Information Security Policy
Teracity Software Technologies Ltd. Sti. Within the scope of establishing an Information Security Management System (ISMS);
• To define our information assets in order to comply with the principles of confidentiality, integrity and accessibility of information, which are the requirements of the Information Security Management System, and to establish the risk management methodology for our company, customers and suppliers,
• To protect the confidentiality of our customers' information and to ensure compliance with standards and legal regulations,
• To provide the necessary resources for the necessary hardware, software, training and other controls to reduce information security risks and to establish a structure that will ensure their continuity,
• All personnel and business partners; To provide awareness, training and encouragement to ensure participation and compliance with ISMS as required by the holistic approach obligation of information security,
• It is our ISMS policy to control, monitor and review the efficiency of ISMS through internal and external audits and to continuously operationalize and improve the system.