Information Security Policy

Ensuring the following provisions is the Information Security Management System of BOYTEKS A.Ş.

  • Security is ensured through granting authorized access to information,Information integrity is ensured by protecting against unauthorized alterations and recording the performed alterations,
  • When information is required, access is ensured by making available for authorized users access,
  • The entire policies and procedures supporting this policy are applied and implemented by each unit within the scope and restrictions. The entire legal requirements are satisfied.
  • Awareness is ensured by providing continuing training to the entire employees regarding the Information Security.
  • The entire Information Security vulnerabilities and suspicious situations determined shall be reported to the relevant parties. Continuous improvements and checks are ensured by the relevant parties.

 

  • certificate-01
  • certificate-02

 

Objectives:

  • Determining the values of information assets through appropriate risk assessment, acknowledging the weaknesses and threats imposing risk to information assets and minimizing the risks to reasonable levels.
  • Fulfilment of the requirements of the laws through the design, implementation and maintaining the Information Security Management System.
  • Preserving and securing the Reliability and the image of the Enterprise.
  • Complying with the terms and conditions of the entire customer agreements regarding the Information Security.
  • Ensuring the Business continuity of the enterprise.
  • Ensuring the compliance with TS ISO IEC 27001 and maintaining the compliance.