{"id":5924,"date":"2024-09-03T17:43:55","date_gmt":"2024-09-03T20:43:55","guid":{"rendered":"https:\/\/fourtrust.com.br\/?page_id=5924"},"modified":"2025-02-06T13:04:51","modified_gmt":"2025-02-06T16:04:51","slug":"information-security-policy","status":"publish","type":"page","link":"https:\/\/fourtrust.com.br\/en\/information-security-policy\/","title":{"rendered":"Information Security Policy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5924\" class=\"elementor elementor-5924 elementor-5923\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4a2e850 e-flex e-con-boxed e-con e-parent\" data-id=\"4a2e850\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;3fe554a&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}],&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_bottom&quot;:&quot;curve&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n    <path class=\"elementor-shape-fill\" d=\"M1000,4.3V0H0v4.3C0.9,23.1,126.7,99.2,500,100S1000,22.7,1000,4.3z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e9e034 elementor-widget elementor-widget-heading\" data-id=\"5e9e034\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Information Security Policy<\/h1>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cf25272 e-flex e-con-boxed e-con e-parent\" data-id=\"cf25272\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cd76170&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7e7d172 e-con-full e-flex e-con e-child\" data-id=\"7e7d172\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-18f7c0b elementor-widget elementor-widget-text-editor\" data-id=\"18f7c0b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>OBJECTIVE<\/strong><br \/>To guarantee the availability, integrity, confidentiality, legality, authenticity and auditability of the information necessary for the conduct of FOURTRUST&#8217;s business.<\/p>\n<p><strong>SCOPE<\/strong><br \/>Applies to all administrators, employees, interns, service providers, systems and services, including work performed externally or by third parties, who use the processing environment, or with access to information belonging to FOURTRUST or ITS CLIENTS.<\/p>\n<p>Each and every user of the company&#8217;s computing resources has the responsibility to protect the security and integrity of information and computer equipment.<\/p>\n<p><strong>CONCEPTS<\/strong><br \/>Information security is characterized here by the preservation of the following concepts:<\/p>\n<p>Confidentiality: Ensures that information is accessible only by authorized persons, for the necessary period;<\/p>\n<p>Availability: Ensures that information is available to authorized persons whenever necessary;<\/p>\n<p>Integrity: Ensures that the information is complete and integral and that it has not been modified or destroyed in an unauthorized or accidental manner during its life cycle.<\/p>\n<p><strong>DEFINITIONS<\/strong><br \/>Information: result of the processing and organization of data (electronic or physical) or records of a system. Information Assets: set of information, stored in such a way that it can be identified and recognized as valuable to the company.<\/p>\n<p>Information systems: in general, these are computer systems used by the company to support its operations.<\/p>\n<p>Segregation of duties: consists of the separation between the functions of authorization, approval of operations, execution, control and accounting, in such a way that no employee, intern or service provider holds powers and duties that are at odds with this principle.<\/p>\n<p>Information Security Management Group: group composed of FOURTRUST administrators with the objective of evaluating the information security strategy and guidelines followed by the company.<\/p>\n<p><strong>INFORMATION CLASSIFICATION<\/strong><br \/>All information produced in the development of the company&#8217;s activities must be classified according to the confidentiality levels below:<\/p>\n<p>Public: This is all information that can be accessed by the organization&#8217;s users, customers, suppliers, service providers and the general public. For example: information available on the FOURTRUST website or published in the FOURTRUST em Foco magazine. Internal: This is all information that can only be accessed by employees of the organization. This is information that has a degree of confidentiality that could compromise the organization&#8217;s image. Example: weekly bulletin.   <\/p>\n<p>Confidential: This is all information that can be accessed by users of the organization and by specifically authorized partners of the organization. Unauthorized disclosure of this information may cause an impact (financial, image or operational) to the organization&#8221;s business or the partner&#8217;s business. Example: commercial proposals. <\/p>\n<p>Restricted: This is all information that can only be accessed by users of the organization explicitly indicated by name or by the area to which they belong. Unauthorized disclosure of this information can cause serious damage to the business and\/or compromise the organization&#8217;s business strategy. Example: payroll data is restricted to access only by the HR department.  <\/p>\n<p><strong>RESPONSIBILITIES<\/strong><br \/>In general, it is the responsibility of all administrators, employees, interns and service providers to:<br \/>&#8211; Faithfully comply with the FOURTRUST Information Security Policy;<br \/>&#8211; Protect information against unauthorized access, modification, destruction or disclosure by FOURTRUST;<br \/>&#8211; Ensure that the technological resources, information and systems at its disposal are used only for the purposes approved by FOURTRUST;<br \/>&#8211; Comply with the laws and regulations that regulate intellectual property;<br \/>&#8211; Do not discuss confidential work matters in public environments or exposed areas (planes, transport, restaurants, social gatherings, etc.), including issuing comments and opinions on blogs and social networks;<br \/>&#8211; Do not share confidential information of any kind;<br \/>&#8211; Immediately report to the Information Security Management area any non-compliance or violation of this Policy and\/or its Rules and Procedures.<\/p>\n<p>It is the duty of everyone within FOURTRUST:<br \/>\u2022 To consider information as an asset of the organization, one of the critical resources for conducting business, which has great value to FOURTRUST and must always be treated professionally.<br \/>\u2022 It is the responsibility of the Manager\/Supervisor of each area to classify the information (reports, documents, models, procedures, spreadsheets) generated by their area in accordance with the level of confidentiality established in this document.<\/p>\n<p>Good practices include:<br \/>\u2022 Blocking access to the computer whenever you leave your desk, even for a few minutes;<br \/>\u2022 Keeping desks organized and documents with confidential information locked when you are not using them.<\/p>\n<p><strong>FOURTRUST Information Security Management Group<\/strong><\/p>\n<p>Mission<br \/>To be the manager of the security process and protect the organization&#8217;s information, catalyzing, coordinating, developing and\/or implementing actions for this purpose.<\/p>\n<p>Team:<br \/>Carlos Paiva and Rodrigo Medri<\/p>\n<\/p>\n<p><strong>GENERAL GUIDELINES<\/strong><\/p>\n<p><strong>EMPLOYEE PERSONAL DATA<\/strong><br \/>FOURTRUST undertakes not to intentionally accumulate or maintain employee personal data other than that which is relevant to the conduct of its business. All employee personal data will be considered confidential. <\/p>\n<p>Personal data of employees under the responsibility of FOURTRUST will not be used for purposes other than those for which they were collected. Personal data of employees will not be transferred to third parties, except when required by our business, and provided that such third parties maintain the confidentiality of said data. <\/p>\n<p><strong>ILLEGAL SOFTWARE<\/strong><br \/>The use of illegal software (pirated software) is strictly prohibited at FOURTRUST. Users may not, under any circumstances, install this type of software on the company&#8217;s equipment. <\/p>\n<p>Periodically, the FOURTRUST Information Security Management Group will carry out checks on the data on the servers and\/or on the users&#8217; computers, aiming to ensure the correct application of this guideline.<\/p>\n<p><strong>EMPLOYEE ADMISSION\/DISMISSAL<\/strong><br \/>FOURTRUST&#8217;s HR department must inform FOURTRUST&#8217;s Information Security Management Group of any and all temporary and\/or intern movements, and employee admission\/dismissals, so that they can be registered or deregistered in the company&#8217;s systems. HR must ask the department responsible for hiring which systems and work file repositories the new employee should have access to. This information must be recorded and forwarded to the Information Security Management Group using the \u201cForm for granting and revoking access to FOURTRUST&#8217;s computing resources\u201d. FOURTRUST&#8217;s Information Security Management Group will register the new user and inform the new user of their first password, which must be changed by the user upon their first access.  <\/p>\n<p>In the event of termination, the HR department must communicate the fact on the same date to the Information Security Management Group, using the \u201cForm for granting and revoking access to FOURTRUST computing resources\u201d so that all granted accesses are revoked.<\/p>\n<p>It is the responsibility of the HR department to inform and obtain the necessary signatures of agreement from new hires regarding FOURTRUST&#8217;s Information Security Policy.<\/p>\n<p><strong>GRANTING AND REVOCING ACCESS<\/strong><br \/>When there is a need to grant or revoke access to FOURTRUST&#8217;s systems, work file repositories and\/or IT equipment, the requesting sector will communicate this need to the FOURTRUST Information Security Management Group, copying HR, using the \u201cForm for granting and revoking access to FOURTRUST&#8217;s computing resources\u201d.<\/p>\n<p><strong>PASSWORD POLICY<\/strong><br \/>We recommend that passwords always have at least 8 (eight) alphanumeric characters, containing at least one capital letter and one special character.<\/p>\n<p>We recommend that users also change passwords every 3 months, and that they do not repeat passwords set in the last 12 months.<\/p>\n<p>Whenever a user is terminated from the organization, all their passwords and access are revoked on the same day.<\/p>\n<p><strong>WORKING FILES<\/strong><br \/>Working files, considered essential data for business development, are kept on FOURTRUST&#8217;s file servers in a system that allows the control, comparison and management of different versions, called SVN.<\/p>\n<p>Access is via a client application of the versioning system approved by the FOURTRUST Information Security Management Group.<\/p>\n<p>Examples of work files are:<br \/>\u2022 Billing spreadsheet;<br \/>\u2022 Invoices;<br \/>\u2022 Commercial proposals;<br \/>\u2022 Technical analysis reports;<br \/>\u2022 Measurement spreadsheets;<br \/>\u2022 System documentation used as input for analysis and measurement work.<\/p>\n<p>Access to SVN outside FOURTRUST premises is blocked and prohibited, unless done via VPN, with due permission from the Information Security Management Group.<\/p>\n<p><strong>INDIVIDUAL FILES<\/strong><br \/>Individual files are those created, copied or developed by users that are not an integral part of the deliverable product of their work, whether internal or for clients. Some examples are: drafts or reminders, calculation memories, messages, diagrams or technical instructions. The users themselves are responsible for backing up these files.  <\/p>\n<p>Users are not permitted to use or store the types of files listed below on their workstations:<br \/>\u2022 Programs not licensed or approved for use by FOURTRUST;<br \/>\u2022 Music, films, series, TV programs;<br \/>\u2022 Videos not related to professional activity;<br \/>\u2022 Pornographic or sex-related content.<\/p>\n<p><strong>SHARING FOLDERS AND DATA<\/strong><br \/>Sharing work folders and files whose content is classified as CONFIDENTIAL or RESTRICTED information is prohibited through the following:<br \/>\u2022 Google Talk, WhatsApp, Viber or any other instant messaging communicator;<br \/>\u2022 Sharing Windows folders;<br \/>\u2022 Bluetooth;<br \/>\u2022 Copying via pen drive or any other removable device;<br \/>\u2022 Google Drive, Dropbox, iCloud, OneDrive or any other virtual drive.<\/p>\n<p>If there is a need to share data between users (internal and\/or external), the Pydio system must be used, available at https:\/\/transfer.FOURTRUSTcs.com.br<\/p>\n<p><strong>BACKUP COPIES, RECOVERY AND INTEGRITY OF SYSTEMS AND<\/strong> <strong>THEIR DATABASES<\/strong><br \/>Backup copies of systems, work file repositories, databases and configurations of equipment and network servers are the exclusive responsibility of the Information Security Management Group.<\/p>\n<p><strong>INTERNET USE<\/strong><br \/>Internet use will be monitored by the Information Security Management Group, through the use of a navigation registration system that informs which user is connected, the time they used the Internet and which page they accessed.<\/p>\n<p>The definition of employees who will be allowed to use (browse) restricted websites, such as social networks, is the responsibility of the company&#8217;s management, based on a request from its Manager\/Supervisor.<\/p>\n<p>Users must ensure that they are not performing actions that may infringe third party copyrights, trademarks, licenses of use or patents.<\/p>\n<p>When browsing the Internet, it is prohibited to view, transfer (downloads), copy or any other type of access to websites:<br \/>\u2022 radio stations (*);<br \/>\u2022 Online games;<br \/>\u2022 Pornographic or sex-related content;<br \/>\u2022 That defend illegal activities;<br \/>\u2022 That belittle, depreciate or incite prejudice against certain classes;<br \/>\u2022 That promote participation in discussion rooms on matters related to FOURTRUST&#8217;s business, which do not contain information that adds professional knowledge and\/or for the business should not be accessed.<\/p>\n<p>Any access to social networks that is not related to the company&#8217;s area of interest is not permitted and, therefore, is subject to punishment.<\/p>\n<p>*Access to radio stations or Spotify is only permitted for use via cell phone, through a connection established on the \u201cFOURTRUST_Guest\u201d Wi-Fi network.<\/p>\n<p><strong>USE OF ELECTRONIC MAIL<\/strong> \u2013 (\u201ce-mail\u201d)<br \/>The electronic mail provided by FOURTRUST is an internal and external communication tool for conducting the company\u2019s business.<\/p>\n<p>Messages must be written in professional language, must not compromise the image of FOURTRUST, cannot be contrary to current legislation or the ethical principles established in the \u201cCode of Ethics and Conduct\u201d.<\/p>\n<p>The use of electronic mail is and the user is responsible for every message sent from his\/her address.<\/p>\n<p>It is not permitted to register personal contacts in instant messaging systems (when using the professional account @FOURTRUST.com.br); and not even the use of personal accounts.<\/p>\n<p>It is strictly forbidden to send messages that:<br \/>\u2022 Contain defamatory statements and offensive language;<br \/>\u2022 May cause harm to other people;<br \/>\u2022 Are hostile; \u2022 Are related to \u201cchain letters\u201d, pornographic content or equivalent;<br \/>\u2022 May harm the image of FOURTRUST and\/or other companies;<br \/>\u2022 Are inconsistent with the policies established in the FOURTRUST \u201cCode of Ethics and Conduct\u201d.<\/p>\n<p>The use of free e-mail (Yahoo!, Hotmail, etc.) on FOURTRUST computers will not be permitted.<\/p>\n<p>The Information Security Management Group may, in order to prevent viruses from entering FOURTRUST computers, block the receipt of emails from free emails.<\/p>\n<p><strong>NEEDS FOR NEW SYSTEMS, APPLICATIONS AND\/OR EQUIPMENT<\/strong><br \/>The Information Security Management Group is responsible for defining the purchase, replacement and installation of any and all \u201csoftware\u201d and \u201chardware\u201d.<\/p>\n<p>Any need for new software or hardware must be discussed with those responsible for the Information Security Management Group. The purchase or development of software directly by users is not permitted. <\/p>\n<p><strong>USE OF COMPANY-OWNED EQUIPMENT<\/strong><br \/>Users who are in possession of any equipment (desktop, notebook, cell phone or tablet) owned by FOURTRUST must be aware that:<br \/>\u2022 The information technology resources made available to users are intended for the performance of professional activities;<br \/>\u2022 The protection of the computing resource for individual use is the responsibility of the user;<br \/>\u2022 It is the responsibility of each user to ensure the integrity of the equipment, the confidentiality and availability of the information contained therein;<br \/>\u2022 The user must not change the configuration of the equipment received;<br \/>\u2022 The user must not install or remove any program from the equipment received. Nor must the user change the configuration of any previously installed program. <\/p>\n<p>Outside of work:<br \/>\u2022 Keep the equipment with you at all times;<br \/>\u2022 Be careful in hotel lobbies, airports, airplanes, taxis, etc.<br \/>\u2022 When transporting the equipment in a car, always use the trunk or a place that is not visible;<br \/>\u2022 Be careful when transporting the equipment on the street.<\/p>\n<p>In case of theft:<br \/>\u2022 Report the incident at a police station;<br \/>\u2022 Report the incident as quickly as possible to your immediate superior and the Information Security Management Group;<br \/>\u2022 Send a copy of the incident report to HR.<\/p>\n<p><strong>RESPONSIBILITIES OF MANAGERS\/SUPERVISORS<\/strong><br \/>Managers and supervisors are responsible for defining their subordinates&#8217; access rights to the company&#8217;s systems and information, and are responsible for verifying that they are accessing exactly the systems and data areas compatible with their respective functions, using and maintaining the equipment properly, and keeping backup copies of their individual files, as established in this policy.<\/p>\n<p>The Information Security Management Group will periodically audit users&#8217; access to information, verifying:<br \/>\u2022 What type of information the user can access; <br \/>\u2022 Who is authorized to access a given system and\/or information;<br \/>\u2022 Who accessed a given system and information;<br \/>\u2022 Who authorized the user to have permission to access a given system or information;<br \/>\u2022 What information or system a given user accessed;<br \/>\u2022 Who attempted to access any system or information without authorization.<\/p>\n<p><strong>TELECOMMUNICATIONS SYSTEM<\/strong><br \/>Controlling use, granting permissions and applying restrictions in relation to FOURTRUST telephone extensions, as well as the use of any virtual extensions installed on computers, is the responsibility of the Information Security Management Group, in accordance with the company&#8217;s management definitions.<\/p>\n<p><strong>USE OF ANTIVIRUS<\/strong><br \/>Every file obtained via the Internet or received from an entity external to FOURTRUST must be checked by an antivirus program.<\/p>\n<p>All workstations have antivirus software installed. Its update will be automatic, scheduled by the Information Security Management Group, via the network. <\/p>\n<p>The user cannot, under any circumstances, disable the antivirus program installed on the workstations.<\/p>\n<p><strong>VIOLATION OF SECURITY POLICY<\/strong><br \/>Is any act that:<br \/>Exposes the company to an actual or potential monetary loss through the compromise of data or information security or the loss of equipment;<\/p>\n<p>Involve the disclosure of confidential data, copyrights, trades, patents or unauthorized use of corporate data; Involve the use of data for illicit purposes, which may include the violation of any law, regulation or any other government provision.<\/p>\n<p><strong>PENALTIES<\/strong><br \/>Failure to comply with this Information Security Policy constitutes serious misconduct and may result in the following actions: formal warning, suspension, termination of employment contract, other disciplinary action and\/or civil or criminal proceedings.<\/p>\n<p><strong>Validity<\/strong><br \/>The provisions of this document shall come into force on the date of publication of the notice announcing it.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Information Security Policy OBJECTIVETo guarantee the availability, integrity, confidentiality, legality, authenticity and auditability of the information necessary for the conduct of FOURTRUST&#8217;s business. SCOPEApplies to all administrators, employees, interns, service providers, systems and services, including work performed externally or by third parties, who use the processing environment, or with access to information belonging to FOURTRUST [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5924","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/fourtrust.com.br\/en\/wp-json\/wp\/v2\/pages\/5924","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fourtrust.com.br\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fourtrust.com.br\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fourtrust.com.br\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/fourtrust.com.br\/en\/wp-json\/wp\/v2\/comments?post=5924"}],"version-history":[{"count":0,"href":"https:\/\/fourtrust.com.br\/en\/wp-json\/wp\/v2\/pages\/5924\/revisions"}],"wp:attachment":[{"href":"https:\/\/fourtrust.com.br\/en\/wp-json\/wp\/v2\/media?parent=5924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}