{"id":15682,"date":"2024-06-29T10:53:00","date_gmt":"2024-06-29T10:53:00","guid":{"rendered":"https:\/\/analizgumruk.com.tr\/en\/?page_id=15682"},"modified":"2024-12-07T21:09:32","modified_gmt":"2024-12-07T21:09:32","slug":"data-security-and-confidential-archive-management","status":"publish","type":"page","link":"https:\/\/www.analizgumruk.com.tr\/en\/our-operational-methodology\/data-security-and-confidential-archive-management\/","title":{"rendered":"Data Secur\u0131ty and Conf\u0131dent\u0131al Arch\u0131ve Management"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"15682\" class=\"elementor elementor-15682\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3d59fce6 elementor-section-content-middle elementor-section-full_width wd-section-stretch elementor-section-height-default elementor-section-height-default\" data-id=\"3d59fce6\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8ea69d9\" data-id=\"8ea69d9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-859e631 elementor-widget elementor-widget-heading\" data-id=\"859e631\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\"> Data Security and Confidential Archive Management<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3d46c92 elementor-section-content-middle elementor-section-full_width wd-section-stretch elementor-section-height-default elementor-section-height-default\" data-id=\"3d46c92\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wide\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-71e7803\" data-id=\"71e7803\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-35c252f elementor-widget__width-inherit elementor-widget elementor-widget-heading\" data-id=\"35c252f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The digitization of information, processes, and workflows, as well as the transformation of infrastructure to digital forms, brings significant security risks and precautionary measures in customs operations and brokerage services. In this context, our institution holds the ISO\/IEC 27001:2022 Information Security Management System, and the related standard's scope, risk assessment, and risk management methodologies are applied accordingly.\nTo reduce, mitigate, and manage security risks, particularly for safeguarding the confidentiality, integrity, or availability of critical data that could threaten the security of processes and operations, we implement a series of methodologies:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3b26843c elementor-section-content-middle elementor-reverse-tablet elementor-reverse-mobile elementor-section-full_width wd-section-stretch elementor-section-height-default elementor-section-height-default\" data-id=\"3b26843c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2a7b575f\" data-id=\"2a7b575f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5be82cdb elementor-widget elementor-widget-wd_image_or_svg\" data-id=\"5be82cdb\" data-element_type=\"widget\" data-widget_type=\"wd_image_or_svg.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div class=\"wd-image text-left\">\n\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1536\" height=\"1536\" src=\"https:\/\/www.analizgumruk.com.tr\/en\/wp-content\/uploads\/2024\/09\/nFcAWDkkGV9-z-0-y-66afcadb0ce7a76a578fbd9c-scaled-1536x1536.webp\" class=\"attachment-1536x1536 size-1536x1536\" alt=\"\" srcset=\"https:\/\/www.analizgumruk.com.tr\/en\/wp-content\/uploads\/2024\/09\/nFcAWDkkGV9-z-0-y-66afcadb0ce7a76a578fbd9c-scaled-1536x1536.webp 1536w, https:\/\/www.analizgumruk.com.tr\/en\/wp-content\/uploads\/2024\/09\/nFcAWDkkGV9-z-0-y-66afcadb0ce7a76a578fbd9c-150x150.webp 150w\" sizes=\"(max-width: 1536px) 100vw, 1536px\" \/>\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2422defb\" data-id=\"2422defb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-21d990c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"21d990c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-e6218ec\" data-id=\"e6218ec\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7d9ca57 color-scheme-inherit text-left elementor-widget elementor-widget-text-editor\" data-id=\"7d9ca57\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><span class=\"color-primary\">1.<\/span><\/strong> Data Encryption and Protection<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e51de0 color-scheme-inherit text-left elementor-widget elementor-widget-text-editor\" data-id=\"9e51de0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Data used in transactions is encrypted and stored securely to prevent unauthorized access. Records and data that are to be disposed of, as required by Information Security Management System procedures, are destroyed accordingly.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-24b6c40 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"24b6c40\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-4ebddf4\" data-id=\"4ebddf4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4494aef color-scheme-inherit text-left elementor-widget elementor-widget-text-editor\" data-id=\"4494aef\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><span class=\"color-primary\">2.<\/span><\/strong> Access Control and Authentication<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ea835dc color-scheme-inherit text-left elementor-widget elementor-widget-text-editor\" data-id=\"ea835dc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The access rights for employees or guest users involved in our services are defined, and strong authentication systems are employed.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7795a9c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7795a9c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-0f527c0\" data-id=\"0f527c0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ba21a38 color-scheme-inherit text-left elementor-widget elementor-widget-text-editor\" data-id=\"ba21a38\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><span class=\"color-primary\">3.<\/span><\/strong> <span class=\"s4\">System Updates and Maintenance<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aae9143 color-scheme-inherit text-left elementor-widget elementor-widget-text-editor\" data-id=\"aae9143\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Regular system updates and maintenance are conducted to ensure digital infrastructures remain secure and up-to-date.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7a57c2f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7a57c2f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-33d0f7c\" data-id=\"33d0f7c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a1e33bd color-scheme-inherit text-left elementor-widget elementor-widget-text-editor\" data-id=\"a1e33bd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><span class=\"color-primary\">4.<\/span><\/strong> <span class=\"s4\">Intrusion Detection and Prevention Systems<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c25e79 color-scheme-inherit text-left elementor-widget elementor-widget-text-editor\" data-id=\"5c25e79\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Effective security systems, including firewalls, are established to detect and prevent cyberattacks on operations. The system undergoes periodic voluntary security testing and other audits throughout the year.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7c38494 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7c38494\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-ec8a902\" data-id=\"ec8a902\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b539e44 color-scheme-inherit text-left elementor-widget elementor-widget-text-editor\" data-id=\"b539e44\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><span class=\"color-primary\">5.<\/span><\/strong> Training and Awareness<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e88a696 color-scheme-inherit text-left elementor-widget elementor-widget-text-editor\" data-id=\"e88a696\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"s5\">Personnel involved receive regular training on information security topics.<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-3ab8dbe elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3ab8dbe\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-cba5e1a\" data-id=\"cba5e1a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3b9f219 color-scheme-inherit text-left elementor-widget elementor-widget-text-editor\" data-id=\"3b9f219\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong><span class=\"color-primary\">6.<\/span><\/strong> Emergency Response Plans<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2bf159b color-scheme-inherit text-left elementor-widget elementor-widget-text-editor\" data-id=\"2bf159b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"s5\"><div class=\"s5\">Emergency response plans and protocols are in place to enable rapid and effective action in the event of security breaches.<\/div><p class=\"s7\">\u00a0<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-aaef5ef elementor-section-content-middle elementor-section-full_width wd-section-stretch elementor-section-height-default elementor-section-height-default\" data-id=\"aaef5ef\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8e15903\" data-id=\"8e15903\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f7434ba elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"f7434ba\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">In this context, the information and data of our business partners are stored using specialized archival methods, organized by the requested content and order, and shared exclusively as per their specific requests. These data are securely stored in a hybrid manner, on both local and cloud platforms, providing flexibility, scalability, and unique accessibility to the processes. To enhance the confidentiality and security of the data, strong encryption algorithms like AES and other data masking techniques are used; backups and archives running on virtual machines are utilized to prevent data loss and facilitate recovery.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Data Security and Confidential Archive Management The digitization of information, processes, and workflows, as well as the transformation of infrastructure<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":15626,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-15682","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.analizgumruk.com.tr\/en\/wp-json\/wp\/v2\/pages\/15682"}],"collection":[{"href":"https:\/\/www.analizgumruk.com.tr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.analizgumruk.com.tr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.analizgumruk.com.tr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.analizgumruk.com.tr\/en\/wp-json\/wp\/v2\/comments?post=15682"}],"version-history":[{"count":49,"href":"https:\/\/www.analizgumruk.com.tr\/en\/wp-json\/wp\/v2\/pages\/15682\/revisions"}],"predecessor-version":[{"id":17660,"href":"https:\/\/www.analizgumruk.com.tr\/en\/wp-json\/wp\/v2\/pages\/15682\/revisions\/17660"}],"up":[{"embeddable":true,"href":"https:\/\/www.analizgumruk.com.tr\/en\/wp-json\/wp\/v2\/pages\/15626"}],"wp:attachment":[{"href":"https:\/\/www.analizgumruk.com.tr\/en\/wp-json\/wp\/v2\/media?parent=15682"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}