Menu

Documentation

Device and Office Security Procedure

All electronic devices inside the offices must be inventory-approved and defined devices by the Board. This procedure outlines security protocols for office devices and premises...

Office SecurityDevice SecuritySecurity ProceduresPhysical Security

Emergency Plan and Policy

The purpose of this policy and associated plans is to determine the conditions, methods, and procedures for EticSoft to fulfill its obligations in unexpected and extraordinary situations...

Emergency PlanDisaster RecoveryBusiness ContinuityCrisis Management

EticSoft Business Continuity Policy

To ensure the continuity of all processes and functions in which EticSoft operates together with its employees, business partners, and customers...

Business ContinuityRisk ManagementDisaster RecoveryBusiness Operations

EticSoft General Information Security Procedures

A binding reference implementation guide for everyone who can access the company's software, hardware, and information assets, primarily including all EticSoft employees, business partners, consultants, and managers...

Information SecuritySecurity ProceduresData ProtectionSecurity Guidelines

EticSoft Information Security Definitions

Comprehensive definitions and classifications for information security terms, roles, responsibilities and asset classifications used within EticSoft...

Security DefinitionsInformation AssetsSecurity BoardAsset Classification

EticSoft Information Security Policy

Information security policy aims to establish principles for identifying threats to EticSoft's information assets, preventive measures and implementation processes, and business continuity throughout this process...

Information SecurityPolicySecurity ManagementAssets Protection

External Systems Access General Procedure

In cases where installation, inspection, maintenance, upgrade, detection, etc. operations need to be performed on a system not hosted by EticSoft, access can be granted upon request from customers and business partners under specified conditions...

External AccessSystem SecurityAccess ControlSecurity Procedures

Human Resources Policy

Comprehensive policies and procedures covering recruitment, training, employee development, productivity, continuity, motivation, hierarchy, and compensation aspects of human resources management...

Human ResourcesHR PolicyEmploymentTrainingCompensation

Management Policies

EticSoft uses written policy and procedure documents that it references while carrying out all process operations and fulfilling its responsibilities...

Management PolicyCorporate GovernanceDocumentationTransparency

Sanal POS PRO! Partnership Procedure

To standardize collaboration processes with VirtualPOS PRO! stakeholders to ensure fair competition, transparency and continuity, and to develop our collaboration processes with stakeholders in a healthy and sustainable way...

VirtualPOSPartnershipIntegrationFinancial ServicesPayment Systems

External Services

External services are used to provide payment services to our customers. We use the following external services to provide payment services to our customers...

External ServicesPayment ServicesPayment GatewaysPayment Processors

Data Privacy Policy

Data privacy policy is a policy that outlines how we collect, use, and protect data from our customers. We use the following data privacy policy to protect our customers' data...

Data Privacy PolicyData ProtectionData SecurityData Privacy

SPP Terms of Service

SPP terms of service is a policy that outlines how we collect, use, and protect data from our customers. We use the following SPP terms of service to protect our customers' data...

SPP Terms of ServiceData ProtectionData SecurityData Privacy