OHS INSIGHTS BLOG

Information Security & Data Privacy Hub

Stay informed. Stay compliant.

The SOC Blog keeps you up to date with the latest trends in Occupational Health and Safety (OHS), data protection regulations such as Brazil’s LGPD and GDPR, and key updates to our compliance management software.

Segurança da Informação - Banner
cadeado segurança da informação soc
SELOS ISO

BLOG DE SST

Information Security & Data Privacy Hub

Stay informed. Stay compliant.

The SOC Blog keeps you up to date with the latest trends in Occupational Health and Safety (OHS), data protection regulations such as Brazil’s LGPD and GDPR, and key updates to our compliance management software.

Segurança da Informação - Banner
cadeado segurança da informação soc
SELOS ISO
Information Security

SOC's Commitment to Information Security (ISO 27001) and Data Privacy (LGPD)

The best way to lead is to walk in the client’s shoes — to deeply understand their needs and expectations. With SOC’s ISO 27001-certified services, our clients’ data remains confidential, available, integral, and authentic — in full alignment with internationally recognized standards.

This commitment extends beyond our internal environment: SOC’s Cloud Computing solutions are also subject to regular audits and rigorous controls.

Our goal is to effectively mitigate any risks that could compromise your organization — especially those related to the management and protection of sensitive information belonging to clients, users, and employees.

As a result, all content managed by SOC — including data transmitted to Brazil’s eSocial platform — is safeguarded by robust processes aligned with ISO 27001, ISO 27701, and full compliance with Brazil’s General Data Protection Law (LGPD).
Segurança da Informação - Portal
Information Security
Segurança da Informação dicas
cadeado segurança da informação soc
cadeado segurança da informação soc
cadeado segurança da informação soc
Best Practices for SOC Users.
Information Security
Best Practices for SOC Users
Segurança da Informação dicas
cadeado segurança da informação soc
cadeado segurança da informação soc
cadeado segurança da informação soc

Frequently Asked Questions

Still have questions?

Explore the most common topics addressed by our team below.

About Information Security Policy

The Information Security and Privacy Management System (ISMS) of AGE — the company behind the SOC Platform — includes a comprehensive set of controls and effectiveness indicators for Information Security. All standards and policies are reviewed annually to ensure continued compliance and improvement.

Does AGE Maintain All Required System Documentation?

Yes. AGE maintains all necessary documentation for systems that process data. This information is available strictly for internal use or for audit purposes — upon prior request and subject to approval by AGE Desenvolvimento de Sistemas. Access is granted only after signing the appropriate Non-Disclosure Agreement (NDA). The SOC Help Center, available directly within the platform, provides comprehensive information on system usage, architecture, information security, and data privacy.

Does SOC Follow Secure Development Best Practices?

Yes. SOC adheres to secure application and system development best practices throughout the entire development lifecycle — prior to production release.
The SOC development process follows a well-defined cycle that includes development, testing/QA, staging (pre-production), production deployment, and bug fixing. All stages are aligned with the security principles and best practices recommended by OWASP (Open Web Application Security Project).

Does AGE Follow a Standardized Framework to Ensure System Security?

Yes. AGE follows a rigorous set of standards to ensure the security of its systems. We are proud to be the first occupational health management platform in Brazil certified under:

NBR ISO/IEC 27001:2013 – Information Security Management System (ISMS), since 2017.

NBR ISO/IEC 27701:2019 – Privacy Information Management System (PIMS), since 2023.

These certifications are maintained through annual audits, ensuring continuous compliance with internationally recognized security and privacy standards.

Is the system developed according to a secure development methodology?

AGE follows the best practices of OWASP (Open Web Application Security Project).

Does AGE perform vulnerability assessments to detect potential risks to client data?

Annual penetration tests (PENTESTS) and monthly vulnerability scans are conducted, but the results are for AGE's internal use only, as they contain confidential information. If needed, clients may conduct their own vulnerability or penetration tests by requesting prior authorization from AGE. In such cases, access to the results will be granted upon signing a Non-Disclosure and Confidentiality Agreement.

Does the system have a Disaster Recovery Plan?

Yes. The Disaster Recovery Plan is tested, reviewed, and updated annually.

What type of cloud computing service model does SOC use?

SOC is a SaaS (Software as a Service), so there is no software installation required. Customers only need an internet connection to access SOC.

Does SOC use a WAF (Web Application Firewall) to protect the application perimeter?

Yes. SOC uses AWS WAF as its Web Application Firewall to monitor HTTP and HTTPS requests and protect against common web vulnerabilities that could impact availability, compromise security, or consume excessive resources. AWS WAF gives SOC granular control over incoming requests, allowing the creation and refinement of security rules to block both common and targeted attack patterns.

Do the data centers include logical security elements (Firewall, IDS/IPS, Anti-Malware, Content Filters, DLP)? Which ones?

Yes. AWS (Amazon Web Services) provides multiple layers of protection, including:

- AWS Shield – Protection against DDoS attacks

- Security Groups and Network ACLs – Virtual firewalls for controlling inbound and outbound traffic

- AWS GuardDuty – Intelligent threat detection (IDS/IPS)

- AWS WAF – Web Application Firewall for filtering and monitoring HTTP/HTTPS requests

These services work together to enhance the security posture of the SOC platform and protect client data from unauthorized access and cyber threats.

Does SOC allow secure file exchange with authentication and encrypted protocols?

Yes. SOC provides Web Services for file upload and download using the WS-Security standard and secure protocols TLS 1.2 and 1.3. For systems that do not support Web Services, SFTP is also available as a secure alternative.

Does SOC have a solution for mitigating DDoS attacks?

Yes. SOC uses AWS Shield Standard to protect against Distributed Denial of Service (DDoS) attacks. This service provides always-on detection and automatic inline mitigation to safeguard the platform's availability and performance.

Does the company have a solution for preventing malicious artifacts?

Yes. We use security solutions from industry-leading providers in their respective fields.

Does SOC ensure data security against unauthorized access?

Yes. SOC implements multiple layers of protection for stored data, including encryption, logical segregation, regular backups, and cybersecurity safeguards. Access to SOC's source code is strictly limited to AGE's internal development team, ensuring controlled and secure handling of the platform's core infrastructure.

Does SOC establish security guidelines to limit client data exposure?

Yes. Client data is not accessed by AGE employees without the client's explicit consent, and only in exceptional cases. Additionally, all data — both at rest and in transit — is encrypted to ensure confidentiality and integrity.

Does SOC guarantee that data entered into the system will NOT be used for other purposes?

Yes. SOC's Privacy Policy ensures that client data is not shared with third parties, and data access is fully managed by the client, who defines who can access what within the SOC platform — with exclusive permission and control.

How are nonconformities handled if detected?

In accordance with AGE's Information Security and Privacy Management System (ISMS), any nonconformity (NC) identified during an audit is addressed and resolved based on its severity, following a defined process for handling audit findings. All related evidence is for internal use only by AGE.

Does SOC undergo regular maintenance and improvements?

Yes. SOC is updated every 15 days and undergoes infrastructure improvements whenever necessary.

Clients are notified through SOC Bulletins or Scheduled Maintenance Notices sent via email.

We have a dedicated software maintenance and support team with well-defined processes to carry out all necessary repairs.

Does AGE invest in information security training?

Yes. All AGE employees receive information security training upon hiring. In addition, annual workshops on information security and data privacy are conducted to reinforce internal policies and standards, ethical conduct, and anti-corruption practices.

These initiatives are complemented by lectures delivered by the Information Security team to promote ongoing awareness and compliance.

Can clients request an audit?

Yes, customer may request an audit, as long as it is agreed in advance with the Information Security team, following the standards required by AGE according to its Internal Policy, respecting the issues of Confidentiality and Secrecy.

Are there access control methods that restrict source connections?

Yes. SOC provides a tool called "IP Group", which allows clients to configure and restrict source IP addresses. This feature enhances access control by limiting system usage based on predefined IP ranges, days, and time periods. SOC's infrastructure includes all necessary resources to ensure the security of transmitted data. Additional information about this tool is available in the SOC Help Center.

Does the system provide any type of reports or logs?

The SOC system provides access reports, action logs, and screen recording features to support client audits.

Does the system use any access control mechanism?

Yes. It uses login, password, and ID, along with access logs.

Does SOC offer any file encryption solution for the database? Is any type of encryption control provided?

Yes, our database is encrypted. For encryption control, we use AWS Key Management Service (KMS).

Is there a regularly tested backup routine in the SOC system?

Yes, we have a backup policy in place, and backups are performed daily. Additionally, periodic restoration tests are conducted to verify data integrity.

Does SOC's infrastructure ensure data security against unauthorized access?

Yes. SOC includes data protection mechanisms such as encryption, logical segregation, backups, and cyber risk safeguards. Access to SOC's source code is strictly limited to AGE's internal development team.

Does SOC comply with the LGPD (General Data Protection Law)?

Yes. We comply with the technical and legal requirements defined by Brazil's General Data Protection Law (LGPD), ensuring the privacy of the data entered into SOC.

Are there Privacy and Personal Data Protection Policies? Which ones?

Yes. You can access our policy at the following link: Política de Privacidade | SOC - Software de SST .

What personal data related to employees and former employees does SOC make available? What is the purpose?

The system provides registration and document data — such as name, CPF, RG, among others — at the client's discretion, as well as health history and employment records. This data is used according to the purposes defined by the client, for example, to carry out medical appointments or to generate documents required by labor and social security legislation, as well as to manage services contracted for these purposes.

These data are accessed only by users responsible for executing the related services.

What are the means of making data available?

Data can be made available through reports, system layouts, and Web Services, according to the client's specifications.

Has the organization undergone a Privacy and Personal Data Protection Program? If so, when?

At AGE, annual workshops on information security and data privacy are conducted.

Does the organization implement preventive security measures to protect personal data from unauthorized access, as well as from accidental or unlawful incidents, in accordance with Brazil's General Data Protection Law (LGPD)? If so, what specific measures are in place?

Yes. To comply with Article 46 of Law 13.709/2018 (LGPD), several technical and administrative measures have been implemented, including ISO/IEC 27701 certification (Information Privacy Management System) and its corresponding controls.

These include:

_ Data encryption

_ Data backups

_ Disaster recovery plan

_ Environment and role segregation

_ Application and security resource monitoring

_ Cloud data protection mechanisms

_ Data loss prevention systems (DLP)

SOC also performs security and penetration tests to ensure system functionality in line with secure development best practices.

Our employees receive regular privacy training, completing the triad of processes, technology, and people for personal data protection.

Does the system provide a privacy notice?

Yes, our Privacy Policy is available at: Política de Privacidade | SOC - Software de SST , in accordance with Brazil's General Data Protection Law (LGPD).

Does SOC maintain audit logs that identify the user responsible for all actions performed (viewing, editing, deleting)?

SOC maintains comprehensive audit logs, including access logs that record user identity and timestamps of access attempts, as well as action logs that track user activities such as data entry, modification, and deletion across system functionalities.

SOC stores data solely in its role as a data processor, in accordance with

Brazil's General Data Protection Law (LGPD). Data deletion is the responsibility of the client, who acts as the data controller. Our team does not intervene in this process.

In the event of a data breach or security incident, is the client always notified?

In compliance with Brazil's General Data Protection Law (LGPD), Article 48 establishes that it is the controller's responsibility to notify the National Data Protection Authority (ANPD) and the data subject whenever an incident may pose a risk or significant harm to individuals.

What is the potential impact for the client in case of unauthorized access, unwanted modifications, or data loss?

The potential impact depends on how the client manages access to their own data. SOC acts solely as a data processor and does not control or intervene in client-defined permissions. Therefore, it is the client's responsibility to assess the risks related to the information they input into the system.

SOC, in turn, continuously monitors and mitigates technological threats within its environment to ensure data confidentiality, integrity, and availability — using secure storage, encryption, and data recovery mechanisms.

Is there any monitoring of critical information transfers?

Yes. We use a Data Loss Prevention (DLP) tool that monitors and controls the flow of all information and files within the company's environment. This includes tracking critical data related to Brazil's General Data Protection Law (LGPD).

Important Documents

Information Security and Data Privacy related documents

To access them, simply click on the document name cards:
Information Security

SOC’s Data Protection Officer

Carlos Dantas dos Santos
Operations and Technology Head and DPO
Mail: seguranca@soc.com.br
cadeado segurança da informação soc
cadeado segurança da informação soc
cadeado segurança da informação soc
Still have questions?
Didn't find the information you were looking for?

If you’re a client, please contact our Support Team through the Client Portal.

If you’re not a client yet, feel free to reach out to our Sales Team.
Benefits
Benefits for SOC Clients
ISO 27001 Certification is comprehensive, ensuring even greater data security, reliability, and protection for SOC clients.
SOC is committed to full compliance with Brazil’s LGPD, ensuring the privacy of our clients’ data.
As a market leader and authority in Occupational Health and Safety (OHS) management software, our team works to protect and maintain transparency in all client processes.
Since day one, SOC has prioritized data security. That’s why we’ve prepared official LGPD documentation exclusively for our clients.
Join Us
Be Part of It
Over 7,000 success stories. Meet our clients and become part of the largest Occupational Health and Safety community in Brazil.
Segurança da Informação duvidas

CONTEÚDO PROGRAMÁTICO

Saúde ocupacional

  • Cadastro de Exame
  • Tela de Digitação Rápida
  • SOCAPP
  • Gestão de Convocação
  • Guia de Encaminhamento
  • Pedido de Exames
  • Licença Médica
  • Gestão de FAP

Segurança no trabalho

  • Cadastro de Risco
  • GHE
  • Entrega de EPI
  • CIPA
  • Registro de Ocorrência
  • Atividades
  • Cursos

Estrutura Organizacional

  • Empresa
  • Unidade
  • Setor
  • Cargo
  • Funcionário
  • Importação Modelo I

Configurações Gerais

  • Navegação
  • Comandos básicos
  • Usuários e Perfil de Acessos
  • Configurações Pessoais
  • Gestão de Avisos
  • Log de Ações
  • Restrição de IP
  • Pesquisa Avançada
  • Parâmetros de Empresa Principal
  • Parâmetros Gerais

eSocial

  • Portal eSOCial
  • Mensageria SOC
  • Interface Específica com outros Sistemas

SOC Net

  • Visão do Credenciador
  • Visão do Credenciado

Gestão eletrônica de documentos

  • SOCGED
  • Biometria
  • Assinatura Digital

SOC Indicadores

  • Power BI
  • Painéis de Gráficos

Financeiro

  • Tabela de Preços
  • Produto e Serviço

Integrações Web Service

  • SOC Integrador
  • Exporta dados

Personalizações

  • Cadastro Dinâmico
  • Tipos de Ficha
  • Modelos Personalizados
  • ASO, Funcionário, entre outros.

Relatórios

  • Relatórios Agendados
  • PCMSO
  • PPRA

Para comprar soluções SOC

Brasil

0800 888 8888

Ou veja a nossa lista completa de números locais

Chat online

Converse conosco para comprar soluções SOC ou para esclarecimento de dúvidas

Fale Conosco

Envie-nos e-mails com comentários, questões ou feedback