{"id":7766,"date":"2020-12-27T14:40:30","date_gmt":"2020-12-27T11:40:30","guid":{"rendered":"https:\/\/www.inforte.com\/?page_id=7766"},"modified":"2021-02-02T13:23:25","modified_gmt":"2021-02-02T10:23:25","slug":"web-confidentiality","status":"publish","type":"page","link":"https:\/\/www.inforte.com\/en\/web-confidentiality\/","title":{"rendered":"Web Confidentiality"},"content":{"rendered":"<p><strong>INFORTE<\/strong><br \/>\n<strong>PRIVACY AND PERSONAL DATA PROTECTION POLICY<\/strong><\/p>\n<h3>1. PURPOSE AND SCOPE<\/h3>\n<p>This Privacy and Personal Data Protection Terms (\u201cTerms\u201d) sets out the principles, which are accepted by Inforte Bili\u015fim A.\u015e. (shall be referred to as \u201cCompany\u201d or \u201cData Controller\u201d) with respect to the protection of personal data, determines the personal data processing principles with respect to the processing of personal data of Visitor, Customer, Potential Customer, Supplier, Supplier Employee, Potential Employee, and Online Visitor and 3rd Person (\u201cData Subject Groups\u201d) and aims to inform such Data Subject Groups according to Personal Data Protection Law numbered 6698 (\u201cLaw numbered 6698\u201d).<\/p>\n<h3>2. PRINCIPLES OF PROCESSING PERSONAL DATA<\/h3>\n<p>We, the Company, as the Data Controller, process your personal data under the below principles.<\/p>\n<p style=\"padding-left: 40px;\"><strong>2.1 Processing in accordance with Law and Rule of Fairness <\/strong><\/p>\n<p style=\"padding-left: 40px;\">The principles brought with legal regulations and the general trust and fairness rule are complied with in respect of processing your personal data. According to this principle, while we, as the Data Controller try to reach our personal data processing purposes, we take into consideration your interest and reasonable expectations, do not abuse our rights and act in compliance with the principle of transparency in respect of our actions.<\/p>\n<p style=\"padding-left: 40px;\"><strong>2.2 Ensuring that the Personal Data Are Correct and, When Necessary, Up to Date <\/strong><\/p>\n<p style=\"padding-left: 40px;\">In line with this principle, which emphasizes the importance of the accuracy and up-to-date of your personal data, periodical controls, and updating are made to ensure that the personal data, which is processed, is accurate and up-to-date, and in this respect necessary measures are taken by taking into consideration your legitimate interests. To this effect, systems, which are aimed to check the accuracy of the personal data and to make the necessary corrections, are established within the Company. Furthermore, the accuracy of the resources, from which the personal data are collected, is checked and requests, which arise due to inaccuracy of personal data, are taken into consideration. Therefore, this principle is applied in harmony with your right to request correction of the personal data, to which you are entitled under the Law numbered 6698.<\/p>\n<p style=\"padding-left: 40px;\"><strong>2.3 Being Processed for Specified, Explicit, and Legitimate Purposes <\/strong><\/p>\n<p style=\"padding-left: 40px;\">Your personal data are processed based on explicit, specified, and legitimate data processing purposes. In this respect, we ensure that our personal data processing activities are clearly comprehensible by the data subject and we determine and explicitly set forth the purposes of the personal data processing activities in clauses 5 and 7 of this Terms.<\/p>\n<p style=\"padding-left: 40px;\"><strong>2.4 Being Relevant, Limited and Proportioned to the Purposes for Which They Are Processed <\/strong><\/p>\n<p style=\"padding-left: 40px;\">Your personal data are processed in a manner, which is proportioned, relevant and limited to the envisioned processing purpose(s) and the processing of personal data, which are not relevant to achieving the(se) purpose(s) or are not needed, is avoided. Again, under this principle, personal data are not collected or processed for purposes, which do not exist and are deemed to occur later.<\/p>\n<p style=\"padding-left: 40px;\"><strong>2.5 Being Stored for the Period Set Forth by the Legislation or the Period Required for the Purpose for Which They are Processed <\/strong><\/p>\n<p style=\"padding-left: 40px;\">Your personal data are stored only for the period, which is set forth by the relevant legislation or is required for the purpose for which they are processed. For this, we, as the Data Controller, take and apply the organizational and technical measures. In this respect, we firstly determine whether a period of time is foreseen by the relevant legislation for the storing of personal data and if a period is determined, we comply with such period of time and if a period of time is not determined, the personal data are stored for the period, which is required for the purpose, for which they are processed. In the event of expiry of the period or that the reasons for processing cease to exist, if there is not any legal basis, which allows for data to be processed for a longer period of time, your personal data is erased, destructed, or anonymized according to the personal data protection legislation.<\/p>\n<h3>3. CONDITIONS FOR PROCESSING PERSONAL DATA<\/h3>\n<p>Your personal data may be processed by the Company under the conditions set forth below.<\/p>\n<p style=\"padding-left: 40px;\"><strong>3.1 Being Expressly Provided for In the Laws <\/strong><\/p>\n<p style=\"padding-left: 40px;\">The fundamental rule is that the personal data cannot be processed without the explicit consent of the data subject, but according to this exception, your personal data may be processed in the event the processing of personal data is explicitly provided for in the laws.<\/p>\n<p style=\"padding-left: 40px;\"><strong>3.2 Fiili \u0130mk\u00e2ns\u0131zl\u0131k Sebebiyle \u0130lgilinin A\u00e7\u0131k R\u0131zas\u0131n\u0131n Al\u0131namamas\u0131 <\/strong><\/p>\n<p style=\"padding-left: 40px;\">The fundamental rule is that the personal data cannot be processed without the explicit consent of the data subject, but according to this exception, your personal data may be processed in the event the processing of personal data is explicitly provided for in the laws.<\/p>\n<p style=\"padding-left: 40px;\"><strong>3.3 Being Directly Related to the Establishment or Performance of a Contract<\/strong><\/p>\n<p style=\"padding-left: 40px;\">On the condition that it is directly related to the establishment or performance of a contract, your personal data may be processed if the processing of the personal data of the parties to the contract is required. Based on this condition, in the event the personal data of the parties are processed for the performance of the obligations under a valid contract, explicit consent shall not be required.<\/p>\n<p style=\"padding-left: 40px;\"><strong>3.4 Performance by the Company of its Legal Obligation <\/strong><\/p>\n<p style=\"padding-left: 40px;\">If the processing is mandatory to fulfill the legal obligations as a Data Controller, your personal data may be processed.<\/p>\n<p style=\"padding-left: 40px;\"><strong>3.5 Personal Data Is Made Public <\/strong><\/p>\n<p style=\"padding-left: 40px;\">If your personal data is made public by yourself; in other words, if they are disclosed to the public by you, they may be processed. In such a case, it is deemed that the legal interest, which is required to be protected, is deemed to cease to exist.<\/p>\n<p style=\"padding-left: 40px;\"><strong>3.6 Data Processing Is Mandatory for Establishment, Exercise or Protection of A Right <\/strong><\/p>\n<p style=\"padding-left: 40px;\">Your personal data may be processed if data processing is mandatory for establishment, exercise or protection of a right.<\/p>\n<p style=\"padding-left: 40px;\"><strong>3.7 Processing Based on Legitimate Interests <\/strong><\/p>\n<p style=\"padding-left: 40px;\">If data processing is required for the legitimate interests of the Company, your personal data may be processed. In this respect, the Company may process personal data for the purposes such as promotion of employees, raise in the salaries of the employees or regulating the social benefits of the employees on the condition that the fundamental rights and freedoms of the employee are not violated. On the other hand, even in such cases, the fundamental principles with respect to the protection of personal data shall be complied with and the balance of interests of the data subject shall be respected.<\/p>\n<p style=\"padding-left: 40px;\"><strong>3.8 Processing Based on Explicit Consent <\/strong><\/p>\n<p style=\"padding-left: 40px;\">Although the main rule is that the personal data is processed based on explicit consent, in the event the other conditions outlined in this clause exist, the explicit consent of the data subject is not sought. Otherwise, it will be an abuse of rights. In this respect, your personal data is processed based on explicit consent if they are not processed based on one of the conditions, which are outlined in this Terms.<\/p>\n<h3>4. CATEGORIZATION OF PERSONAL DATA<\/h3>\n<p>&nbsp;<\/p>\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"5\">\n<tbody>\n<tr>\n<td width=\"287\"><\/td>\n<td><\/td>\n<\/tr>\n<tr>\n<td width=\"287\">Data Subject<\/td>\n<td width=\"437\">Data Category<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"9\" width=\"287\">Customer<\/td>\n<td width=\"437\">ID Data<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">Financial Data<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">Legal Transaction Data<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">Visual and Auditory Data<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">Process Security Data<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">Contact Data<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">Customer Operation Data<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">Physical Space Security Data<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">Marketing Data<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"5\" width=\"287\">\n<div>Potential Employee<\/div>\n<\/td>\n<td width=\"437\">ID Data<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">Contact Data<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">Professional Experience Data<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">Visual  and Auditory Data<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">\n<div>Other (Other data included in the curriculum vitae)<\/div>\n<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"6\" width=\"287\">\n<div>Potential Employee<\/div>\n<\/td>\n<td width=\"437\">ID Data<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">Contact Data<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">Visual and Auditory Data<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">Process Security Data<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">Marketing Data<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">Other (Other data included in the online forms)<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\" width=\"287\">\n<div>Visitor<\/div>\n<\/td>\n<td width=\"437\">ID Data<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">\u0130leti\u015fim Bilgisi<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">FizikselMekanG\u00fcvenli\u011fiBilgisi<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"5\" width=\"287\">\n<div>Tedarik\u00e7i \/\u0130\u015f Orta\u011f\u0131 Yetkilisi\/\u00c7al\u0131\u015fan\u0131<\/div>\n<\/td>\n<td width=\"437\">ID Data<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">Contact Data<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">Legal Transaction Data<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">Finansal Bilgiler<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">Process Security Data<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"3\" width=\"287\">\n<div>Visitor<\/div>\n<\/td>\n<td width=\"437\">ID Data<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">Contact Data<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">Process Security Data<\/td>\n<\/tr>\n<tr>\n<td rowspan=\"5\" width=\"287\">\n<div>3. Person<\/div>\n<\/td>\n<td width=\"437\">ID Data<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">Contact Data<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">Legal Transaction Data<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">Visual Auditory Data<\/td>\n<\/tr>\n<tr>\n<td width=\"437\">Process Security Data<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h3>5. PURPOSES OF PROCESSING PERSONAL DATA<\/h3>\n<p>Personal data may be processed in the Company in accordance with the personal data processing conditions, which are outlined in articles 5 and 6 of the Law numbered 6698, based on the group of the data subject.<\/p>\n<p style=\"padding-left: 40px;\"><strong>5.1 CUSTOMER <\/strong><\/p>\n<p style=\"padding-left: 40px;\">The personal data of the Customers may be processed under the conditions for processing personal data, which are set forth in article 5 of the Law numbered 6698, for the purposes of our relevant business units carrying out the necessary works and conducting relevant business processes and planning and execution of the activities for maintaining the business continuity by the relevant business units in order to realize the commercial activities, which are carried out by the company; carrying out the necessary business processes in order to have the data subjects benefit from the products and services, which are provided by the company; planning and execution of its operational activities, which are required in order to ensure that the operations of the company are carried out in accordance with the company procedures and the relevant legislation; conduct of audit activities; planning and execution of market research activities for the sale and marketing of the products and services and; provision of the legal, technical and commercial-business security of the company and the persons, which are in business relationship with the company; carrying out financial and accounting works, planning and execution of the operation processes of the company; pursuing contract processes and legal claims; pursuing customer requests and\/or complaints; planning and execution of purchase, sale processes of products and\/or services; planning and execution of the after sales support services activities and operation processes; planning and execution of transfer processes; planning and execution of corporate communication activities; management of events and activities; planning and execution of logistics activities; provision of the security of company premises and facilities; planning of information security; establishing and management of and audit and execution of information technologies infrastructure.<\/p>\n<p style=\"padding-left: 40px;\"><strong>5.2 POTENTIAL EMPLOYEE<\/strong><\/p>\n<p style=\"padding-left: 40px;\">The personal data of the Potential Employee may be processed under the conditions for the processing of personal data, which are outlined in article 5 of the Law numbered 6698, to carry out the processes of procurement of personnel, planning, and execution of human resources processes, fulfilling the obligations arising from the legislation.<\/p>\n<p style=\"padding-left: 40px;\"><strong>5.3 POTENTIAL CUSTOMER<br \/>\n<\/strong><\/p>\n<p style=\"padding-left: 40px;\">The personal data of the Potential Customers may be processed under the conditions for processing of personal data, which are set forth in article 5 of the Law numbered 6698, for the purposes of planning and execution of the activities, which are necessary for suggesting and promoting the products and services, which are provided by the company, to the data subject by customizing such products and services as per the liking, habit of use and needs; carrying out the necessary works, which are necessary to realize the commercial activities, which are carried out by the company, and conducting the business processes related thereto; carrying out the works, which are necessary in order to benefit from the products and services, which are provided by the company, and the related business processes, planning and execution of activities, which are required for suggesting and promoting the products and services, which are provided by the company, by customizing thereof; planning and execution of processes for management of customer relations.<\/p>\n<p style=\"padding-left: 40px;\"><strong>5.4 VISITOR<br \/>\n<\/strong><\/p>\n<p style=\"padding-left: 40px;\">The personal data of the Visitors may be processed, under the conditions for the processing of personal data, which are outlined in article 5 of the Law numbered 6698, provision of security of buildings and facility premises and\/or facilities; creating and following up visitor logs; provision of security of its fixtures and\/or its resources; provision of technical and commercial-occupational security; provision of security of company operations; provision of information, which arises from the legislation to authorized institutions and organizations.<\/p>\n<p style=\"padding-left: 40px;\"><strong>5.5 REPRESENTATIVES \/ EMPLOYEES OF SUPPLIERS \/ BUSINESS PARTNERS<br \/>\n<\/strong><\/p>\n<p style=\"padding-left: 40px;\">Personal data of Representatives \/ Employees of the Suppliers \/ Business Partners may be processed under the conditions for processing personal data set forth in article 5 of the Law numbered 6698 for the purposes of conducting the necessary work carried out by our relevant business units for realizing the commercial activities carried out by the company and the conduct of the business processes in relation to this, the management of the relationships with the business partners and\/or suppliers, the planning and execution of the communication activities with the business partners and\/or suppliers, the planning and execution of our company\u2019s commercial and\/or business strategies, the provision of the security of the company\u2019s operations, for the provision of the legal, technical and commercial-occupational security of our company and the relevant persons, who are in a business relationship with our company, the conduct of agreement processes, the conduct of finance and accounting processes, the conduct of purchase of goods\/services, the provision of the security of the data controller\u2019s operations and providing information to authorized persons, institutions, establishments.<\/p>\n<p style=\"padding-left: 40px;\"><strong>5.6 ONLINE VISITOR<br \/>\n<\/strong><\/p>\n<p style=\"padding-left: 40px;\">Personal data of Online Visitors may be processed under the conditions for processing personal data outlined in article 5 of the Law numbered 6698 for the conduct of marketing analysis works, the conduct of advertisements\/campaigns\/promotions\u2019 processes, the conduct of communication activities, the conduct of product and services development works, carrying out legal obligations.<\/p>\n<p style=\"padding-left: 40px;\"><strong>5.7 3rd PERSON<br \/>\n<\/strong><\/p>\n<p style=\"padding-left: 40px;\">Personal data of 3rd Person may be processed under the conditions for processing personal data set forth in article 5 of the Law numbered 6698 for the purposes of the conduct of personnel procurement processes, the conduct of the business and operational processes for allowing the use of the services provided by the company, following up on legal works and the performance of agreements.<\/p>\n<h3>6. TRANSFER OF PERSONAL DATA<\/h3>\n<p>Your personal data may be transferred within the scope of principles and purposes set forth in clauses 3 and 5 of this Confidentiality and Personal Data Protection Terms under the conditions for, and for the purposes of, processing personal data set forth in articles 8 and 9 of the Law numbered 6698 in a limited capacity to our business partners, suppliers, legally authorized public authorities and legal entities in the country or abroad.<\/p>\n<h3>7. METHOD AND LEGAL BASIS OF COLLECTION OF PERSONAL DATA<\/h3>\n<p>Depending on the Data Subject Group, your personal data transferred electronically to the Company are processed as follows.<\/p>\n<p style=\"padding-left: 40px;\"><strong>7.1 CUSTOMER<br \/>\n<\/strong><\/p>\n<p style=\"padding-left: 40px;\">Personal data of the Customers are processed on the legal bases that \u201cprocessing of personal data of the parties of a contract is necessary, provided that it is directly related to the establishment or performance of the contract\u201d, \u201cit is necessary for compliance with a legal obligation to which the data controller is subject\u201d and \u201cprocessing of data is necessary for the legitimate interests pursued by the data controller, provided that this processing shall not violate the fundamental rights and freedoms of the data subject\u201d set forth in article 5 of the Law numbered 6698 or by obtaining explicit consent, in physical or electronic media, by automated or semi-automated means or by non-automated means as part of a data recording system through written or verbal data transfer tools by way of being received either directly from the person or third persons.<\/p>\n<p style=\"padding-left: 40px;\"><strong>7.2 POTENTIAL CUSTOMER<\/strong><\/p>\n<p style=\"padding-left: 40px;\">Personal data of the Potential Customers are processed on the legal bases of \u201cpersonal data have been made public by the data subject himself\/herself\u201d, \u201cprocessing of data is necessary for the legitimate interests pursued by the data controller, provided that this processing shall not violate the fundamental rights and freedoms of the data subject\u201d, set forth in article 5 of the Law numbered 6698 or by receiving explicit consent, in physical or electronic media, by automated or semi-automated means or by non-automated means as part of a data recording system through written or verbal data transfer tools by way of being received either directly from the person or third persons.<\/p>\n<p style=\"padding-left: 40px;\"><strong>5.2 POTENTIAL EMPLOYEE<\/strong><\/p>\n<p style=\"padding-left: 40px;\">Personal data of the Potential Employee are processed on the legal bases of \u201cprocessing of personal data of the parties of a contract is necessary, provided that it is directly related to the establishment or performance of the contract\u201d in terms of the employment agreement which may be established, and \u201cprocessing of data is necessary for the legitimate interests pursued by the data controller, provided that this processing shall not violate the fundamental rights and freedoms of the data subject\u201d, set forth in article 5 of the Law numbered 6698 or by obtaining explicit consent by filling out an application form in electronic medium, by filling out a physical form by automated or semi-automated means or by non-automated means as part of a data recording system through written or verbal data transfer tools by way of being received either directly from the person or third persons.<\/p>\n<p style=\"padding-left: 40px;\"><strong>7.4 VISITOR<br \/>\n<\/strong><\/p>\n<p style=\"padding-left: 40px;\">Ziyaret\u00e7i ki\u015fisel verileri, 6698 say\u0131l\u0131 Kanun\u2019un 5. maddesinde yer alan; \u201cveri sorumlusunun hukuki y\u00fck\u00fcml\u00fcl\u00fc\u011f\u00fcn\u00fc yerine getirebilmesi i\u00e7in zorunlu olmas\u0131\u201d, \u201cbir hakk\u0131n tesisi, kullan\u0131lmas\u0131 veya korunmas\u0131 i\u00e7in veri i\u015flemenin zorunlu olmas\u0131\u201d ve \u201cilgili ki\u015finin temel hak ve \u00f6zg\u00fcrl\u00fcklerine zarar vermemek kayd\u0131yla, veri sorumlusunu me\u015fru menfaatleri i\u00e7in veri i\u015flenmesinin zorunlu olmas\u0131\u201d hukuki sebebine dayanarak hizmet binam\u0131z i\u00e7erisindeki \u00e7e\u015fitli yerlerde bulunan g\u00fcvenlik kameralar\u0131 ve giri\u015fleriniz s\u0131ras\u0131nda taraf\u0131n\u0131zdan al\u0131nan di\u011fer bilgiler vas\u0131tas\u0131yla g\u00f6r\u00fcnt\u00fcler kay\u0131t alt\u0131na al\u0131nmakta suretiyle otomatik, k\u0131smen otomatik veya herhangi bir veri kay\u0131t sisteminin par\u00e7as\u0131 olmak kayd\u0131yla otomatik olmayan yollarla i\u015flenmektedir.<\/p>\n<p style=\"padding-left: 40px;\"><strong>7.5 TEDAR\u0130K\u00c7\u0130 \/ \u0130\u015e ORTA\u011eI YETK\u0130L\u0130S\u0130 \/ \u00c7ALI\u015eANI <\/strong><\/p>\n<p style=\"padding-left: 40px;\">Personal data of Representatives \/ Employees of the Suppliers \/ Business Partners are processed on the legal bases that \u201cprocessing of personal data of the parties of a contract is necessary, provided that it is directly related to the establishment or performance of the contract\u201d, \u201cit is necessary for compliance with a legal obligation to which the data controller is subject\u201d and \u201cprocessing of data is necessary for the legitimate interests pursued by the data controller, provided that this processing shall not violate the fundamental rights and freedoms of the data subject\u201d set forth in article 5 of the Law numbered 6698 or by receiving explicit consent in physical or electronic media, by automated or semi-automated means or by non-automated means as dart of a data recording system through written or verbal data transfer tools as part of the data recording system by way of being received either directly from the person or third persons.<\/p>\n<p style=\"padding-left: 40px;\"><strong>7.6 ONLINE VISITOR <\/strong><\/p>\n<p style=\"padding-left: 40px;\">Personal data of Online Visitors are processed on the legal bases of \u201cprocessing of data is necessary for the legitimate interests pursued by the data controller, provided that this processing shall not violate the fundamental rights and freedoms of the data subject\u201d and \u201cit is necessary for compliance with a legal obligation to which the data controller is subject\u201d set forth in article 5 of the Law numbered 6698 by automated means.<\/p>\n<p style=\"padding-left: 40px;\"><strong>7.7 3rd PERSON <\/strong><\/p>\n<p style=\"padding-left: 40px;\">Personal data of Third Persons are processed on the legal bases of \u201cit is necessary for compliance with a legal obligation to which the data controller is subject\u201d and \u201cProcessing of data is necessary for the legitimate interests pursued by the data controller, provided that this processing shall not violate the fundamental rights and freedoms of the data subject\u201d set forth in article 5 of the Law numbered 6698 by automated or semi-automated means or by non-automated means as part of a data recording system in physical or electronic media through written or verbal data transfer tools by way of being received either directly from the person or third persons.<\/p>\n<h3>8. SECURITY OF PERSONAL DATA<\/h3>\n<p>The Company takes reasonable measures to prevent unauthorized access risks, data losses by accident, deliberate deletion of data or data from being damaged for the purpose of ensuring the security of the personal data and prevention of unlawful processing thereof.<br \/>\nAll reasonably required technical and physical measures are taken to prevent persons other than those who are authorized to access personal data from accessing personal data. In this context, especially the authorization system is set up in a way which makes it impossible for persons and systems to access more personal data than it is necessary.<br \/>\nThe Company carries out the required audits and has such audits carried out in its institutions and establishments for the purpose of execution of  the provisions of the Law numbered 6698.<\/p>\n<h3>9. UNDERTAKINGS TO THIRD PARTY PERSONAL DATA<\/h3>\n<p>The Data Subject Group accepts and consent that personal data in relation to 3rd Persons transferred by the Data Subject Group may be processed by the Company. The relevant Person Group also undertakes that it has informed as required in line with the Law numbered 6698 in relation to the transferred persons and information and that it has obtained the consents. Otherwise, the relevant Person Group shall be liable for the damages arising.<\/p>\n<h3>10. PROCEDURES AND PRINCIPLES FOR APPLICATION<\/h3>\n<p>As data subject, you may make a submission in relation to your requests regarding your rights in article 11 of the Law numbered 6698, in line with the procedures and principles in the Data Subject Application Form , by filling out the relevant form and sending it a message to our REM address infortebilisim@hs01.kep.tr or with your e-mail address registered in your system sent to kvkk@inforte.com.tr or with a message sent with a secure e-signature, by a written application bearing signature made in person or via notary to our address Kozyata\u011f\u0131 Mh. De\u011firmen Sk. No:16\/12 Kad\u0131k\u00f6y, Istanbul. The Company will conclude the application made by you as soon as possible depending on the nature of the request and at the latest within thirty days free of charge. However, in case the transaction requires an additional cost, the fee in the tariff determined by the Personal Data Protection Board will be charged by the Company.<\/p>\n<p>In this context, as the data subject, you have the following rights;<\/p>\n<ul>\n<li>To learn whether your personal data is processed or not,<\/li>\n<li>To demand for information as to if your personal data have been processed,<\/li>\n<li>To learn the purpose of processing of your personal data and whether these personal data are used in compliance with such purpose,<\/li>\n<li>To know the third persons to whom personal data were transferred in the country or abroad,<\/li>\n<li>To request the rectification of the incomplete or inaccurate data, if any,<\/li>\n<li>To request the erasure or destruction of your personal data ,<\/li>\n<li>To request the notification to third persons to which personal data were transferred,<\/li>\n<li>To object to the occurrence of a result against himself\/herself by analyzing  of the data processed solely through automated systems,<\/li>\n<li>To claim compensation for the damage arising from the unlawful processing of your personal data.<\/li>\n<\/ul>\n<div class=\"vc_empty_space\"   style=\"height: 10px\" ><span class=\"vc_empty_space_inner\"><\/span><\/div>\n<br \/>\n<a href=\"https:\/\/www.inforte.com\/wp-content\/uploads\/2020\/12\/inforte-ilgli-kisi-basvuru-formu.docx\">DOWNLOAD THE DATA SUBJECT APPLICATION FORM<\/a><br \/>\n<div class=\"vc_empty_space\"   style=\"height: 80px\" ><span class=\"vc_empty_space_inner\"><\/span><\/div>","protected":false},"excerpt":{"rendered":"<p>INFORTE G\u0130ZL\u0130L\u0130K VE K\u0130\u015e\u0130SEL VER\u0130LER\u0130N KORUNMASI \u0130LKELER\u0130 1. AMA\u00c7 VE KAPSAM \u0130\u015fbu Gizlilik ve Ki\u015fisel Verilerin Korunmas\u0131 \u0130lkeleri (\u201c\u0130lkeler\u201d), Inforte Bili\u015fim A.\u015e (\u201c\u015eirket\u201d yahut \u201cVeri Sorumlusu\u201d olarak an\u0131lacakt\u0131r) ki\u015fisel verilerin korunmas\u0131na ili\u015fkin kabul etti\u011fi ilkeleri d\u00fczenlemekte, Ziyaret\u00e7i, M\u00fc\u015fteri, Aday M\u00fc\u015fteri, Tedarik\u00e7i, Tedarik\u00e7i \u00c7al\u0131\u015fan\u0131, \u00c7al\u0131\u015fan Aday\u0131&#8230;<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-7766","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Web Gizlilik ve KVKK \u0130lkeleri - Inforte Bili\u015fim A.\u015e.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inforte.com\/en\/web-confidentiality\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Web Gizlilik ve KVKK \u0130lkeleri - Inforte Bili\u015fim A.\u015e.\" \/>\n<meta property=\"og:description\" content=\"INFORTE G\u0130ZL\u0130L\u0130K VE K\u0130\u015e\u0130SEL VER\u0130LER\u0130N KORUNMASI \u0130LKELER\u0130 1. AMA\u00c7 VE KAPSAM \u0130\u015fbu Gizlilik ve Ki\u015fisel Verilerin Korunmas\u0131 \u0130lkeleri (\u201c\u0130lkeler\u201d), Inforte Bili\u015fim A.\u015e (\u201c\u015eirket\u201d yahut \u201cVeri Sorumlusu\u201d olarak an\u0131lacakt\u0131r) ki\u015fisel verilerin korunmas\u0131na ili\u015fkin kabul etti\u011fi ilkeleri d\u00fczenlemekte, Ziyaret\u00e7i, M\u00fc\u015fteri, Aday M\u00fc\u015fteri, Tedarik\u00e7i, Tedarik\u00e7i \u00c7al\u0131\u015fan\u0131, \u00c7al\u0131\u015fan Aday\u0131...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inforte.com\/en\/web-confidentiality\/\" \/>\n<meta property=\"og:site_name\" content=\"Inforte Bili\u015fim A.\u015e.\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-02T10:23:25+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"20 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.inforte.com\/web-gizlilik-ve-kvkk-ilkeleri\/\",\"url\":\"https:\/\/www.inforte.com\/web-gizlilik-ve-kvkk-ilkeleri\/\",\"name\":\"Web Gizlilik ve KVKK \u0130lkeleri - Inforte Bili\u015fim A.\u015e.\",\"isPartOf\":{\"@id\":\"https:\/\/www.inforte.com\/#website\"},\"datePublished\":\"2020-12-27T11:40:30+00:00\",\"dateModified\":\"2021-02-02T10:23:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.inforte.com\/web-gizlilik-ve-kvkk-ilkeleri\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.inforte.com\/web-gizlilik-ve-kvkk-ilkeleri\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.inforte.com\/web-gizlilik-ve-kvkk-ilkeleri\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Ana sayfa\",\"item\":\"https:\/\/www.inforte.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Web Gizlilik ve KVKK \u0130lkeleri\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.inforte.com\/#website\",\"url\":\"https:\/\/www.inforte.com\/\",\"name\":\"Inforte Bili\u015fim A.\u015e.\",\"description\":\"arbor, DDOS, spectrum, visibility, availability, forescout, nac, orchestration, network control, iot security, netscout, performans monitor, packet broker, tap, services assurance, centrify, privilage, access management, password vault, idendity access management, session recording\",\"publisher\":{\"@id\":\"https:\/\/www.inforte.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.inforte.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.inforte.com\/#organization\",\"name\":\"Inforte Bili\u015fim A.\u015e.\",\"url\":\"https:\/\/www.inforte.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png\",\"contentUrl\":\"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png\",\"width\":286,\"height\":180,\"caption\":\"Inforte Bili\u015fim A.\u015e.\"},\"image\":{\"@id\":\"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Web Gizlilik ve KVKK \u0130lkeleri - Inforte Bili\u015fim A.\u015e.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inforte.com\/en\/web-confidentiality\/","og_locale":"en_GB","og_type":"article","og_title":"Web Gizlilik ve KVKK \u0130lkeleri - Inforte Bili\u015fim A.\u015e.","og_description":"INFORTE G\u0130ZL\u0130L\u0130K VE K\u0130\u015e\u0130SEL VER\u0130LER\u0130N KORUNMASI \u0130LKELER\u0130 1. AMA\u00c7 VE KAPSAM \u0130\u015fbu Gizlilik ve Ki\u015fisel Verilerin Korunmas\u0131 \u0130lkeleri (\u201c\u0130lkeler\u201d), Inforte Bili\u015fim A.\u015e (\u201c\u015eirket\u201d yahut \u201cVeri Sorumlusu\u201d olarak an\u0131lacakt\u0131r) ki\u015fisel verilerin korunmas\u0131na ili\u015fkin kabul etti\u011fi ilkeleri d\u00fczenlemekte, Ziyaret\u00e7i, M\u00fc\u015fteri, Aday M\u00fc\u015fteri, Tedarik\u00e7i, Tedarik\u00e7i \u00c7al\u0131\u015fan\u0131, \u00c7al\u0131\u015fan Aday\u0131...","og_url":"https:\/\/www.inforte.com\/en\/web-confidentiality\/","og_site_name":"Inforte Bili\u015fim A.\u015e.","article_modified_time":"2021-02-02T10:23:25+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"20 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.inforte.com\/web-gizlilik-ve-kvkk-ilkeleri\/","url":"https:\/\/www.inforte.com\/web-gizlilik-ve-kvkk-ilkeleri\/","name":"Web Gizlilik ve KVKK \u0130lkeleri - Inforte Bili\u015fim A.\u015e.","isPartOf":{"@id":"https:\/\/www.inforte.com\/#website"},"datePublished":"2020-12-27T11:40:30+00:00","dateModified":"2021-02-02T10:23:25+00:00","breadcrumb":{"@id":"https:\/\/www.inforte.com\/web-gizlilik-ve-kvkk-ilkeleri\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inforte.com\/web-gizlilik-ve-kvkk-ilkeleri\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.inforte.com\/web-gizlilik-ve-kvkk-ilkeleri\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Ana sayfa","item":"https:\/\/www.inforte.com\/"},{"@type":"ListItem","position":2,"name":"Web Gizlilik ve KVKK \u0130lkeleri"}]},{"@type":"WebSite","@id":"https:\/\/www.inforte.com\/#website","url":"https:\/\/www.inforte.com\/","name":"Inforte Bili\u015fim A.\u015e.","description":"arbor, DDOS, spectrum, visibility, availability, forescout, nac, orchestration, network control, iot security, netscout, performans monitor, packet broker, tap, services assurance, centrify, privilage, access management, password vault, idendity access management, session recording","publisher":{"@id":"https:\/\/www.inforte.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inforte.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.inforte.com\/#organization","name":"Inforte Bili\u015fim A.\u015e.","url":"https:\/\/www.inforte.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png","contentUrl":"https:\/\/www.inforte.com\/wp-content\/uploads\/2018\/06\/logo.png","width":286,"height":180,"caption":"Inforte Bili\u015fim A.\u015e."},"image":{"@id":"https:\/\/www.inforte.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/pages\/7766"}],"collection":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/comments?post=7766"}],"version-history":[{"count":14,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/pages\/7766\/revisions"}],"predecessor-version":[{"id":7868,"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/pages\/7766\/revisions\/7868"}],"wp:attachment":[{"href":"https:\/\/www.inforte.com\/en\/wp-json\/wp\/v2\/media?parent=7766"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}