{"id":1795,"date":"2025-06-10T12:40:42","date_gmt":"2025-06-10T09:40:42","guid":{"rendered":"https:\/\/www.gozensecurity.com\/bilgi-guvenligi\/"},"modified":"2025-08-20T12:51:23","modified_gmt":"2025-08-20T09:51:23","slug":"information-security-policy","status":"publish","type":"page","link":"https:\/\/www.gozensecurity.com\/en\/information-security-policy\/","title":{"rendered":"Information Security Policy"},"content":{"rendered":"<p>G\u00f6zen Security is committed to information security in line with its objectives, values, and strategic targets by adopting G\u00f6zen Holding&#8217;s policy.<\/p>\n<p>G\u00f6zen Security (Corporation) management aims;<\/p>\n<ul>\n<li>To protect the reliability and image of the corporation<\/li>\n<li>To make sure that the contracts made fulfill the information security requirements, and<\/li>\n<li>To ensure the continuance of the fundamental and supportive activities of the corporation with minimum interruption.<\/li>\n<\/ul>\n<p>G\u00f6zen Security, within this scope, undertakes to take measures in order to ensure and protect the confidentiality, integrity, and accessibility of the information assets of the corporation.<\/p>\n<p>Defining, evaluating, and processing the information security risks are addressed under the risk management of the corporation.<\/p>\n<p>Everyone who uses the information technology infrastructure and accesses the information sources of the corporation:<\/p>\n<ul>\n<li>Ensures the confidentiality of the information belonging to the corporation in personal and electronic communication and the information exchange with third parties, and,<\/li>\n<li>Backs up the information he\/she processes according to the levels of criticality, and<\/li>\n<li>Takes the security measures determined according to the risk levels,<\/li>\n<li>Has information about the information security violations, does not commit violations, and reports any information security incidents observed to the Information Security unit,<\/li>\n<li>Does not share the internal information sources with unauthorized persons, and does not use them for activities violating the Republic of Turkey laws and related regulations.<\/li>\n<\/ul>\n<p>Employees of the corporation, and external parties such as third parties, suppliers, customers, and visitors are required to comply with this policy and the other policies, procedures, and instructions ensuring the implementation of this policy.<\/p>\n<p>G\u00f6zen Security management is responsible for supporting the information security infrastructure and maintaining its operation.<\/p>\n<p>Corporation undertakes to give \u201cInformation Security Awareness Training\u201d to all employees in the form of e-training or classroom training in order to ensure awareness, to continuously improve information security, and to meet the legal regulations and arrangements and the applicable expectations of the related parties.<\/p>\n<p>In case of any failure to observe and comply with the information security policies, procedures, and instructions, then the sanctions such as warning, reprimand, and termination of the contract shall be applied as per the personnel regulations of the Corporation.<\/p>\n<p>Corporation\u2019s top management is ready to provide any support in order to protect the information assets according to the rules in the Information Security Policy, create information security awareness, establish a common corporate culture, determine the risks, and take the necessary actions to minimize the weaknesses, and execute the applicable sanctions in case of security violations.<\/p>\n<p>Corporation ensures compliance with the Information Security requirements by internal and external inspections, reporting the inspection results to the management, and taking the actions related to such results.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>G\u00f6zen Security is committed to information security in line with its objectives, values, and strategic targets by adopting G\u00f6zen Holding&#8217;s policy. G\u00f6zen Security (Corporation) management aims; To protect the reliability and image of the corporation To make sure that the contracts made fulfill the information security requirements, and To ensure the continuance of the fundamental [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-1795","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Information Security Policy - G\u00f6zen Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gozensecurity.com\/en\/information-security-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security Policy - G\u00f6zen Security\" \/>\n<meta property=\"og:description\" content=\"G\u00f6zen Security is committed to information security in line with its objectives, values, and strategic targets by adopting G\u00f6zen Holding&#8217;s policy. G\u00f6zen Security (Corporation) management aims; To protect the reliability and image of the corporation To make sure that the contracts made fulfill the information security requirements, and To ensure the continuance of the fundamental [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gozensecurity.com\/en\/information-security-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"G\u00f6zen Security\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-20T09:51:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.gozensecurity.com\/wp-content\/uploads\/2025\/06\/post-share.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.gozensecurity.com\/en\/information-security-policy\/\",\"url\":\"https:\/\/www.gozensecurity.com\/en\/information-security-policy\/\",\"name\":\"Information Security Policy - G\u00f6zen Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.gozensecurity.com\/en\/#website\"},\"datePublished\":\"2025-06-10T09:40:42+00:00\",\"dateModified\":\"2025-08-20T09:51:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.gozensecurity.com\/en\/information-security-policy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.gozensecurity.com\/en\/information-security-policy\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.gozensecurity.com\/en\/information-security-policy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Anasayfa\",\"item\":\"https:\/\/www.gozensecurity.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.gozensecurity.com\/en\/#website\",\"url\":\"https:\/\/www.gozensecurity.com\/en\/\",\"name\":\"G\u00f6zen Security\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.gozensecurity.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security Policy - G\u00f6zen Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.gozensecurity.com\/en\/information-security-policy\/","og_locale":"en_US","og_type":"article","og_title":"Information Security Policy - G\u00f6zen Security","og_description":"G\u00f6zen Security is committed to information security in line with its objectives, values, and strategic targets by adopting G\u00f6zen Holding&#8217;s policy. G\u00f6zen Security (Corporation) management aims; To protect the reliability and image of the corporation To make sure that the contracts made fulfill the information security requirements, and To ensure the continuance of the fundamental [&hellip;]","og_url":"https:\/\/www.gozensecurity.com\/en\/information-security-policy\/","og_site_name":"G\u00f6zen Security","article_modified_time":"2025-08-20T09:51:23+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/www.gozensecurity.com\/wp-content\/uploads\/2025\/06\/post-share.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.gozensecurity.com\/en\/information-security-policy\/","url":"https:\/\/www.gozensecurity.com\/en\/information-security-policy\/","name":"Information Security Policy - G\u00f6zen Security","isPartOf":{"@id":"https:\/\/www.gozensecurity.com\/en\/#website"},"datePublished":"2025-06-10T09:40:42+00:00","dateModified":"2025-08-20T09:51:23+00:00","breadcrumb":{"@id":"https:\/\/www.gozensecurity.com\/en\/information-security-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.gozensecurity.com\/en\/information-security-policy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.gozensecurity.com\/en\/information-security-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Anasayfa","item":"https:\/\/www.gozensecurity.com\/en\/"},{"@type":"ListItem","position":2,"name":"Information Security Policy"}]},{"@type":"WebSite","@id":"https:\/\/www.gozensecurity.com\/en\/#website","url":"https:\/\/www.gozensecurity.com\/en\/","name":"G\u00f6zen Security","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.gozensecurity.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.gozensecurity.com\/en\/wp-json\/wp\/v2\/pages\/1795","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gozensecurity.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.gozensecurity.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.gozensecurity.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gozensecurity.com\/en\/wp-json\/wp\/v2\/comments?post=1795"}],"version-history":[{"count":1,"href":"https:\/\/www.gozensecurity.com\/en\/wp-json\/wp\/v2\/pages\/1795\/revisions"}],"predecessor-version":[{"id":1796,"href":"https:\/\/www.gozensecurity.com\/en\/wp-json\/wp\/v2\/pages\/1795\/revisions\/1796"}],"wp:attachment":[{"href":"https:\/\/www.gozensecurity.com\/en\/wp-json\/wp\/v2\/media?parent=1795"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}