Are anti-viruses covered by KVKK (5651 Logging)? KVKK(5651 Logging) will there be a problem with compatibility?

If you want, let's come together, what is KVKK (5651 Logging), what are the Let's see what our needs are created in detail;

The development and widespread use of information technologies by making it easier to process, as well as a number of hazards. It also offers important opportunities in terms of taking precautions. Not many many institutions and organizations process data thanks to these technologies It finds the opportunity to improve the value it produces and offer it to its customers. Thus, it develops its products and services and improves its processes. is constantly improving its quality. In this direction, information as a fact of living in a society, it is important to ensure that data is used effectively. use in a way is becoming more and more important.

No. 5651 on the Regulation of Publications on the Internet And Combating Crimes Committed Through These Publications Pursuant to the Law, users are entitled to receive some responsibilities for units providing internet services He's bringing it.

These units mentioned in the law are as follows:

  • ○ Access Provider: Provides access to the internet to its users any natural or legal person who offers access.
  • ○ Internet Bulk Usage Provider: Users those that provide an environment for internet use at a certain place and time.
  • ○ Hosting Provider: The content offered to users and provides or operates systems that host services natural or legal persons.
  • ○ Content provider: Provides content to users over the Internet real or legal persons or entities that produce and provide all kinds of information Persons.

Internet bulk usage providers as per the relevant law, accessing content that may constitute a crime in terms of its subject matter to take precautions against those who want to and to keep internal IP distribution logs to record electronically in their systems.

Logging; control that records the behavior of a system system. According to Law No. 5651, logging, internet access businesses/institutions that use the service offered by the businesses/institutions that provide is a system that can record people's movements. This is the case With the Law No. 5651, it has been made mandatory.

Call Now:

+90 539 583 3874- +90 212 401 8101

KVKK Compliance Procedures:

  • - Log Collection,
  • - Access Logs,
  • - Data Loss Prevention,
  • - Network Security,
  • - Penetration Test,
  • - Authority Matrix,
  • - User Account Management,
  • - Encryption,
  • - Cryptographic Storage of Data,
  • - Cryptographic Key Management,
  • - Backup,
  • - Up-to-date Anti-Virus Software,
  • - Erasure, Destruction, Disposal, Anonymization,
  • - Authority Control,
  • - Firewall,
  • - Application Security,
  • - Backup,
  • - Intrusion Detection and Prevention,
  • - Two-Factor Authentication,
  • - Using Encrypted Corporate Email,

To Ensure Personal Data Security

  • - Personal Data, accidentally or maliciously by the organization to prevent it from being taken out of the country,
  • - Supervising users' internet access and to take precautions against possible attacks,
  • - Exposing user machines to a targeted attack to make sure that there are no security vulnerabilities. to ensure its protection,
  • - To ensure that vulnerability checks are performed regularly,
  • - Antivirus, antispam to protect against malware use products like,
  • - A security intelligence to ensure security monitoring product (SIEM),
  • - Because security is at the forefront, user authentication and using management products,
  • - Because security is at the forefront, user authentication and use of management products, damage to personal data for any reason to ensure that the data can be retrieved in case of backup systems are working and their returns Ensuring detailed checks that it is healthy is required.

Who/What Areas Does Law No. 5651 Cover? Internet public use providers are, by law, hotels, restaurants, such as student dormitories, public organizations, cafes and companies to connect to the internet for both customers and employees are persons or organizations that offer the opportunity. Bulk use provider organizations that provide people with access to the internet or persons shall be liable for each and every are responsible for all transactions. This responsibility includes any good or ill-intended use given as covers.

In case of situations related to KVKK (5651 Logging) if our staff want/need to work remotely how do we do it without damaging these firewalls that we've built? can they work? Once we have established these security measures I don't know how they can securely access the information here as if they were in the company. how will they be able to access it? They need us to help them access this information. firewalls, in which case we're going to bypass all Will our data be exposed? The answer to your questions such as VPN (Virtual Private Network). Let's talk together about VPN Let's be informed briefly...

Our Solution Partners