget-text-editor\" data-id=\"1de9032\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"gray_block\"><div class=\"uk-container uk-container-center\"><div class=\"uk-grid padding_blocks uk-scrollspy-init-inview uk-scrollspy-inview uk-animation-slide-right\" data-uk-scrollspy=\"{cls:'uk-animation-slide-right' , delay:400}\"><div class=\"gray_block\"><div class=\"uk-container uk-container-center\"><div class=\"uk-grid padding_blocks uk-scrollspy-init-inview uk-scrollspy-inview uk-animation-slide-right\" data-uk-scrollspy=\"{cls:'uk-animation-slide-right' , delay:400}\"><p>In order to mitigate vulnerabilities resulting from software inconsistencies, we perform periodic updates (3 months &#8211; minimum) with OS updates, patches.<\/p><p>Updates to iSend products occur monthly.<\/p><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-46a467b e-flex e-con-boxed e-con e-parent\" data-id=\"46a467b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1625240 e-con-full e-flex e-con e-child\" data-id=\"1625240\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-feebef5 elementor-widget elementor-widget-heading\" data-id=\"feebef5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">SEGREGATION OF ENVIRONMENTS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-850e6ed e-con-full e-flex e-con e-child\" data-id=\"850e6ed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-99b031c elementor-widget elementor-widget-text-editor\" data-id=\"99b031c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"uk-container uk-container-center\"><div class=\"uk-grid padding_blocks uk-scrollspy-init-inview uk-scrollspy-inview uk-animation-slide-left\" data-uk-scrollspy=\"{cls:'uk-animation-slide-left' , delay:400}\"><div class=\"uk-width-small-1-1\"><p>No Production data is used for the Development and Approval of our products.<\/p><p>The Production and Development environments are totally separate\/segregated, with storage even in different vendors, while the Production environment is hosted by Microsoft Azure, the Development environment is hosted on Amazon (AWS) and fully replicated in our physical structure of our unit in Porto Alegre\/RS.<\/p><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e270f64 animated-fast e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"e270f64\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7f1e138 e-con-full e-flex e-con e-child\" data-id=\"7f1e138\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d27afe elementor-widget elementor-widget-heading\" data-id=\"6d27afe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PREPRODUCTION<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2dd3c45 e-con-full e-flex e-con e-child\" data-id=\"2dd3c45\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-02769bd elementor-widget elementor-widget-text-editor\" data-id=\"02769bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"gray_block\"><div class=\"uk-container uk-container-center\"><div class=\"uk-grid padding_blocks uk-scrollspy-init-inview uk-scrollspy-inview uk-animation-slide-right\" data-uk-scrollspy=\"{cls:'uk-animation-slide-right' , delay:400}\"><div class=\"gray_block\"><div class=\"uk-container uk-container-center\"><div class=\"uk-grid padding_blocks uk-scrollspy-init-inview uk-scrollspy-inview uk-animation-slide-right\" data-uk-scrollspy=\"{cls:'uk-animation-slide-right' , delay:400}\"><p>Our entire deployment cycle for production goes through two stages\/validations:<\/p><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2993a67 e-con-full e-flex e-con e-child\" data-id=\"2993a67\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-45d4476 elementor-widget elementor-widget-text-editor\" data-id=\"45d4476\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"gray_block\"><div class=\"uk-container uk-container-center\"><div class=\"uk-grid padding_blocks uk-scrollspy-init-inview uk-scrollspy-inview uk-animation-slide-right\" data-uk-scrollspy=\"{cls:'uk-animation-slide-right' , delay:400}\"><div class=\"gray_block\"><div class=\"uk-container uk-container-center\"><div class=\"uk-grid padding_blocks uk-scrollspy-init-inview uk-scrollspy-inview uk-animation-slide-right\" data-uk-scrollspy=\"{cls:'uk-animation-slide-right' , delay:400}\"><p>&#8211; STEP 1: Availability of all artifacts produced for a release\/release in our iSend Labs environment which is a Beta Test\/Pre-Production environment with a reduced amount of customers\/business partners who are engaged in making our product better every day.<a class=\"custom-link\" href=\"https:\/\/isend.co\/inspire-se\/isendlabs\/\" target=\"_blank\" rel=\"noopener\">  To learn more, access this content<\/a><\/p><p>&#8211; STEP 2: On average, after 15 days of availability of the artifacts, in the iSend Labs environment, from the previous step, if there are no negative conditions, it is made available in the production environment for all customers.<\/p><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-82c138e e-flex e-con-boxed e-con e-parent\" data-id=\"82c138e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5a66e4f e-con-full e-flex e-con e-child\" data-id=\"5a66e4f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-de754c0 elementor-widget elementor-widget-heading\" data-id=\"de754c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PROJECT MANAGEMENT METHODOLOGY<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-965f802 e-con-full e-flex e-con e-child\" data-id=\"965f802\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-21d1c8d elementor-widget elementor-widget-text-editor\" data-id=\"21d1c8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The entire scope of our projects is based on the management methodology of the PMI \u2013 Project Management Institute. This methodology is internationally adopted as an ANSI standard for Project Management, thus ensuring the quality of the services provided and the certainty that the final product will be adequate to the requirements of the project and fully adherent to the required needs.   <a class=\"custom-link\" href=\"https:\/\/pmirs.org.br\/\" target=\"_blank\" rel=\"noopener\">To learn more, access this content<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2dce8ce animated-fast e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"2dce8ce\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeInRight&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-57bdbe1 e-con-full e-flex e-con e-child\" data-id=\"57bdbe1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a1268bb elementor-widget elementor-widget-heading\" data-id=\"a1268bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CLEAN TABLE AND SCREEN POLICY<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bcded88 e-con-full e-flex e-con e-child\" data-id=\"bcded88\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0574188 elementor-widget elementor-widget-text-editor\" data-id=\"0574188\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"gray_block\"><div class=\"uk-container uk-container-center\"><div class=\"uk-grid padding_blocks uk-scrollspy-init-inview uk-scrollspy-inview uk-animation-slide-right\" data-uk-scrollspy=\"{cls:'uk-animation-slide-right' , delay:400}\"><div class=\"gray_block\"><div class=\"uk-container uk-container-center\"><div class=\"uk-grid padding_blocks uk-scrollspy-init-inview uk-scrollspy-inview uk-animation-slide-right\" data-uk-scrollspy=\"{cls:'uk-animation-slide-right' , delay:400}\"><p>The clean desks and screens policy is an information security practice recommended for workplaces in our company, in order to avoid the exposure of sensitive or non-sensitive information, and to inhibit data compromise.<\/p><p>To reduce unauthorized access, loss or damage to information during and outside office hours, we request that all our employees adopt a clean desk policy for the most varied information and, equally, a clean screen policy, against the danger of having a user logged in and\/or absent.<\/p><p>Information protection measures are in our daily lives, to circumvent security incidents, data leaks and other problems that may harm those who provide our service.<\/p><p>To this end, we have adopted the minimum measures of (but not limited to):<\/p><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-694439a e-con-full e-flex e-con e-child\" data-id=\"694439a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6f4d6e0 elementor-widget elementor-widget-text-editor\" data-id=\"6f4d6e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"gray_block\"><div class=\"uk-container uk-container-center\"><div class=\"uk-grid padding_blocks uk-scrollspy-init-inview uk-scrollspy-inview uk-animation-slide-right\" data-uk-scrollspy=\"{cls:'uk-animation-slide-right' , delay:400}\"><div class=\"gray_block\"><div class=\"uk-container uk-container-center\"><div class=\"uk-grid padding_blocks uk-scrollspy-init-inview uk-scrollspy-inview uk-animation-slide-right\" data-uk-scrollspy=\"{cls:'uk-animation-slide-right' , delay:400}\"><p>&#8211; Keep the work environment organized, both physical and digital<br>&#8211; Keep the physical desk and especially the digital desk clean of information with the aim of reducing any loss of important data<br>&#8211; Sensitive information should always be stored in secure locations<br>&#8211; Always seek a positive image at work, whether with the team, customers or visitors<br>&#8211; We adopt procedures for shredding sensitive documents when they are discarded<br>&#8211; We encourage the use of electronic documents<br>&#8211; We only print documents when necessary<br>&#8211; We do not leave sensitive documents on printers<br>&#8211; We always recommend that all machines, when in the absence of an operator, this should be protected by passwords<br>&#8211; We clean physical and digital trash cans periodically<\/p><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dae3726 animated-fast e-flex e-con-boxed elementor-invisible e-con e-parent\" data-id=\"dae3726\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0cd7da1 elementor-widget elementor-widget-heading\" data-id=\"0cd7da1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Date of last revision of this policy: 16.08.24<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Security Policy GET TO KNOW ISEND BUY NOW We present here the Security Policy of our company Intelly and our iSend product. Reliability and care for information security have always [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-29431","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/isend.co\/en\/wp-json\/wp\/v2\/pages\/29431","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/isend.co\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/isend.co\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/isend.co\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/isend.co\/en\/wp-json\/wp\/v2\/comments?post=29431"}],"version-history":[{"count":1,"href":"https:\/\/isend.co\/en\/wp-json\/wp\/v2\/pages\/29431\/revisions"}],"predecessor-version":[{"id":29432,"href":"https:\/\/isend.co\/en\/wp-json\/wp\/v2\/pages\/29431\/revisions\/29432"}],"wp:attachment":[{"href":"https:\/\/isend.co\/en\/wp-json\/wp\/v2\/media?parent=29431"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}