To ensure the trust of the institutions and organizations served and to ensure the security of our information assets that we use for the services we provide,
The continuity of IT services will be provided under an institutional roof, independent of individuals, within the scope and limits of ISMS,
Performing routine works based on IT infrastructure / hardware / software system and ensuring data security will be within the scope and boundaries of ISMS,
Within the scope of ISMS; Accepting that all kinds of confidential / commercial / private information processed in all information technology systems of our customers and suppliers with whom we cooperate are the confidentiality of the relevant institutions, this information is subject to the terms of Confidentiality / Integrity / Availability without the knowledge / approval of the relevant person / institution / organization anywhere. to ensure its unattainability by remaining,
Provided that it stays within the scope and limits of the ISMS, it will comply with the ISMS policy, legal and regulatory requirements, take into account the obligations or dependencies of third parties arising from contracts,
Within the scope of ISMS; By constantly reviewing our risks and applying controls for risks above the acceptable level,
To keep the information security awareness of our employees high,
To keep the policy updated by reviewing it at management review meetings once a year, to continuously improve the effectiveness of the ISO 27001 system.