{"id":2280,"date":"2019-11-18T17:05:37","date_gmt":"2019-11-18T14:05:37","guid":{"rendered":"https:\/\/kalehan.com.tr\/bilgi-guvenligi-politikasi-copy\/"},"modified":"2023-05-18T16:59:09","modified_gmt":"2023-05-18T13:59:09","slug":"information-security-policy","status":"publish","type":"page","link":"https:\/\/kalehan.com.tr\/en\/information-security-policy\/","title":{"rendered":"Information Security Policy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2280\" class=\"elementor elementor-2280\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d1c99fc elementor-section-height-full elementor-section-items-top animated-slow elementor-section-boxed elementor-section-height-default elementor-invisible\" data-id=\"d1c99fc\" data-element_type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;2d70004&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:null,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}],&quot;animation&quot;:&quot;fadeIn&quot;,&quot;animation_delay&quot;:100}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4861a10\" data-id=\"4861a10\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-061a253 elementor-widget elementor-widget-heading\" data-id=\"061a253\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">INFORMATION SECURITY POLICY<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-36766ef elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"36766ef\" data-element_type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;4ccd281&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:null,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-da4cf9d\" data-id=\"da4cf9d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ed43da0 elementor-widget elementor-widget-text-editor\" data-id=\"ed43da0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Kalehan Energy, being aware of the importance of information availability and information security for the success of its projects and in achieving business continuity, has adopted the principle of ensuring information security in all its activities.<\/p><p>In this regard, Kalehan Energy protects its information assets against any threat that may occur intentionally or unintentionally and that may originate either internally or externally, and takes necessary measures to ensure access to information at appropriate functions and levels as required by its business processes.<\/p><p>Kalehan Energy undertakes to comply with legal regulations and meet applicable standards related to information security, and takes into consideration international good practice.<\/p><p>Kalehan Energy ensures the continuity of the three basic elements of the Information Security Management System (ISMS) in all its activities:<\/p><ul><li>Confidentiality: Preventing unauthorized access to important information,<\/li><li>Integrity: Ensuring the accuracy and integrity of information,<\/li><li>Availability: Ensuring the accessibility of information to authorized persons when necessary.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7b03489\" data-id=\"7b03489\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-baa6d25 elementor-widget elementor-widget-text-editor\" data-id=\"baa6d25\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Security of all information assets is ensured, including not only electronic data, but also data stored in written, printed, audio and similar environments.<\/p><p>Business continuity plans will be prepared, implemented and tested to ensure access to information as required by business processes.<\/p><p>Information security risks will be reviewed and measures and controls will be implemented for risks above acceptable levels; action plans will be reviewed and followed up in accordance with the results of risk assessments.<\/p><p>Training will be provided to raise employee awareness on information security, reporting of non-conformances as well as actual or perceived vulnerabilities will be encouraged, reported vulnerabilities and non-conformities will be investigated by the ISMS manager and necessary resources will be provided therefor.<\/p><p>Kalehan Energy is determined to continually improve its information security management system, monitor its targets and acceptability criteria, and thus improve its information security performance.<\/p><p>Kalehan Energy top management undertakes to provide all necessary support in these matters.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>INFORMATION SECURITY POLICY Kalehan Energy, being aware of the importance of information availability and information security for the success of its projects and in achieving business continuity, has adopted the principle of ensuring information security in all its activities. In this regard, Kalehan Energy protects its information assets against any threat that may occur intentionally&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"class_list":["post-2280","page","type-page","status-publish","hentry","description-off"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/kalehan.com.tr\/en\/wp-json\/wp\/v2\/pages\/2280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalehan.com.tr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kalehan.com.tr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kalehan.com.tr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kalehan.com.tr\/en\/wp-json\/wp\/v2\/comments?post=2280"}],"version-history":[{"count":6,"href":"https:\/\/kalehan.com.tr\/en\/wp-json\/wp\/v2\/pages\/2280\/revisions"}],"predecessor-version":[{"id":4037,"href":"https:\/\/kalehan.com.tr\/en\/wp-json\/wp\/v2\/pages\/2280\/revisions\/4037"}],"wp:attachment":[{"href":"https:\/\/kalehan.com.tr\/en\/wp-json\/wp\/v2\/media?parent=2280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}