{"id":1531,"date":"2021-12-10T01:39:40","date_gmt":"2021-12-09T22:39:40","guid":{"rendered":"https:\/\/aktasdis.com\/?page_id=1531"},"modified":"2022-01-19T14:18:18","modified_gmt":"2022-01-19T11:18:18","slug":"information-security-approach","status":"publish","type":"page","link":"https:\/\/aktasdis.com\/en\/corporate\/management-systems\/information-security-approach\/","title":{"rendered":"Information Security Approach"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion-flex-column fusion-no-small-visibility\" style=\"--awb-padding-top:15px;--awb-padding-right:30px;--awb-padding-bottom:15px;--awb-padding-left:30px;--awb-overflow:hidden;--awb-bg-color:#ffffff;--awb-bg-color-hover:#ffffff;--awb-bg-size:cover;--awb-border-color:#d6d6d6;--awb-border-top:1px;--awb-border-right:1px;--awb-border-bottom:1px;--awb-border-left:1px;--awb-border-style:solid;--awb-border-radius:10px 10px 10px 10px;--awb-width-large:100%;--awb-margin-top-large:-30px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><nav class=\"fusion-breadcrumbs fusion-no-small-visibility awb-yoast-breadcrumbs fusion-breadcrumbs-1\" style=\"--awb-margin-top:15;--awb-margin-bottom:15;--awb-margin-left:20;--awb-font-size:8;--awb-breadcrumb-sep:&#039;\/&#039;;\" aria-label=\"Breadcrumb\"><span><span><a href=\"https:\/\/aktasdis.com\/en\/\">Home<\/a><\/span><\/span><\/nav><\/div><\/div>\n<div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:4%;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:10%;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-one\" style=\"--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h1 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:36;line-height:1.2;\">Information Security Approach<\/h1><\/div><div class=\"fusion-text fusion-text-1\" style=\"--awb-text-transform:none;\"><p>Information is one of the major corporate assets that carries great importance and that must be best protected. Information security provides for the reduction of malfunctions and opportunity losses that may occur and for the protection of information against wide-scale threats.<\/p>\n<p>The protection of information is significant for all stakeholders. Therefore, Aktas manages information access through a systematic perspective by implementing the Information Security Management System.<\/p>\n<\/div><div style=\"text-align:left;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/aktasdis.com\/wp-content\/uploads\/2022\/01\/Aktas_PO013-Information_Security_Management_System_Main_Policy.pdf\"><span class=\"fusion-button-text awb-button__text awb-button__text--default fusion-button-text-right\">Information Security Approach<\/span><span class=\"fusion-button-icon-divider button-icon-divider-right\"><i class=\"fa-file-pdf fas awb-button__icon awb-button__icon--default\" aria-hidden=\"true\"><\/i><\/span><\/a><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":1505,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"inline_featured_image":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-1531","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information Security Approach - Ak-tas Dis Ticaret A.S.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/aktasdis.com\/en\/corporate\/management-systems\/information-security-approach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security Approach - Ak-tas Dis Ticaret A.S.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/aktasdis.com\/en\/corporate\/management-systems\/information-security-approach\/\" \/>\n<meta property=\"og:site_name\" content=\"Ak-tas Dis Ticaret A.S.\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-19T11:18:18+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/aktasdis.com\\\/en\\\/corporate\\\/management-systems\\\/information-security-approach\\\/\",\"url\":\"https:\\\/\\\/aktasdis.com\\\/en\\\/corporate\\\/management-systems\\\/information-security-approach\\\/\",\"name\":\"Information Security Approach - Ak-tas Dis Ticaret A.S.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/aktasdis.com\\\/en\\\/#website\"},\"datePublished\":\"2021-12-09T22:39:40+00:00\",\"dateModified\":\"2022-01-19T11:18:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/aktasdis.com\\\/en\\\/corporate\\\/management-systems\\\/information-security-approach\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/aktasdis.com\\\/en\\\/corporate\\\/management-systems\\\/information-security-approach\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/aktasdis.com\\\/en\\\/corporate\\\/management-systems\\\/information-security-approach\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/aktasdis.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Corporate\",\"item\":\"https:\\\/\\\/aktasdis.com\\\/en\\\/corporate\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Management Systems\",\"item\":\"https:\\\/\\\/aktasdis.com\\\/en\\\/corporate\\\/management-systems\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Information Security Approach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/aktasdis.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/aktasdis.com\\\/en\\\/\",\"name\":\"Ak-tas Dis Ticaret A.S.\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/aktasdis.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security Approach - Ak-tas Dis Ticaret A.S.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/aktasdis.com\/en\/corporate\/management-systems\/information-security-approach\/","og_locale":"en_US","og_type":"article","og_title":"Information Security Approach - Ak-tas Dis Ticaret A.S.","og_url":"https:\/\/aktasdis.com\/en\/corporate\/management-systems\/information-security-approach\/","og_site_name":"Ak-tas Dis Ticaret A.S.","article_modified_time":"2022-01-19T11:18:18+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/aktasdis.com\/en\/corporate\/management-systems\/information-security-approach\/","url":"https:\/\/aktasdis.com\/en\/corporate\/management-systems\/information-security-approach\/","name":"Information Security Approach - Ak-tas Dis Ticaret A.S.","isPartOf":{"@id":"https:\/\/aktasdis.com\/en\/#website"},"datePublished":"2021-12-09T22:39:40+00:00","dateModified":"2022-01-19T11:18:18+00:00","breadcrumb":{"@id":"https:\/\/aktasdis.com\/en\/corporate\/management-systems\/information-security-approach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/aktasdis.com\/en\/corporate\/management-systems\/information-security-approach\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/aktasdis.com\/en\/corporate\/management-systems\/information-security-approach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/aktasdis.com\/en\/"},{"@type":"ListItem","position":2,"name":"Corporate","item":"https:\/\/aktasdis.com\/en\/corporate\/"},{"@type":"ListItem","position":3,"name":"Management Systems","item":"https:\/\/aktasdis.com\/en\/corporate\/management-systems\/"},{"@type":"ListItem","position":4,"name":"Information Security Approach"}]},{"@type":"WebSite","@id":"https:\/\/aktasdis.com\/en\/#website","url":"https:\/\/aktasdis.com\/en\/","name":"Ak-tas Dis Ticaret A.S.","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/aktasdis.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/aktasdis.com\/en\/wp-json\/wp\/v2\/pages\/1531","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aktasdis.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/aktasdis.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/aktasdis.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aktasdis.com\/en\/wp-json\/wp\/v2\/comments?post=1531"}],"version-history":[{"count":7,"href":"https:\/\/aktasdis.com\/en\/wp-json\/wp\/v2\/pages\/1531\/revisions"}],"predecessor-version":[{"id":2390,"href":"https:\/\/aktasdis.com\/en\/wp-json\/wp\/v2\/pages\/1531\/revisions\/2390"}],"up":[{"embeddable":true,"href":"https:\/\/aktasdis.com\/en\/wp-json\/wp\/v2\/pages\/1505"}],"wp:attachment":[{"href":"https:\/\/aktasdis.com\/en\/wp-json\/wp\/v2\/media?parent=1531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}