{"id":1818,"date":"2025-04-16T17:42:36","date_gmt":"2025-04-16T14:42:36","guid":{"rendered":"https:\/\/cbernet.com\/information-security-policy\/"},"modified":"2025-04-16T18:32:44","modified_gmt":"2025-04-16T15:32:44","slug":"information-security-policy","status":"publish","type":"page","link":"https:\/\/cbernet.com\/en\/information-security-policy\/","title":{"rendered":"Information Security Policy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1818\" class=\"elementor elementor-1818 elementor-1805\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-dc5bed7 e-con-full e-flex e-con e-parent\" data-id=\"dc5bed7\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-863f32d elementor-widget elementor-widget-heading\" data-id=\"863f32d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Information Security Policy<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-49da5df e-con-full e-flex e-con e-parent\" data-id=\"49da5df\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-28001a2 e-con-full e-flex e-con e-child\" data-id=\"28001a2\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-73d8c62 elementor-widget elementor-widget-text-editor\" data-id=\"73d8c62\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The main field of activity of CBERNET Bilgi Teknolojileri Anonim \u015eirketi is the implementation and operation of cyber security projects in critical facilities and operational technologies (OT) infrastructures, and the provision of pre-sales and after-sales services as consultancy. Our organization provides IT (Information \/ Information Systems Infrastructure) and OT (Automation Infrastructure) Cyber Security \/ Network Project Management. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b14c54f elementor-widget elementor-widget-text-editor\" data-id=\"b14c54f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Our institution also provides analysis, consultancy, technical support and training activities.<\/p><p>The Agency&#8217;s policy is based on national and international regulations, standards and documents in force for each of the services provided and all transactions and documents prepared are based on compliance with national and international standards.<\/p><p>In this context, our organization takes access controls in accordance with the need-to-know principle within the framework of legal compliance and security measures in accordance with the developing technology. Considering the information security threats, an information security risk management system is implemented that provides an appropriate balance between risks and measures in terms of the organization&#8217;s information assets and services. Our information security objectives within this framework;  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65c6a72 elementor-widget elementor-widget-text-editor\" data-id=\"65c6a72\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li>Ensuring compliance with legal requirements and standards<\/li><li>Maximizing the confidentiality, integrity and accessibility of the data processed in the organization,<\/li><li>Ensuring business standardization and increasing security in information systems,<\/li><li>Establishing infrastructures to ensure the protection of the data of internal and external stakeholders who directly or indirectly benefit from our business processes to the extent they request,<\/li><li>Continuous improvement of ISMS in line with the developing technology and standards.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c0332d0 elementor-widget elementor-widget-text-editor\" data-id=\"c0332d0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>We undertake to comply with the Information Security Management System, which is defined, put into effect and implemented in a way that realizes the determined information security objectives and fulfills the requirements specified in TS ISO\/IEC 27001, to allocate the resources necessary for the efficient operation of the system, to evaluate its effectiveness, to continuously improve it, and to ensure that it is understood by employees and accessible to all interested parties.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Information Security Policy The main field of activity of CBERNET Bilgi Teknolojileri Anonim \u015eirketi is the implementation and operation of cyber security projects in critical<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-1818","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/pages\/1818","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/comments?post=1818"}],"version-history":[{"count":1,"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/pages\/1818\/revisions"}],"predecessor-version":[{"id":1819,"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/pages\/1818\/revisions\/1819"}],"wp:attachment":[{"href":"https:\/\/cbernet.com\/en\/wp-json\/wp\/v2\/media?parent=1818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}