{"id":947,"date":"2024-12-17T10:59:01","date_gmt":"2024-12-17T10:59:01","guid":{"rendered":"https:\/\/surmenosgb.com.tr\/?page_id=947"},"modified":"2026-01-26T11:03:00","modified_gmt":"2026-01-26T11:03:00","slug":"information-security-policy","status":"publish","type":"page","link":"https:\/\/surmenosgb.com.tr\/en\/bilgi-guvenligi-politikasi\/","title":{"rendered":"Information Security Policy"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"947\" class=\"elementor elementor-947\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9544583 e-flex e-con-boxed e-con e-parent\" data-id=\"9544583\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_bottom&quot;:&quot;tilt&quot;,&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M0,6V0h1000v100L0,6z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-48f9757 elementor-icon-list--layout-inline elementor-align-center elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"48f9757\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/surmenosgb.com.tr\/en\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-fi-rr-home\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Home Page<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/surmenosgb.com.tr\/en\/bilgi-guvenligi-politikasi\/\">\n\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"icon icon-fi-rr-angle-small-right\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Information Security Policy<\/span>\n\t\t\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-128fc5b elementor-widget elementor-widget-heading\" data-id=\"128fc5b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Information Security Policy<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-316b81d e-flex e-con-boxed e-con e-parent\" data-id=\"316b81d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f9366b8 elementor-widget elementor-widget-text-editor\" data-id=\"f9366b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In the digitalizing business world, information security is no longer an option but an operational necessity, especially in sectors where critical data is processed, such as \u201cJoint Health and Safety Unit\u201d (JHSU) activities. As S\u00fcrmen OSGB, we reinforce our leadership in occupational health and safety with our technological infrastructure and our commitment to data protection. Our Information Security Policy is a strategic constitution that protects the digital memory of our organization and the confidential data entrusted to us by our business partners.<\/p><p>\u00a0<\/p><p><strong>1. Basic Pillars of Information Security: Confidentiality, Integrity and Availability<\/strong><\/p><p>S\u00fcrmen OSGB's information security strategy is built on three internationally recognized principles:<\/p><ul><li><strong>Confidentiality:<\/strong> We guarantee that only authorized persons have access to personnel health records, risk analyses and company confidential documents processed within the scope of OSGB services.<\/li><li><strong>Integrity<\/strong> We implement technical controls to prevent external interference from altering or corrupting data, from its generation to its storage and transmission.<\/li><li><strong>Accessibility:<\/strong> We develop business continuity models to ensure that our information assets are ready and accessible for authorized users whenever they are needed.<\/li><\/ul><p>\u00a0<\/p><p><strong>2. Corporate Goals and Strategic Alignment<\/strong><\/p><p>Our information security requirements are in full harmony with S\u00fcrmen OSGB's overall corporate goals. For us, security is not an obstacle that slows down the workflow, but rather a lever that increases our service quality and builds trust. In this direction;<\/p><ul><li>Our management is open to change and has a visionary approach.<\/li><li>Competent professionals with high information security awareness are employed.<\/li><li>The financial resources required for technological hardware, software and infrastructure investments that will increase our competitiveness with our competitors in the sector are provided without interruption.<\/li><\/ul><p>\u00a0<\/p><p><strong>3. Technical Infrastructure and Cyber Defense Mechanisms<\/strong><\/p><p>Today, cyber threats are not only limited to hacking, but also range from social engineering to ransomware. As S\u00fcrmen OSGB, we take the following cornerstones into our center against these threats:<\/p><ul><li><strong>Virus and Malware Protection:<\/strong> We protect our digital assets by equipping our systems with the latest antivirus and endpoint security solutions.<\/li><li><strong>Access Control Systems:<\/strong> \u201cWith the principle of \u201dleast authorization\", we ensure that each user only accesses the data they need for their tasks.<\/li><li><strong>Business Continuity and Data Backup:<\/strong> We implement regular backup procedures and periodically test our contingency plans to ensure that data is not lost in the event of a system failure or natural disaster.<\/li><li><strong>Breach Notification:<\/strong> In the event of any information security breach, we operate structured notification processes to take quick action and ensure transparency.<\/li><\/ul><p>\u00a0<\/p><p><strong>4. Risk Management: Turning Threats into Opportunities<\/strong><\/p><p>Information security is not a static process. Thanks to the risk assessments carried out regularly at S\u00fcrmen OSGB, we identify vulnerabilities in our current system and external threats in advance. According to the results of these analyzes;<\/p><ul><li>Corrective and preventive actions are initiated for the weak points identified.<\/li><li>Necessary resources (hardware, software, human resources) are allocated to ensure secure access to customer and personnel information.<\/li><li>With our risk-focused approach, we increase efficiency by directing our cyber security investments to the most critical areas.<\/li><\/ul><p>\u00a0<\/p><p><strong>5. The Human Factor: Awareness and Culture<\/strong><\/p><p>Even the most powerful firewall may be insufficient against an untrained user. As S\u00fcrmen OSGB, we aim to make information security a corporate culture rather than a technical issue. In this context;<\/p><ul><li>We ensure that all our personnel and certain third-party stakeholders receive Information Security Management System (ISMS) trainings.<\/li><li>We expect our employees to adopt safety procedures as a \u201cway of working\u201d.<\/li><li>We support the adaptation process with continuous internal audits and awareness campaigns.<\/li><\/ul><p>\u00a0<\/p><p><strong>6. ISO 27001 Standards and Continuous Improvement<\/strong><\/p><p>Fulfillment of applicable requirements is a legal and standards-based obligation of S\u00fcrmen OSGB. We not only establish our Information Security Management System, but also develop it with the continuous improvement cycle (Plan-Apply-Check-Act). While integrating the new opportunities brought by technology into our system, we closely monitor the compliance of the personnel with these innovations.<\/p><p><br \/><strong>7. Periodic Review and Timeliness<\/strong><\/p><p>In a dynamic world, \u201cyesterday's security may be today's vulnerability\u201d. With this awareness, our Information Security Policy is reviewed at least once a year or in the event of a significant change in our organizational structure, sector or legal legislation. In these meetings, which are held with the participation of senior management and unit managers, the appropriateness, accuracy and effectiveness of the policy are discussed and the system is kept up-to-date.<\/p><p>\u00a0<\/p><p><strong>Conclusion A Trusting Partnership<\/strong><\/p><p>As S\u00fcrmen OSGB, we do not only ensure physical security in workplaces; we also protect the corporate data of our business partners against the dangers of the digital world. Our Information Security Policy is a reflection of our principles of transparency, trust and professionalism. Every company that works with us has the peace of mind of knowing that their data is protected to the highest international standards.<\/p><p>We will continue to contribute to Turkey's digital transformation and secure industrialization by maintaining the excellence we have achieved in our occupational health and safety services in the field of information security. Your data is safe with us.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Ana Sayfa Dijitalle\u015fen i\u015f d\u00fcnyas\u0131nda, \u00f6zellikle &#8220;Ortak Sa\u011fl\u0131k G\u00fcvenlik Birimi&#8221; (OSGB) faaliyetleri gibi kritik verilerin i\u015flendi\u011fi sekt\u00f6rlerde, bilgi g\u00fcvenli\u011fi art\u0131k bir se\u00e7enek de\u011fil, operasyonel bir zorunluluktur. S\u00fcrmen OSGB olarak, i\u015f sa\u011fl\u0131\u011f\u0131 ve g\u00fcvenli\u011fi alan\u0131ndaki liderli\u011fimizi, teknolojik altyap\u0131m\u0131z ve veriyi koruma taahh\u00fcd\u00fcm\u00fczle peki\u015ftiriyoruz. Bilgi G\u00fcvenli\u011fi Politikam\u0131z, kurumumuzun dijital haf\u0131zas\u0131n\u0131 ve i\u015f ortaklar\u0131m\u0131z\u0131n bize emanet etti\u011fi gizli [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-947","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/surmenosgb.com.tr\/en\/wp-json\/wp\/v2\/pages\/947","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/surmenosgb.com.tr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/surmenosgb.com.tr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/surmenosgb.com.tr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/surmenosgb.com.tr\/en\/wp-json\/wp\/v2\/comments?post=947"}],"version-history":[{"count":10,"href":"https:\/\/surmenosgb.com.tr\/en\/wp-json\/wp\/v2\/pages\/947\/revisions"}],"predecessor-version":[{"id":1511,"href":"https:\/\/surmenosgb.com.tr\/en\/wp-json\/wp\/v2\/pages\/947\/revisions\/1511"}],"wp:attachment":[{"href":"https:\/\/surmenosgb.com.tr\/en\/wp-json\/wp\/v2\/media?parent=947"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}