Information Security Management System Policy

At our organization, our commitment to core values is built upon the principles of “treating information as a strategic asset,” “prioritizing reliability at every stage,” and “adopting a proactive approach to cyber risks.” These values form the foundation of our information security commitments outlined below:

This policy and responsibility cover the websites www.deico.com.tr and www.akademi.deico.com.tr. Applications outside the control of DEICO do not include information, titles, campaigns collected by third parties. DEICO is not responsible for the processing of personal data collected, stored and used by third parties through their websites.

  • Protecting Information Security: We are committed to protecting the information assets of our organization and stakeholders in line with the principles of confidentiality, integrity, and availability. nsuring the security of our critical systems, implementing preventive controls against data breaches, and complying fully with legal and contractual obligations are our top priorities.

  • Continuous Improvement and Risk Management: We continuously monitor, evaluate, and improve our information security performance. By adopting a risk-based approach, we closely follow technological threats and update our processes in accordance with the evolving threat landscape.

  • Corporate Awareness and Shared Responsibility Culture: Information security is not merely a technical issue but a shared responsibility of all our employees. With this understanding, we regularly inform our staff, raise awareness, and foster a security culture throughout the organization. Every DEICO employee is responsible for complying with information security policies and promptly reporting any violations.

  • Trust-Based Communication with Interested Parties: We meet the confidentiality expectations of our business partners and take the utmost care in protecting trade secrets. We maintain transparent and verifiable communication with audit authorities, ensuring full compliance with regulations and standards. We adopt an information management approach that respects intellectual property rights in a competitive environment.

  • Management Commitment: As top management, we commit to providing all necessary resources to ensure the effectiveness of our information security management system, setting objectives, improving the system through internal and external audits, and maintaining full compliance with the ISO/IEC 27001 standard.