ISMS Policy
Within the scope of the Information Security Management System carried out at EDS Inc., the minimum rules that employees must comply with are defined. All policies aim to achieve the objectives stated below.
- To ensure the confidentiality, integrity, and availability of all types of data shared within information systems by addressing risks and opportunities with a risk-based approach,
- To ensure business continuity and minimize all risks that may arise from security breaches,
- To protect the company’s reputation and values and ensure the continuous improvement of management systems.
The policies explain the rules that must be followed while designing or operating the information security system. They are binding for all personnel working within EDS Inc.
In case of violation of the policies, a disciplinary process shall be carried out by the Human Resources Department, and legal action shall be taken where necessary.
Appendices
- Appendix-1 Electronic Mail Policy
- Appendix-2 Encryption Policy
- Appendix-3 Anti-Virus Policy
- Appendix-4 Internet Access and Usage Policy
- Appendix-5 Server Security Policy
- Appendix-6 Network Devices Security Policy
- Appendix-7 Network Management Policy
- Appendix-8 Remote Access Policy
- Appendix-9 Wireless Communication Policy
- Appendix-10 Backup Policy
- Appendix-11 Business Continuity Policy
- Appendix-12 Authentication and Authorization Policy
- Appendix-13 Database Security Policy
- Appendix-14 Change Management Policy
- Appendix-15 Clean Screen and Clean Desk Policy