Modal content
×

T.C. İÇİŞLERİ BAKANLIĞI

WEB SİTESİ GİZLİLİK VE ÇEREZ POLİTİKASI

Web sitemizi ziyaret edenlerin kişisel verilerini 6698 sayılı Kişisel Verilerin Korunması Kanunu uyarınca işlemekte ve gizliliğini korumaktayız. Bu Web Sitesi Gizlilik ve Çerez Politikası ile ziyaretçilerin kişisel verilerinin işlenmesi, çerez politikası ve internet sitesi gizlilik ilkeleri belirlenmektedir.

Çerezler (cookies), küçük bilgileri saklayan küçük metin dosyalarıdır. Çerezler, ziyaret ettiğiniz internet siteleri tarafından, tarayıcılar aracılığıyla cihazınıza veya ağ sunucusuna depolanır. İnternet sitesi tarayıcınıza yüklendiğinde çerezler cihazınızda saklanır. Çerezler, internet sitesinin düzgün çalışmasını, daha güvenli hale getirilmesini, daha iyi kullanıcı deneyimi sunmasını sağlar. Oturum ve yerel depolama alanları da çerezlerle aynı amaç için kullanılır. İnternet sitemizde çerez bulunmamakta, oturum ve yerel depolama alanları çalışmaktadır.

Web sitemizin ziyaretçiler tarafından en verimli şekilde faydalanılması için çerezler kullanılmaktadır. Çerezler tercih edilmemesi halinde tarayıcı ayarlarından silinebilir ya da engellenebilir. Ancak bu web sitemizin performansını olumsuz etkileyebilir. Ziyaretçi tarayıcıdan çerez ayarlarını değiştirmediği sürece bu sitede çerez kullanımını kabul ettiği varsayılır.

1.Kişisel Verilerin İşlenme Amacı

Web sitemizi ziyaret etmeniz dolayısıyla elde edilen kişisel verileriniz aşağıda sıralanan amaçlarla T.C. İçişleri Bakanlığı tarafından Kanun’un 5. ve 6. maddelerine uygun olarak işlenmektedir:

  • T.C. İçişleri Bakanlığı tarafından yürütülen ticari faaliyetlerin yürütülmesi için gerekli çalışmaların yapılması ve buna bağlı iş süreçlerinin gerçekleştirilmesi,
  • T.C. İçişleri Bakanlığı tarafından sunulan ürün ve hizmetlerden ilgili kişileri faydalandırmak için gerekli çalışmaların yapılması ve ilgili iş süreçlerinin gerçekleştirilmesi,
  • T.C. İçişleri Bakanlığı tarafından sunulan ürün ve hizmetlerin ilgili kişilerin beğeni, kullanım alışkanlıkları ve ihtiyaçlarına göre özelleştirilerek ilgili kişilere önerilmesi ve tanıtılması.
 
2.Kişisel Verilerin Aktarıldığı Taraflar ve Aktarım Amacı

Web sitemizi ziyaret etmeniz dolayısıyla elde edilen kişisel verileriniz, kişisel verilerinizin işlenme amaçları doğrultusunda, iş ortaklarımıza, tedarikçilerimize kanunen yetkili kamu kurumlarına ve özel kişilere Kanun’un 8. ve 9. maddelerinde belirtilen kişisel veri işleme şartları ve amaçları kapsamında aktarılabilmektedir.

3.Kişisel Verilerin Toplanma Yöntemi

Çerezler, ziyaret edilen internet siteleri tarafından tarayıcılar aracılığıyla cihaza veya ağ sunucusuna depolanan küçük metin dosyalarıdır. Web sitemiz ziyaret edildiğinde, kişisel verilerin saklanması için herhangi bir çerez kullanılmamaktadır.

4.Çerezleri Kullanım Amacı

Web sitemiz birinci ve üçüncü taraf çerezleri kullanır. Birinci taraf çerezleri çoğunlukla web sitesinin doğru şekilde çalışması için gereklidir, kişisel verilerinizi tutmazlar. Üçüncü taraf çerezleri, web sitemizin performansını, etkileşimini, güvenliğini, reklamları ve sonucunda daha iyi bir hizmet sunmak için kullanılır. Kullanıcı deneyimi ve web sitemizle gelecekteki etkileşimleri hızlandırmaya yardımcı olur. Bu kapsamda çerezler;

İşlevsel: Bunlar, web sitemizdeki bazı önemli olmayan işlevlere yardımcı olan çerezlerdir. Bu işlevler arasında videolar gibi içerik yerleştirme veya web sitesindeki içerikleri sosyal medya platformlarında paylaşma yer alır.

Teknik olarak web sitemizde kullanılan çerez türleri aşağıdaki tabloda gösterilmektedir.

Oturum Çerezleri

(Session Cookies)

Oturum çerezleri ziyaretçilerimizin web sitemizi ziyaretleri süresince kullanılan, tarayıcı kapatıldıktan sonra silinen geçici çerezlerdir. Amacı ziyaretiniz süresince İnternet Sitesinin düzgün bir biçimde çalışmasının teminini sağlamaktır.

 

Web sitemizde çerez kullanılmasının başlıca amaçları aşağıda sıralanmaktadır:

  • • İnternet sitesinin işlevselliğini ve performansını arttırmak yoluyla sizlere sunulan hizmetleri geliştirmek,
5.Çerez Tercihlerini Kontrol Etme

Farklı tarayıcılar web siteleri tarafından kullanılan çerezleri engellemek ve silmek için farklı yöntemler sunar. Çerezleri engellemek / silmek için tarayıcı ayarları değiştirilmelidir. Tanımlama bilgilerinin nasıl yönetileceği ve silineceği hakkında daha fazla bilgi edinmek için www.allaboutcookies.org adresi ziyaret edilebilir. Ziyaretçi, tarayıcı ayarlarını değiştirerek çerezlere ilişkin tercihlerini kişiselleştirme imkânına sahiptir.  

6.Veri Sahiplerinin Hakları

Kanunun ilgili kişinin haklarını düzenleyen 11 inci maddesi kapsamındaki talepleri, Politika’da düzenlendiği şekilde, ayrıntısını Bakanlığımıza ileterek yapabilir. Talebin niteliğine göre en kısa sürede ve en geç otuz gün içinde başvuruları ücretsiz olarak sonuçlandırılır; ancak işlemin ayrıca bir maliyet gerektirmesi halinde Kişisel Verileri Koruma Kurulu tarafından belirlenecek tarifeye göre ücret talep edilebilir.

 

Corporate Promotion Contact Us
EN
  • English
  • Türkçe
SİBERAY
SİBERAY
  • CYBER SECURITY

    Cyber Security

    General information about the development of the internet from the past to the present, the things to be done related to cyber security by individuals and institutions, cybercrime, the importance of personal data and duties of parents.

    • Cyber World
      • What is the Internet?
      • The Purposes of Usage of the Internet
      • What is the Cyber World?
      • Management of Time of Cyber World
      • Digital Literacy
    • Siberay For Individuals
      • Safe Internet
      • Cyber Crimes
      • Social Engineering
      • Harmful Software
      • Harmful Software - 2
      • Cyber Security Measures
      • LPPD for Individulas
      • Parental Control
    • Siberay For Organizations
      • Cyber Security For Business
      • Network and Internet Security For Enterprises
      • LPPD For Organizations
      • Cyber Awareness For Employees
  • SOCIAL MEDIA

    Social Media

    General information about social media platforms, time spent on social media, personal data and cyberbullying.

    • Social Media Platforms
    • Information Pollution
    • Cyber Bullying
    • Time Management
    • Data Processing
  • DIGITAL GAME

    Digital Game

    General information about games on digital platforms, appropriate game selection, numerical data in the digital world and the duties of parents.

    • Selection of Games
    • Numerical Data Regarding the Digital Game Market
    • Permission and Data Management
    • Parental Guide
  • ADDICTION

    Addiction

    What is Technology Addiction? Are you addicted to digital resources? You can find the answers to the questions under this title.

    • Technology Addiction
    • Screen Addiction
    • Social Media Addiction
    • Game Addiction
  • RESOURCES

    Resources

    Contents which may be utilized individually or institutionally.

    • Articles
    • Videos
Search
  • CYBER SECURITY
    • Cyber World
      • What is the Internet?
      • The Purposes of Usage of the Internet
      • What is the Cyber World?
      • Management of Time of Cyber World
      • Digital Literacy
    • Siberay For Individuals
      • Safe Internet
      • Cyber Crimes
      • Social Engineering
      • Harmful Software
      • Harmful Software - 2
      • Cyber Security Measures
      • LPPD for Individulas
      • Parental Control
    • Siberay For Organizations
      • Cyber Security For Business
      • Network and Internet Security For Enterprises
      • LPPD For Organizations
      • Cyber Awareness For Employees
  • SOCIAL MEDIA
    • Social Media Platforms
    • Information Pollution
    • Cyber Bullying
    • Time Management
    • Data Processing
  • DIGITAL GAME
    • Selection of Games
    • Numerical Data Regarding the Digital Game Market
    • Permission and Data Management
    • Parental Guide
  • ADDICTION
    • Technology Addiction
    • Screen Addiction
    • Social Media Addiction
    • Game Addiction
  • RESOURCES
    • Articles
    • Videos

Cyber Security For Business

The topics, which businesses should consider so as to ensure cyber security.

Don't be a victim of Social Engineering

The concept of social engineering was a cyber threat long before today, when everything matches with the virtual world. Users who are deceived by this method, which Kevin Mitnick, one of the most famous hackers in the world, frequently uses and have generalized, can voluntarily transmit a lot of information, including their system login information, to the other party. This situation proves that corporate cyber security is not only about system administrators but also includes all company employees. In this scope, besides the mindfulness and awareness trainings for employees, such applications as two-factor authentication techniques and secure identity verification solutions are of critical importance so as to protect your organization's data safe.

Phishing attacks appears in front of us as one of the social engineering tools. In this method, users can become victims by clicking on the link or file having come with an e-mail they receive. These messages, which are prepared with attractive suggestions to guarantee the click (a considerable order offer, an intriguing message, a credit card refund contribution return that looks as if it came from your bank, etc.) can sometimes direct people to copied pages of homepages of banks ’internet branch, and thus access to your account as well as obtaining all your personal information. Security software manufacturers offer a variety of tools to prevent this. While this is a sub-solution embedded in antivirus software for individual users, corporate users can avoid being a victim by blocking this message on the server. Nevertheless, users need to think twice before clicking on any message, especially with such attractive content. Otherwise, there may be risks of losing both financial and information.

 

Keep Ransomware Out of the Door

Ransomware, which was once confronted as the biggest cyberattack problem of institutions all over the world, can be, in words of one syllable, expressed as locking your system and demanding money and ransom. Although it varies according to different researches, it is predicted that the damage to be incurred by businesses on account of ransomware in 2021 will exceed 20 billion US Dollars.

Attackers who install the ransomware on your computer via an e-mail request a payment to undo the changes they have made. Since these changes are methods such as encrypting data and blocking access to information, there are not many alternatives, other than making the payment, users who are attacked. The higher the criticality level of the information rendered inaccessible by attackers is, the higher the ransom amount becomes. Furthermore, if the payment is not made, the amount of ransom also increases. Malicious ransomware exploits various vulnerabilities in systems, as well as e-mail. The way to prevent this is through the scanning and vulnerability detection that comes with the use of up-to-date software and vulnerability management, as well as conscious use.

 

 Take Control of Mobile Device Access

Mobile devices have been integrated into corporate systems for a long time. Both smartphones and tablets have become an integral part of business processes. Therefore, it has become an obligation to restrict the access of these devices to the systems with certain authorizations. Access restrictions to be imposed on devices against the risks of loss and theft can preclude various cyber risks brought by these devices, especially data theft.

 

Don't Be Exposed to PPD Penalties

LPPD, that is to say, the Law on Protection of Personal Data, has brought many legal obligations to businesses. This law, which includes various obligations, especially obtaining the consent of customers for use, also includes serious financial sanctions in the event that the data is used outside of the permitted subjects. In this scope, LPPD requests a data supervisor for transactions regarding data protection. “Data supervisor refers to the natural or legal entities who determines the purposes and means of processing personal data, and is also responsible for the establishment and management of the data recording system. Legal entities, themselves, become “data supervisors” within the scope of their activities made by them regarding the processing of personal data, and the legal responsibility specified in the relevant regulations will be in under the responsibility of, in the person, the legal entity. In this regard, “There is no difference in terms of public law legal entities and private law legal entities. " The data supervisor, defined by the aforementioned expressions, not only confronts criminal sanctions after data theft, but corporate reputation is also damaged.

For all these reasons, it is essential that enterprises need to protect their systems against information theft with high security measures. In these transactions, which are also defined as LPPD compliance, a cyber security policy must be implemented in line with the criteria set by the law.

Protect Your Passwords

Password security, which can be enabled with in-house information security awareness, concerns not only the IT department, but also all employees. This method, which has been encountered many times in the past, is among the primary methods applied by data thieves. This situation, which can be defined with many risks ranging from the password of an e-mail account being stolen to losing a memory stick, can seriously harm the information security of the institutions.

 

 

Make sure your software is up to date

Another issue that should be considered is that the in-house software are up-to-date versions. Even if an update comes, and if it is not applied, the security gaps that come with that update cannot be removed.

Increase Your Network Security Standards

In the new order operating in the cloud environment, appropriate solutions are necessary. For example, such solutions as Next-generation Network Access Control (NAC) control and record all accesses happening across the network. While access to the content kept in the cloud is under control, devices with outdated applications, or missing or non-existing security certificates and unauthorized persons cannot access the network with an Ethernet cable or Wi-Fi password.

Reduce Risks with Vulnerability Management

Vulnerability Management applications that reveal the security risks of your system ensure that the risks, which might be encountered, are prevented at the start of them. Vulnerability Management applications, which include stages such as analysis of the existing system architecture, leaking tests, risk modeling, determination of priorities and creation of an action plan, not only reveal the current situation, but also indicate what cyber security measures should be taken for the future.

 

 Do Not Ignore To Back Up Your Data

Data backup is, of course, not just a matter of natural disasters. Data backup have a critical importance in terms of a malfunction to happen in the general system, of theft of data, and of all issues that require data to be recovered. For a more comprehensive solution, of course, this backup should be done with professional backup software rather than physical external disks. These types of solutions allow fast recovery in emergency situations, while eliminating the risks such as the loss or theft of physical external disks.

Paying attention to certain points while backing up can increase the benefit to be achieved. For example, making the backup in a place isolated from the existing system, helps, in attacks such as ransomware, to return to the normal process without the obligation to pay ransom, or to minimize the effect of these attacks. Therefore, the relevant institution does not suffer any financial loss and paves the way for the uninterrupted continuation of business processes.

 

Benefit from 24/7 Solutions of Monitoring and Protection

Cyber security-related events can occur at any time of the day. For this reason, it is essential that the solutions, which provide 24/7 monitoring of systems, be preferred. Such solutions provide high-level information and data security by automatically intervening in cyber security violations to be made out of working hours.

 

Get Prepared against Natural Disasters

Natural disasters such as Earthquake etc. are phenomena that directly affect the workflow of businesses and sometimes stop them completely. In such a case, backing up the data automatically is of critical importance in terms of the continuation of the workflow and the prevention of information loss. This solution, where data backup solutions are at the forefront, enables, with fast and uninterrupted backup, your business to continue its activity at any time.

 

Make Sure You Take Necessary Safety Precautions While Working Remotely

After COVID-19, many businesses provided for their employees with the opportunity to work remotely. While this method eliminates health risks, it also increases the number of people accessing your systems, therefore creating various cyber risks. In order to eliminate these risks, the first method that comes to mind and should be applied is to establish a remote access connection via a VPN.

On the other hand, only limited access permissions, in accordance with their duties, should be given to users who will connect to your system with remote access, and critical data such as, especially, CRM and ERP should be banned to access, other than authorized persons.

CYBER SECURITY

  • Cyber World
    • What is the Internet?
    • The Purposes of Usage of the Internet
    • What is the Cyber World?
    • Management of Time of Cyber World
    • Digital Literacy
  • Siberay For Individuals
    • Safe Internet
    • Cyber Crimes
    • Social Engineering
    • Harmful Software
    • Harmful Software - 2
    • Cyber Security Measures
    • LPPD for Individulas
    • Parental Control
  • Siberay For Organizations
    • Cyber Security For Business
    • Network and Internet Security For Enterprises
    • LPPD For Organizations
    • Cyber Awareness For Employees

SOCIAL MEDIA

  • Social Media Platforms
  • Information Pollution
  • Cyber Bullying
  • Time Management
  • Data Processing

DIGITAL GAME

  • Selection of Games
  • Numerical Data Regarding the Digital Game Market
  • Permission and Data Management
  • Parental Guide

ADDICTION

  • Technology Addiction
  • Screen Addiction
  • Social Media Addiction
  • Game Addiction

RESOURCES

  • Articles
  • Videos
  • CYBER SECURITY
    • Cyber World
      • What is the Internet?
      • The Purposes of Usage of the Internet
      • What is the Cyber World?
      • Management of Time of Cyber World
      • Digital Literacy
    • Siberay For Individuals
      • Safe Internet
      • Cyber Crimes
      • Social Engineering
      • Harmful Software
      • Harmful Software - 2
      • Cyber Security Measures
      • LPPD for Individulas
      • Parental Control
    • Siberay For Organizations
      • Cyber Security For Business
      • Network and Internet Security For Enterprises
      • LPPD For Organizations
      • Cyber Awareness For Employees
  • SOCIAL MEDIA
    • Social Media Platforms
    • Information Pollution
    • Cyber Bullying
    • Time Management
    • Data Processing
  • DIGITAL GAME
    • Selection of Games
    • Numerical Data Regarding the Digital Game Market
    • Permission and Data Management
    • Parental Guide
  • ADDICTION
    • Technology Addiction
    • Screen Addiction
    • Social Media Addiction
    • Game Addiction
  • RESOURCES
    • Articles
    • Videos

Follow “Siberay”

    

İncek Mah. Boztepe Sk. No:125 Gölbaşı – ANKARA
Telefon: +90 (312) 462 57 00

E-posta: siber@egm.gov.tr

TRT ÇOCUK TRT
                                                    © 2025 Department of Combating Cyber ​​Crimes
Sizlere daha iyi hizmet verebilmek için sitemizde çerezlere yer veriyoruz 🍪 Çerez politikamız hakkında bilgi edinmek için tıklayınız