INFORMATION SECURITY MANAGEMENT POLICY
Our company provides products in the field of "Combustion Systems Products (Burner Head, Burner Cap, Combustor ), Enamel Coating Products (Enamel Coated Sheet, Enamel Made By-products), Tea-Coffee Machines and Equipment (Cooking Containers), Technical Materials (Glass Cover Hinge, Oven Cover Hinge), Aluminum Injection Products, Processed Metal, Production and Sale of Metal Parts”. Our company commits to protect confidentiality, integrity and all physical and electronic information assets. Information and information security requirements will be in line with our corporate objectives. Our company's management will hire employees who are open to change, well trained, competent in their fields and provide financing that will ensure competition with our competitors in the market, and will provide sufficient equipment and infrastructure. Financial support will also be provided with this infrastructure and personnel. Business continuity and contingency plans, data backup instructions, avoidance of viruses and hackers, access control systems and information security breach notification will be the cornerstones of our core activities. Vulnerabilities and threats obtained as a result of the risk assessments will be eliminated and our customers and employees will obtain secure access to the information.
Moreover, we will determine our goals and provide the resources and conditions necessary to achieve these goals as a result of the risk assessments.
We anticipate all interested parties, especially our employees, to make the Information Security Management System requirements the way they work in order to realize this policy. Efforts will be made to ensure that all personnel and certain third parties receive appropriate training on the Information Security Management System.
Continuous improvement works will be carried out by fulfilling the applicable conditions related to information security and the opportunities and requirements brought by these conditions. Moreover, our company, our employees and all interested parties will be adapted to this system.
Our Information Security Policy is reviewed and updated once a year or upon a significant change related to our company, with the participation of management and department managers to ensure its authenticity, accuracy and effectiveness.