×
TR EN
INTERNET USE POLICIES
  1. .PURPOSE;
    The purpose of this policy is to set a standard for information security about internet access used within the organization. Inappropriate use of the Internet may cause undesirable consequences in terms of legal obligations, capacity utilization and corporate image of the institution. It aims not to cause such negativities knowingly or unknowingly and to ensure that the internet is used in accordance with the rules, ethics and laws.
  2. SCOPE;
    This policy covers the access rules of the internet.
  3. RESPONSIBILITIES;
    Anyone who provides internet access through corporate networks or communication channels is responsible for the implementation of this policy.
  4. APPLICATION;
    All users and System administrators should not leave the following internet access and usage method:
         ;    ●The organization's computer network will be accessed through a firewall that controls access and content. Network firewalls are devices that act as a gateway between the organization's network and external networks and are designed to prevent problems that the organization may encounter in internet connection. Control of access from outside the network to inside the network is done here. The firewall should work together with these services to ensure network security.
            ●Content filtering systems should be used in line with the needs. Unwanted sites (gambling, violence, etc.) should be blocked through the firewall.
            ●Intrusion detection and prevention systems should be used in line with the needs of the institution. It is a system that aims to detect suspicious events, influence and attacks. Firewall logs suspicious cases and system administrators monitor these logs at regular intervals. In cases where the firewall detects an attack, it prevents possible threats by blocking the source of the attack.
            ●All traffic to or from the internet should be scanned for viruses. .However, authorized system administrators have the right to use all services while accessing the Internet. Access authorization can be given to the relevant personnel within the scope of the projects worked on. Since the files to be downloaded will be scanned for viruses, harmful content will be blocked by the anti-virus application.
             carried out by the relevant system.