Explicit Consent for Processing & Transfer of Personal Data
Information Security Policy
INFORMATION SECURITY POLICY
Our company provides services in the field of "COMPUTER PROGRAMMING AND CONSULTING ACTIVITIES" . Our company is committed to protecting confidentiality, integrity and all physical and electronic information assets. The management of our company will provide the employment of personnel who are open to change, well-educated, competent in their field, and provide the financing, sufficient equipment and infrastructure to ensure competition with our competitors in the sector. Along with this infrastructure and personnel, necessary financing will be provided. Business continuity and contingency plans, data backup procedures, avoidance of viruses and hackers, access control systems and information security breach notification will form the cornerstones of our activities. The vulnerabilities and threats obtained as a result of the risk assessments will be eliminated, and secure access to the information of our customers and personnel will be ensured.
In addition, as a result of risk assessments, we will determine our goals and provide the resources and conditions necessary for the achievement of these goals.
In order to realize this policy, we expect our employees to make the Information Security Management System conditions a way of working. It will be ensured that all personnel and certain third parties receive appropriate training on the Information Security Management System.
The applicable conditions regarding information security and the opportunities and requirements brought by these conditions will be fulfilled and these conditions will be continuously improved. In addition, our company, our personnel and all relevant parties will be adapted to this system.
Our Information Security Policy is reviewed and updated with the participation of management and unit responsible once a year or in case of significant changes regarding our company to ensure its suitability, accuracy and effectiveness.