Tezmaksan Makina Sanayi ve Ticaret A.Ş.
Tezmaksan Makina Sanayi ve Ticaret A.Ş.

Information Security Policy

Tezmaksan Makine Sanayi ve Ticaret Anonim Şirketi ("Tezmaksan" or "Company") and its subsidiaries, have created an Information Security Management System ("ISMS") in accordance with the ISO / IEC 27001: 2013 standard so as to protect human, infrastructure, software, hardware, organization information, customer information, information belonging to third parties and to ensure information security management within financial resources, secure risk management, measure process performance on information security management and ensure the arrangement of relations with third parties on issues related to information security.

The purpose of the establishment of ISMS is to protect the information used in the performance of all services provided by Tezmaksan and its subsidiaries from all threats that might occur internally and/or externally, knowingly, or unknowingly, intentionally or accidentally, to identify the risks that might arise within this scope and to minimize the effects of these risks and to ensure that the activities carried out are performed effectively, accurately, quickly and safely.

Information is a substance being in written, printed, oral and similar media form, which is necessary for the activities of an organization, and which must be appropriately protected as a result, in electronic form. It has been ensured that through the ISMS policy, confidentiality (prevention of unauthorized access to information), integrity (whole and complete information and information elements, accuracy and inappropriate non-modification) and accessibility (access of authorized users to data they need when they need it) are implemented in all activities carried out by the Company and its subsidiaries. ISMS policy has been applied to all units of the Company and its subsidiaries.

Information security is a corporate responsibility and in line with our corporate targets. Necessary roles have been defined, responsibilities have been determined and people in charge have been appointed to allow information security processes to be maintained properly and ISMC to be sustained. Such responsibilities cover especially all units using the information technologies infrastructure, users accessing information systems as third parties and suppliers providing technical support to information systems.

In order to achieve targeted success conducted within the scope of information security, conscious approach of Company’s employees, users and suppliers, and fulfilling their duties that are under their responsibilities and paying utmost attention to the policies, procedures, guidelines and announcements published in the www.tezmaksan.com is essential. Within this context, Tezmaksan ensures that the above-mentioned people become aware of them by carrying out studies / trainings for increasing the awareness of information security.

The establishment of the ISMS policy at our Company aims to take inventory on information assets, carry out risk assessments, implement controls and reviewe the effectiveness of the controls implemented so as to ensure the confidentiality, integrity and accessibility of the information produced, processed and stored by the Company and its subsidiaries. With the establishment process of ISMS in our Company, it is aimed to identify existing and possible risks in all areas within the scope, to evaluate them periodically, to reduce them to an acceptable level via criticizing them with controls in accordance with the standard, and as a result of the evaluations made for applying the risk assessment procedure, the action plans are reviewed and the keeping of the ISMS alive in the institution is followed.

Within this context, our Company and its subsidiaries undertake to fulfill the requirements of information security standards and the legal requirements related to the ISMS, to bring the security measures to an appropriate level, to activate all applicable controls and, additionally; to continuously improve the ISMS’ regular intervals with new application areas and advancing technology annually.

This website uses cookies to improve your experience. Learn More
Okay