{"id":1377,"date":"2025-10-03T13:41:31","date_gmt":"2025-10-03T16:41:31","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/?page_id=1377"},"modified":"2025-10-28T18:38:54","modified_gmt":"2025-10-28T21:38:54","slug":"code-of-ethics-and-conduct","status":"publish","type":"page","link":"https:\/\/hackerrangers.siteup.dev\/es\/code-of-ethics-and-conduct\/","title":{"rendered":"Code of Ethics and Conduct"},"content":{"rendered":"<p>Every day is a new opportunity to do the right thing. Let our Code of Ethics and Conduct \u2014 along with your common sense \u2014 be your guide!<\/p>\n<h2><strong>1. PRINCIPLES OF CORPORATE CONDUCT<\/strong><\/h2>\n\n<\/p>\n<div id=\"content-core\">\n<div id=\"parent-fieldname-text-de586924066c4a259dd2187f8b4c556b\" class=\"\">\n<h3><strong>1.1 Towards our collaborators<\/strong><\/h3>\n<p>Here at Perallis, we want everyone to feel as comfortable as possible exchanging ideas and opinions. There are no physical or hierarchical barriers when it comes to doing cool things together. All department division exists only to facilitate the management of people and tasks, but we always work together. And just as we are one of the greatest experts in information security in Brazil, we also want to become one of the greatest experts in celebration! Here, we take integration moments seriously: they are essential to surprise our clients and partners more and more!<\/p>\n<p><strong>1.2 Towards our clients<\/strong><br \/>\nTo make a difference in our clients&#8217; lives, we need to be truly committed and connected. To this end, treating all our clients with kindness and respect is part of our organizational culture. Our team is incredibly specialized in listening, understanding, and helping. We always maintain a relationship of trust and transparency with both our clients and our partners.<\/p>\n<p><strong>1.3 Towards the society<\/strong><br \/>\nWe want to impact and change the world through information security. And when it comes to doing good, our team works hard. We want much more than only being cybersecurity experts: we want to develop businesses and promote sustainable growth.<\/p>\n<p><strong>1.4 Towards the competition<\/strong><br \/>\nPerallis is committed to being the best regarding information security, but not at all costs: we must overcome competition legally and within the free market framework.<\/p>\n<p>What is Perallis&#8217;s way of doing the right thing?<\/p>\n<ul>\n<li>We only use legitimate means to obtain competitive information.<\/li>\n<li>We respect the confidential information and intellectual property rights of competitors.<\/li>\n<li>We do not carry out actions that can be interpreted as anti-competitive, monopolistic, or contrary to the law, such as price-fixing agreements or other fees.<\/li>\n<\/ul>\n<p><strong>1.5 Towards the environment<\/strong><br \/>\nAs we have our commitment to society, we must follow environmental laws and regulations, and favor sustainable development. As we expand our business, we aim to contribute to the communities we operate in, develop our employees, contribute to overall economic prosperity, and minimize our impact on the environment.<\/p>\n<h3><strong>2. WORK ENVIRONMENT<\/strong><\/h3>\n<p>The essence of Perallis is practiced day to day.<\/p>\n<p><strong>2.1 Employees\u2019 responsibilities<\/strong><br \/>\nAt Perallis, each of our employees is responsible for:<\/p>\n<ul>\n<li>Always act under the law and policies applicable to their role.<\/li>\n<li>Know, understand and comply with the ethical values addressed by this Code.<\/li>\n<li>Participate in training and other activities on our Code of Ethics and Conduct and other related policies.<\/li>\n<li>Communicate ethical dilemmas or complex situations that raise suspicion of violation of this Code or legislation.<\/li>\n<li>Maintain confidentiality and collaborate with any investigation involving issues outlined in this Code.<\/li>\n<\/ul>\n<p><strong>2.2 Health and safety<\/strong><br \/>\nWe care about you and are committed to protecting the health and safety of everyone who works with us, directly or indirectly. Although we have beer available on days of celebration, keep in mind that you should enjoy it in moderation, and never drink it in a way that puts those around you in danger, or that violates the law or our Code.<\/p>\n<p>Also remember to ensure responsible and safe driving, preventing traffic violations and accidents.<br \/>\nAttention: The use of illegal substances or the carrying of firearms in our offices and events is strictly prohibited.<\/p>\n<p><strong>2.3 Anti-harassment<\/strong><br \/>\nIt is important to turn our work environment healthy in every way.<br \/>\nAt Perallis, harassment, offensive and disrespectful conduct are not tolerated.<br \/>\nBy harassment, we mean any undesirable act that creates an intimidating, offensive or hostile work environment, such as:<\/p>\n<ul>\n<li>Offensive or degrading comments;<\/li>\n<li>Sexual harassment;<\/li>\n<li>Slanders of any kind;<\/li>\n<li>Demonstration of hostility due to individual characteristics.<\/li>\n<\/ul>\n<p>If you feel harassed by someone (anyone, no matter the position), please speak up.<\/p>\n<p><strong>2.4 Non-discrimination<\/strong><br \/>\nWe are committed to respecting people&#8217;ss diversity, talents and skills.<br \/>\nWe should not make decisions in the workplace based on color, gender, sexual orientation, ethnicity, religion, politics, or any other type of discrimination. Everyone should be treated fairly, with respect and dignity.<br \/>\nRegarding our employees and applicants, any decision related to the work environment and career must be based on merit, qualification, and performance related to the position, without considering any characteristics unrelated to the activities to be exercised by them.<\/p>\n<p><strong>2.5 Dress code<\/strong><br \/>\nPerallis\u2019 image is formed not only by our products and services but also by the people who work with us. Casual wear is our standard outfit for everyday wear \u2014 and it is also recommended when the client is informal.<\/p>\n<p>Business casual is our standard meeting attire. It is of fundamental importance that each professional is attentive to maintain an adequate posture regarding their attitudes, behaviors, and clothing.<\/p>\n<ul>\n<li>Casual attire: shorts, jeans, T-shirts, sneakers, flat shoes, sandals, dresses, and business skirts.<\/li>\n<li>Business casual attire: social pants, dress shoes, shirt with collar (polo shirt is acceptable), dress, shoes or flat shoes, and business skirts.<\/li>\n<\/ul>\n<p><strong>2.6 Remote work<\/strong><br \/>\nPerallis authorizes employees to work outside its facilities, in the remote work model.<br \/>\nIn this case, employees must continue to take into consideration all conduct addressed by this Code of Ethics and Conduct.<\/p>\n<h2><strong>3 Integrity in business<\/strong><\/h2>\n<p><strong>3.1 Conflict of Interest<\/strong><br \/>\nAs we know, we have the responsibility to always act on behalf of our partners and customers. Therefore, if the ability to make a decision has or seems to have been influenced by a reason of particular interest or advantage, there will be a conflict of interest.<\/p>\n<p>Being in a conflict of interest situation is not something you will be penalized for.<br \/>\nHowever, intentionally concealing this situation violates our Code and may result in penalties. Conflict of interest situations may not be so easily identified. If in doubt, present the case to someone on your team and consult the specific policy.<\/p>\n<p>Finally, we must avoid any scenarios that could put us in an impartial position, whether it is a real conflict of interest or the appearance of a conflict.<\/p>\n<p><strong>3.2 Promotional gifts, gifts, meals, hospitality, and entertainment<\/strong><br \/>\nWe know that in the course of our activities, it is normal for us to offer or receive some business courtesy for building relationships. But as we mentioned before, offering or receiving any kind of advantage that influences business decisions inappropriately or results in undue advantages is prohibited.<\/p>\n<p>Perallis establishes parameters so that our employees can accept and offer business courtesies safely and legally.<\/p>\n<p><strong>3.3 Corruption, bribery, and kickbacks<\/strong><br \/>\nAt Perallis, business operations influenced by acts of corruption are not tolerated.<br \/>\nYou should not pay or receive bribes, kickbacks, or any kind of reward in negotiations with public officials or individuals in the private sector.<br \/>\nIf you are in a situation like this, refuse to pay or accept a bribe, kickback, reward, or any kind of advantage, even if it results in the loss of a deal to our company.<\/p>\n<p>We are committed to complying with anti-corruption and anti-money laundering laws such as, but not limited to: Brazilian Law No. 12.846\/13, the U.S. Foreign Corrupt Practices Act (\u201cFCPA\u201d), and the UK Bribery Act (\u201cUKBA\u201d).<br \/>\nNote: If any public agent demonstrates that, to deal with a certain matter, an advantage will be due or charged to anyone, the contact must be interrupted and the matter must be immediately taken to our CEO, Vin\u00edcius Perallis.<\/p>\n<p><strong>3.4 Inside information<\/strong><br \/>\nIf at any point in your work, you become aware of inside information that is not publicly known, do not disclose it within our company.<br \/>\nWe must obtain information from our competitors in an integral manner, acting accordingly to competitive practices.<\/p>\n<p><strong>3.5 Money Laundering<\/strong><br \/>\nMoney laundering is a crime that consists of disguising the origin of illegal resources.<br \/>\nWhoever carries out the operation causes the profit obtained through criminal activities to be concealed or hidden in a way that appears as a result of a legal commercial operation, being absorbed by the financial system naturally.<br \/>\nWe must be vigilant and verify that we are negotiating with reputable clients and partners with legitimate financial resources.<\/p>\n<p><strong>3.6 Data privacy<\/strong><br \/>\nThe personal information of our organization, of our final clients, and of our employees must be handled with total secrecy and security.<br \/>\nIn addition, access to this information should only be carried out by employees who will work directly with them. It should not be passed on internally or externally unless there is a legal requirement for disclosure.<\/p>\n<h3><strong>4. Complaint channel<\/strong><\/h3>\n<p>If you identify deviations or violations of this code or current legislation practiced by Perallis\u2019 professionals or business partners, you can register your report through the following email address: admin@perallis.com.<br \/>\nYour information will be treated confidentially, preserving your identity throughout the investigation.<br \/>\nWe recommend that you share as much information as possible to assist the investigation process, including people involved, witnesses, and existing evidence or evidence that can be obtained.<\/p>\n<\/div>\n<\/div>\n<p>","protected":false},"excerpt":{"rendered":"<p>Every day is a new opportunity to do the right thing. Let our Code of Ethics and Conduct \u2014 along with your common sense \u2014 be your guide! 1. PRINCIPLES OF CORPORATE CONDUCT<\/p>","protected":false},"author":13,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"class_list":["post-1377","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Code of Ethics and Conduct | Hacker Rangers<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Code of Ethics and Conduct | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"Every day is a new opportunity to do the right thing. Let our Code of Ethics and Conduct \u2014 along with your common sense \u2014 be your guide! 1. PRINCIPLES OF CORPORATE CONDUCT\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/es\/code-of-ethics-and-conduct\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-28T21:38:54+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"28 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/code-of-ethics-and-conduct\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/code-of-ethics-and-conduct\/\",\"name\":\"Code of Ethics and Conduct | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"datePublished\":\"2025-10-03T16:41:31+00:00\",\"dateModified\":\"2025-10-28T21:38:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/code-of-ethics-and-conduct\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/code-of-ethics-and-conduct\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/code-of-ethics-and-conduct\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Code of Ethics and Conduct\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Code of Ethics and Conduct | Hacker Rangers","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"es_ES","og_type":"article","og_title":"Code of Ethics and Conduct | Hacker Rangers","og_description":"Every day is a new opportunity to do the right thing. Let our Code of Ethics and Conduct \u2014 along with your common sense \u2014 be your guide! 1. PRINCIPLES OF CORPORATE CONDUCT","og_url":"https:\/\/hackerrangers.siteup.dev\/es\/code-of-ethics-and-conduct\/","og_site_name":"Hacker Rangers","article_modified_time":"2025-10-28T21:38:54+00:00","twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"28 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/code-of-ethics-and-conduct\/","url":"https:\/\/hackerrangers.siteup.dev\/code-of-ethics-and-conduct\/","name":"Code of Ethics and Conduct | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"datePublished":"2025-10-03T16:41:31+00:00","dateModified":"2025-10-28T21:38:54+00:00","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/code-of-ethics-and-conduct\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/code-of-ethics-and-conduct\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/code-of-ethics-and-conduct\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"Code of Ethics and Conduct"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/pages\/1377","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/comments?post=1377"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/pages\/1377\/revisions"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/media?parent=1377"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}