Within the scope of establishing an Information Security Management System (ISMS); -In order to comply with the principles of confidentiality, integrity and accessibility of information, which are the requirements of the Information Security Management System, our company has defined the information assets in our company, identified the risks and implemented the risk management methodology, which includes taking control measures related to the risks, To protect the confidentiality of information belonging to our customers, to ensure compliance with standards and legal regulations, - To provide the necessary resources for hardware, software, training and other controls necessary to reduce information security risks and to ensure their continuity, - To ensure the awareness, training and encouragement of all personnel and business partners to ensure their participation and compliance with the ISMS in accordance with the necessity of a holistic approach to information security, - To ensure the efficiency of the ISMS; Raising awareness, training and incentivizing all personnel and business partners to ensure their participation in and compliance with the ISMS in line with the necessity of a holistic approach to information security, - Controlling, monitoring and reviewing the efficiency of the ISMS through internal and external audits, and continuously harmonizing and improving the system; is our ISMS policy.


Within the scope of establishing an Information Security Management System (ISMS); -In order to comply with the principles of confidentiality, integrity and accessibility of information, which are the requirements of the Information Security Management System, our company has defined the information assets in our company, identified the risks and developed a risk management methodology that includes taking control measures related to the risks, To protect the confidentiality of information belonging to our customers, to ensure compliance with standards and legal regulations, - To provide the necessary resources for hardware, software, training and other controls necessary to reduce information security risks and to ensure their continuity, - To ensure the awareness, training and encouragement of all personnel and business partners to ensure their participation and compliance with the ISMS in accordance with the necessity of a holistic approach to information security, - To ensure the efficiency of the ISMS; Raising awareness, training and incentivizing all personnel and business partners to ensure their participation in and compliance with the ISMS in accordance with the necessity of a holistic approach to information security, - Controlling, monitoring and reviewing the efficiency of the ISMS through internal and external audits, and continuously harmonizing and improving the system; is our ISMS policy.


Within the scope of establishing an Information Security Management System (ISMS); -In order to comply with the principles of confidentiality, integrity and accessibility of information, which are the requirements of the Information Security Management System, our company has defined the information assets in our company, identified the risks and developed a risk management methodology that includes taking control measures related to the risks, To protect the confidentiality of information belonging to our customers, to ensure compliance with standards and legal regulations, - To provide the necessary resources for hardware, software, training and other controls necessary to reduce information security risks and to ensure their continuity, - To ensure the awareness, training and encouragement of all personnel and business partners to ensure their participation and compliance with the ISMS in accordance with the necessity of a holistic approach to information security, - To ensure the efficiency of the ISMS; Raising awareness, training and incentivizing all personnel and business partners to ensure their participation in and compliance with the ISMS in accordance with the necessity of a holistic approach to information security, - Controlling, monitoring and reviewing the efficiency of the ISMS through internal and external audits, and continuously harmonizing and improving the system; is our ISMS policy.

Çerezler, hizmetlerimizi daha verimli bir şekilde sunmamızı sağlar. Çerez politikasını inceleyebilirsiniz.