Our company “It provides services in the fields of WEB DESIGN, SOFTWARE, ADVERTISING - SOCIAL MEDIA MANAGEMENT. Our company is committed to protecting confidentiality, integrity and all physical and electronic information assets. Information and information security requirements will be in line with our corporate goals. Our company's management will provide employment of personnel who are open to change, well-educated and competent in their fields and will provide financing to compete with our competitors in the sector, and will have sufficient equipment and infrastructure. Necessary financing will be provided together with this infrastructure and personnel. Business continuity and emergency plans, data backup procedure, protection from viruses and hackers, access control systems and information security breach notification will constitute the cornerstones of our basic activities. As a result of the risk assessments, the gaps and threats obtained will be eliminated and secure access to the information of our customers and personnel will be provided.
In addition, as a result of risk assessments, we will determine our goals and provide the resources and conditions necessary to achieve these goals.
We expect them to adopt the management system requirements as a way of working. All personnel will be provided with appropriate training on the Information Security Management System by certain third parties.
The applicable conditions regarding information security and the opportunities and requirements brought by these conditions will be fulfilled and the opportunities and requirements brought by these conditions will be fulfilled and these conditions will be continuously improved. In addition, the requirements of our company will be fulfilled and these conditions will be continuously improved. In addition, our company, our personnel and all relevant parties will adapt to this system.
Our information security policy is reviewed and updated once a year or in case of significant changes regarding our company, with the participation of management and unit managers, to ensure its suitability, accuracy and effectiveness.
Information Security Policy Document