Information Security Policy

At Piksel İnternet ve Reklamcılık Hizmetleri Ticaret A.Ş. (Pixelplus), we prioritize user experience, innovative strategic approach, creative design, and the use of current technologies as our core principles. Information is one of our most valuable assets. Among our strategic objectives is the recognition of information as a critical asset, ensuring its continuity, confidentiality, accuracy, and accessibility, which are fundamental responsibilities.

Information security is a collective responsibility of all our employees. The intentional or accidental loss, unauthorized alteration, or improper use of information clearly outlines the potential risks that our company and business partners may encounter. Therefore, maintaining the confidentiality, integrity, and accessibility of the information assets associated with our business partners and stakeholders is an indispensable part of a sustainable governance approach.

In line with this understanding;

  • We aim to build, implement, continually improve, and periodically audit an Information Security Management System (ISMS) compliant with the ISO 27001:2022 standard, guaranteeing the confidentiality, accessibility, and integrity of our information assets.
  • We define the authority, roles, and responsibilities necessary for the operation of the ISMS, periodically re-evaluating these definitions in line with evolving needs over time.
  • We identify, classify our information assets, determine the risks threatening them, develop necessary methods to manage these risks, and apply them effectively.
  • In light of customer expectations and industry developments, we continuously update our information security practices, proactively implementing measures against potential breach scenarios.
  • For the protection of information and information assets, we periodically review risks and manage information security risks by taking necessary actions.
  • To minimize human-related risks, we organize training programs to increase our employees' awareness of information security, continuously monitoring the effectiveness of these programs.
  • To ensure our operations and responsibilities to our stakeholders are not interrupted in case of any adversity, we prepare business continuity plans, test these plans, and report the results to our management.
  • To assist in the compliant operation of the ISMS, we prepare procedures and instructions, identify control points; and in line with the philosophy of continuous improvement, we regularly measure, audit, and review its effectiveness.

Thus, we commit to effectively ensuring the functionality of the ISMS by allocating all necessary resources in accordance with relevant standards and regulations.