{"id":7328,"date":"2022-06-08T21:48:20","date_gmt":"2022-06-08T21:48:20","guid":{"rendered":"https:\/\/transgoodlojistik.com\/2022\/?page_id=7328"},"modified":"2022-08-24T12:01:57","modified_gmt":"2022-08-24T12:01:57","slug":"information-security","status":"publish","type":"page","link":"https:\/\/trendlog.com.tr\/en\/information-security\/","title":{"rendered":"Information Security"},"content":{"rendered":"[vc_row type=&#8221;full_width_background&#8221; full_screen_row_position=&#8221;middle&#8221; bg_color=&#8221;#121212&#8243; scene_position=&#8221;center&#8221; text_color=&#8221;light&#8221; text_align=&#8221;left&#8221; top_padding=&#8221;50&#8243; bottom_padding=&#8221;50&#8243; overlay_strength=&#8221;0.3&#8243; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_link_target=&#8221;_self&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; bg_image_animation=&#8221;none&#8221;][vc_column_text]In order to ensure the continuous improvement of information security management system of our organization:<\/p>\n<p>We are committed to identify and assess risks associated with information confidentiality, integrity and access, apply necessary control measures for all assets which are above the acceptable level, measure the performance of information security processes and set goals based on this data, minimize our weaknesses and threats through investments in infrastructure, working environment, hardware, software and training, meet security conditions that requires our job, our customers and legal regulations:<\/p>\n<p>By identifying information assets and studying their impact on the functioning by addressing issues such as: the cost of replacing these assets, confidentiality of information, impact on image, the damage they can cause in terms of juridical and legal obligations,<\/p>\n<p>By eliminating the danger of occurrence of threat associated with: large number of vulnerabilities and how well existing means of control are able to cover them, motivation of attacker, attractiveness of information to competitors, access control vulnerabilities and data integrity.[\/vc_column_text][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_link_target=&#8221;_self&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; bg_image_animation=&#8221;none&#8221;][image_with_animation image_url=&#8221;7329&#8243; alignment=&#8221;&#8221; animation=&#8221;Fade In&#8221; border_radius=&#8221;10px&#8221; box_shadow=&#8221;medium_depth&#8221; max_width=&#8221;100%&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; top_padding=&#8221;2%&#8221; bottom_padding=&#8221;2%&#8221; overlay_strength=&#8221;0.3&#8243; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_link_target=&#8221;_self&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; bg_image_animation=&#8221;none&#8221;][vc_column_text]\n<div class=\"li-content\">\n<p>The policy is being reviewed at management review meetings and revised in accordance with established objectives, as necessary.<\/p>\n<p>While establishing information security policy, it is being explained that, confidentiality, integrity and availability are taken as the basis for processing, transferring and storing information and emphasized risk management approach.<\/p>\n<\/div>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;full_width_background&#8221; full_screen_row_position=&#8221;middle&#8221; bg_image=&#8221;7439&#8243; bg_position=&#8221;right bottom&#8221; bg_repeat=&#8221;no-repeat&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; top_padding=&#8221;13%&#8221; bottom_padding=&#8221;9%&#8221; overlay_strength=&#8221;1&#8243; shape_divider_position=&#8221;top&#8221; shape_divider_height=&#8221;250&#8243; bg_image_animation=&#8221;fade-in&#8221; shape_type=&#8221;fan&#8221;][vc_column centered_text=&#8221;true&#8221; column_padding=&#8221;no-extra-padding&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_link_target=&#8221;_self&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;1\/6&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; bg_image_animation=&#8221;none&#8221;][\/vc_column][vc_column centered_text=&#8221;true&#8221; column_padding=&#8221;no-extra-padding&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_link_target=&#8221;_self&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;2\/3&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; bg_image_animation=&#8221;none&#8221;][vc_row_inner column_margin=&#8221;default&#8221; text_align=&#8221;left&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_position=&#8221;all&#8221; centered_text=&#8221;true&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; font_color=&#8221;#414142&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; bg_image_animation=&#8221;none&#8221; enable_animation=&#8221;true&#8221; animation=&#8221;fade-in-from-bottom&#8221;][vc_column_text]\n<h2>We are reducing distances and saving time.<\/h2>\n<p>info@trendlog.com.tr[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_row_inner column_margin=&#8221;default&#8221; text_align=&#8221;left&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; bg_image_animation=&#8221;none&#8221; enable_animation=&#8221;true&#8221; animation=&#8221;fade-in-from-bottom&#8221; delay=&#8221;100&#8243;][image_with_animation image_url=&#8221;7406&#8243; alignment=&#8221;center&#8221; animation=&#8221;Fade In&#8221; border_radius=&#8221;none&#8221; box_shadow=&#8221;none&#8221; max_width=&#8221;100%&#8221;][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_link_target=&#8221;_self&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;1\/6&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221; bg_image_animation=&#8221;none&#8221;][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;full_width_background&#8221; full_screen_row_position=&#8221;middle&#8221; bg_color=&#8221;#121212&#8243; scene_position=&#8221;center&#8221; text_color=&#8221;light&#8221; text_align=&#8221;left&#8221; top_padding=&#8221;50&#8243; bottom_padding=&#8221;50&#8243; overlay_strength=&#8221;0.3&#8243; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_link_target=&#8221;_self&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; column_border_width=&#8221;none&#8221;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"yoast_head":"\n<title>Information Security - TrendLog Lojistik &gt; Kazakistan Nakliye<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security - TrendLog Lojistik &gt; Kazakistan Nakliye\" \/>\n<meta property=\"og:description\" content=\"[vc_row type=&#8221;full_width_background&#8221; full_screen_row_position=&#8221;middle&#8221; bg_color=&#8221;#121212&#8243; scene_position=&#8221;center&#8221; text_color=&#8221;light&#8221; text_align=&#8221;left&#8221; top_padding=&#8221;50&#8243; bottom_padding=&#8221;50&#8243; overlay_strength=&#8221;0.3&#8243; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_link_target=&#8221;_self&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; column_border_width=&#8221;none&#8221;...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trendlog.com.tr\/en\/information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"TrendLog Lojistik &gt; Kazakistan Nakliye\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/trendlogcomtr\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-24T12:01:57+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/trendlog.com.tr\/en\/#organization\",\"name\":\"TrendLog Lojistik > Kazakistan Nakliye\",\"url\":\"https:\/\/trendlog.com.tr\/en\/\",\"sameAs\":[\"https:\/\/www.instagram.com\/trendlog_logistics\/\",\"https:\/\/www.facebook.com\/trendlogcomtr\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/trendlog.com.tr\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/trendlog.com.tr\/en\/kk\/wp-content\/uploads\/2022\/06\/trendlog-fav.png\",\"contentUrl\":\"https:\/\/trendlog.com.tr\/en\/kk\/wp-content\/uploads\/2022\/06\/trendlog-fav.png\",\"width\":100,\"height\":100,\"caption\":\"TrendLog Lojistik > Kazakistan Nakliye\"},\"image\":{\"@id\":\"https:\/\/trendlog.com.tr\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/trendlog.com.tr\/en\/#website\",\"url\":\"https:\/\/trendlog.com.tr\/en\/\",\"name\":\"TrendLog Lojistik &gt; Kazakistan Nakliye\",\"description\":\"Uluslararas\u0131 Ta\u015f\u0131mac\u0131l\u0131k\",\"publisher\":{\"@id\":\"https:\/\/trendlog.com.tr\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/trendlog.com.tr\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"tr\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/trendlog.com.tr\/en\/information-security\/#webpage\",\"url\":\"https:\/\/trendlog.com.tr\/en\/information-security\/\",\"name\":\"Information Security - TrendLog Lojistik &gt; Kazakistan Nakliye\",\"isPartOf\":{\"@id\":\"https:\/\/trendlog.com.tr\/en\/#website\"},\"datePublished\":\"2022-06-08T21:48:20+00:00\",\"dateModified\":\"2022-08-24T12:01:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/trendlog.com.tr\/en\/information-security\/#breadcrumb\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/trendlog.com.tr\/en\/information-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/trendlog.com.tr\/en\/information-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Anasayfa\",\"item\":\"https:\/\/trendlog.com.tr\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security\"}]}]}<\/script>\n","yoast_head_json":{"title":"Information Security - TrendLog Lojistik &gt; Kazakistan Nakliye","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"tr_TR","og_type":"article","og_title":"Information Security - TrendLog Lojistik &gt; Kazakistan Nakliye","og_description":"[vc_row type=&#8221;full_width_background&#8221; full_screen_row_position=&#8221;middle&#8221; bg_color=&#8221;#121212&#8243; scene_position=&#8221;center&#8221; text_color=&#8221;light&#8221; text_align=&#8221;left&#8221; top_padding=&#8221;50&#8243; bottom_padding=&#8221;50&#8243; overlay_strength=&#8221;0.3&#8243; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_position=&#8221;all&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_link_target=&#8221;_self&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; column_border_width=&#8221;none&#8221;...","og_url":"https:\/\/trendlog.com.tr\/en\/information-security\/","og_site_name":"TrendLog Lojistik &gt; Kazakistan Nakliye","article_publisher":"https:\/\/www.facebook.com\/trendlogcomtr","article_modified_time":"2022-08-24T12:01:57+00:00","twitter_card":"summary_large_image","twitter_misc":{"Tahmini okuma s\u00fcresi":"3 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/trendlog.com.tr\/en\/#organization","name":"TrendLog Lojistik > Kazakistan Nakliye","url":"https:\/\/trendlog.com.tr\/en\/","sameAs":["https:\/\/www.instagram.com\/trendlog_logistics\/","https:\/\/www.facebook.com\/trendlogcomtr"],"logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/trendlog.com.tr\/en\/#\/schema\/logo\/image\/","url":"https:\/\/trendlog.com.tr\/en\/kk\/wp-content\/uploads\/2022\/06\/trendlog-fav.png","contentUrl":"https:\/\/trendlog.com.tr\/en\/kk\/wp-content\/uploads\/2022\/06\/trendlog-fav.png","width":100,"height":100,"caption":"TrendLog Lojistik > Kazakistan Nakliye"},"image":{"@id":"https:\/\/trendlog.com.tr\/en\/#\/schema\/logo\/image\/"}},{"@type":"WebSite","@id":"https:\/\/trendlog.com.tr\/en\/#website","url":"https:\/\/trendlog.com.tr\/en\/","name":"TrendLog Lojistik &gt; Kazakistan Nakliye","description":"Uluslararas\u0131 Ta\u015f\u0131mac\u0131l\u0131k","publisher":{"@id":"https:\/\/trendlog.com.tr\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trendlog.com.tr\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"tr"},{"@type":"WebPage","@id":"https:\/\/trendlog.com.tr\/en\/information-security\/#webpage","url":"https:\/\/trendlog.com.tr\/en\/information-security\/","name":"Information Security - TrendLog Lojistik &gt; Kazakistan Nakliye","isPartOf":{"@id":"https:\/\/trendlog.com.tr\/en\/#website"},"datePublished":"2022-06-08T21:48:20+00:00","dateModified":"2022-08-24T12:01:57+00:00","breadcrumb":{"@id":"https:\/\/trendlog.com.tr\/en\/information-security\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trendlog.com.tr\/en\/information-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/trendlog.com.tr\/en\/information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Anasayfa","item":"https:\/\/trendlog.com.tr\/en\/"},{"@type":"ListItem","position":2,"name":"Information Security"}]}]}},"_links":{"self":[{"href":"https:\/\/trendlog.com.tr\/en\/wp-json\/wp\/v2\/pages\/7328"}],"collection":[{"href":"https:\/\/trendlog.com.tr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/trendlog.com.tr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/trendlog.com.tr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/trendlog.com.tr\/en\/wp-json\/wp\/v2\/comments?post=7328"}],"version-history":[{"count":10,"href":"https:\/\/trendlog.com.tr\/en\/wp-json\/wp\/v2\/pages\/7328\/revisions"}],"predecessor-version":[{"id":7590,"href":"https:\/\/trendlog.com.tr\/en\/wp-json\/wp\/v2\/pages\/7328\/revisions\/7590"}],"wp:attachment":[{"href":"https:\/\/trendlog.com.tr\/en\/wp-json\/wp\/v2\/media?parent=7328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}