Idea Logo
    • Our Focus
      • Sales - Distribution Applications
      • Fintech Applications
      • R&D
    • About
    • HR
    • News
    • Contact
    Türkçe
    Idea Logo
    • About Idea Technologies
    • Success Stories
    • References
    • Business Partners
    • Quality Policy
    • Information Security and Privacy Policy
    • Feedback Policy
    • Service Management Policy
    • Business Continuity Policy
    • Artificial Intelligence Policy
    • Environment and Occupational Health and Safety Policy
    • Anti-Bribery and Anti-Corruption Policy
    • KVKK Information Notice
      • Clarification Text For Customers
      • Clarification Text For Suppliers
    • Cookie Policy

    Information Security Policy

    Idea Technology Solutions has access to its customers’ strategically important data and information during the development of the products and the implementation of solutions it offers.

    Thus the aim of our Information Security Policy is to ensure the confidentiality, integrity and accessibility of information assets of both Idea Teknoloji Çözümleri and all other parties involved.

    In line with its Information Security Policy, Idea Technology Solutions:

    • Performs the risk analysis and determines the necessary measures,
    • Allocates the necessary resources (hardware, software, personnel, infrastructure and training programs) to implement the measures,
    • Defines the duties, roles and responsibilities of its employees,
    • Defines the security processes, ensures their implementation and monitoring,
    • In order to ensure the continuity of the system, it carries out joint projects with its suppliers, customers and business partners when necessary,
    • It complies with the legal requirements of the countries where it operates.

    The objectives of our Information Security Policy are as follows:

    • Ensuring the confidentiality of accessed / used / disclosed information. (For further information about the Law on the Protection of Personal Data and our Obligations, please click.)
    • Preventing the access of unauthorized persons who will try to disrupt the confidentiality and integrity of the information,
    • Preventing or minimizing the effects of potential security breaches,
    • Preparing, maintaining and testing business continuity plans in order to ensure access to information,
    • Reducing performance losses to the lowest possible level,
    • Ensuring the reporting of all existing or suspicious vulnerabilities in information security and to develop practices for the initiation of their investigation.
    •    
    • Our Focus
      • R&D
      • Fintech Applications
      • Sales - Distribution Applications
    • About
    • KVKK
    • HR
    • News
    • Contact
    • Manage Cookies
    vergiteknolojileri.com.tr


    © 2019 Idea Technology Solutions. All Rights Reserved.
    ASK FOR A DEMO
    ALL REFERENCES