The Company undertakes to take all necessary technical and administrative measures and
to take the due care to ensure the confidentiality, integrity and security of personal data.
In this context, it takes the necessary measures to prevent unlawful processing of
personal data, unauthorized access to data, unlawful disclosure, modification or
destruction of data. Accordingly, The Company takes the following technical and
administrative measures regarding the personal data it processes:
Anti-virus application. On all computers and servers in The Company's information
technology infrastructure, a periodically updated anti-virus application is installed.
Firewall. The data center and disaster recovery centers hosting The Company servers are
protected by periodically updated software-loaded firewalls; the relevant next generation
firewalls control the internet connections of all staff and provide protection against
viruses and similar threats during this control.
VPN. Suppliers can access The Company servers or systems through SSL-VPN defined on
Firewalls. A separate SSL-VPN identification has been made for each supplier; with the
identification made, the supplier only provides access to the systems that it should use or
is authorized to use.
User identifications. The Company employees' authorization to The Company systems
is limited only to the extent necessary by job descriptions; in case of any change of
authority or duty, systemic authorizations are also updated.
Information security threat and event management. Events that occur on The
Company servers and firewalls, are transferred to the “Information Security Threat and
Event Management” system. This system alerts the responsible staff when a security
threat occurs and allows them to respond immediately to the threat.
Encryption. Sensitive data is stored with cryptographic methods and if required,
transferred through environments encrypted with cryptographic methods and
cryptographic keys are stored in secure and various environments.
Logging. All transaction records regarding sensitive data are securely logged.
Two-factor authentication. Remote access to sensitive data is allowed through at least
two-factor authentication.
Penetration test. Periodically, penetration tests are performed on servers in the The
Company system. The security gaps created as a result of this test are closed and a
verification test is performed to show that the relevant security gaps have been closed.
Besides, Information Security Threat and Event Management System automatically
performs penetration tests. Test results are recorded.
Information Security Management System (ISMS). At the ISMS meetings made within
The Company, the topics contained in the control forum are audited monthly by the
director of information technology and the director of financial operations.