In order to ensure the continuous improvement of information security management system of our organization:

We are committed to identify and assess risks associated with information confidentiality, integrity and access, apply necessary control measures for all assets which are above the acceptable level, measure the performance of information security processes and set goals based on this data, minimize our weaknesses and threats through investments in infrastructure, working environment, hardware, software and training, meet security conditions that requires our job, our customers and legal regulations:

By identifying information assets and studying their impact on the functioning by addressing issues such as: the cost of replacing these assets, confidentiality of information, impact on image, the damage they can cause in terms of juridical and legal obligations,

By eliminating the danger of occurrence of threat associated with: large number of vulnerabilities and how well existing means of control are able to cover them, motivation of attacker, attractiveness of information to competitors, access control vulnerabilities and data integrity.

The policy is being reviewed at management review meetings and revised in accordance with established objectives, as necessary.

While establishing information security policy, it is being explained that, confidentiality, integrity and availability are taken as the basis for processing, transferring and storing information and emphasized risk management approach.

We are reducing distances and saving time.

[email protected]