{"id":8375,"date":"2026-05-20T14:18:06","date_gmt":"2026-05-20T11:18:06","guid":{"rendered":"https:\/\/avies.com\/bilgi-guvenligi-politikamiz\/"},"modified":"2026-05-20T14:21:45","modified_gmt":"2026-05-20T11:21:45","slug":"our-information-security-policy","status":"publish","type":"page","link":"https:\/\/avies.com\/en\/our-information-security-policy\/","title":{"rendered":"Our Information Security Policy"},"content":{"rendered":"<section class=\"l-section wpb_row height_custom\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_grid cols_1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p style=\"font-weight: 400;\"><span>AV\u0130ES is aware that information security is the shared responsibility of all its employees. It acknowledges that the company and its stakeholders may suffer severe damages in the event of intentional or accidental loss, unauthorized use, or disclosure of information.<\/span><\/p>\n<p style=\"font-weight: 400;\"><span>Accordingly, AV\u0130ES, operating in the fields of <strong>design and production of avionics and electronic systems<\/strong>,<\/span><\/p>\n<ul style=\"font-weight: 400;\">\n<li><span>undertakes to establish, implement, regularly review, and continuously improve a system in compliance with the ISO\/IEC 27001:2022 Information Security Management System standard in order to ensure the <strong>confidentiality<\/strong>, <strong>integrity<\/strong>, and <strong>availability<\/strong> of information assets,<\/span><\/li>\n<li><span>define <strong>authorities<\/strong>, <strong>roles<\/strong>, and <strong>responsibilities<\/strong> for the effective operation of the Information Security Management System, and review them at regular intervals,<\/span><\/li>\n<li><span>act in accordance with the principle of <strong>segregation of duties<\/strong> in design, development, testing, and implementation processes, and establish the necessary <strong>authorization and approval mechanisms<\/strong>,<\/span><\/li>\n<li><span>ensure full compliance with all <strong>legal regulations<\/strong>, <strong>customer requirements<\/strong>, and <strong>contractual obligations<\/strong> regarding information security,<\/span><\/li>\n<li><span><strong>identify<\/strong> and assess risks to protect information assets, and take appropriate risk management actions,<\/span><\/li>\n<li><span>prepare and test <strong>business continuity plans<\/strong> to ensure the continuity of company activities and customer obligations in the event of any information security incident or interruption,<\/span><\/li>\n<li><span>effectively <strong>manage<\/strong> information security vulnerabilities and breach incidents, and take measures to <strong>prevent the recurrence<\/strong> of such incidents,<\/span><\/li>\n<li><span>organize <strong>information security awareness trainings<\/strong> for all employees and critical external stakeholders, recognizing the importance of the human factor in the sustainability of information security, and monitor the effectiveness of these trainings.<\/span><\/li>\n<\/ul>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h2>Our Cyber Hygiene Certificate<\/h2>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><div class=\"w-gallery fit_cover type_grid action_popup_image ratio_custom count_1\" style=\"--columns:5;--items-gap:20px;--items-ratio-width:84;--items-ratio-height:120;\"><div class=\"w-gallery-list\"><div class=\"w-gallery-item\"><div class=\"w-gallery-item-img\"><img loading=\"lazy\" decoding=\"async\" width=\"683\" height=\"1024\" src=\"https:\/\/avies.com\/wp-content\/uploads\/2026\/05\/belge-05-683x1024.jpg\" class=\"attachment-large size-large\" alt=\"\" srcset=\"https:\/\/avies.com\/wp-content\/uploads\/2026\/05\/belge-05-683x1024.jpg 683w, https:\/\/avies.com\/wp-content\/uploads\/2026\/05\/belge-05-200x300.jpg 200w, https:\/\/avies.com\/wp-content\/uploads\/2026\/05\/belge-05.jpg 1000w\" sizes=\"auto, (max-width: 683px) 100vw, 683px\" \/><\/div><a class=\"w-gallery-item-link\" aria-label=\"belge-05\" href=\"https:\/\/avies.com\/wp-content\/uploads\/2026\/05\/belge-05.jpg\"><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"AV\u0130ES is aware that information security is the shared responsibility of all its employees. It acknowledges that the company and its stakeholders may suffer severe damages in the event of intentional or accidental loss, unauthorized use, or disclosure of information. Accordingly, AV\u0130ES, operating in the fields of design and production of avionics and electronic systems,...","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-8375","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/avies.com\/en\/wp-json\/wp\/v2\/pages\/8375","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/avies.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/avies.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/avies.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/avies.com\/en\/wp-json\/wp\/v2\/comments?post=8375"}],"version-history":[{"count":1,"href":"https:\/\/avies.com\/en\/wp-json\/wp\/v2\/pages\/8375\/revisions"}],"predecessor-version":[{"id":8377,"href":"https:\/\/avies.com\/en\/wp-json\/wp\/v2\/pages\/8375\/revisions\/8377"}],"wp:attachment":[{"href":"https:\/\/avies.com\/en\/wp-json\/wp\/v2\/media?parent=8375"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}