• TR
  • TR
  • Phone : +90 212 217 69 00
  • E - Mail : info@sumervarlik.com.tr
logo
  • Homepage
  • Corporate
    • About Us
    • Our Company’s Principles
    • Our Business Partners
    • Our Fields of Activity
    • Our Group Companies
    • Our Portfolios
    • Information Security Policy
    • Trade Registry Information
  • Customers
    • Customer Satisfaction
    • Messages from You
    • Frequently Asked Questions
  • Investor Relations
  • Debt Inquiry
    • Payment Channels
    • Debt Inquiry Form
    • Payment by Credit Card
  • Human Resources
    • Our Values
    • Vacant Positions
    • Personal Data Protection (KVK)
    • Social Responsibility Projects
    • Career in Sümer
  • Contact
  • Information Security Policy

1.REVISION

Article revised

Reason for Revision

Effective Date

No revisions were made

Annual Control

00.00.0000

2.PURPOSE

This policy aims to monitor, oversee and supervise the activities for the development and regular updating of the control infrastructure relating to the measures for ensuring the confidentiality, integrity and accessibility of information technologies and data across the Company

3. SCOPE

Information, like any other important business-related asset, is an asset that is essential to an organization's operations and, as a result, must be appropriately protected. The security of information assets is ensured in line with the policies defined by the Company. The purpose of information security is intended to prevent unauthorized access to information (Confidentiality), ensure that information and information assets are complete and accurate and not inappropriately altered (Integrity), and that authorized users can access the data they need when they need it (Accessibility). The Information Security Policy is applicable to all units and service providers of the Company. The objective of the Company's Information Security Management Process is to take inventory of information assets, conduct risk assessment, implement controls, and review the effectiveness of the controls applied in order to ensure the confidentiality, integrity and accessibility of the information produced, processed, and stored by the Company.

4. DEFINITIONS

 

The following words and terms shall have the following means:  

Company: Sümer Varlık Yönetim A.Ş.
Risk Center Data: highly confidential data transmitted and stored by the Risk Center.  

5. BASIC PRINCIPLES OF INFORMATION SYSTEMS MANAGEMENT

• It is essential that the structure of information technologies is compatible with the scale of the Company, the quality and diversity of the activities and products offered, and its strategic objectives; and that the information technologies and the data they contain are reliable, accurate, complete, traceable, consistent, accessible, and meet the needs.  Information technologies are established based on a structure that will as a minimum allow the following;

• Storing or backing up and using all information related to the Company in a secure and timely manner in electronic environment in the country,

• Penetration and stress testing,

• Keeping accounting books and records in accordance with the procedures and principles established by the Public Oversight, Accounting and Auditing Standards Board.

• IS Continuity Plan is created to ensure the continuous operability of information technologies. The operability and adequacy of the said plan are regularly tested; necessary measures are taken if required. In the planning of business continuity, critical information technology assets and processes are determined; risk assessment is carried out with business impact analysis.

• It is essential to store information technologies and the data it contains securely. In this context, data are classified according to their degree of security sensitivity, security controls are established at the appropriate level for each class and backed up accordingly. The security of information technologies and the operation of backup systems are regularly tested, and necessary changes are made if required according to the test results.

• In ensuring information security and accessing the Company's information technologies, techniques including authentication and authorization mechanisms, non-deniability and non-repudiation and responsibility assignment opportunities are used.

• The principle of segregation of duties is applied in the development, testing and operation of information technologies. The duties, powers and responsibilities of the departments and employees involved in the information technology management process are determined in accordance with the principle of segregation of duties.

• It is essential to ensure the confidentiality of customer and Company information obtained and stored through Information technologies during the execution of activities. Letters of undertaking are determined and signed by the employees involved in sharing of customer information with parties other than those authorized by law.

• Audit trails of sufficient detail and clarity are created regarding the transactions carried out using information technologies and causing changes in the records of the company's activities.  Necessary measures are taken to prevent the deterioration of the integrity of the audit traces and to detect any deterioration.

• The operation of the information technologies put into practice, their compliance with the strategic objectives, the effectiveness and adequacy of the controls, and the developments in information technologies are regularly monitored.  The impact of the implementation of new information technologies on the risk profile of the Company is evaluated. In this context, if necessary, the operation of information technologies is revised.

6. INFORMATION SECURITY POLICY

The Company, with its Information Security Policy;
• Protects the confidentiality of customer and staff information to ensure that the privacy of personal information is protected.
• Implements the infrastructure and controls that will protect the integrity of information and guarantee its continuous accessibility.
• Provides authorization in accordance with the principle of separation of duties in design, development, testing and implementation processes and establishes an approval mechanism in critical transactions.
• Provides physical and logical separation of Development, Test, and Production environments.
• Ensures that the minimum authorization principle required for the authorization of users is enabled and that the authorizations are checked regularly.
• Establishes network security against threats that may come from external networks.
• Establishes a layered security architecture and ensures continuous surveillance.
• Ensures that security measures such as encryption and masking in the transmission and storage of Risk Center data and personal information are taken.
• Ensures the reliability of the encryption keys used.
• Establishes an information security organization in order to ensure the management and coordination of information security activities.
• Maintains the inventory of information assets, identifies ownership, and manages risks on information assets.
• Performs information security incident management activities that include the steps of detecting, reporting and preventing the recurrence of information security incidents.
• Implements an adequate awareness program for all employees and ensures the participation of all employees in order to meet information security requirements.
• Takes the necessary physical and environmental security measures in order to ensure the security of the information in the areas where the information is processed.
• Determines and implements the security requirements in information technology acquisition, development and maintenance.
• Obliges employees to comply with the determined information security policies, processes, legal and regulatory obligations by obtaining their written commitments.
• Implements the necessary security controls in all relevant areas to control access to information and prevent unauthorized access.
• Implements the necessary security controls in the operation of information technology activities and defines relevant roles and responsibilities.

7. REVIEW OF INFORMATION SECURITY POLICY

The Company's Information Security Policy is reviewed by the Information Security Officer at least once a year and updated if deemed necessary and submitted to the approval of the Board of Directors. New policies are developed to include the requirements that arise due to the developments in security technologies.

8. RESPONSIBILITY FOR THE IMPLEMENTATION OF THE INFORMATION SECURITY POLICY

The responsibility of checking the Information Security Policy of all employees is on the administrative supervisor of the personnel.  It is ensured that the personnel are aware of the Information Security Policy. The final version of the policy is announced to all employees and published or distributed to a common platform where employees can access continuously. All employees must comply with the general provisions that are relevant them. Compliance with the general provisions that are relevant for employees is regularly monitored.

9. ENFORCEMENT

This regulation on information security enters into force as of the date of approval of senior management and the board of directors. All applications and workflows of the Company regarding information security are created/updated in accordance with the provisions of the policy.



Corporate

Information Security Policy About Us Our Company’s Principles Our Business Partners Our Fields of Activity Our Group Companies Our Portfolios Trade Registry Information
finans banka asv-holding
CATEGORIES
  • Homepage
  • Corporate
  • Customers
  • Investor Relations
  • Debt Inquiry
  • Human Resources
  • Contact
  • Information Society Services
CORPORATE
  • About Us
  • Our Company’s Principles
  • Our Business Partners
  • Our Fields of Activity
  • Our Group Companies
  • Our Portfolios
  • Information Security Policy
  • Trade Registry Information
CUSTOMER RELATIONS
  • Customer Satisfaction
  • Messages from You
  • Frequently Asked Questions
CONTACT DETAILS
  • info@sumervarlik.com.tr
  • +90 212 217 69 00
© 2023 Copyrights by Sümer Varlık / Full Design By Netürk
neturk