{"id":33340,"date":"2025-08-08T10:50:37","date_gmt":"2025-08-08T07:50:37","guid":{"rendered":"https:\/\/www.khas.edu.tr\/?page_id=33340"},"modified":"2025-12-03T15:29:45","modified_gmt":"2025-12-03T12:29:45","slug":"it-information-security","status":"publish","type":"page","link":"https:\/\/www.khas.edu.tr\/en\/it-information-security\/","title":{"rendered":"IT-Information Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"33340\" class=\"elementor elementor-33340 elementor-26271\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cf6a908 e-flex e-con-boxed e-con e-parent\" data-id=\"cf6a908\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1e0db13 elementor-widget elementor-widget-html\" data-id=\"1e0db13\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<link rel=\"stylesheet\" href=\"https:\/\/cdn.jsdelivr.net\/npm\/bootstrap-icons@1.11.3\/font\/bootstrap-icons.css\">\r\n\r\n<style>\r\n  :root{\r\n    --accent:#0A3D91; --accent-2:#1F5FBF;\r\n    --text:#0b1324; --muted:#6c757d;\r\n    --bg:#fff; --line:#e8eef6;\r\n  }\r\n  .unit-wrap{ padding:0; margin:0; }\r\n  .section-title{\r\n    font-size:1.5rem; font-weight:700; color:var(--accent);\r\n    margin:40px 0 14px; position:relative; padding-left:12px;\r\n  }\r\n  .section-title::before{\r\n    content:\"\"; position:absolute; left:0; top:50%; transform:translateY(-50%);\r\n    width:5px; height:20px; background:var(--accent-2); border-radius:2px;\r\n  }\r\n  .section-desc-box{\r\n    max-width:1000px; margin:0 auto 20px; padding:20px 22px;\r\n    background:#fff; border:1px solid var(--line); border-radius:14px;\r\n    display:flex; gap:16px; align-items:flex-start;\r\n    color:var(--text); line-height:1.6;\r\n    transition: box-shadow .2s ease, transform .2s ease;\r\n  }\r\n  .section-desc-box:hover{ box-shadow:0 8px 24px rgba(10,61,145,.08); transform: translateY(-2px); }\r\n  .section-desc-box .icon{\r\n    width:48px; height:48px; border-radius:12px;\r\n    background:var(--accent); color:#fff;\r\n    display:flex; align-items:center; justify-content:center;\r\n    font-size:1.35rem; flex-shrink:0; margin-top:2px;\r\n  }\r\n  .section-desc-box p{ margin:0; text-align:justify; }\r\n  @media (max-width:576px){\r\n    .section-title{ margin:28px 0 12px; }\r\n    .section-desc-box{ padding:16px 16px; gap:12px; }\r\n    .section-desc-box .icon{ width:44px; height:44px; font-size:1.2rem; }\r\n  }\r\n<\/style>\r\n\r\n<div class=\"unit-wrap\">\r\n\r\n  <h2 class=\"section-title\">KVKK (PDPL) &amp; Privacy Policy<\/h2>\r\n  <div class=\"section-desc-box\">\r\n    <div class=\"icon\"><i class=\"bi bi-file-lock2\"><\/i><\/div>\r\n    <p>\r\n      The protection of personal data is a priority for our university. During the KVKK (Personal Data Protection Law) compliance process, the security of all users' data is ensured, privacy policies are regularly updated, and employee awareness is increased.\r\n    <\/p>\r\n  <\/div>\r\n\r\n  <h2 class=\"section-title\">Password and Account Security<\/h2>\r\n  <div class=\"section-desc-box\">\r\n    <div class=\"icon\"><i class=\"bi bi-key\"><\/i><\/div>\r\n    <p>\r\n      The strong password guide includes rules for minimum length and the use of special characters. Password renewal and reset guidelines are shared. An additional layer of security is provided for accounts via multi-factor authentication (MFA).\r\n    <\/p>\r\n  <\/div>\r\n\r\n  <h2 class=\"section-title\">Email Security &amp; Phishing<\/h2>\r\n  <div class=\"section-desc-box\">\r\n    <div class=\"icon\"><i class=\"bi bi-envelope-exclamation\"><\/i><\/div>\r\n    <p>\r\n      Information is provided on how to recognize phishing emails, examples of suspicious emails, and measures to be taken in such situations. Users are advised to be cautious before clicking on unknown links.\r\n    <\/p>\r\n  <\/div>\r\n\r\n  <h2 class=\"section-title\">Device and Network Security<\/h2>\r\n  <div class=\"section-desc-box\">\r\n    <div class=\"icon\"><i class=\"bi bi-laptop\"><\/i><\/div>\r\n    <p>\r\n      Guidance is offered on the secure use of personal computers and mobile devices, up-to-date operating system and software updates, antivirus solutions, and VPN usage.\r\n    <\/p>\r\n  <\/div>\r\n\r\n  <h2 class=\"section-title\">File Sharing and Cloud Services<\/h2>\r\n  <div class=\"section-desc-box\">\r\n    <div class=\"icon\"><i class=\"bi bi-cloud-arrow-up\"><\/i><\/div>\r\n    <p>\r\n      Security rules to be observed during internal and external file sharing are explained. Recommendations are provided for the secure use of cloud services.\r\n    <\/p>\r\n  <\/div>\r\n\r\n  <h2 class=\"section-title\">Incident Reporting<\/h2>\r\n  <div class=\"section-desc-box\">\r\n    <div class=\"icon\"><i class=\"bi bi-exclamation-triangle\"><\/i><\/div>\r\n    <p>\r\n      In case of a security breach or a suspicious situation, a notification form or relevant contact links are shared for users to fill out. This ensures incidents are quickly detected and resolved.\r\n    <\/p>\r\n  <\/div>\r\n\r\n<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>KVKK (PDPL) &amp; Privacy Policy The protection of personal data is a priority for our university. During the KVKK (Personal Data Protection Law) compliance process, the security of all users&#8217; data is ensured, privacy policies are regularly updated, and employee awareness is increased. Password and Account Security The strong password guide includes rules for minimum [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"slim_seo":{"title":"IT-Information Security - Kadir Has University","description":"KVKK (PDPL) &amp; Privacy Policy The protection of personal data is a priority for our university. During the KVKK (Personal Data Protection Law) compliance pro"},"footnotes":""},"birimler":[188],"class_list":["post-33340","page","type-page","status-publish","hentry","birimler-it"],"_links":{"self":[{"href":"https:\/\/www.khas.edu.tr\/en\/wp-json\/wp\/v2\/pages\/33340","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.khas.edu.tr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.khas.edu.tr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.khas.edu.tr\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.khas.edu.tr\/en\/wp-json\/wp\/v2\/comments?post=33340"}],"version-history":[{"count":4,"href":"https:\/\/www.khas.edu.tr\/en\/wp-json\/wp\/v2\/pages\/33340\/revisions"}],"predecessor-version":[{"id":33349,"href":"https:\/\/www.khas.edu.tr\/en\/wp-json\/wp\/v2\/pages\/33340\/revisions\/33349"}],"wp:attachment":[{"href":"https:\/\/www.khas.edu.tr\/en\/wp-json\/wp\/v2\/media?parent=33340"}],"wp:term":[{"taxonomy":"birimler","embeddable":true,"href":"https:\/\/www.khas.edu.tr\/en\/wp-json\/wp\/v2\/birimler?post=33340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}