icon 04 icon 08 icon 11 icon 10 icon 12 Group 4 icon 07 icon 03 Group 2 icon 14 icon 09 icon 05 icon 02 icon 13 icon 01 icon 06

Information Security Policy

Information security policy of Weavers...

Confidentiality is ensured by granting only authorized access to information, the integrity of the information is ensured by protecting against unauthorized changes and recording the changes made, when information is required, the accessibility is ensured by making it available to authorized users, All policies and procedures supporting this policy are implemented by each unit within the scope and limits. All legal requirements are fulfilled, Awareness is created by providing continuous training on information security for all employees, All information security vulnerabilities and detected suspicious situations are reported to the relevant officers. Continuous improvement and controls are ensured by those concerned.


To determine the value of information assets through appropriate risk assessment, to understand their weaknesses and threats that could put them at risk, and to reduce risks to acceptable levels. To fulfill the requirements of the laws through the design, implementation and maintenance of the information security management system To protect the credibility of the organization and its image. To comply with all customer contract terms regarding information security. To ensure the business continuity of the organization To ensure and sustain TS ISO IEC 27001 compliance.


We use cookies to give you the best possible experience on our website. Necessary cookies must be set for our website to function properly. You can decide which categories you want to allow. Please note that depending on the settings you have chosen; all functions of the website will may not be available.
You can find more information in our privacy policy / cookie policy.