logo icon
Tüm Filtreler

Information Security Policy

Determine risk acceptance criteria and risks, develop and implement controls,

Ensure the implementation of the information security risk assessment process to identify risks related to confidentiality, integrity and accessibility losses of information and related data within the scope of the Information Security Management System, identify risk owners,

Ensure the implementation of the information security risk assessment process to identify risks related to confidentiality, integrity and accessibility losses of information and related data within the scope of the Information Security Management System, Define a framework for assessing accessibility impacts,

Continuously monitor risks by reviewing technological expectations in the context of the scope served,

Provide Information Security requirements arising from national or sectoral regulations to which it is subject, fulfillment of legal and relevant legislative requirements, fulfillment of obligations arising from agreements, and corporate responsibilities towards internal and external stakeholders,

To reduce the impact of Information Security threats to service continuity and contribute to continuity,

To have the competence to quickly intervene in Information Security incidents that may occur and minimize the impact of the incident,

To maintain and improve the level of information security over time with a cost-effective control infrastructure,

To improve the reputation of the organization, to protect it from negative effects based on information security,

Zağnos Tour ensures information security by making Confidentiality, Integrity, Accessibility assessments of information for all levels of information that it hosts and acquires within the scope of its main activities and business processes,

Zağnos Tour Information Security Management System applications to increase corporate awareness about information with different levels of sensitivity in terms of confidentiality, to determine and implement logical, physical and administrative controls recommended for information with different levels of sensitivity; An information classification guide has been created to define the access and control rules within the scope of Information Security Management System applications of data in portable media.

Zağnos Tour Senior Management is committed to the realization, review and continuous improvement of practices related to Information Security.