top of page

Certifications

ISO/IEC 27001 means a global standard information security management system certificate continuously enhancing a corporate Information Security Management System is a global standard information security management system certificate that m (ISMS) to converse data in a holistic manner. International Organization for Standardization (ISO) and The International Electrotechnical Commission (IEC) organize this certificate. 

 

ISO 270001 POLICY

 

CONTENTS:  

1.Purpose........................................................................................................................  1 

2.Scope...........................................................................................................................  1 

3.Policy............................................................................................................................. 1 

 

1.Purpose:  

To Define the information security management framework to defining the basic information security goals and principles, and the purpose is to emphasize that the management supports the information security management system.  

2. Scope:  

The principles’ determined to support the strategic goals of the Institution, protecting the reputation of the Institution and ensuring compliance with the relevant regulations are within the scope of the Information Security Policy. 

3. Policy: 

As an institution; In order to protect the information assets of our organization and our stakeholders, to keep them up to date and ensure their accessibility when needed; 

.To secure all kinds of critical information required in our activities, 
.To meet the information security obligations arising from the national or international regulations and legal requirements that we are subject to, 
.To increase the competencies of the employees of the institution and to ensure that the employees contribute to the information security, 
.Creating business continuity plans and taking necessary precautions against changing information security threats by making risk analyzes, 
.To provide all necessary support to ensure information security, 
.Continuous improvement of the information security management system, 

We make a commitment to it.

bottom of page