TR|EN
MENÜ
Corporate > Information Security Policy

Information Security Policy

         

  https://www.pk.com.tr/bilgi-guvenligi-politikasi_clip_image002.jpg

Pamukkale Kablo Sanayi ve Ticaret Anonim Şirketi

Document no.

:

PK-BPL01

 

Date of Publication

:

 07/10/2016

 Information Security Policy

Revision no.

:

02

Date of Revision

:

04/08/2020

 

 


PURPOSE

This policy aims to supervise development and regular updating of the control infrastructure regarding measures that will ensure the confidentiality, integrity and accessibility of the information systems and data within the Company.

SCOPE

Information, like other important business-related assets, is an asset that is necessary for an organization’s activities and therefore needs to be appropriately protected. The security of information assets is provided in accordance with the policies defined by the Company. The purpose of information security is to prevent unauthorized access to information (Confidentiality), to ensure that information and information assets are complete and accurate, and not inappropriately modified (Integrity), and to ensure that authorized users can access the data they need when they need it (Accessibility).
Information Security Policy applies to all units and service providers of the Company.
The aim of the Company’s Information Security Management Process is to inventory information assets, conduct risk assessments, implement controls and review the effectiveness of implemented controls in order to ensure the confidentiality, integrity and accessibility of information produced, processed and stored by the Company.

DEFINITIONS

Company: Pamukkale Kablo Sanayi ve Ticaret Anonim Şirketi (Pamukkale Kablo)
IT Data: Highly confidential data such as passwords, PINs, encryption keys, card numbers, personal certificates, and smart cards that users use to prove their identities on systems.
Information Security and Risk Committee: It represents the committee established for the purpose of establishing policies, procedures and processes regarding the management of information systems and ensuring information security, and effectively managing risks arising from the use of information technologies.

FUNDAMENTAL PRINCIPLES REGARDING INFORMATION SYSTEMS MANAGEMENT

 

INFORMATION SECURITY POLICY

With the Information Security Policy, the Company;

MAIN TOPICS OF INFORMATION SECURITY POLICY

INFORMATION SECURITY ORGANIZATION

The Company management establishes the information security organization within the Company. The organization carries out its work on the establishment, maintenance and management of security policies in the Company with a holistic approach.

In order to carry out the activities of planning, implementing and controlling Information Security in the Company, the Information Security and Risk Committee, Information Security Officer, Physical Security Officer, Information Asset Owners and Company employees take part. The duties and responsibilities of relevant parties within this scope are clearly defined in addition to this policy.
The Company’s Information Security Policy is prepared by the Information Security Officer, reviewed at least once a year by the Information Security and Risk Committee and approved by the Board of Directors. While creating the Information Security Policy, the Company’s security strategy, security requirements, legal and regulatory obligations are taken into consideration.
The Company’s Executive Management ensures that the Information Security Policy is implemented.

MANAGEMENT OF INFORMATION ASSETS

All data belonging to the Company created, transmitted, stored or shared verbally in printed and digital media are included in the scope of the Company’s information assets. The applications, software and hardware used in the transmission, processing, access, storage and destruction of data are also included in the scope of information assets.
The Company ensures the confidentiality, integrity and accessibility of information assets and all assets related to this data, preventing them from being accidentally or intentionally damaged, changed, disclosed or lost. To this end, it classifies information assets by conducting asset assessments. It ensures that the Company’s information is used in accordance with this classification. An owner is assigned to each asset and the responsibilities related to the assets are assigned to these owners.

ASSESSMENT OF RISKS

The Company’s risk assessment approach regarding information security is determined and defined by the Information Security and Risk Committee.  The information security risk assessment approach determines the methods by which the Company’s information security risks will be determined, how risk levels will be calculated and how risks will be evaluated. The work on identifying, rating, processing and reviewing risks that may occur regarding information assets is carried out in accordance with the determined risk assessment approach.

CREATING SECURITY AWARENESS

The company determines awareness training requirements for all personnel and provides training to its personnel accordingly. All newly hired employees must be informed about information security. The company obtains signed approvals from its own employees and supplier company employees that they know and will comply with information security policies.

PHYSICAL AND ENVIRONMENTAL SECURITY

The company takes physical security measures to prevent unauthorized physical access, intervention and damage to buildings and areas where information processing activities take place within the scope of the Additional BUSINESS CONTINUITY MANAGEMENT PROCEDURE to this policy.
The loss, damage, theft, endangerment of information assets and interruption of the organization’s activities are prevented by applying security controls to the equipment used in information processing activities.

COMMUNICATION AND OPERATION MANAGEMENT

Processes are created and responsibilities are defined to ensure that the facilities, environments and tools where information is processed are operated and managed in a secure manner and in accordance with their purpose. When defining responsibilities for processes, the role that performs a job and the role that controls the job are not given to the same person.
In order to protect the integrity of software and information, security checks are performed against malicious codes and applications.
Backup activities are performed to ensure the integrity and usability of information and information assets. Protection of information and supporting infrastructure in the network is ensured.
In order to prevent unauthorized disclosure, modification, removal or destruction of assets and interruption of business activities, precautions are taken and standardized for the processing of information. Security checks are applied to ensure the security of information and software received and given with external institutions or within the Company.
The security requirements of the website services are met.
Audit trails are created for information system applications and monitoring activities are carried out in order to detect unauthorized information processing activities.
Penetration tests are carried out by a competent and independent external company at least once a year.

ACCESS CONTROL

In order to control access to information, user access is managed based on security requirements and unauthorized access is prevented. Access authorizations are provided in accordance with the principle of separation of duties and the principle of minimum required authorization. Authorizations are reviewed regularly.
Unauthorized access to network-related services is prevented with security controls for network access. Access controls for operating systems and applications are implemented. Information security requirements are met for those using mobile computing and remote working services.

NETWORK SECURITY

Network control security systems are established to ensure security in network traffic. Layered security architectures such as external firewall, IPS, internal firewall, SSM (where one security layer is breached and another security layer is activated) are used in network security. Systems used in network security are kept under constant surveillance. VPN and SSL are used in connections established with the external network.

INFORMATION SYSTEMS ACQUISITION, DEVELOPMENT AND MAINTENANCE

Security requirements are applied in information systems acquisition, development and maintenance operations. Controls are implemented to prevent corruption, loss, unauthorized modification and misuse of information in applications. When necessary, cryptography is applied to ensure the confidentiality and integrity of information. Security controls are applied to ensure the security of system files and system data. Changes to be made to applications and systems are carried out in a controlled manner and security risks are reduced. It is ensured that software developments provided from outside meet information security requirements.

INFORMATION SECURITY INCIDENT MANAGEMENT

Information security incidents, violations and weaknesses related to information systems are reported through channels to be determined in addition to this policy. Reporting is carried out in a way that ensures corrective measures can be taken in a timely manner. All employees, suppliers and third-party users are ensured to participate in reporting information security incidents. As a result of incidents, remedial activities are implemented and recurring incidents are prevented.

INFORMATION SYSTEMS CONTINUITY MANAGEMENT

Information continuity activities are carried out to prevent interruptions in business activities and to protect important business processes from information system disruptions. It is ensured that these activities meet information security requirements.

COMPLIANCE

All Company employees are obliged to comply with the security requirements arising from relevant laws, regulations and contracts, intellectual property rights, license agreements and security requirements determined by the Company. Managers ensure compliance with security policies and standards in the operation of all processes in their areas of responsibility. All Company employees are responsible for the use of Company data in accordance with their confidentiality levels. Information security review activities are carried out to monitor compliance with the Company’s information security policies. The compliance with the Information Security Policy is reported to the Board of Directors at least once a year.

REVIEW OF THE INFORMATION SECURITY POLICY

The Company’s Information Security Policy is reviewed at least once a year by the Information Security Officer and, if deemed necessary, updated and submitted to the Board of Directors for approval. New policies are produced to include the needs that arise due to developments in security technologies.

RESPONSIBILITY FOR IMPLEMENTING THE INFORMATION SECURITY POLICY

All employees are made aware of the Information Security Policy. The latest version of the policy is announced to all personnel and published in a common area that the personnel can access at all times. Personnel must comply with the general provisions that concern them. The administrative manager of the personnel is responsible for checking whether the personnel comply with the general provisions that concern them. Compliance with information security policies is regularly monitored.

ENFORCEMENT

This regulation regarding information security shall enter into force as of the date of approval by the executive management. All applications and workflows regarding the Company’s information security shall be created/updated in accordance with the policy provisions.