Information Security Policy
Our company provides services in the following areas:
- Sales, demonstration, and installation of hardware and software related to information systems infrastructure,
- Computer programming and software development activities (including system, database, network, and web page software development and coding),
- On-site and remote technical support services,
- Consultancy and engineering services related to these activities.
Our company is committed to protecting the confidentiality, integrity, and security of all physical and electronic information assets. Information and information security requirements will be aligned with our corporate objectives.
Our management is committed to fostering an adaptable, well-educated, and competent workforce while ensuring the necessary financial resources to maintain competitiveness within the industry. Sufficient infrastructure and hardware will be maintained to support this commitment, along with the required financial resources.
Business continuity and emergency plans, data backup procedures, virus and hacker protection measures, access control systems, and information security breach notifications form the foundation of our core operations. Through risk assessments, vulnerabilities and threats will be eliminated, ensuring secure access to customer and employee information.
Additionally, based on risk evaluations, our objectives will be defined, and the necessary resources and conditions required to achieve these objectives will be provided.
We expect our employees to adopt the management system requirements as part of their work practices. All personnel and relevant third parties will receive appropriate training related to the Information Security Management System.
All applicable information security requirements, along with the opportunities and necessities they bring, will be fulfilled and continuously improved. Furthermore, our company will ensure the adaptation of this system by our employees and all relevant stakeholders.
Our information security policy is reviewed annually or whenever significant changes occur within the company to ensure its relevance, accuracy, and effectiveness. This review process is conducted with the participation of management and unit supervisors to maintain its up-to-date status.
General Manager