In order to comply with the principles of confidentiality, integrity and accessibility of information, which are the requirements of the Information Security Management System, to establish the risk management methodology for our company, customers and suppliers, which includes defining information assets in our company, identifying risks and taking control measures regarding risks,
To protect the confidentiality of our customers' information and to ensure compliance with standards and legal regulations,
Providing the necessary resources for hardware, software, training and other controls to reduce information security risks and ensuring their continuity,
Raising awareness, training and encouragement of all personnel and business partners to ensure their participation in and compliance with the ISMS as required by the holistic approach to information security,
Controlling, monitoring and reviewing the efficiency of the ISMS through internal and external audits, and continuously harmonizing and improving the system;
Translated with www.DeepL.com/Translator (free version)