Our Information Security Policy

Information resources such as facilities and devices are assets that are of great importance to Başerler Pazarlama Makina İmalat Sanayi and Ticaret Şirketi. Any person using information assets and resources or providing information is obliged to protect information assets.

All employees using common information assets are expected to show the necessary sensitivity and act by considering other colleagues, corporate employees and corporate values. Confidentiality is given importance as a requirement of corporate values, all kinds of personal information are protected by systems with the highest security standards. Unless the owner of the information requests, authorization or legal requirements, the information is never shared.

Başerler Pazarlama Machinery Manufacturing Industry and Trade Company. The most critical of all these information assets and resources are the information assets that need to be accessed when needed, the Başerler Server system in the server of our own control, hard disks (cipher: aes-xts-plain64 keysize: 512 bits) and web-based communication (AES TLS 1.2) is in the encrypted, 24/7 security data center.
Information assets and resources can be located in different locations or environments. Regardless of location or environment, customer communication requirements and corporate values ​​determine the use of these assets and resources.

Information security is possible by ensuring not only the confidentiality of information but also its integrity and availability. The requirement for confidentiality of information means granting only access to information assets required within authorization. The integrity of information requires ensuring the completeness and accuracy of all information assets. The availability of information means that information assets are accessible and usable when needed.

The complexity and multiplicity of needs regarding the use, location and protection of information necessitate the definition of comprehensive and comprehensive information security processes and policies. For this reason, information security risks are evaluated by those responsible for information assets in line with the determined processes, the priority of the risks is determined and the necessary measures are taken. Ensuring the security of the servers is a priority. Asset inventory and possible risks of this inventory are determined in advance and efforts are made to ensure that customers receive safe and uninterrupted service.

In decisions and actions, importance and priority is given to using reliable objective information and all the possibilities of technology. The functioning is not according to people's assumptions, intuition, feelings and experiments; It is organized according to objective principles revealed by scientific and technological facts. To achieve this, knowledge is transferred from the most advanced sources in the world, adopted and professional practices are carried out accordingly. Using resources efficiently, investing in technology is made, and development is continued in this direction.

For this reason, the planning, implementation, monitoring and improvement steps of the information security management system are carried out in accordance with the standards supporting this standard.