ISMS Policy
With the implementation of this policy, the Senior Management of MST Satış Pazarlama ve Yatırım A.Ş. undertakes and declares to fulfil the following basic principles that are necessary to ensure the protection, continuity and sustainability of information assets in terms of Confidentiality, Integrity and Accessibility with the Information Security Management System to be established as one of the requirements of continuous development in order to achieve the goal of "Increasing market share by offering Quality and Advantageous Construction Equipment to the Market with a customer-oriented working approach and becoming an International Brand in the Construction Equipment Industry".
Compliance with Information Security Management System standard conditions and requirements will be ensured.
The confidentiality of the information produced and/or used within the scope of MST's ISMS, regardless of whether it belongs to corporate and personal information or Third Parties, shall be ensured in all cases.
The requirements determined by the laws of the Republic of Turkey, regulations, circulars, customer contracts and legal legislation required by the work will be met and harmonised work will be ensured.
Unauthorised use, alteration, disclosure, and damage of all information assets within the scope, knowingly or unknowingly, will be prevented. Risks on information assets will be assessed and the identified risks will be reduced to acceptable levels.
Trainings that will increase the information security awareness of the personnel and encourage them to contribute to the functioning of the system will be provided regularly to the employees of the organisation, newly recruited employees and, where relevant, supplier employees.
All actual or suspected violations of information security incidents will be reported, and measures will be taken to prevent recurrence.
Business continuity will be ensured to ensure continuous access to information and to ensure that information is used effectively, accurately, quickly, and securely by observing access authorisations.
Necessary resources will be provided for the implementation, maintenance, and improvement of the Information Security Management System.