To place a custom filter order, you can contact us at sales@ksfil.com

Key solutions for Filtration
24/7 Emergency Filter Hotline +90 (262) 349 28 04

To place a custom filter order, you can contact us at info@ksfil.com

  • Home
  • Personel Data Security (KVKK)

Personal Data Security (KVKK)

  • Click for the Information Text
  • Click for the Data Owner Application Form
  • Click for the Communiqué on the Procedures and Principles of Application to the Data Controller
  • Click for the Personal Data Security Guide

Information Security Management System (ISMS)

KS Filter provides information security management for human, infrastructure, software, hardware, customer information, organization information, information belonging to third parties and financial resources in its production and services. In this direction, the purpose of our ISMS Policy is; to protect our company's information assets against all kinds of threats that may occur internally or externally, knowingly or unknowingly, to ensure accessibility to information as required by business processes, to meet legal legislation requirements, to ensure the continuity of the three basic elements of ISMS in all activities carried out;

Confidentiality: Preventing unauthorized access to important information,
Integrity: Demonstrating that the accuracy and integrity of information is ensured,
Accessibility: Demonstrating that authorized persons can access information when necessary,
Concerning the security of not only data kept in electronic media but also all data in written, printed, verbal and similar media.
Providing awareness by providing Information Security Management training to all personnel,
Reporting all gaps in Information Security that actually exist or raise suspicion to the ISMS Team and ensuring that they are investigated by the ISMS Coordinator.
Preparing, maintaining and testing business continuity plans
Identifying current risks by periodically conducting assessments on Information Security.
Reviewing and following up on action plans as a result of assessments.
Preventing any disputes and conflicts of interest that may arise from contracts.
Meeting business requirements for accessibility to information and information systems.
Within the scope of providing cyber security;
Disconnecting critical machines from external networks
Educating users about threats and protective measures they can take
Ensuring that they only purchase from trusted vendors.