Fizix Senior Management;

  • Is appropriate for the organization’s purpose,
  • Provides a framework for establishing Information Security objectives,
  • Includes a commitment to meet applicable requirements,
  • Includes a commitment to the continuous improvement of the ISMS,
  • Has established and documented the ISMS Policy. This policy is communicated to all employees and relevant parties within the organization through appropriate communication channels and is continuously reviewed for compliance during Management Review meetings and when significant changes occur.

Fizix, while carrying out its activities in line with its objectives, aims to ensure the security of all data produced and shared with public institutions/organizations in any format within the framework of ISMS requirements, to identify any intentional or unintentional threats to our information assets, and to manage the risks that these threats may pose. To this end;

  • Increasing customer satisfaction and ensuring continuity of trust by providing information security in all processes,
  • Implementing cost-effective, world-class security measures to protect information assets,
  • To increase process security by improving the competence of each employee within the framework of the ISMS and to encourage employee contribution,
  • To raise employee awareness of information security and increase awareness through regular training,
  • Achieving a position as a competent company in the field of information security within the sector,
  • Detecting potential information security non-conformities as quickly as possible and managing them with effective solutions,
  • Ensuring that process security and employee motivation are maintained at the highest level and continuously improved,
  • Establishing trust-based, transparent relationships with external connections and business partners in the field of information security,
  • Continuously developing and improving the ISMS infrastructure, thereby ensuring the sustainability of the ISMS,
  • Acting in accordance with information security requirements, legal regulations, and relevant Turkish laws and regulations in all processes of the institution.