ISMS Policy
E2P BİLİŞİM TEKNOLOJİ TİC. SAN. A.Ş. ISMS POLICY
The main theme of the TS EN ISO 27001:2022 Information Security Management System is; to demonstrate that Information Security management is ensured within E2P Bilişim Teknoloji TİC. SAN. A.Ş. in terms of human resources, infrastructure, software, hardware, user information, organizational information, third-party information and financial resources, to secure risk management, to measure the process performance of Information Security management, and to ensure the regulation of relations with third parties on matters related to information security.
The main theme of the Information Security Management System;
Has been determined to cover all software used within the scope of E2P Bilişim Teknoloji TİC. SAN. A.Ş., all hardware and software on the basis of corporate business process management, all server system elements and end-user computers, and all physical and electronic information assets within the scope of related support and maintenance services, software development, integration and software maintenance processes.
In this regard, the purpose of our ISMS Policy is;
- To protect E2P Bilişim Teknolojileri information assets against all kinds of threats that may occur from inside or outside, knowingly or unknowingly,
- To ensure accessibility to information as required by business processes,
- To meet legal regulatory requirements,
- To carry out activities aimed at continuous improvement,
-
To ensure the continuity of the three fundamental elements of the Information Security Management System in all activities carried out:
Confidentiality: To prevent unauthorized access to critical information
Integrity: To demonstrate that the accuracy and integrity of information is ensured
Availability/Accessibility: To demonstrate that authorized persons can access information when necessary
- To be concerned with the security of not only data stored in electronic media; but all data in written, printed, verbal and similar media,
- To ensure awareness by providing Information Security Management training to all personnel,
- To report all actual or suspected vulnerabilities in Information Security to the ISMS Team and to ensure investigation by the ISMS Team,
- To prepare, maintain and test business continuity plans,
- To identify existing risks by conducting periodic assessments on Information Security,
- To review and follow up on action plans as a result of assessments,
- To prevent any disputes and conflicts of interest that may arise from contracts,
- To meet business requirements for information accessibility and information systems,
- We commit to full compliance with customer and regulatory requirements.
General Manager
02.12.2025