Our Information Security Policy

Polar Teknoloji A.Ş. considers corporate and personal information belonging to itself and its stakeholders as a highly valuable asset.

To effectively and continuously protect information systems and physical workspaces containing corporate information from threats, the company ensures that all activities are carried out in compliance with the Information Security Management System ISO 27001:2013 standard.

The purpose of information security is to ensure that all types of information belonging to Polar Teknoloji A.Ş. and/or its stakeholders are only used by authorized individuals, stored completely and accurately, and made available when needed.

All personnel of Polar Teknoloji A.Ş. and third parties working on behalf of the company, regardless of their authority or responsibilities, must comply with the information security policies and procedures set by the company.

Under the Information Security Management System:

  •   ●  Ensure secure access to the information assets of the company and all institutions, organizations, and individuals associated with it,
  •   ●  Protect the availability, integrity, and confidentiality of information,
  •   ●  Assess and manage risks related to the company's information assets,
  •   ●  Protect the reliability and brand image of the company,
  •   ●  Apply necessary sanctions in case of information security violations,
  •   ●  Ensure compliance with national and international regulations, legal and relevant legislative requirements, and information security needs arising from agreements,
  •   ●  Reduce the impact of information security threats on business/service continuity and ensure the continuity of operations,
  •   ●  Maintain and improve the information security level with the established control infrastructure.

    Polar Teknoloji A.Ş. commits to these principles.