Privacy Policy
Aim
Safe Solid Certification Services Ltd. (the "Company") ("Company"), acceptable for all technology resources undertakes to create usage rules. These resources include, but are not limited to: may include the following equipment:
- Computers (Laptops, Desktops, Mobile Devices, Servers, etc.)
- Network Equipment (Routers, Wireless Devices, Fiber Optic Lines, etc.)
- Audio/Video Equipment (Cameras, Projectors, Security Cameras, Digital Cameras and Video Cameras, Scanners, Printers, Copiers, etc.)
- Software (Operating Systems, Application Software, etc.)
- Resources (Drive File Storage, Website File Storage, Email Accounts, Social Network Accounts etc.)
This policy applies to all employees of the Company, including all personnel associated with third parties, Applies to contract employees, contractors and subcontractors. This policy is the Company's It is valid for all equipment owned or rented.
While the company wants to provide a reasonable level of freedom and privacy, users infrastructure and software applications are the property of the Company and therefore only official must know that it will be used for the purposes for which it will be used. Additionally, all data must be treated as such and protected from unauthorized access. must be protected.
The following activities are general guidelines for the acceptable use of Company resources. Includes rules:
- All passwords used to access company systems must be stored securely and protected from unauthorized access. should be protected from use.
- No user accounts may be shared with other people. Authorized users are responsible for their own passwords and is responsible for the security of your accounts.
- Personally identifiable information is not transferred to equipment, cloud drives and storage devices.
- All computers connected to the company network, whether belonging to the employee or the Company, have up-to-date virus data. It is confirmed by virus scanning software based on
- Employees should use extreme caution when opening email attachments from unknown senders.
- All electronic works are sent via Company e-mail accounts to prevent data transfer outside the network. must be completed or transferred.
- Social media and chat applications should not be used for business processes. Under no circumstances, the Company When using Company resources, its employees are prohibited from doing anything that is illegal under local or international law. cannot engage in any activity.
Under no circumstances will Company employees comply with local or international laws when using Company resources. cannot engage in any illegal activity. The following lists unacceptable use It provides a framework for activities falling into this category.
The following activities are strictly prohibited, without exception:
- protected by copyright, patent or other intellectual property rights or similar laws or regulations violation of the rights of any person or company, including but not limited to including the installation or distribution of "pirated" or other software products that you do not own.
- Unauthorized copying of copyrighted materials, including but not limited to magazines, books digitization and distribution of photographs from other copyrighted sources and Installation of any licensed software.
- Software, technical information, encryption in violation of international or domestic export control laws It is illegal to export software or technology. Export of any such material The relevant manager should be consulted beforehand.
- Introducing malicious programs into network or server environments.
- Disclosing your account password to others or allowing others to use your account to give. This includes family members and other household members while working at home. valid.
- Any provision or transmission of material that violates sexual harassment or hostile workplace laws. actively using a machine.
- Making false offers for products, items or services originating from the Company account.
- Causing security breaches or disruption of network communications. security breaches, The employee is not named as the recipient, unless it is within the scope of the employee's normal duties. including accessing data or logging into a server or account that the employee does not have permission to access It includes various actions, including but not limited to:
- Any network that would intercept data unless it is part of the employee's normal job/duty carry out monitoring activities.
- User authentication or security of any host, network, or account bypass.
- Including "spam" or other advertising material to anyone who has not specifically requested it to send unsolicited e-mail messages.
- Any harassment via email or phone.
- Unauthorized use or falsification of email header information.
- From the Company's networks or the networks of other Internet/Intranet/Extranet service providers, unsolicited content for the purpose of promoting or on behalf of any service hosted by sending emails.
Passwords:
When setting password users, the strength of the password is normally determined in the system settings. However, users:
- One should avoid choosing obvious passwords, such as passwords based on information that can be easily found.
- Should not choose common passwords (use of technical tools, use of password blacklist recommended).
- Should not reuse passwords.
- Should not save passwords for safe keeping and retrieval.
- Must use only authorized password management software (available through IT administrator).
- All passwords should be memorized and not recorded anywhere.
- It must be unique for each application.
Basak ERDEM
General manager
In the event of any legal dispute, the Turkish version of this document shall prevail.