Our company provides services in the field of information technology. Our company is committed
to protecting privacy, integrity, andall physical and electronic information assets.
Information security requirements align with our corporate goals.
The management of our company ensures an open, well-trained, and competent workforce,
maintains competitiveness within the industry by securing adequate funding, and possesses
sufficient hardware and infrastructure.
maintains competitiveness within the industry by securing adequate funding, and possesses
sufficient hardware and infrastructure.
Business continuity and emergency plans, data backup procedures, protection against viruses
and hackers, access control systems, and information security breach reporting constitute
the cornerstones of our core activities.
and hackers, access control systems, and information security breach reporting constitute
the cornerstones of our core activities.
Vulnerabilities and threats identified through risk assessments are addressed to ensure secure
access to information for our customers and employees.
Additionally, objectives are defined based on risk assessments, and the necessary resources
and conditions are provided to achieve these objectives.
access to information for our customers and employees.
Additionally, objectives are defined based on risk assessments, and the necessary resources
and conditions are provided to achieve these objectives.
To implement this policy, we expect our employees to integrate Information Security Management
System requirements into their work. All employees and third parties receive appropriate training on
the "Information Security Management System."
System requirements into their work. All employees and third parties receive appropriate training on
the "Information Security Management System."
Applicable conditions related to information security, as well as opportunities and requirements
brought by these conditions, will be fulfilled, and these conditions will be continuously improved.
Adaptation to this system will be ensured for our company, employees, and all relevant parties.
brought by these conditions, will be fulfilled, and these conditions will be continuously improved.
Adaptation to this system will be ensured for our company, employees, and all relevant parties.
Our Information Security Policy is reviewed annually or in the event of significant changes related
to our company. It is reviewed with the participation of management and unit responsible to ensure
its suitability, accuracy, and effectiveness, and it is updated accordingly.
to our company. It is reviewed with the participation of management and unit responsible to ensure
its suitability, accuracy, and effectiveness, and it is updated accordingly.
General Manager
4M Digital Transformation and Consultancy
0 312 486 02 21
Enhance Your Productivity with Technology-Driven Solutions