Information Security Policy
Our Company’s Information Security Policy
Our company operates in the field of "Software Development Activities." We are committed to maintaining the confidentiality, integrity, and protection of all physical and electronic information assets. Information and information security requirements will align with our corporate objectives.
Our management is open to change and will ensure the employment of well-educated, competent personnel. It will also provide the necessary financial resources to remain competitive within the industry, as well as maintain sufficient hardware and infrastructure. These resources, along with qualified personnel and financial backing, will be fully provided.
Business continuity and emergency plans, data backup procedures, protection from viruses and hackers, access control systems, and information security breach reporting will form the foundation of our core operations. Based on the results of risk assessments, identified vulnerabilities and threats will be eliminated to ensure secure access to information for both our customers and employees.
Furthermore, based on the outcomes of risk assessments, we will define our objectives and provide the necessary resources and conditions to achieve them.
To implement this policy, we expect our employees to incorporate the requirements of the Information Security Management System (ISMS) into their working practices. All personnel and relevant third parties will be provided with appropriate training related to the ISMS.
All applicable requirements related to information security, along with the opportunities and necessities they entail, will be fulfilled and continuously improved. In addition, the adaptation of our company, personnel, and all relevant parties to this system will be ensured.
Our Information Security Policy is reviewed annually—or whenever there are significant changes affecting our company—with the participation of management and unit supervisors to ensure its relevance, accuracy, and effectiveness, and it is updated accordingly.