Version updated on September, 2024
INTRODUCTION
Compliance with the established guidelines is the responsibility of everyone who have access to the information technology assets of Hotmart Technology BV ("Hotmart" or "Company") and its subsidiaries, whether tangible or not, regardless of form or format, including Brazilian regulated subsidiaries, such as Launch Pad Sociedade de Crédito Direto S/A. Therefore, it is essential to achieve adequate levels of protection for Hotmart's information.
GUIDELINES
Hotmart aims to carry out activities to protect the confidentiality, integrity, and availability of cyber security. The objective is to achieve, among others, the following objectives:
I) Effectively monitor the effectiveness of the processes and controls implemented to reduce cyber security risks.
II) Rapid identification of emerging information security risks for treatment.
III) Continuous improvement in the ability to prevent, detect, and reduce vulnerability to incidents related to the cyber environment.
IV) Continuous promotion of a culture of attention to information security and protection of the data processed by Hotmart, incorporating it into operational processes and procedures.
INFORMATION SECURITY PROGRAM
Hotmart's Information Security program consists of a broad process that, within the framework of the outlined principles and objectives, guides the implementation of controls and information management instruments, among which the following stand out:
Classification is determined based on the value of the information, sensitivity, criticality, legal and contractual obligations, and the Company defines labels for the classification of information, which must be observed and applied internally during the processing of information.
The company ensures respect for all aspects of intellectual property present in its environment and in its operations. It is everyone's duty to refrain from using Hotmart's information or intellectual property for private purposes.
At Hotmart, information assets are protected against undue access, and employees must observe the precautions inherent to each activity, acting with integrity and discernment when using the Company's equipment.
The company adopts formal procedures for managing access to its entire IT environment, including processes for granting, revoking, transferring, reviewing, and authenticating access.
Hotmart adopts various controls for managing code review processes, the integrity and continuity of the systems developed, tracking, versioning, testing, and managing the continuous integration cycle.
By managing its networks, Hotmart preserves the secure flow of data between the components of its systems, observing network segmentation and the use of secure configuration standards and strong encryption.
Hotmart carries out recurring scans and tests on its IT environment, by a team specialized in security tests, to check for flaws and vulnerabilities in its systems, which are dealt with by its cyber security and secure development teams.
Protection mechanisms are implemented against malicious code at entry and exit points of the company's systems. These points include but are not limited to, firewalls, remote access servers, workstations, email servers, web servers, proxy servers, and mobile devices.
Based on information received and internal checks, the risks involved in contracting each supplier are assessed to ensure compliance with the company's cyber security, data and information privacy rules, in accordance with the services provided.
Automated audit trails are implemented for Hotmart's system components, allowing the tracking of security events, authentication, and actions performed by users.
Hotmart applies information transmission control in its IT environment, through automated solutions, which detect, restrict and alert the inappropriate circulation of data. Controls are associated with the classification of this information.
In order to securely maintain and safeguard Hotmart's data, periodic backups and recovery tests of its systems' functionalities are carried out to ensure the continuity of its operation.
To disseminate knowledge and continuous improvement, the Company carries out periodic training and awareness-raising regarding Cyber and Information Security, covering all employees and third parties who access the Company's technology environment.
In the event of any inconsistency or failure in Hotmart's environment being identified by the external public, the Company provides a channel for receiving the relevant notice, via e-mail to cybersecurity@hotmart.com.
Security Recommendations for Hotmart Customers and Users:
PENALTIES FOR NON-COMPLIANCE
Failure to comply with the guidelines of the Information Security Program, defined in this Policy, constitutes a serious offense and entails the application of sanctions by internal and external standards, terms of use, and other applicable regulations in force.
Any employees, service providers, users, or clients who deliberately fail to report violations of this policy will also be subject to the measures mentioned above.
To this end, the Hotmart Company provides a reporting channel
Hotmart Company guarantees to whistleblowers that we act in a genuine and truthful manner: (a) anonymity and protection of their identities, if necessary and requested; (b) confidentiality of the process; (c) impartiality in the analysis of the reported fact; (d) the right to information about the progress of the case; and (e) Protection and non-retaliation.