{"id":2614,"date":"2023-07-28T16:14:42","date_gmt":"2023-07-28T13:14:42","guid":{"rendered":"https:\/\/www.vr.net.tr\/isms-policy\/"},"modified":"2025-09-03T16:45:39","modified_gmt":"2025-09-03T13:45:39","slug":"isms-policy","status":"publish","type":"page","link":"https:\/\/www.vr.net.tr\/en\/isms-policy\/","title":{"rendered":"ISMS Policy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2614\" class=\"elementor elementor-2614 elementor-1952\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-364b199 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"364b199\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;shape_divider_bottom&quot;:&quot;triangle-asymmetrical&quot;,&quot;shape_divider_bottom_negative&quot;:&quot;yes&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M737.9,94.7L0,0v100h1000V0L737.9,94.7z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2cb79baf\" data-id=\"2cb79baf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-63fba65d elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"63fba65d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">ISMS Policy<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7609fd63 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7609fd63\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1a7c9e33\" data-id=\"1a7c9e33\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2e20d1df elementor-invisible elementor-widget elementor-widget-theme-post-featured-image elementor-widget-image\" data-id=\"2e20d1df\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"theme-post-featured-image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img  fetchpriority=\"high\" decoding=\"async\" width=\"850\" height=\"567\"  src=\"\/wp-content\ /uploads\/2023\/06\/terms-end-conditions.png\" class=\"attachment-full size-full wp-image-792\" alt=\"\" srcset=\"\/wp-content\/uploads\/2023\/06\/terms-end-conditions.png 850w, \/wp-content\/uploads\/2023\/06\/terms-end-conditions-300x200.png 300w, \/wp-content\/uploads\/2023\/06\/terms-end-conditions-768x512.png 768w\" sizes=\"(max-width: 850px) 100vw, 850px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-292332dc elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"292332dc\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-2cd250b5\" data-id=\"2cd250b5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-23ed194 elementor-widget elementor-widget-text-editor\" data-id=\"23ed194\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The main theme of our company&#8217;s ISM, in line with the TS EN 27001:2022 standard, is to demonstrate that information security management is ensured within the information processing activities used in our services, covering people, infrastructure, software, hardware, organizational information, third-party information, and financial resources; to guarantee risk management, to measure the performance of information security management processes, and to regulate relationship with third parties in matters related to information security.<\/p><p>Accordingly, the objectives of <em><span style=\"text-decoration: underline;\"><strong><span class=\"sc-dcJsrY jPczCJ AT-ate-chip--compact ate-chip--marker  ate-chip ate-chip--compact ate-chip--marker\" data-segment=\"gid_0\" data-type=\"g\"><span class=\"sc-dcJsrY jCHvdx AT-ate-chip--compact ate-chip--marker  ate-chip ate-chip--compact ate-chip--marker\" data-segment=\"gid_1\" data-type=\"g\"><span class=\"sc-dcJsrY iMLoHX AT-ate-chip--compact ate-chip--marker  ate-chip ate-chip--compact ate-chip--marker\" data-segment=\"gid_2\" data-type=\"g\">our ISMS Policy<\/span><\/span><\/span><\/strong><\/span><\/em> are as following:<\/p><ul><li><em>To manage information assets, determine their security values, requirements and risks, and to develop and implement controls against security risks<\/em><\/li><li><em>To define a framework for identifying information assets, their values, security requirements, vulnerabilities threats, and frequency of threats<\/em><\/li><li><em>To establish a framework for assessing the confidentiality, integrity, and availability impacts of threats on information <span class=\"error-spellcheck\" data-word=\"assests\" data-suggestion=\"assess|assets|assents|asserts|assists|asses-ts|asset\">assests<\/span><\/em><\/li><li><em>To set out the working principles for the treatment of risks<\/em><\/li><li><em>To continuously monitor risks by reviewing technological expectations within the scope of the services provided<\/em><\/li><li><em>To fulfill information security requirements arising from applicable national or international regulations, legal and related legislative requirements, contractual obligations, and corporate responsibilities toward internal and external stakeholders<\/em><\/li><li><em>To reduce the impact of information security threats on service continuity and to contribute to the continuity of services<\/em><\/li><li><em>To possess the competence to rapidly respond to potential information security incidents and to minimize thier impact.<\/em><\/li><li><em>To maintain and improve the level of information security over time with a cost-effective control infrastructure.<\/em><\/li><li><em>To enhance the company&#8217;s reputation and protect it from adverse effects based on information security.<\/em><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The main theme of our company&#8217;s ISM, in line with the TS EN 27001:2022 standard, is to demonstrate that information security management is ensured within the information processing activities used in our services, covering people, infrastructure, software, hardware, organizational information, third-party information, and financial resources; to guarantee risk management, to measure the performance of information [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-2614","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.vr.net.tr\/en\/wp-json\/wp\/v2\/pages\/2614","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.vr.net.tr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.vr.net.tr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.vr.net.tr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.vr.net.tr\/en\/wp-json\/wp\/v2\/comments?post=2614"}],"version-history":[{"count":8,"href":"https:\/\/www.vr.net.tr\/en\/wp-json\/wp\/v2\/pages\/2614\/revisions"}],"predecessor-version":[{"id":2830,"href":"https:\/\/www.vr.net.tr\/en\/wp-json\/wp\/v2\/pages\/2614\/revisions\/2830"}],"wp:attachment":[{"href":"https:\/\/www.vr.net.tr\/en\/wp-json\/wp\/v2\/media?parent=2614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}