Our Information Security and Business Continuity Policy
Your information is safe with Codit! No need to worry about external threats anymore. Your information is secured in-line with our privacy policy.
Codit is committed to protecting the confidentiality, integrity and safeguarding of all physical and electronic information assets throughout the organization in order to protect the organization's competitive edge, profitability, readiness, legal compliance and business image.
It has adopted and implemented the principles set out in the ISO 27001 Information Security Management Standard in order to protect our most valuable asset, information, in a timely, accurate and most appropriate manner. In order to protect the organization's existence, service continuity and reputation in the industry, it implements the following principles:
- The confidentiality, integrity and accessibility requirements of the company's information assets are determined by taking the legal requirements, contracts, corporate strategies, needs and expectations of the relevant parties into account. Thus, protection is provided in accordance with these requirements
- Information assets are used in accordance with management strategies and objectives,
- Corporate and customer information is protected by signing confidentiality agreements with employees, business partners, customers and third parties,
- Internal and external risks that threaten information security are systematically identified, measured, evaluated and managed to be minimized,
- Awareness of information security is ensured on all relevant internal and external parties,
- Security breaches are recorded, reviewed and measures are taken to prevent recurrence,
- Depending on the risk assessment, physical and technical security policies and rules are determined to be then implemented,
- Information security policies are guaranteed to be evaluated and modified in accordance with changes in related parties, legislation, and technologies,
- Access to critical information is secured by carrying out plans and drills to ensure business continuity in extreme situations,
- Information Security Management System requirements are effectively implemented in all processes and continuously improved by reviewing.