CeYber Digital adopts a management approach in line with international standards in the areas of information security, data privacy and operational continuity.
Our infrastructure and processes are periodically reviewed with accredited audit mechanisms and maintained in accordance with current regulations. This structure allows us to offer our customers a secure, scalable and sustainable technology ecosystem.
Data Controller: CeyBer Group
Address: Kazımdirik Mah. Üniversite Cad. No:120, 35110 Bornova/Izmir
Phone: 0232 215 01 06
Email: kvk@ceyber.com
Website: www.ceyber.com
We would like to emphasize that we attach utmost importance to the security and confidentiality of your personal data; in accordance with the Law No. 6698 on the Protection of Personal Data (“KVKK”) and the Communiqué on the Procedures and Principles to be Followed in Fulfilling the Obligation to Inform, as Ceyber Group, in our capacity as data controller, we would like to inform you about your personal data that we collect through our website via smart assistant (chatbot), contact form, online meeting/appointment system or other electronic channels.
1. Categories of Personal Data Processed
- Identity Information: Name-Surname, Turkish Republic Identity Number - Identity Number, Date of Birth.
- Contact Information: Email address, phone number, address.
- Education and Work Experience Information: Educational status, school/faculty/department graduated from, start/end dates, work experience (position, company, sector, job description, working style, etc.), foreign language skills and level.
- Candidate Application Specific Data: Unit/position applied for, application date, driver's license information, health information, suitability for work. - Transaction Security Data: IP address, access date/time, browser information, log records.
- Interview/Content Data: Smart assistant chats, requests specified in the form, online interview messages.
2. Purposes of Processing Personal Data
Your personal data is processed within the scope of the KVKK (Personal Data Protection Law) for the following purposes:
- Receiving, evaluating and responding to your service request.
- Receiving, evaluating, suitability analysis and conducting recruitment processes for your job application. - Providing support via smart assistant/chatbot and contact form.
- Managing online consultation/appointment processes.
- Establishing communication, providing information, appointment/response reminders.
- Ensuring system and information security, preventing malicious use.
- Fulfilling legal obligations. - Improving service quality and for analysis purposes (within the scope of legitimate interest).
- Preventing fraud and illegal activities.
3. Methods of Collection, Transfer, Storage and Destruction of Personal Data and Legal Grounds
You can access the methods of collection, transfer, storage period and destruction of your personal data and the legal grounds through the Personal Data Protection Policy on our website www.ceyberdigital.com or via the link https://www.ceyberdigital.com/en/kvkk.
4. Your Rights as a Data Subject
- Learning whether your personal data is being processed.
- You have the right to request information if your data has been processed, to learn the purpose of the processing and whether it is being used appropriately.
- You have the right to request the correction of incomplete/incorrect data.
- You have the right to request its deletion/destruction.
- You have the right to request notification of correction/deletion actions to third parties to whom the data was transferred.
- You have the right to object to unfavorable results from automated analysis systems.
- You have the right to claim compensation for your losses.
You can communicate these rights in writing to kvk@ceyber.com. Your requests will be processed free of charge within 30 days at the latest. Official documents may be required for identity verification. This information text applies when you use the smart assistant on our website, fill out forms, or communicate online. For detailed information, please visit the “Trust & Compliance” section on our website (https://www.ceyberdigital.com/en/kvkk).
We would like to inform you about the types of cookies used on our website, the purposes for which cookies are used and the settings, management and deletion of these cookies. You can visit our website without providing any personal information and meet your needs by getting information about our products and services. Some cookies are used to collect information about the use of the site during visits. Our goal here is to provide convenience to the user who visits our website and to improve the functioning of our website.
What is a Cookie?
A cookie is a small-sized text file that is saved to your computer or mobile device via your browser when you visit a site. Cookies allow a site to function more efficiently, as well as to provide you with personalized pages to provide a more convenient and faster visit experience to your personal needs. Cookies only contain information about your visit history on the internet and do not collect any information about files stored on your computer or mobile device.
Types of Cookies and Purposes of Use
According to their validity period, there are two types of cookies: Permanent Cookie and Temporary Cookie. Temporary cookies are created while you visit the website and are valid only until you close your browser. Persistent cookies, on the other hand, are created when you visit the website and remain until you delete them or they expire. Persistent cookies are used for actions such as providing a personalized experience that is compatible with your settings. The types of cookies and their purpose of use are described below.
Mandatory Cookies are essential for the proper functioning of our website. For example, mandatory cookies are used for purposes such as authentication, so that information about your current session is not lost. These cookies are used for purposes such as security and verification and are not used for any marketing purposes.
Cookies Necessary for Functionality
They are cookies that allow users who visit our website to remember their preferences. It allows, for example, to remember the visitor's language preference or text font size selection. Failure to allow the use of such cookies may cause you not to use a special feature and prevent them from remembering your preferences.
Cookies Necessary for Performance and Analysis
They are cookies that help improve our website. Such cookies collect information about visitors' use of the site, are used to control whether the site is working properly and to detect errors received.
Targeting and Advertising Cookies
These cookies are used to promote products and services on our website or in channels other than our site, to show you relevant and personalized ads with our partners with whom we cooperate, and to measure the effectiveness of advertising campaigns.
How to collect cookies?
The data is collected through your devices through which you access the browsers. This information collected is device-specific. It can be deleted by the user at any time and access to information can be turned off.
Our Privacy Policy
Your privacy is important to us, your privacy and security rights are our basic principle. In this context, you can find our clarification text on the protection of personal data here.
How Can You Control Cookies?
You can delete cookies that are already on your computer and prevent the saving/placing of cookies on your internet browser. Internet browsers are predefined to automatically accept cookies. As managing cookies varies from browser to browser, you can consult the help menu of your browser or app for detailed information. As an example, you can manage it with the option “Google Chrome -> Settings -> Advanced -> Privacy and Security -> Site Settings -> Cookies and Site Data -> Allow sites to save and read cookie data”. You can manage it from the menu “Internet Explorer -> Settings -> Internet Options -> Privacy -> Advanced settings”. Most Internet browsers allow you to:
View saved cookies and delete the ones you wish
Blocking third-party cookies
Blocking cookies from certain sites
Blocking all cookies
How to delete all cookies when you close the Internet browser
If you choose to delete cookies, your preferences on the relevant website will be deleted. In addition, many websites and digital platforms, including websites owned by Akbank, may not function properly if you choose to block cookies altogether. To control cookies on your mobile device; on Apple Devices;
You can clear your browsing history and cookies with the steps “Settings -> Safari -> Delete History and Website Data”.
To delete cookies and keep your history, you can follow the steps “Settings -> Safari -> Advanced -> Website Data -> Erase All Website Data”.
If you do not want historical data to be kept when visiting the Sites;
You can activate private roaming by following the steps “Safari -> icon -> Custom -> Done”.
You can block cookies with the steps “Settings -> Safari -> Block All Cookies”. However, when you block cookies, some websites and features may not work properly.
On Android Devices;
You can clear your cookie with the option “Chrome app -> Settings -> Privacy -> Clear browsing data -> Cookies, media licenses and site data -> Clear Data”.
You can allow or block cookies with the option “Chrome App -> Settings -> Site Settings -> Cookies”.
During our activities at Ceyber, it is our primary goal to ensure the trust of the institutions and organizations we serve, employees and suppliers, and to ensure the confidentiality, integrity and accessibility of the information assets we use for the services we provide.
For this purpose, by our Senior Management,
Maintaining the ISO 27001 Quality Management system and continuously improving its effectiveness, constantly reviewing our risks and applying controls for risks above the acceptable level, conducting awareness trainings to maintain the information security awareness of our employees, communicating information and obligations on information security of our stakeholders in internal and external matters, Interruption of our activities to ensure its continuity, to comply fully with the laws and regulations of the Republic of Turkey and to ensure the confidentiality of personal data,
We are committed to providing the necessary resources to implement, maintain its continuity and systematic management of information security studies.
CeyBer Call Center was established in Izmir in 2016 with employee and customer-oriented service approach.
Adopting the mission of “Happy Employee, Happy Customer”, we include it in all our processes.
With an expert staff of 650 people, we continue to grow every day. With our capacity of over 1000 employees, we respond to customer demands in many different areas such as e-commerce, logistics and technology. We take team spirit and cooperation at the heart of all our business processes. Thanks to this, we achieve success by hand.
As a CeyBer Call Center, we manage the customer experience through many different channels such as inbound, outbound, live support, back office. We make a difference in the industry with the exclusive services we offer. We provide employment in the call center sector with our Izmir, Istanbul and Adıyaman locations. In order to improve our service quality and improve customer experience, we adopt integrated quality management systems within the scope of occupational health and safety, business continuity, information security, environmental management, customer complaint and customer management.
1. Objective
Eliminate risks that may occur as a result of unauthorized access or improper use of information shared to them during or outside of working hours.
2. Scope
Work desks, screens, printers, printed documents, documents, records.
3. Responsible
All employees and all managers are responsible for ensuring that employees act in accordance with this policy.
4. Application
Computers should be turned off outside working hours. In case of leaving the computer during working hours, the computer must be left locked (encrypted). Documents containing personal information and confidential information (even if they are on file) should not be left on the printers.
Computer passwords should not be shared outside of computing personnel. Passwords should not be left in writing, strictly on paper. At the end of work, documents belonging to the Company, containing corporate or personal information should not be left on the work table, but should be stored in secure environments (steel case, locked drawer, etc.).
Documents that fall into the critical information class such as secret, top secret, etc. must be destroyed according to PR.KY.02 BGYS and the Procedure for Control of Records. Computer desktops and desks should not contain documents containing critical information belonging to the company.
Printed information that has expired, which is decided no longer needed, must be torn and destroyed so that it cannot be read with the approval of its official. Devices used in all types of communication (telephones, faxes, copiers) should not be left to unauthorized access. Documents, documents should not be left on the devices.