Maysan MandoTR
  • KOREA & TURKEY
    FRIENDSHIP
  • DISTRIBUTOR
    LOGIN
  • SUPPLIER
    LOGIN
  • ONLINE
    PAYMENT SYSTEM
TR

With the implementation of this policy, Senior Management, while realizing its vision of being a leading shock absorber manufacturer and partner that is fully integrated and accepted worldwide, for our customers, society, suppliers, employees and partners, ensures that the confidentiality of all information assets within the scope of the Information Security Management System, which will be established to comply with customer special requests, comply with legal requirements and ensure adequate protection of all information of the company, aims and undertakes to fulfill the following basic principles necessary to ensure the protection, continuity and sustainability of its integrity and accessibility.

1. To provide the necessary participation and support to the Organization to be established in order to ensure compliance with the standard requirements and controls of the Information Security Management System,

2. Ensuring compliance with the legal regulations, regulations, circulars, customer contracts and requirements and conditions required by other relevant business, including the protection of personal data,

3. Ensuring data security by ensuring the confidentiality, integrity and accessibility of the information belonging to our company and our stakeholders (Customer, Supplier, etc.) in all cases,

4. In accordance with the principles of "Must know" and "Everything is forbidden unless authorized", ensuring that information and personal data are accessible only by authorized persons,

5. To provide the necessary resources and management support to the planning to be made regarding the regular provision of awareness programs to the employees and supplier employees when they are relevant, which will increase the awareness of the personnel related to information security and encourage them to contribute to the operation of the system,

6. To provide the necessary support and contribution to ensure the establishment, operation and continuity of the necessary systems for the continuous access to information and personal data at the planned levels by ensuring business continuity,

7. Ensuring the achievement of the targeted outputs of the Information Security Management System and supporting its continuous improvement,

8. To provide the necessary resources to be determined for the implementation, maintenance and continuous improvement of the Information Security Management System,

The Information Security Management System will be integrated into the business processes of our company and the requirements and conditions created for information security will be taken into consideration at every stage.