{"id":1871,"date":"2021-05-26T05:08:42","date_gmt":"2021-05-26T05:08:42","guid":{"rendered":"https:\/\/www.isbirsentetik.com\/bilgi-guvenligi\/"},"modified":"2021-07-29T06:58:43","modified_gmt":"2021-07-29T06:58:43","slug":"information-security","status":"publish","type":"page","link":"https:\/\/www.isbirsentetik.com\/en\/information-security\/","title":{"rendered":"Information Security"},"content":{"rendered":"<section id=\"bt_bb_section69e75590ec488\"  class=\"bt_bb_section bt_bb_top_spacing_90 bt_bb_bottom_spacing_90 bt_bb_layout_boxed_1200 bt_bb_vertical_align_top\" ><div class=\"bt_bb_port\"><div class=\"bt_bb_cell\"><div class=\"bt_bb_cell_inner\"><div class=\"bt_bb_row \"  data-bt-override-class=\"{}\"><div class=\"bt_bb_row_holder\" ><div  class=\"bt_bb_column col-xxl-12 col-xl-12 col-xs-12 col-sm-12 col-md-12 col-lg-12 bt_bb_vertical_align_top bt_bb_align_left bt_bb_padding_normal\" style=\"; --column-width:12;\" data-width=\"12\" data-bt-override-class=\"{}\"><div class=\"bt_bb_column_content\"><div class=\"bt_bb_column_content_inner\"><div  class=\"bt_bb_text\" ><\/p>\n<ul>\n<li>The main theme of TS EN ISO 27001:2013 information security management system is to show that information security management was accomplished at <strong><em><u>\u0130\u015eB\u0130R SENTET\u0130K DOKUMA A.\u015e.<\/u><\/em><\/strong>, to secure risk management,   to meausre the process performance of information security management and to provide the relations with the third person about information security.In accordance with,  the main aim of <strong><u>Our ISMS<\/u><\/strong>;\n<ul>\n<li>To protect information asset of <strong><u>\u0130\u015fbir Sentetik Dokuma A.\u015e.<\/u><\/strong> against all kind of  threats  which may come out  by consciously or unconsciously ; or from inner or external , to provide accessibility to information as required by business process, meet legislative requirements ,<\/li>\n<li>Provide three basic continuity of ISMS in all activities carried out<\/li>\n<\/ul>\n<p><strong><em>              <u>Privacy :<\/u><\/em><\/strong>              Preventing unauthorized access to sensitive information<\/p>\n<p><strong><em>              <u>Integrity :<\/u><\/em><\/strong><u> <\/u>           Demonstration of the accuracy and completeness of information<\/p>\n<p><strong><em>              <u>Accessibility :<\/u><\/em><\/strong>      Demonstration of the availability of information where necessary by authorized people<\/p>\n<ul>\n<li>To deal with the security of all data in written, printed, oral, and similar media, not just those stored in electronic media<\/li>\n<li>Ensuring awareness  by giving information security management trainings  to all staff<\/li>\n<li>To report the actual or suspected disclosure deficiencies in information security to the ISMS team and to ensure that they are investigated by the ISMS administrator<\/li>\n<li>Prepare, maintain and test business continuity plans<\/li>\n<li>To determine the current risks by making periodic assessments on information security. After evaluating the results ,reviewing the action plans and following up them<\/li>\n<li>To prevent any conflict and conflict of interest that may arise from the contract<\/li>\n<li>To meet the business needs for information accessibility and information systems completely.<\/li>\n<li>Committed to continuous improvement<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/www.isbirsentetik.com\/en\/wp-json\/wp\/v2\/pages\/1871"}],"collection":[{"href":"https:\/\/www.isbirsentetik.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.isbirsentetik.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.isbirsentetik.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.isbirsentetik.com\/en\/wp-json\/wp\/v2\/comments?post=1871"}],"version-history":[{"count":2,"href":"https:\/\/www.isbirsentetik.com\/en\/wp-json\/wp\/v2\/pages\/1871\/revisions"}],"predecessor-version":[{"id":1977,"href":"https:\/\/www.isbirsentetik.com\/en\/wp-json\/wp\/v2\/pages\/1871\/revisions\/1977"}],"wp:attachment":[{"href":"https:\/\/www.isbirsentetik.com\/en\/wp-json\/wp\/v2\/media?parent=1871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.isbirsentetik.com\/en\/wp-json\/wp\/v2\/categories?post=1871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.isbirsentetik.com\/en\/wp-json\/wp\/v2\/tags?post=1871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}