Our Data Security Policy

- Managing information assets, identifying security values, needs and risks of assets, developing and implementing controls on security risks

- Define the framework in which to determine information assets, values, security needs, vulnerabilities, threats to assets and methods for determining the frequency of these threats.

- Define a framework for evaluating the privacy, integrity, and accessibility effects of threats on assets.

- Laying out the working principles for risk processing.

- Constantly monitor risks by reviewing technological expectations in the scope's context served.

- Of course, from national or international regulations, legal and fulfilling the requirements of other relevant legislation, from the obligations arising out of the agreement to cover the requirements for information security responsibilities arising from firms provide internal and external stakeholders.

- Reduce the impact of information security threats to service continuity and contribute to continuity.

- Having the competence to quickly intervene in information security events that may occur and minimize the impact of the event to maintain and improve the level of information security over time with a cost-effective control infrastructure.

- Improving the company's reputation and protecting it from negative effects based on information security.