elvan@elvan.com.tr

0 212 592 32 00


Information Security Policy

ELVAN GROUP INFORMATION POLICY


As ELVAN GROUP; in our main field of activity, chocolate, cake, jelly, liqurice, wafer, biscuit, fondant, waffle, croissant and sugar production;
we amied,
Establishing, implementing, operating, maintaining its effectiveness and continuing continuous improvement activities by fulfilling the requirements of the Information Security Management System.
To meet the information security requirements by taking into account the legal conditions, contractual obligations of third parties and customer conditions, taking into account the existing and potential risks.
To ensure information security in all activities we carry out within our organization,
To ensure the continuity and sustainability of all activities, especially critical business processes.

In line with this purpose, it will be ensured that any confidential and commercial private information processed within the scope and limits of the ISMS cannot be obtained by adhering to the terms of Confidentiality – Integrity – Accessibility.

 

HİDAYET KADİROĞLU

 

 

INTERSWEET INFORMATION POLICY


As ELVAN GROUP; in our main field of activity, chocolate, cake, jelly, liqurice, wafer, biscuit, fondant, waffle, croissant and sugar production;
we amied,
Establishing, implementing, operating, maintaining its effectiveness and continuing continuous improvement activities by fulfilling the requirements of the Information Security Management System.
To meet the information security requirements by taking into account the legal conditions, contractual obligations of third parties and customer conditions, taking into account the existing and potential risks.
To ensure information security in all activities we carry out within our organization,
To ensure the continuity and sustainability of all activities, especially critical business processes.

In line with this purpose, it will be ensured that any confidential and commercial private information processed within the scope and limits of the ISMS cannot be obtained by adhering to the terms of Confidentiality – Integrity – Accessibility.

 

 

HİDAYET KADİROĞLU