Our Legal Compliance Board and Committee

Information Security Management Commitee

Information Security Management Commitee

Ünsped Information Technologies Department meets the requirements for up-to-date software, hardware, and other information services needed to maximize the use of developing information technologies, to ensure their continuity, to carry out activities to improve the system, network, and Internet infrastructure, to create specialized staff for these issues, to be at the forefront in terms of the application level of computer technologies, to create UGM information resources in an integrated structure in the light of these technologies, to manage projects on issues where there is trustworthiness, consultation, awareness of corporate structure and institutionalization. 

To ensure this continuity, our information security policy which we apply is as follows: 

"We respect the confidentiality of the personal and commercial information of all our customer stakeholders who are in a relationship with us, especially our customers. We use confidential information belonging to our customers and other stakeholders only for business purposes and following legal standards, agreements, or contractual obligations. We protect the information submitted to us under the UGM privacy policies, contractual obligations, and the law. We train our employees on information security, information use, and information confidentiality issues when they enter the workplace.” Based on these principles, the “Information Security Management Committee” continues its work regularly every month to ensure compliance with information security-related legislation, data integrity and accessibility, confidentiality, reliability, protecting our corporate reputation, business continuity, implementing an emergency action plan in extraordinary situations, ensuring continuous improvement by managing information security risks, creating internal information security awareness and creating awareness of information security for users, implementing the Information Security Management System, continuous improvement, regular internal audits with the necessary controls in case of security violations