Our company, as its management, performs the establishment of information technology infrastructure based on local and wide area networks in all kinds of businesses and institutions, depending on the mission, vision and policies expressed in the Quality Management System, and provides operatorship and consultancy services with its operation and support, It meets the IT needs of enterprises and institutions that require high technical knowledge and experience with the outsource method.
Information security is the activities of protecting the confidentiality, integrity and usability of the information produced, prepared by the company and to which the parties are responsible. These activities should ensure that information is protected, including other characteristics such as accuracy, explainability, non-repudiation and reliability.
Services that our company is responsible for performing information security activities:
- Continuity of IT services will be provided under an institutional roof independent of individuals, within the scope and limits of ISMS.
- Configuration of network installations that require high knowledge and experience will be provided within the scope and limits of ISMS.
- The necessary operating and technical support services will be provided within the scope and limits of the ISMS, in order for the existing networks in the institutions / organizations to work continuously.
- Providing operator services and ensuring data security in routine works based on IT infrastructure / hardware / software system will be within the scope and boundaries of ISMS.
- Meeting the expectations of our customers at a high level of the institutions / organizations we serve under the contract, increasing their information processing capabilities, helping them reach their activity / process / performance targets by keeping them informed of technological developments will be continued within the scope and limits of ISMS.
- Recognizing that any confidential/commercial/private information processed in all information technology systems we serve within the scope and boundaries of ISMS is the privacy of the customer of the institution/organization we serve, and that this information is confidential in any place/person/institution/organization without the knowledge/approval of the customer. / Integrity / Availability will be ensured by adhering to the conditions.
- ISMS policy will comply with legal and regulatory requirements, take into account obligations or dependencies arising from contracts or third parties, provided that it remains within the scope and limits of ISMS.
Our company establishes the necessary control mechanisms for the fulfillment of information security activities. A draft study has been initiated in order to determine the control targets, to carry out the controls and to ensure their continuity. In this study, the risk management and risk control structure to which the controls will depend has been established.
Our company, which works especially for organizations that request services based on outsourcing, has to guarantee that the most important capital and asset of the institutions / organizations that receive service from it is used by 3rd parties without seeking good or bad intentions. It is a basic requirement to carry out activities in compliance with the laws and relevant legislation rules stipulated by the specifications and included in the provisions of the contract and deemed mandatory by the highest executive structure in the fields in which the institution / organization operates.
In order to fulfill these requirements, arrangements will be made on the basis of hardware and software, and awareness - awareness - application - development training and exercises will be carried out for all our personnel.
Another dimension of information security is providing business continuity management. For this reason, by providing the necessary backup structures, breakage and rupture situations in the areas that fall under the responsibility of our company in any business continuity structure will be eliminated.
In the ISMS documentation established to support our information security policy
- Rules to be followed
- Processes
- Procedures
- Controls
It is located.