Data Security and Confidential Archive Management

The digitization of information, processes, and workflows, as well as the transformation of infrastructure to digital forms, brings significant security risks and precautionary measures in customs operations and brokerage services. In this context, our institution holds the ISO/IEC 27001:2022 Information Security Management System, and the related standard's scope, risk assessment, and risk management methodologies are applied accordingly. To reduce, mitigate, and manage security risks, particularly for safeguarding the confidentiality, integrity, or availability of critical data that could threaten the security of processes and operations, we implement a series of methodologies:

1. Data Encryption and Protection

Data used in transactions is encrypted and stored securely to prevent unauthorized access. Records and data that are to be disposed of, as required by Information Security Management System procedures, are destroyed accordingly.

2. Access Control and Authentication

The access rights for employees or guest users involved in our services are defined, and strong authentication systems are employed.

3. System Updates and Maintenance

Regular system updates and maintenance are conducted to ensure digital infrastructures remain secure and up-to-date.

4. Intrusion Detection and Prevention Systems

Effective security systems, including firewalls, are established to detect and prevent cyberattacks on operations. The system undergoes periodic voluntary security testing and other audits throughout the year.

5. Training and Awareness

Personnel involved receive regular training on information security topics.

6. Emergency Response Plans

Emergency response plans and protocols are in place to enable rapid and effective action in the event of security breaches.

 

In this context, the information and data of our business partners are stored using specialized archival methods, organized by the requested content and order, and shared exclusively as per their specific requests. These data are securely stored in a hybrid manner, on both local and cloud platforms, providing flexibility, scalability, and unique accessibility to the processes. To enhance the confidentiality and security of the data, strong encryption algorithms like AES and other data masking techniques are used; backups and archives running on virtual machines are utilized to prevent data loss and facilitate recovery.