As EMTA Elektrik, in order to ensure the security of all information within the institution; a comprehensive information classification system has been developed that will ensure that this information is classified, protected and destroyed when necessary according to its sensitivity levels. With this system, we aim to increase information security awareness, activate the necessary controls in both digital and physical environments and minimize risk.
Within the scope of our Information Security Management System, we make the following commitments:
We identify information security risks and define, develop and implement appropriate controls to reduce these risks to acceptable levels.
We regularly conduct risk assessment processes within the framework of confidentiality, integrity and accessibility of information, andWe clearly define risk owners.
We evaluate the importance of information in terms of business continuity and create policies and procedures appropriate to these effects.
We prioritize the protection of personal data and fully comply with all applicable local andinternational regulations, especially KVKK. We manage the data processing, storage and destruction processes with the principle of transparency and constantly update them.
We follow technological developments in the areas we operate and adopt a systematic approach to detect new threats and risks in advance.
While fully complying with national and sectoral legislation, we also provide corporate We take meeting information security requirements as a basis in line with our responsibilities.
We adopt preventive approaches in order to prevent situations that threaten information security from disrupting service continuity, and we intervene immediately and effectively in possible incidents.
We continuously improve our information security level with cost-effective and sustainable security controls, and use our resources we use it effectively.
We protect our corporate reputation against possible negativities arising from information security with proactive approaches.
We base our information security practices on environmental sustainability; we prioritize technologies that increase energy efficiency, reduce our carbon footprintand reduce the use of natural resources. In this way, we both ensure information securityand fulfill our environmental responsibilities.
GENERAL MANAGER
08.04.2025
Rev:02