1. How to process and use the information we obtain regarding you and the services you request during your visit to this website and using the services we offer through this site is subject to the terms specified in this "Confidentiality Agreement." By visiting this website and requesting to benefit from the services we offer through this site, you become a party to this agreement and accept the terms specified. This contract will be binding on the parties as long as it is in effect. By examining this contract to which you are a party, you should be informed about its terms and conditions.
Sharing your personal data is on a voluntary basis. If you do not provide the personal data we need, it will not be possible for us to provide you with the product you have requested or the service you need.
1.Types of Information We Collect and How It Is Collected:
Pinoo iot Mobil App - Atölye Vizyon only collects information provided by you. This information is basic information including your name, surname, address and e-mail address. Your personal information is collected in order to be able to get back to you quickly and inform you about new products and campaigns when you subscribe to any of our sites or connect to our applications.
1.Sharing Personal Information
Your personal information obtained can be shared with Pinoo iot Mobil App - Atölye Vizyon and its group companies in order to provide the product you have requested or the service you need in accordance with the confidentiality agreement.
1.Pinoo iot Mobil App - Atölye Vizyon group companies
Pinoo iot Mobil App - Atölye Vizyon affiliates, subsidiaries, businesses and cooperating third parties.
As long as you give us your permission, Pinoo iot Mobil App - Atölye Vizyon or new products from the institutions we work with, purchase offers, discount coupons, special news that we think may be of interest to you, developments that tell us and we are happy to share with you, and other promotions will be sent to you by e-mail.
Your consent must be obtained in order to perform all these transactions. With this contract, you have the right to withdraw your consent at any time. You can get your consent back by sending your e-mail to our relevant e-mail address and expressing that you have withdrawn your consent.
If you change your decision to consent to the processing and use of your personal data by our company, you can also cancel your membership.
Pinoo iot Mobile App - Atölye Vizyon has the right to use or disclose your personal information in order to protect the integrity of www.pinoo.io, to meet your requests in the most accurate way and to provide correct information in researches to protect public safety in cases where legal action is required and required by law. has. However, your information will not be shared with any third party, except for the cases specified in this contract.
Accuracy of Your Personal Information
As a user, you undertake that the information you provide is correct and valid, and that you will notify us of any changes in this information. As a user, you will be liable in the event of any damage or loss of rights due to the inaccuracy and validity of the information provided. In such cases, it will not be possible for you to make a request to our company.
You have the right to control and change all the information you have provided to Pinoo iot Mobil App - Atölye Vizyon. If you want to change the information in our database or if there is a change you want to make about your contact details, you can contact us via the addresses on the contact page of the page.
When you want to stop the deletion of personal information we have obtained from you or to stop the use of your information, you can contact us and indicate your request, and you can cancel without any problems. It will be sufficient to fill out the request form to perform this action.
Likewise, filling the request form to stop and delete the information we have obtained from your children under your supervision will speed up the cancellation process. Data protection upon request p
You can get information about our policy and procedures.
Other Web Sites
Our website may contain links to pages not managed by Pinoo iot Mobile App - Atölye Vizyon. When you visit any of these sites, you should take into account the privacy policies of the site you are directed to. Pinoo iot Mobile App - Atölye Vizyon is not responsible for the standards and company policies of other sites.
Rights of Persons whose Personal Data is Processed
Within the scope of this contract, whether the personal data of the persons whose personal data is processed are processed, if the data has been processed, the related information, the purpose of the data processing and whether they are used for their purpose, whether the data is transferred at home or abroad
who are the third parties, the correction / deletion of the data in case of incomplete or incorrect data, the right to object to the emergence of a result against the person by analyzing the processed data exclusively through automated systems and to demand the compensation of the damage in the event that the data is damaged due to the processing in violation of the relevant legislation. are available.
2. DELETION AND DESTRUCTION OF PERSONAL DATA
The deletion and destruction of personal data can be carried out in accordance with the principles specified in the personal data storage and destruction policy, using the methods explained below.
2.1. Deletion of Personal Data Deletion of personal data is the process of making personal data inaccessible and unavailable for the relevant users in any way. The data controller is obliged to take all necessary technical and administrative measures to make the deleted personal data inaccessible and unavailable for the relevant users.
2.1.1. Personal Data Deletion Process The process to be followed in the process of deleting personal data is as follows:
● Determination of personal data that will constitute the subject of deletion.
● Identifying relevant users for each personal data using an access authorization and control matrix or a similar system.
● Determining the authorizations and methods of the relevant users such as access, retrieval and reuse.
● Closing and eliminating the access, retrieval and reuse authorizations and methods of the relevant users within the scope of personal data.
2.1.2. Methods of Deleting Personal Data
Since personal data can be stored in various recording media, they must be deleted by methods appropriate to the recording media. Examples of this are listed below:
a) Application Type Cloud Solutions as a Service (such as Ofice 365, Salesforce, Dropbox) In the cloud system, the data should be deleted by giving a delete command. It should be noted that the relevant user is not authorized to retrieve deleted data on the cloud system while performing the said transaction.
b) Personal Data on Paper Media Personal data on paper media should be deleted using the blackout method. The blackout process is done by cutting the personal data on the relevant documents whenever possible, and making them invisible to the relevant users by using fixed ink, which is irreversible and cannot be read with technological solutions, in cases where it is not possible.
For example, when a copy of the petition submitted to our Institution by a person who applied to the data controller for the deletion of his personal data but could not obtain a result; In order to protect the personal data in the aforementioned petition, a kind of blackout process was applied by drawing / painting / deleting these personal data in an illegible way.
c) Office Files Located on the Central Server The file must be deleted with the delete command in the operating system or the access rights of the relevant user on the directory where the file or file is located must be removed. It should be noted that the relevant user is not the system administrator at the same time while performing the aforementioned operation.
ç) Personal Data on Removable Media Personal data on flash-based storage media should be stored encrypted and deleted using software suitable for these media.
d) Databases Relevant lines containing personal data should be deleted with database commands (DELETE etc.). It should be noted that the relevant user is not the database administrator at the same time while performing the aforementioned transaction.
2.2 Destruction of Personal Data
The destruction of personal data is the process of making personal data inaccessible, retrieved and reusable in any way. The data controller is obliged to take all necessary technical and administrative measures regarding the destruction of personal data.
2.2.1. Methods of Destroying Personal Data In order to destroy personal data, it is necessary to detect all copies of the data and to destroy them one by one using one or more of the following methods, depending on the type of systems in which the data is located:
a) Local Systems One or more of the following methods can be used to destroy data on the systems in question.
i) De-magnetization: It is the process of unreadable distortion of the data on the magnetic media by passing it through a special device and exposing it to a very high magnetic field.
ii) Physical Destruction: It is the physical destruction of optical media and magnetic media such as melting, burning or pulverizing. It is ensured that the data is inaccessible by processes such as melting, burning, pulverizing or passing the optical or magnetic media through a metal grinder. For solid state disks, if overwriting or de-magnetizing is not successful, this media must also be physically destroyed.
iii) Overwriting: It is the process of preventing the recovery of old data by writing random data consisting of 0 and 1 at least seven times on magnetic media and rewritable optical media. This process is done using special software.
b) Environmental Systems Destruction methods that can be used depending on the type of environment are as follows:
i) Network devices (switch, router, etc.): The storage environments inside the devices in question are fixed. Products often have a delete command but no destruction feature. It must be destroyed by using one or more of the appropriate methods specified in (a).
ii) Flash-based media: Flash-based hard disks with ATA (SATA, PATA etc.), SCSI (SCSI Express, etc.) interface, using the command if supported, using the manufacturer's recommended destruction method if not supported, or It must be destroyed by using one or more of the methods.
iii) Magnetic tape: Media that store data with the help of micro magnet pieces on the flexible tape. It must be destroyed by exposing and de-magnetizing to very strong magnetic media or by physical destruction methods such as burning or melting.
iv) Units such as magnetic discs: Media that store data with the help of micro magnet parts on flexible (plate) or fixed media. It must be destroyed by exposing and de-magnetizing to very strong magnetic media or by physical destruction methods such as burning or melting.
v) Mobile phones (Sim card and fixed memory areas): Portable smartphones have a delete command in fixed memory areas, but most of them do not have a destroy command. It must be destroyed by using one or more of the appropriate methods specified in (a).
vi) Optical discs: These are data storage media such as CDs and DVDs. It must be destroyed by physical destruction methods such as incineration, fragmentation, and melting. vii) Peripherals such as printers with removable data recording media, fingerprint door access system: All data recording media must be verified to be removed and destroyed by using one or more of the appropriate methods specified in (a) according to their characteristics. viii) Peripherals such as a printer with a fixed data recording medium, fingerprint door access system: Most of the systems in question have a delete command, but there is no destroying command. It must be destroyed by using one or more of the appropriate methods specified in (a).
c) Paper and Microfiche Media The main medium must be destroyed since the personal data in the media in question are permanently and physically written on the media. While performing this process, it is necessary to divide the media into small pieces that are incomprehensible with paper shredding or shearing machines, horizontally and vertically if possible, so that they cannot be put back together. Personal data transferred from the original paper format to the electronic environment by scanning should be destroyed by using one or more of the appropriate methods specified in (a), depending on the electronic environment in which they are located.
d) Cloud Environment During the storage and use of personal data in the aforementioned systems, it is required to be encrypted with cryptographic methods and, where possible, for personal data, especially for each cloud solution that is served, separate encryption keys should be used. When the cloud computing service relationship ends; All copies of encryption keys required to make personal data usable must be destroyed. In addition to the above environments, the processes for the destruction of personal data in devices that are malfunctioning or sent for maintenance are carried out as follows:
i) Destruction of the personal data contained in the relevant devices by using one or more of the appropriate methods specified in (a) before they are transferred to third institutions such as manufacturers, vendors, services for maintenance and repair,
ii) In cases where destruction is not possible or appropriate, the data storage medium is disassembled and stored, other defective parts are sent to third institutions such as manufacturer, seller, service,
iii) Necessary measures should be taken to prevent personnel coming from outside for maintenance and repair purposes from copying personal data and removing them outside the institution.
You can contact us using the contact information below for your questions regarding the confidentiality agreement.
ATÖLYE VİZYON BİLİŞİM VE DANIŞMANLIK TİC. A.S.
Headquarters: Atatürk Mah Girne Cad No: 11/1 Ataşehir İstanbul
Tel: 0 216 251 16 64 - 0 551 166 04 44
E-Mail Address: Kurumsal@atolyevizyon.com