Information Security Policy

The main theme of TS EN ISO 27001:2022 Information Security Management System; Signum Teknoloji Tanıtım ve Eğitim A.Ş. Software Services; to demonstrate that information security management is provided within human, infrastructure, software, hardware, customer information, organizational information, third party information and financial resources, to ensure risk management, to measure information security management process performance and to ensure the regulation of relations with third parties on information security issues. Our ISMS Policy Objective;

  • To protect Signum Teknoloji Tanıtım ve Eğitim A.Ş. information assets against all kinds of threats that may occur from inside or outside, intentionally or unintentionally, to ensure accessibility to information as required by business processes, to meet the requirements of legal regulations, to work towards continuous improvement,
  • To ensure the continuity of the three basic elements of the Information Security Management System in all activities carried out.
  • Confidentiality: Preventing unauthorized access to critical information,
  • Integrity Demonstrate that the accuracy and integrity of information is ensured,
  • Accessibility: Demonstrating that those with authorization can access information when necessary,
  • To take care of the security of not only the data kept electronically, but also all data in written, printed, verbal and similar media.
  • To raise awareness by providing Information Security Management trainings to all personnel.
  • To report to the ISMS Team all actual or suspicious vulnerabilities in Information Security and to ensure that they are investigated by the ISMS Team.
  • Prepare, maintain and test business continuity plans.
  • To identify existing risks by making periodic assessments on Information Security.
  • As a result of the evaluations, reviewing and following up on action plans.
  • To prevent any disputes and conflicts of interest that may arise from contracts.
  • To meet business requirements for information accessibility and information systems.

Within the scope of Article 11 of the Personal Data Protection Law No. 6698 ("KVKK"); to learn whether your personal data has been processed, to request information if it has been processed, to learn the purpose of processing your personal data and whether it is used in accordance with its purpose, to learn the third parties to whom it is transferred domestically and / or abroad, to request correction of your personal data if it is incomplete or incorrectly processed, to request the deletion / destruction or anonymization of your personal data within the scope of Article 7 of the KVKK in case the reasons requiring the processing of your personal data disappear and there is no legal obstacle. You have the right to request the deletion/destruction or anonymization of your personal data within the scope of Article 7 of the KVKK, to request notification of the correction or deletion/destruction/anonymization to third parties to whom your personal data has been transferred in cases of correction or deletion/destruction/anonymization, to object if a result arises against you due to the analysis of your personal data exclusively by automated systems, and to request compensation for damages in case you suffer damage due to unlawful processing of your personal data.