elkon-logo

Elkon Elektrik San. ve Tic. A.Ş., in line with the Information Security Management System Standard, undertakes the following to ensure secure access to the information assets of individuals whose data we process:

  • To manage information assets; to identify the security value, requirements, and risks of these assets; and to develop and implement controls against security risks in accordance with the Information Security Management System.
  • To define a framework for identifying information assets, their values, security requirements, vulnerabilities, threats to assets, and the frequency of such threats.
  • To establish a framework for evaluating the impact of threats on the confidentiality, integrity, and availability of assets.
  • To set out the principles for risk treatment.
  • To continuously monitor risks by reviewing technological expectations within the scope of the services provided.
  • To fulfill information security requirements arising from applicable national and international regulations, legal and regulatory obligations, contractual commitments, and responsibilities towards internal and external stakeholders.
  • To reduce the impact of information security threats on service continuity and contribute to business continuity.
  • To have the capability to respond rapidly to potential information security incidents and minimize their impact.
  • To maintain and continuously improve the level of information security through a cost-effective control infrastructure.
  • To provide all personnel with awareness, information, and training on Information Security, and to repeat such training at regular intervals.
  • To continuously improve the system by considering the outcomes of implementation, audits, and corrective actions within the scope of the Information Security Management System Standard.
  • To operate the Information Security Management System in an integrated manner with other management systems within the organization.
  • To enhance the company’s reputation and protect it against adverse impacts related to information security.