Warning
Work in Progress: This page is currently under construction. Content may be incomplete or subject to change. To contribute, see the contribution guide.
Security Policies
Policies that govern how Patria Investments’ Technology team handles systems, data, and access.
Policy index
| Policy | Audience | Summary |
|---|---|---|
| Incident Response | All tech staff | How to detect, report, and respond to security incidents |
| Acceptable Use | All employees | Permitted and prohibited uses of corporate systems |
| Secrets Management | Developers | How to handle credentials, API keys, and certificates |
| Data Privacy for Developers | Developers | LGPD obligations when building systems that process personal data |
Policy compliance
All Technology team members are required to read and comply with these policies. Confirmation is recorded annually in the HR system.
Policy violations are handled according to the HR disciplinary process and may result in immediate access revocation in cases of critical security incidents.
Policy review cycle
Policies are reviewed annually by the Security & Compliance team, or sooner in response to regulatory changes or significant incidents.
Questions
Contact the Security & Compliance team — see Contacts