Our Information Security Policy
As pammuks.com, our main priority is to ensure that information security is actively involved in all business processes of the institution.
This priority is in line with company goals, integrated with each other, harmonious and balanced. necessitates the security and continuity of information assets.
pammuks.com adopts the following principles to ensure information security;
It adopts the principle of ensuring and maintaining the security of information in all Information Technologies processes and all Human Resources processes, including software development, network infrastructure systems management, IT retail, help desk and digital solutions activities that constitute the scope of ISMS it offers to its customers and stakeholders.
Commits to make the necessary infrastructure investments to maintain security effectively.
It provides independent review of the management system by using internal and external resources to ensure the continuous improvement of the information security management system.
It attaches importance to ensuring the safety of its activities regarding the products and services it offers to its customers and stakeholders.
In line with the adopted principles; To ensure the appropriate level of protection of information assets, to tighten internal controls and prevent unauthorized access to information assets, to ensure confidentiality, integrity and accessibility of information assets, to ensure the security of information assets as required by third-party information security requirements, to prevent information security breaches and suspicious information. It carries out studies to provide the necessary support to establish reporting/notification infrastructures for security activities and to conduct research at necessary points.
as pammuks.com Management;
Protecting the confidentiality, integrity and accessibility of information in order to meet the requirements of our Information Security Management System, Allocating the necessary resources to increase the competence of our employees in order to meet the requirements and operate them effectively, Planning training programs, Continuous improvement of the processes and activities used for the execution of information security To carry out regular reviews for the purpose of our Management Systems, to plan awareness-raising and guiding activities in order to ensure the participation and compliance of all our personnel and business partners with our management systems, as required by our holistic approach to our Management Systems, To ensure compliance with standards, legal regulations and contract requirements as required by our Management Systems, Our management system is an indispensable part of our corporate culture. We undertake to implement as part of it.