top of page

Our Information Security Policy

cyber security.jpg

Our company is aware that information assets are very important for business processes and functions;

  • Confidentiality, integrity and accessibility of information assets; ensuring its continuity and control,

  • Limiting the exposure to risks arising from the loss, corruption or misuse of information assets, and ensuring compliance with laws and regulations,

  • Protection of information assets against all kinds of threats that may occur intentionally or unintentionally, from inside or outside,

purposes.

Our Information Security Policy covers all domestic and international Company personnel who use our Company's information or business systems, and third-party service providers and their affiliated support personnel, except for the Company personnel, who have access to Clean Tank Engineering's information as per their contractual relationship with Clean Tank Engineering. .

Those who use the information technology infrastructure of our company and access information resources:

  • They ensure the confidentiality, integrity and accessibility of company information in personal and electronic communications.

  • They take the security measures determined according to the risk levels.

  • They report information security violations by notifying the Information Security Incident Manager and take measures to prevent these violations.

  • They do not transmit internal information sources (announcements, documents, etc.) to third parties without authorization.

  • They do not use company information resources for activities against the law and related regulations.

  • They protect the confidentiality, integrity and accessibility of information belonging to customers, business partners, suppliers or other third parties.

bottom of page