Our Policies

As FONET Bilgi Teknolojileri A.Ş. Senior Management, we undertake that it will prove its commitment to the installation, operation, monitoring, review, maintenance and continuous improvement of the Information Security Management System (ISMS) in accordance with the TS ISO / IEC 27001 standard by realizing the following issues.

  • Documentation, certification and continuous improvement of our information security management system in line with the requirements of the ISO 27001 Information Security Management System standard.
  • Complying with all legal regulations and agreements with third parties (business partners, customers, suppliers) regarding information security.
  • Systematic management of risks to our information assets.
  • Providing necessary trainings to all our employees in order to raise awareness on information security.
  • Ensuring secure access to information technology systems and ensuring the continuity of access to these systems,
  • Periodic and continuous risk assessment and processing,
  • Performing security tests and audits within the scope of independent review of information security,
  • Allocate the necessary resources for information security management and assign relevant roles and responsibilities,
  • Managing the activities we carry out to ensure the continuity of our core and supporting business processes in an integrated manner with our other management systems

 

The first priority and assets that need to be protected are company records, information obtained in line with customer contracts, personal data belonging to real persons for whom we are responsible for data, information obtained due to investment and R&D projects, application development documents of all projects, source codes and the media that store, process and transmit them. Necessary controls are implemented to protect the confidentiality, integrity and accessibility of these assets.

Therefore;

  • Confidentiality of information is protected,
  • Information cannot be shared with unauthorized persons intentionally or as a result of inattention,
  • Information is protected against unauthorized access,
  • Integrity of information is ensured by protection against unauthorized modification,

 

Information is made available to authorized users when necessary.