Warning
Work in Progress: This page is currently under construction. Content may be incomplete or subject to change. To contribute, see the contribution guide.
Acceptable Use Policy
Rules governing the use of Patria Investments’ corporate systems, devices, and data.
Scope
Applies to all employees, contractors, and third parties with access to Patria Investments’ systems, networks, or data.
Permitted use
- Using corporate systems for work-related activities
- Accessing the internet for business purposes and reasonable personal use that does not interfere with work
- Storing work files in approved corporate platforms (SharePoint, OneDrive, approved cloud services)
Prohibited use
Danger
The following are strictly prohibited:
- Sharing corporate credentials with others (including colleagues)
- Storing credentials, tokens, or secrets in source code repositories
- Accessing or attempting to access systems or data beyond your authorised scope
- Installing unapproved software on corporate devices
- Connecting personal devices to the corporate network without prior approval
- Using corporate resources for personal commercial activities
- Circumventing security controls (VPN bypass, disabling endpoint protection, etc.)
- Exfiltrating corporate or customer data to personal accounts or unapproved services
Device security
- Corporate devices must have disk encryption enabled (BitLocker / FileVault)
- The endpoint protection agent (EDR) must not be disabled
- Screen lock activates automatically after 5 minutes of inactivity
- Lost or stolen devices must be reported immediately to IT — contact Contacts
Monitoring
Patria Investments monitors system and network activity for security purposes. Users have no expectation of privacy on corporate systems.
Violations
Violations are reported to the Security team and escalated to HR. Consequences range from remedial training to disciplinary action and access revocation, depending on severity and intent.