In 2019, we focused on expanding and strengthening security and privacy processes, based on protocols developed in accordance with best practices and international standards. Security actions taken for Oi client information are based on applicable legal regulations and seek to define network technology standards and team awareness, especially in the business, information technology and engineering areas. Within our approval flow process, we assess the need for a user to have access, or not, to the data traffic. Information security management guarantees the minimum security requirements in product research and development, in addition to tests done prior to entry into production.
Our Information Security Policy is publicly available and can be accessed through the link.