Information Security Policy
Your data security is our priority
Last Updated: January 9, 2025
Introduction
As Bursa Lotus Psychology Family Counseling, ensuring the security of our clients' personal data is our most important priority. This Information Security Policy explains in detail how we protect your data and what security measures we take.
1. Our Security Principles
Our information security policy is based on the following fundamental principles:
Confidentiality
Your personal data is accessible and processed only by authorized personnel.
Integrity
The accuracy and currency of your data is protected, and unauthorized changes are prevented.
Availability
Your data is accessed securely when needed.
Accountability
All data processing activities are recorded and audited.
2. Technical Security Measures
SSL/TLS Encryption
All data transmission on our website is encrypted with SSL/TLS protocol. This ensures that your data is transmitted securely over the internet.
Secure Server Infrastructure
Your data is stored on servers of trusted hosting providers with regular security updates.
Database Security
Your personal data is stored in encrypted databases and regular backup operations are performed.
Firewall
Our system is protected with multi-layered firewall and unauthorized access attempts are prevented.
3. Administrative Security Measures
Staff Training
All our staff receive regular training on information security and sign confidentiality agreements.
- KVKK and GDPR compliance training
- Cybersecurity awareness training
- Data protection protocol training
Access Control
Data access is limited based on the "need-based" principle and all access is recorded.
- Strong password policies
- Two-factor authentication
- Regular access rights review
Physical Security
Our office and data storage areas are protected with physical security measures.
- Security cameras
- Locked file cabinets
- Visitor registration system
4. Data Processing Security
Data Minimization
Only the minimum data necessary for service delivery is collected and processed.
Data Anonymization
Data used for analytical purposes is anonymized and personal identification information is removed.
Data Retention Periods
Your data is stored for periods determined in accordance with legal obligations and service requirements.
Secure Data Deletion
Data whose retention period has expired is deleted securely and irreversibly.
5. Security Incident Response
We follow the following processes for rapid and effective response to security incidents:
Detection and Analysis
- 24/7 security monitoring
- Automatic threat detection
- Incident analysis and classification
Response and Improvement
- Rapid response protocols
- Affected user notification
- Closing security vulnerabilities
6. Third Party Security
Third-party service providers we use to improve our service quality are also selected in accordance with our security standards:
Service Provider Security Criteria:
- ISO 27001 information security certificate
- KVKK and GDPR compliance
- Regular security audits
- Data processing agreements
- Security incident reporting protocols
7. User Responsibilities
There are points you should pay attention to for data security:
Strong Passwords
Use strong and unique passwords when creating accounts.
Secure Connection
Use our site only over secure internet connections.
Information Sharing
Do not share your personal information on unreliable platforms.
Suspicious Activities
Contact us immediately if you notice suspicious activities.
8. Policy Updates and Contact
This information security policy may be updated in accordance with technological developments and legal requirements. In case of important changes, you will be informed by email.
Contact for Security Issues
For your questions, concerns, or suspicious activity reports regarding security:
Contact Information
+90 505 169 64 16
info@bursalotuspsikoloji.com
Emergency
In case of security breach suspicion, contact us immediately by phone.
Final Note
Information security is a continuously evolving process. As Bursa Lotus Psychology, we will continue to maintain our commitment to data security and adopt best practices. This policy has been prepared to gain and maintain the trust of our clients.