Ana sayfa / About us / Information security policy

Information security policy

1. Policy Statement

Ontex Tüketim Ürünleri San. ve Tic. AŞ, in the context of effective implementation and maintenance of the Information Security Management System (ISMS), commits to taking measures to ensure and maintain the confidentiality, integrity and accessibility of information assets of the company.

2. Aim & Goals

As Ontex Tüketim Ürünleri San. ve Tic.A.Ş., our main aim and goals include the following:

  • To ensure compliance with all legal legislations and contractual obligations regarding information security
  • To prevent any interruption that may occur in main business processes, and ensure business continuity by regaining operational capacity within the target recovery period in cases where interruption cannot be avoided
  • To minimize any damage that may occur due to information security vulnerabilities and protect the Ontex corporate image
  • To reduce the likelihood of information security breaches, and intervene quickly and effectively in case of such incidents
  • To follow the technological developments related to information security and renew the software and hardware in line with these advances

3. Responsibilities

One of the primary priorities of the Ontex Management Team is information security and this team is responsible for the implementation of this policy. The responsibilities of the Management Team regarding information security include the following:

  • Ensuring that relevant procedures are implemented and maintained
  • Providing adequate resources to meet information security commitments
  • Continuously improving the system by evaluating the performance, suitability and effectiveness
  • Identifying and managing risks
  • Setting measurable goals and targets
  • Ensuring appropriate training required within the organization

Our employees also have responsibilities in this regard, including:

  • Acting in accordance with all policies, procedures and instructions related to ISMS
  • Reporting information security breach incidents
  • Supporting management in the continuous improvement of all processes and instructions
  • Contributing effectively to the achievement of the pre-specified targets and goals