All

As Yeniköy Motors, we are committed to protecting both our own information and that of our stakeholders by adhering to the principles of confidentiality, integrity, and availability, and to ensuring the security of our corporate activities. This commitment is crucial in helping to ensure that the information of our customers and business partners remains secure.

For this purpose, Yeniköy Motors complies with applicable laws, standards, and our corporate policies and procedures regarding information security. By operating an Information Security Management System in accordance with the ISO/IEC 27001 standard, we ensure the fulfillment of information security requirements. This standard includes best practices for information security management systems, and by taking these practices into consideration, we protect our information assets.

In order to fully implement and continuously improve the Information Security Management System, Yeniköy Motors conducts internal audits and shares the results with Senior Management. To ensure and enhance information security, we establish and operate in-process control mechanisms in line with the principle of segregation of duties.

We manage the storage, transfer, modification, and access of our information assets based on current best practices. In this way, we protect the information of our customers and business partners and ensure that it remains secure.

We raise awareness among our employees and stakeholders regarding information security, provide access to relevant policies and procedures, and offer adequate resources and training opportunities. Through these efforts, we increase information security awareness and take preventive measures against security breaches.

We work with suppliers and business partners who meet defined information security standards. We maintain continuous communication and cooperation on information security with our stakeholders, public authorities, and legal entities, thereby ensuring information security throughout our entire supply chain.

We provide the necessary organizational structure, resources, and infrastructure to detect and report information security breaches and to respond to such incidents as quickly as possible, and we apply the required sanctions in the event of information security violations.

We use cookies on our website to support technical features that increase the user experience. We also use analytical cookies. If you want to refuse cookies click for detailed information.