As DeTech, to keep information security at the highest level in all our activities and all our digital systems;
- Confidentiality: Information should only be accessible to “authorized persons”,
- Integrity: Protecting information from “unauthorized changes” and recognizing when it has been changed
- Accessibility: Information should be available “only to authorized users” and when needed.
- We will not share any information about the persons and/or organizations to whom we provide services and products with third parties,
- We will create up-to-date firewalls against attacks by malicious individuals who may attempt to access unauthorized information on both the files on the computer and the outputs of these individuals and/or institutions.
- We will investigate, evaluate, measure and report activities that may put Information Security at risk in certain periods,
- We will forward the requested information to the public and/or private organizations we are responsible for in an accurate, complete and timely manner,
- We will strive to ensure that the information we will collect with the permissions we receive from the public and/or private institutions we are responsible for is unconditionally accurate,
- We will ensure the accuracy and integrity of our company’s information,
- We will not be a source of viruses and spyware, and we will take the necessary precautions to prevent this kind of action,
- We will comply with all legally determined and to be determined rules regarding information security,
- While performing our Information Security activities; to continue our activities by planning what we will do, what resources we will obtain, who will be responsible, when it will be completed and how we will analyze the results, we declare and undertake.