1.      PURPOSE
In all kinds of activities carried out by UITSEC International as the data controller of this policy, it is necessary to describe the personal data processing activity and the methods adopted for the protection of personal data in accordance with the Personal Data Protection Law (Law) No. 6698 and it aims to fulfill the obligation of clarification specified in the article. The Personal Data Protection and Processing Policy includes the principles applied by UITSEC International in the collection, use, sharing, storage and destruction of personal data. It is aimed to inform our customers, employees of the institution, visitors, employees of the institutions we cooperate with and all persons whose personal data are processed by the institution, especially third parties.
2. SCOPE
With this Policy, our institution covers all personal data processed in the processes of our institution in automated or non-automated ways, provided that it is part of any data recording system.
3. AUTHORITIES AND RESPONSIBILITIES
All employees, consultants, external service providers and anyone who stores and processes personal data before the institution are responsible for fulfilling the requirements for the storage and destruction of personal data specified by Law, Regulation and Policy within the institution. Each business unit is responsible for storing and protecting the data it produces in its own business processes.
The responsibility for the notification or correspondence made with the KVK Board on behalf of the data controller such as notification or acceptance and registration in the registry is under the responsibility of the "Data Controller Contact Person".
4. DEFINITIONS AND ABBREVIATIONS
Explicit Consent; Consent on a specific subject, based on information and explained with free will.
Relevant User; These are the persons who process personal data within the organization of the data controller or in accordance with the authority and instruction received from the data controller, except for the person or unit responsible for the technical storage, protection and backup of the data.
Destruction; Deletion, destruction or anonymization of personal data.
Law; Personal Data Protection Law No. 6698.
Recording Media; All kinds of media containing personal data that are fully or partially automated or processed in non-automated ways provided that they are part of any data recording system.
Personal Data; All kinds of information related to the identified or identifiable real person.
Processing of Personal Data; All kinds of processes performed on personal data such as obtaining, recording, storing, keeping, changing, re-arranging, disclosing, transferring, taking over, making available, classifying or preventing their use in whole or in part, automatically or in non-automatic ways, provided that they are part of any data recording system.
Anonymization of Personal Data; Making personal data unlikely to be associated with an identified or identifiable real person in any way, even by matching it with other data.
Deletion of Personal Data; Deletion of Personal Data; making personal data inaccessible and unavailable to Related Users in any way.
Destruction of Personal Data; The process of making personal data inaccessible, recoverable and unusable by anyone in any way.
Board; Personal Data Protection Board.
Sensitive Personal Data; Data related to the race, ethnic origin, political opinion, philosophical belief, religion, sect or other beliefs, dress, membership to associations, foundations or trade unions, health, sexual life, criminal convictions and security measures, and biometric and genetic data.
Periodic Destruction; In the event that all the conditions for processing personal data in the Law disappear, the process of deletion, destruction or anonymization of personal data to be carried out ex officio at repeated intervals specified in the personal data storage and destruction policy.
Data Owner/Relevant Person; The natural person whose personal data is processed.
Data Processor ; The natural or legal person who processes personal data on behalf of the data controller based on the authority given by him.
Data Controller; The natural or legal person who determines the purposes and means of processing personal data and is responsible for the establishment and management of the data recording system.
Regulation; Regulation on the Deletion, Destruction or Anonymization of Personal Data published in the Official Gazette on October 28, 2017.
5. POLICY ON THE PROCESSING AND PROTECTION OF PERSONAL DATA
UITSEC International concretely sets out the necessary measures and the process applied for the protection and processing of personal data with this policy. UITSEC International agrees that it will comply with the applicable legislation if this policy is incompatible with the applicable laws and regulations or if the policy is not up-to-date in accordance with the updated legislation. This policy is updated and revised in order for UITSEC International to fulfill legal requirements according to the changes in the law, regulations and legislation.
5.1 Processed Personal Data
UITSEC International processes the following personal data:
PERSONAL DATA
 
     EMPLOYEE    EMPLOYEE
 
CANDIDATE    CUSTOMER    CUSTOMER CANDIDATE    CUSTOMER'S
 
RELEVANT PERSON    POTENTIAL EMPLOYEE    REFERENCE    TRAINEE    PARENT /TRUSTEE
 
/REPRESENTATIVE    VISITOR
Biometric Data    X                   X                         
Criminal Conviction and Security Measures    X    X              X              X          
Sexual Life                        X                         
Association Membership                        X                         
Philosophical Belief, Religion, Sect and Other Beliefs                        X                         
Finance    X                   X                         
Physical Space Security    X    X              X              X         X
Genetic Data                        X                         
Audiovisual Recordings    X                   X                         
Legal action                        X                         
Communication    X    X    X    X    X    X    X    X    X     
Race and Ethnicity         X              X              X          
Transaction Security              X         X                         
Dress                        X                         
Identity    X    X    X    X    X    X    X    X          
Location                        X                         
Professional experience    X    X              X    X         X          
Customer Transaction                             ü                    
Personnel Information    X    X    X    X    X    X         X          
Marketing                        X                         
Risk Management                        X                         
Health Information    X    X              X              X          
Union Membership                        X                         
Political Opinion Information                        X                         
Foundation Membership                        X    X                    
 
5.2 Purposes of Processing Personal Data
UITSEC International processes personal data for the following purposes:
PURPOSE OF DATA PROCESSING    EMPLOYEE    EMPLOYEE
 
CANDIDATE    CUSTOMER    CUSTOMER CANDIDATE    CUSTOMER'S
 
RELEVANT PERSON    POTENTIAL EMPLOYEE     
 
REFERENCE    TRAINEE     
 
PARENT /TRUSTEE
/REPRESENTATIVE    VISITOR
Execution of Emergency Management Processes                                            X     
Execution of Employee Candidate / Intern / Student Selection and Placement Processes         X                   X    X    X          
Execution of Application Processes of Employee Candidates    X                                             
Fulfillment of Employment and Legislation Obligations for Employees    X                                             
Conducting Training Activities    X         X    X                              
Execution of Access Authorizations    X                                             
Providing Physical Space Security    X    X                             X         X
Execution of Communication Activities         X    X    X                              
Planning of Human Resources Processes    X                                             
Execution / Supervision of Business Activities              X                                   
Execution of Goods / Services Procurement Processes    X                                             
Execution of Goods / Services After-Sales Support Services              X                                   
Execution of Goods / Services Sales Processes              X    X                              
Execution of Activities for Customer Satisfaction              X    X                              
Execution of Noc Services              X                                   
Execution of Penetration Processes                        X                         
Execution of Performance Evaluation Processes    ü                        X                    
Potential Employee Detection Process                             X                    
Execution of Advertising / Campaign / Promotion Processes              X    X                              
Execution of SOC Services              X                                   
Execution of Contract Processes    X         X                                   
Follow-up of Requests / Complaints              X    X                              
Execution of Wage Policy    ü                                             
 
5.3 Personal Data Collection Methods and Legal Reasons
•    Data Collection Methods
UITSEC International's methods of obtaining personal data are as follows:
PERSONAL DATA    EMPLOYEE    EMPLOYEE CANDIDATES    CUSTOMER    CUSTOMER CANDIDATE    CUSTOMER'S RELEVANT PERSON    POTENTIAL EMPLOYEE     
 
REFERENCE    TRAINEE    PARENT /TRUSTEE/REPRESENTATIVE    VISITOR
Biometric Data    Application                   Application
 Ethical Hacking Method                         
Criminal Conviction and Security Measures    By hand
 In writing    In writing
 Mail              Application
 Ethical Hacking Method              In writing
 Mail          
Sexual Life                        Application
 Ethical Hacking Method                         
Association Membership                        Application
 Ethical Hacking Method                         
Philosophical Belief, Religion, Sect and Other Beliefs                        Application
 Ethical Hacking Method                         
Finance    Mail 
 Phone                   Application
 Ethical Hacking Method                         
Physical Space Security    Application    Application              Application
 Ethical Hacking Method              Application         Application
Genetic Data                        Application
 Ethical Hacking Method                         
Audiovisual Recordings    By hand
 In writing                   Application
 Ethical Hacking Method                         
Legal action                        Application
 Ethical Hacking Method                         
Communication    By hand 
 In writing or oral    In writing
 Mail    Oral 
 Mail 
 Business Cart 
 Media By hand Application (Wep Portal)    By hand 
 Oral Application (Wep Portal)    Application
 Ethical Hacking Method    Portal
 
Mail    In writing
 Mail    In writing
 Mail    In writing 
 Mail 
 In writing 
 Mail In Writing Mail     
Race and Ethnicity         In writing
 Mail              Application
 Ethical Hacking Method              In writing
 Mail          
Transaction Security              Application         Application
 Ethical Hacking Method                         
Dress                        Application
 Ethical Hacking Method                         
Identity    By hand 
 In writing 
 Mail Phone    In writing
 Mail    Oral 
 Mail 
 Business Card in writing
 Hard Disk Application (Wep Portal)    By hand
 Oral Application (Wep Portal)    Application
 Ethical Hacking Method    Portal
Mail    In writing
 Mail    In writing
 Mail In writing
 Mail          
Location                        Application
 Ethical Hacking Method                         
Professional experience    By hand
 In writing    In writing
 Mail
 Portal              Application
 Ethical Hacking Method    Portal
 
Mail         In writing
 Mail          
Customer Transaction                             Portal
Mail                    
 
 
 
Personnel Information
      
 
 
By hand
 In writing
Mail     
 
 
In writing
 Mail
 Portal     
 
 
Mail
 Excel
 Hard Disk
 Server Application (Wep Portal)     
 
 
Application (Wep Portal)     
 
 
Application
 Ethical Hacking Method     
 
Portal
Mail          
 
 
In writing
 Mail          
Marketing                        Application
 Ethical Hacking Method                         
Risk Management                        Application
 Ethical Hacking Method                         
Health Information    By hand
 In writing    In writing
 Mail              Application
 Ethical Hacking Method              In writing
 Mail          
Union Membership                        Application
 Ethical Hacking Method                         
Political Opinion Information                        Application
 Ethical Hacking Method                         
Foundation Membership                        Application
 Ethical Hacking Method                         
 
•    Legal Reasons for Data Processing
The legal bases for processing personal data of UITSEC International are as follows:
 
PURPOSE OF DATA PROCESSING    EMPLOYEE    EMPLOYEE
 
CANDIDATE    CUSTOMER    CUSTOMER CANDIDATE    CUSTOMER'S
 
RELEVANT PERSON    POTENTIAL EMPLOYEE     
 
REFERENCE     
 
TRAINEE     
 
PARENT /TRUSTEE
/REPRESENTATIVE    VISITOR
Execution of Emergency Management Processes                                            Legitimate Interest     
Execution of Employee Candidate / Intern / Student Selection and Placement Processes         Explicit Consent                   Explicit Consent    Explicit Consent    Law
 
Legitimate Interest          
Execution of Application Processes of Employee Candidates    Law                                             
Fulfillment of Employment and Legislation Obligations for Employees    Law                                             
Conducting Training Activities    Legitimate Interest         Explicit Consent    Explicit Consent                              
Execution of Access Authorizations    Legitimate Interest                                             
Providing Physical Space Security    Legitimate Interest    Legitimate Interest                             Legitimate Interest         Legitimate Interest
Execution of Communication Activities         Explicit Consent    Agreement
 
Explicit Consent    Explicit Consent                              
Planning of Human Resources Processes    Law                                             
Execution / Supervision of Business Activities              Agreement                                   
Execution of Goods / Services Procurement Processes    Law                                             
Execution of Goods / Services After-Sales Support Services              Agreement                                   
Execution of Goods / Services Sales Processes              Law
 
Agreement
Explicit Consent    Explicit Consent                              
Execution of Activities for Customer Satisfaction               
 
Explicit Consent     
 
Explicit Consent                              
Execution of Noc Services              Agreement                                   
Execution of Penetration Processes                        Agreement                         
Execution of Performance Evaluation Processes    Legitimate Interest                        Explicit Consent                    
Potential Employee Detection Process                             Explicit Consent                    
Execution of SOC Services              Agreement                                   
Execution of Contract Processes    Legitimate Interest         Agreement                                   
Execution of Advertising / Campaign / Promotion Processes (34)              Explicit Consent    Explicit Consent                              
Follow-up of Requests / Complaints (41)              Explicit Consent    Explicit Consent                              
Execution of Wage Policy    Law
 
Agreement                                             
 
 
5.4 Ensuring the Security of Personal Data
•    Administrative and Technical Measures
Administrative and technical measures taken to ensure the security of personal data are detailed in the “Personal Data Storage and Destruction Policy”.
5.5 Principles for the Processing of Personal Data
Principles for the processing of personal data are determined in paragraph 2 of Article 4 of the Law. UITSEC International processes personal data in accordance with the determined principles.
The processing of personal data is carried out in accordance with the following principles;
1.    Compliance with the law and the rules of honesty,
2.    Being accurate and up-to-date when necessary,
3.    Processing for specific, explicit and legitimate purposes,
4.    Being connected, limited and restrained with the purpose for which they are processed,
5.    To be kept for the period required by the relevant legislation or for the purpose for which they are processed.
5.6 Conditions for Processing Personal Data
UITSEC International processes personal data due to legal obligations and to provide services to our customers. Processing of data in accordance with Article 5/2 of the Law, the full text of which you can access from www.mevzuat.gov.tr:
1.    Expressly stipulated in the law.
2.    The fact that the person who is unable to disclose his/her consent due to actual impossibility or whose consent is not legally valid is mandatory for the protection of his/her life or body integrity or someone else's life.
3.    The processing of personal data belonging to the parties to the contract is necessary, provided that it is directly related to the establishment or performance of the contract.
4.    It is mandatory for the data controller to fulfill his/her legal obligation.
5.    It is made public by the relevant person.
6.    Data processing is mandatory for the establishment, exercise or protection of a right.
7.    Data processing is mandatory for the legitimate interests of the data controller, provided that it does not harm the fundamental rights and freedoms of the relevant person.
Except for the above-mentioned cases, UITSEC International processes personal data only by obtaining the explicit consent of the data owners.
5.7 Destruction of Personal Data
The destruction of personal data obtained by UITSEC International is detailed in the "Policy on Storage and Destruction of Personal Data".
5.8 Transfer of Personal Data to Domestic Persons
UITSEC International strictly complies with the requirements of the Law regarding the sharing of personal data with third parties, without prejudice to the provisions of other laws. In this context, personal data are not transferred to third parties without the explicit consent of the data owner. However, in the presence of one of the following conditions specified in the Law, personal data may be transferred without the explicit consent of the data owner:
•    Expressly stipulated in the law,
•    The fact that the person who is unable to disclose his/her consent due to actual impossibility or whose consent is not legally valid is mandatory for the protection of his/her life or body integrity or someone else's life,
•    The processing of personal data belonging to the parties to the contract is necessary, provided that it is directly related to the establishment or performance of the contract,
•    It is mandatory for the data controller to fulfill his/her legal obligation,
•    It is made public by the relevant person,
•    Data processing is mandatory for the establishment, exercise or protection of a right,
•    Data processing is mandatory for the legitimate interests of the data controller, provided that it does not harm the fundamental rights and freedoms of the data owner.
Provided that adequate precautions are taken; it is stipulated in terms of personal data of special nature other than health and sexual life, in terms of personal data of special nature related to health and sexual life, 
•    Protection of public health,
•    Preventive medicine,
•    Medical diagnosis,
•    Execution of treatment and care services,
•    Your personal data may be transferred without obtaining explicit consent for purposes such as planning and management of health services and financing.
In the transfer of sensitive personal data, the conditions specified in the processing conditions of this data are complied with.
5.9 Transfer of Personal Data to Persons Abroad
UITSEC International does not transfer any data abroad.
5.10 Personal Data of Visitors
5.10.1 Camera Recording
It is monitored by UITSEC International with an in-office security camera in order to ensure security.
In this context, our Institution acts in accordance with the Constitution, Law and other relevant legislation.
Image recordings of our visitors are taken through the camera monitoring system at the office entrances and inside of all people visiting the office of our institution.
Our institution aims to ensure the security of the institution, employees, customers and visitors within the scope of security camera monitoring activity.
Our institution acts in accordance with the regulations in the Law in carrying out camera monitoring activities for security purposes.
Only a limited number of corporate employees have access to records recorded and stored digitally. Live camera images can only be monitored by the authorized personnel of the institution if necessary. A limited number of people who have access to the records declare that they will protect the confidentiality of the data they access with a confidentiality commitment.
In accordance with Article 12 of the Law, our institution takes the necessary technical and administrative measures to ensure the security of the personal data obtained as a result of the camera monitoring activity.
5.10.2 Personal Data of Website Visitors and Personal Data Received for Internet Access Point Service
Our institution provides internet service to all its employees. Identity information and internet log records of the log records of the service provided are obtained and stored in accordance with the Law No. 5651 (Regarding the Regulation of Publications on the Internet and the Fight Against Crimes Committed Through These Publications). The processed personal data are kept for 2 years in accordance with the Law No. 5651.
5.11 Rights of Personal Data Owner
Your data subject rights arising from the Law are listed in Article 11 of the relevant Law and  are as follows:
ARTICLE 11- (1) Everyone has the following rights regarding himself/herself by applying to the data controller:
•    To learn whether your personal data is processed or not,
•    If your personal data has been processed, requesting information about it,
•    To learn the purpose of processing your personal data and whether they are used in accordance with the purpose,
•    To know the third parties to whom your personal data is transferred, in the country or abroad,
•    To request the correction of your personal data if it is incomplete or incorrectly processed,
•    To request the deletion or destruction of your personal data,
•    To request the notification of these transactions to third parties to whom your personal data has been transferred, in case of correction, deletion or destruction of your personal data,
•    To object to the emergence of a result against you by analyzing your processed data exclusively through automated systems,
•    If you suffer damage due to the unlawful processing of your personal data, you have the right to demand compensation for the damage.
 
You can access the application form at “http://uitsec-international.com/tr/hakkimizda/kisisel-veri-sahibi-basvuru-formu” or you can request it during your visit to our UITSEC International office.
In order for the applications made with the UITSEC International's KVKK Related Person Application Form to be accepted, the Personal Data Owner must pay attention to the following issues;
In the application, which includes the notification you have as the personal data owner and your explanations regarding the right you request to use in order to exercise your above-mentioned rights; you need to be clear and understandable about the subject you request, the subject you request must be related to you or if you are acting on behalf of someone else, you need to be specifically authorized in this regard and you need to certify your authority. In order to follow up your legal right for thirty days without any problems, your applications sent by courier must be notarized and sent by registered mail with return receipt. If you apply through a notary public, your thirty-day legal right will start following the notification of your application to our institution. Applications within this scope will be accepted following the identity verification to be made by us and the relevant persons will be answered in writing or electronically within the legal periods. Relevant persons will be replied in writing or electronically within legal time limits.
 
You can do your rights mentioned in the above articles by filling out the "Personal Data Owner Application Form" with the following methods:
Method    Address    Detail
Application made by hand to address    Esentepe Mahallesi Büyükdere Cad. Levent 199 No:199/6 Şişli    It is the application to be made by the relevant person to the above-mentioned address of the Data Controller, who will fill in the "Personal Data Owner Application Form" and request the processing of your Personal Data. You must present your identity card at the time of application.
Application via notary public    Esentepe Mahallesi Büyükdere Cad. Levent 199 No:199/6 Şişli    It is the application made by the relevant person by sending the "Personal Data Owner Application Form" approved by the notary public to the address specified with return/receipt or by sending to the address specified by the notary public. Applications within this scope will be accepted following the identity verification to be made by us and the relevant persons will be answered in writing or electronically within the legal periods.
Application with KEP (Registered Electronic Mail)    [email protected]    It is the application to be made by the relevant person by filling out and signing the "Personal Data Owner Application Form" and sending it to the Kep address of the Data Controller you want to apply for.