Main Article Content
The objective of this research is to analyze the relevance of the information security policy in the logical part of the company. It will be used data obtained from research conducted within various companies, which demonstrate the level of knowledge of employees and some wrong measures they taken which ended up harming the company. It will be possible to check not only the weight that an information policy has within any economic sector, but also to point out which areas of the company are most prone to data loss/theft. One of the most valuable assets in any business, is information, that is, data that is generated through trades made, revenue generated, productivity, etc., and however small the information seems, to the market it can be extremely relevant and the leakage of this information, due to a failure or lack of security, can lead to the bankruptcy of a company.
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
Submission of an article implies that the work described has not been published previously (except in the form of an abstract or as part of a published lecture or academic thesis), that it is not under consideration for publication elsewhere, that its publication is approved by all authors and tacitly or explicitly by the responsible authorities where the work was carried out, and that, if accepted, will not be published elsewhere in the same form, in English or in any other language, without the written consent of the Publisher. The Editors reserve the right to edit or otherwise alter all contributions, but authors will receive proofs for approval before publication.
Copyrights for articles published in IJIER journals are retained by the authors, with first publication rights granted to the journal. The journal/publisher is not responsible for subsequent uses of the work. It is the author's responsibility to bring an infringement action if so desired by the author.
 Disponível em
 CARUSO, Carlos A. A.; STEFFEN, Flávio Deny. Segurança em informática e de Informações. São Paulo: SENAC/SP, 2006.
 Entenda o problema de segurança dos dispositivos USB. G1. Disponível em:
 Revista conhecimento contábil, vol 06, ISSN 2447-2921, n 01, p 70-80 Jan/Jun, 2018.
 Boas Práticas de Segurança da Informação, Disponível em
 Plano de Implementação da Norma ISO/IEC 27001 no INEM, Carlos Manuel Rosa Correia Disponível em
 MARCELO,A; PEREIRA, M. A ARTE DE HACKEAR PESSOAS. Rio de Janeiro: Brasport, 2005.
 ARAUJO, Eduardo. A VULNERABILIDADE HUMANA NA SEGURANÇA DA INFORMAÇÃO. 2005
 FONTES, Edson. POLÍTICAS E NORMAS PARA A SEGURANÇA DA INFORMAÇÃO: Como desenvolver, implantar e Manter regularmentos para a proteção da informação nas organizações. São Paulo. Brasport. 2012
 DANTAS, M. SEGURANÇA DA INFORMAÇÃO: UMA ABORDAGEM FOCADA EM GESTÃO DE RISCOS. 1 ed. Olinda: Livro rápido, 2011
 FREITAS, F; ARAUJO, M. POLITICAS DE SEGURANÇA DA INFORMAÇÃO: Guia prático para elaboração e implementação. 2ed. Rio de Janeiro: Ciência Moderna LTDA, 2008
 FONTES, E. PRATICANDO A SEGURANÇA DA IONFORMAÇÃO. Rio de Janeiro: Brasport, 2008
 SENAC. PSI – POLÍTICA DE SEGURANÇA DA INFORMAÇÃO. V.1.0. São Paulo. Disponível em: