The security of not only digital data, but also all data in written, printed, verbal and similar media is protected.
Cloud-based secure data storage service is used against the risk of data loss.
It cannot be given to unauthorized persons intentionally or as a result of carelessness.
Accuracy is ensured by protection against unauthorized persons.
It is made available to authorized users when needed.
All procedures are implemented by all units.
All vulnerabilities are reported and action taken.
Employees; Training programs will be organized to raise awareness about the basic issues of information security, weaknesses, threats, risks and information security violations, and internal communication tools will be used for this purpose. Employees undertake to comply with the confidentiality agreement obligations they have signed during their activities.
All of the system acceptance, authorization, installation, information acquisition, development and improvement activities carried out within the information systems will be carried out in accordance with the information security management system requirements.
We use cookies to analyze website traffic and optimize your website experience. When you accept our use of cookies, your data is compiled along with all other user data.