{"id":4287,"date":"2023-01-19T16:24:24","date_gmt":"2023-01-19T13:24:24","guid":{"rendered":"https:\/\/kplegal.com.tr\/?page_id=4287"},"modified":"2023-02-03T16:07:33","modified_gmt":"2023-02-03T13:07:33","slug":"storage-and-destruction-policy","status":"publish","type":"page","link":"https:\/\/kplegal.com.tr\/en\/storage-and-destruction-policy\/","title":{"rendered":"Storage and Destruction Policy"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"4287\" class=\"elementor elementor-4287 elementor-4232\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6b886370 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6b886370\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3e34ce53\" data-id=\"3e34ce53\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-33438ba8 elementor-widget elementor-widget-text-editor\" data-id=\"33438ba8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 style=\"text-align: center;\">K&amp;P LEGAL LAW FIRM<br \/>PROTECTION AND DESTRUCTION OF PROCESSING PERSONAL DATA<\/h2><p><b>1. INTRODUCTION<br \/><\/b><\/p><p><b>1.1. Purpose<br \/><\/b><\/p><p><span style=\"font-weight: 400;\">The purpose of this Policy;<\/span> <b>K&amp;P LEGAL LAW FIRM<\/b><span style=\"font-weight: 400;\"> The purpose of this policy; K&amp;P Legal Law Firm\/ Erdal KARDAS \u2013 Yelda TOPUZ KARDAS Partnership processed personal data protection of personal data for various purposes and from the channels written to the Law Firm, the identification of personal data in printed or electronic form and appropriate controls; the establishment of a secure environment to store this data and this data are carried out by the preparation of limited access to authorized persons and to be sure that Law Firm processed personal data deleted the maximum period required for the purpose for which they are processed, identification of the processes of destruction or anonymity and identification of the roles and responsibilities of the persons involved in these processes and the management of personal data breaches.<br \/><\/span><\/p><p><span style=\"font-weight: 400;\">The business and transactions related to the storage and destruction of personal data are carried out in accordance with K&amp;P Legal\u2019s policy.<br \/><\/span><\/p><p><b>1.2. Scope<br \/><\/b><\/p><p><span style=\"font-weight: 400;\">The scope of this policy; Law Firm employees, clients, employee candidates, service providers, customers, visitors and other third parties the personal data of the confidentiality, privacy to protect your personal data when it comes to the implementation of the necessary controls and precautions to be taken times the maximum storage of personal data personal data will be stored in accordance with the law, where personal data are processed taken technical and administrative measures to be disposed of all recording environments and constitute the activities with regard to the processing of personal data. In this context, the above-mentioned groups of personal data owners can be applied to the entirety of this Policy, as well as only some of its provisions.<br \/><\/span><\/p><p><b>1.3. Definitions<br \/><\/b><\/p><p><span style=\"font-weight: 400;\">The definitions of the terms and abbreviations contained in this Policy are as follows:<\/span><\/p><table class=\"tg\"><thead><tr><th class=\"tg-fymr\" style=\"text-align: left;\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Explicit Consent<\/span><\/th><th class=\"tg-0pky\" style=\"text-align: left;\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Freely given, specific and informed consent<\/span><\/th><\/tr><\/thead><tbody><tr><td class=\"tg-fymr\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Recipient Groups<\/span><\/td><td class=\"tg-0pky\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Category of real or legal persons in which personal data is transferred by the data controller.<\/span><\/td><\/tr><tr><td class=\"tg-fymr\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Anonym<\/span><br \/><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">izing<\/span><\/td><td class=\"tg-0pky\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Rendering personal data impossible to link with an identified or identifiable natural person, even through matching them with other data<\/span><\/td><\/tr><tr><td class=\"tg-fymr\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Presidency<\/span><\/td><td class=\"tg-0pky\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Board of Protection of Personal Data<\/span><\/td><\/tr><tr><td class=\"tg-fymr\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Employee <\/span><\/td><td class=\"tg-0pky\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">K&amp;P Legal personnel<\/span><\/td><\/tr><tr><td class=\"tg-fymr\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Law Firm<\/span><\/td><td class=\"tg-0pky\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">K&amp;P LEGAL LAW FIRM\/ Erdal Kardas &#8211; Yelda Topuz Kardas Partnership<\/span><\/td><\/tr><tr><td class=\"tg-1wig\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Electronic environment<\/span><\/td><td class=\"tg-0lax\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Environments where personal data can be created, read, exchanged and written with electronic devices.<\/span><\/td><\/tr><tr><td class=\"tg-1wig\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Non-Electronic Environment<\/span><\/td><td class=\"tg-0lax\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">All written, printed, visual, etc. media that are excluded from electronic media. <\/span><\/td><\/tr><tr><td class=\"tg-1wig\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Service Provider<\/span><\/td><td class=\"tg-0lax\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">A real or legal person providing services under a specific term of contract with K&amp;P Legal.<\/span><\/td><\/tr><tr><td class=\"tg-1wig\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Data Subject<\/span><\/td><td class=\"tg-0lax\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">The natural person, whose personal data is processed<\/span><\/td><\/tr><tr><td class=\"tg-1wig\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Related User <\/span><\/td><td class=\"tg-0lax\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Persons who process personal data within the data controller organization or in accordance with the authorization and instructions it receives from the data controller, excluding the person or unit responsible for technically storing, protecting and backing up data.<\/span><\/td><\/tr><tr><td class=\"tg-1wig\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Destruction<\/span><\/td><td class=\"tg-0lax\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">The process of making personal data inaccessible, non-refundable and unusable by anyone in any way<\/span><\/td><\/tr><tr><td class=\"tg-1wig\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Recording Environment<\/span><\/td><td class=\"tg-0lax\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Any environment where personal data is completely or partially automated or processed by non-automated means, as part of any data recording system.<\/span><\/td><\/tr><tr><td class=\"tg-1wig\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">KEP<\/span><\/td><td class=\"tg-0lax\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Registered Electronic Mail <\/span><\/td><\/tr><tr><td class=\"tg-1wig\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Registered<\/span><br \/><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Electronic Mail<\/span><\/td><td class=\"tg-0lax\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Secure e-mail service with legal validity in case of dispute, where sender and receiver IDs are identified, shipping time and content cannot be changed.<\/span><\/td><\/tr><tr><td class=\"tg-1wig\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Personal Data<\/span><\/td><td class=\"tg-0lax\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">All the information relating to an identified or identifiable natural person<\/span><\/td><\/tr><tr><td class=\"tg-1wig\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Personal Data Processing<\/span><br \/><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Inventory<\/span><\/td><td class=\"tg-0lax\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">The personal data processing activities of data controllers based on their business processes; the purpose scanning for personal data and its legal reason, the category of data, the group of recipients transferred, and the maximum duration of the protection required for the purposes for which personal data is processed, the inventory they elaborate by describing the personal data envisaged to be transferred to countries and the measures taken regarding data security.<\/span><\/td><\/tr><tr><td class=\"tg-1wig\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Processing of Personal<\/span><br \/><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Data<\/span><\/td><td class=\"tg-0lax\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Any operation performed upon personal data such as collection, recording, storage, retention, alteration, re-organization, disclosure, transferring, taking over, making retrievable, classification or preventing the use thereof, fully or partially through automatic means or provided that the process is a part of any data registry system, through non-automatic means.<\/span><\/td><\/tr><tr><td class=\"tg-1wig\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Board<\/span><\/td><td class=\"tg-0lax\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Personal Data Protection Board<\/span><\/td><\/tr><tr><td class=\"tg-1wig\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Law<\/span><\/td><td class=\"tg-0lax\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Personal Data Protection Law<\/span><\/td><\/tr><tr><td class=\"tg-1wig\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Committee on the <\/span><br \/><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Protection of <\/span><br \/><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Personal Data<\/span><\/td><td class=\"tg-0lax\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">A committee established to carry out administrative monitoring of processes established under the Personal Data Protection Law and sub-regulations appointed by K&amp;P Legal.<\/span><\/td><\/tr><tr><td class=\"tg-1wig\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Sensitive<\/span><br \/><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Personal Data<\/span><\/td><td class=\"tg-0lax\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Information on the race, ethnic origin, political opinion, philosophical beliefs, religion, sect or other beliefs, disguise and dress, membership of associations, foundations or trade unions, health, sexual life, criminal convictions and security measures, and biometric and genetic data.<\/span><\/td><\/tr><tr><td class=\"tg-1wig\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Periodic Destruction<\/span><\/td><td class=\"tg-0lax\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">In the event that all of the terms of the processing of personal data contained in the law are eliminated, the deletion, destruction and anonymity will be performed at repeated intervals as set out in the policy of retention and destruction of personal data.<\/span><\/td><\/tr><tr><td class=\"tg-1wig\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Policy<\/span><\/td><td class=\"tg-0lax\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">K&amp;P Legal Protection and Destruction of Processing Personal Data<\/span><\/td><\/tr><tr><td class=\"tg-1wig\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Processor<\/span><\/td><td class=\"tg-0lax\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">The natural or legal person who processes personal data on behalf of the controller upon his authorization<\/span><\/td><\/tr><tr><td class=\"tg-1wig\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Data Recording<\/span><br \/><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">System<\/span><\/td><td class=\"tg-0lax\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Any recording system through which personal data are processed by structuring according to specific criteria<\/span><\/td><\/tr><tr><td class=\"tg-1wig\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Data controller<\/span><\/td><td class=\"tg-0lax\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">K&amp;P LEGAL LAW FIRM\/ERDAL KARDAS \u2013 YELDA TOPUZ KARDAS PARTNERSHIP who determines the purposes and means of the processing of personal data, and who is responsible for establishment and management of the filing system.<\/span><\/td><\/tr><tr><td class=\"tg-1wig\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">VERBIS (Data Controllers Registry<\/span><br \/><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Information System<\/span><\/td><td class=\"tg-0lax\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Data controllers will use in the application of the Registry and other related transactions related to the Register, accessible over the internet, created and managed by the Presidency information system.<\/span><\/td><\/tr><tr><td class=\"tg-1wig\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">VERBIS<\/span><\/td><td class=\"tg-0lax\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Data Controllers Registry Information System<\/span><\/td><\/tr><tr><td class=\"tg-1wig\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Regulation<\/span><\/td><td class=\"tg-0lax\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Regulation on the erasure, destruction or anonymizing of personal data.<\/span><\/td><\/tr><\/tbody><\/table><p><span style=\"font-weight: 400;\">Definitions not included in this Policy apply to the definitions in the Act.<br \/><b><\/b><\/span><\/p><p><b>2. RESPONSIBILITY AND DUTY DISTRIBUTION<br \/><\/b><\/p><p><span style=\"font-weight: 400;\">All of K&amp;P Legal\u2019s units and employees responsible for technical and administrative units that are being taken by the proper implementation of the measures under the policy of staff training and awareness raising, monitoring and continuous control to prevent unlawful processing of personal data, personal data, and preventing access to lawful and unlawful storage of personal data personal data is processed for purposes of technical and administrative measures for ensuring data security in all environments responsible for the introduction of the units gives active support to the issues.<\/span><\/p><p><b>3. DESCRIPTIONS OF STORAGE AND DESTRUCTION<br \/><\/b><\/p><p><span style=\"font-weight: 400;\">By K&amp;P Legal, personal data belonging to employees, clients, employee candidates, visitors, customers and employees of third parties, organizations or organizations associated as service providers is stored and destroyed in accordance with the Law.<br \/><\/span><\/p><p><span style=\"font-weight: 400;\">Article 3 of the Law defines the concept of the processing of personal data, the personal data processed in Article 4 is limited and measured in connection with the purpose for which they are processed, and the time required for the purpose for which they are intended or processed in the relevant legislation must be maintained, In articles 5 and 6, the terms of processing of personal data are counted.<br \/><\/span><\/p><p><span style=\"font-weight: 400;\">In this context, K&amp;P Legal processes personal data in accordance with articles 5\/1, 5\/2-a, 5\/2-B, 5\/2-c, 5\/2-\u00e7, 5\/2-e, 5\/2-F and 6\/3 within the framework of its activities and stores it for the period stipulated in the relevant legislation or for the period appropriate to the processing purposes.<br \/><\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">5\/1 Personal data shall not be processed without obtaining the explicit consent of the data subject.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">5\/2-a It is expressly permitted by any law.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">5\/2-b It is necessary in order to protect the life or physical integrity of the data subject or another person where the data subject is physically or legally incapable of giving consent.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">5\/2-c It is necessary to process the personal data of parties of a contract, provided that the processing is directly related to the execution or performance of the contract.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">5\/2-\u00e7 It is necessary for compliance with a legal obligation which the controller is subject to.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">5\/2-e It is necessary for the institution, usage, or protection of a right.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">5\/2-f It is necessary for the legitimate interests of the data controller, provided that the fundamental rights and freedoms of the data subject are not harmed.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">6\/3 Personal data indicated in paragraph 1, other than personal data relating to health and sexual life, may be processed without obtaining the explicit consent of the data subject if processing is permitted by any law. Personal data relating to health and sexual life may only be processed without obtaining the explicit consent of the data subject for purposes of protection of public health, operation of preventive medicine, medical diagnosis, treatment, and care services, planning and management of health services and financing by persons under the obligation of secrecy or authorized institutions and organizations.<\/span><\/span><\/li><\/ul><p><b>3.1. Legal Reasons for Storage<br \/><\/b><\/p><p><span style=\"font-weight: 400;\">The personal data processed within the framework of K&amp;P Legal&#8217;s activities are kept for the period stipulated<br \/><\/span><\/p><p><span style=\"font-weight: 400;\">in the relevant legislation;<br \/><\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">1136 Attorneyship Law No.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Turkish Code of Obligations No. 6098<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Turkish Commercial Law No. 6102<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Turkish Civil Code No. 4721<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Personal Data Protection Law No. 6698<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Consumer Protection Law No. 6502 <\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Labor Law No. 4857<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Occupational Health and Safety Act and related Regulations No. 6331 it is stored as long as the storage times stipulated in the framework. <\/span><\/span><\/li><\/ul><p><b>3.2. Processing Purposes Requiring Storage<br \/><\/b><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Employee Candidate \/ Intern \/ Student Selection and Placement Process Execution<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Execution of The Application Process of Employee Candidates<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Fulfillment of Obligations arising from Business Contracts and Legislation for Employees<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Execution of Benefits and Benefits Processes for Employees<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Conducting Educational Activities<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Execution of Access Authorizations<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Execution of Activities in Compliance with the Legislation<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Execution of Finance and Accounting Affairs<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ensuring Physical Space Security<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Execution of Legal Affairs<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Execution of Communication Activities<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Execution \/ Supervision of Business Activities<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Execution of Occupational Health \/ Safety Activities<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Conducting Business Continuity Ensuring Activities<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Execution of Logistics Activities<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Execution of Goods \/ Services Procurement Processes<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Execution of Goods \/ Services After-Sales Support Services<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Execution of Goods \/ Services Sales Processes<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Execution of Good \/ Service Production and Operation Processes<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Execution of Activities for Customer Satisfaction<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Organization and Event Management<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Execution of Risk Management Processes<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Execution of Contract Processes<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Providing Information to Authorized Persons, Institutions and Organizations<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Creation And Tracking of Visitor Records<\/span><\/span><\/li><\/ul><p><b>3.3. Reasons For Destruction<br \/><\/b><\/p><p><span style=\"font-weight: 400;\">Personal Data;<br \/><\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">amending or replacing the provisions of the relevant legislation which constitute the basis for its processing,<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">elimination of the purpose requiring processing or hiding,<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">In cases where processing personal data is carried out solely on the condition of explicit consent, the data subject may withdraw his or her explict consent.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">In accordance with Article 11 of the Law, K&amp;P Legal accepts its application for the deletion and destruction of personal data within the framework of the rights of the data subject,<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">If K&amp;P Legal rejects the application made to the data subject for the request to delete, destroy or anonymize his personal data, finds his answer insufficient, or does not respond within the time stipulated in the Act; To make a complaint to the Board and to make this request appropriate by the Board,<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The maximum period requiring the storage of personal data has passed and there are no conditions that justify storing personal data for longer,<\/span><\/span><\/li><\/ul><p><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">In their case, they are deleted, destroyed, or re-deleted, destroyed, or made anonymous by K&amp;P Legal at the request of the data subject. <\/span><\/span><\/p><p><b>4. ENSURING THE SECURITY AND CONFIDENTIALITY OF PERSONAL DATA<br \/><\/b><\/p><p><span style=\"font-weight: 400;\">In accordance with Article 12 of the Law, K&amp;P Legal shall ensure the appropriate level of security to prevent unlawful processing of the personal data it is processing, to prevent unlawful access to the data, and to ensure the protection of the data. In the event of unlawful disclosure of personal data, it shall act in accordance with the measures provided for in the Law.<br \/><b><\/b><\/span><\/p><p><b>4.1. Administrative Measures<br \/><\/b><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">K&amp;P Legal trains and provides awareness of its employees in relation to the Law on The Protection of Personal Data.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Employees are informed that they cannot disclose or use the personal data they have learned in contravention of the provisions of the Act and that they will not be able to use it for any purpose other than for processing purposes and that this obligation will continue after their departure from office, and they are required to make the necessary commitments.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Disciplinary action is carried out if employees do not comply with safety policies.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">In cases where personal data is subject to transfer, K&amp;P Legal shall ensure that the contracts concluded with the persons to whom the personal data is transferred will be included with the records that the party to whom the personal data is transferred will fulfill its obligations to ensure data security.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Contracts with the relevant companies in which personal data is transferred in accordance with the law in the event of receiving an external service due to technical requirements for the storage of personal data; the provisions concerning that the persons to whom personal data is transferred will take the necessary security measures to protect personal data and that these measures will be complied with in their own organizations.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">At regular intervals, supplier data processing control is implemented. \u201cThe process is operated through the &#8220;Supplier Evaluation Form&#8221;. \u201cTedarik\u00e7i De\u011ferlendirme Formu\u201d \u00fczerinden s\u00fcre\u00e7 i\u015fletilmektedir. <\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Personal data processing inventory compliant with VERBIS system is issued by the K&amp;P Legal and compliance audits are carried out here.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Personal data processing activities carried out by K&amp;P Legal are examined in detail and periodically reviewed and updated as needed. In this context, steps to be taken to ensure compliance with the personal data processing requirements stipulated in the Law are determined. <\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">As a result of the review, non-needed personal data is disposed of safely and securely in accordance with the &#8220;Personal Data Storage and Destruction Policy&#8221; and the regulation on the deletion, destruction or anonymisation of personal data.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">K&amp;P Legal determines the practices that must be implemented in order to comply with the Law, regulates the &#8220;Personal Data Retention and Destruction Policy&#8221; and periodically reviews it and updates it as needed. The risks that may arise from personal data breach incidents and how to manage security breaches are also clearly defined. <\/span><\/span><\/li><\/ul><p><b>4.2. Technical Measures<br \/><\/b><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">K&amp;P Legal complies with the Information Security Policies in the storage of personal data. <\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Technical measures are taken by K&amp;P Legal regarding the protection of personal data to the extent possible by the technology and the measures taken are updated and improved in parallel with the developments.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">In technical matters, expert personnel are employed.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Periodic inspections are carried out for the implementation of the measures taken.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Software and systems are installed to ensure security.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The authority to access personal data processed within K&amp;P Legal is limited to the employees concerned for the purpose of processing.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Systems suitable for technological developments are used to store personal data in secure environments.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Technical security systems for hiding areas are established, technical measures taken are audited periodically, risk-generating issues are re-evaluated, and the necessary technological solution is produced.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">All necessary infrastructures are used in accordance with the law to ensure that personal data is stored securely.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Adequate security measures are taken in the physical environments where sensitive personal data is processed, maintained and\/or accessed, and unauthorized entry and exit are prevented by ensuring physical security.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">If sensitive personal data is required to be transferred via e-mail, it is encrypted by corporate e-mail address or by using a KEP account. Portable memory is encrypted using cryptographic methods and the cryptographic key is kept in different media if it needs to be transferred via media such as CDs and DVDs. If the transfer is performed between servers in different physical environments, data transfer is performed by establishing VPN between servers or using sFTP. If it is necessary to transfer through paper Media, necessary precautions are taken against risks such as theft, loss or sight of the document by unauthorized persons and the document is sent in a \u201cconfidential\u201d format. <\/span><\/span><\/li><\/ul><p><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The main technical measures taken by K&amp;P Legal to prevent unlawful access to personal data are listed below;<br \/><b><\/b><\/span><\/span><br \/><br \/><b>4.2.1. Ensuring Cyber Security<br \/><\/b><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Firewall and gateway measures are primarily used to protect personal data-containing information technology systems from unauthorized access threats over the Internet. <\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">In cases where personal data is provided through different websites and\/or mobile application channels to ensure personal data security, connections are made with SSL.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Current anti-virus software is used. Traffic going to the internet or coming is scanned against viruses. <\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Software that is not approved by the Law Firm cannot be downloaded on Internet and these software cannot be installed on Law Firm\u2019s systems.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Third parties may use the Law Firm&#8217;s Internet with the permission of Information Technology employees and the rules on this subject.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The services to be accessed by the user on the network are restricted and unlimited network access is prevented.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Network access is restricted by creating separate logical areas such as VPN and VLAN.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Devices used as firewalls are not used for any other purpose.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Critical updates to the Firewall configuration are made approved by the It Manager.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Keeping the current topology of network devices, configuration information is stored.<\/span><\/span><\/li><\/ul><p><b>4.2.2. Software Updates<br \/><\/b><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Removing unused software and services from devices is applied and vulnerabilities are prevented. <\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Patch management and software updates of the software, services and hardware used are regularly checked.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">It is regularly checked for proper operation of software and hardware and whether security measures for systems are adequate.<\/span><\/span><\/li><\/ul><p><b>4.2.3. Access Limitations<br \/><\/b><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Access to systems containing personal data is limited.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">An access authorization and control matrix is created to control inappropriate access or access attempts.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Employees are given access to the relevant systems through the use of user name and password, to the extent that it is necessary for their work and tasks and their authority and responsibilities.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Access rights of employees whose job description has changed or left the Law Firm are immediately removed.<\/span><\/span><\/li><\/ul><p><b>4.2.4. Password<br \/><\/b><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">When creating a password, strong password combinations consisting of small capital letters, numbers, both digit and punctuation characters, symbols are preferred instead of numbers or sequences of letters that are associated with personal information and which can be easily guessed.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Passwords are changed at least every 6 (six) months.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The number of password login attempts is limited to 10 (ten).<\/span><\/span><\/li><\/ul><p><b>4.2.5. Anti-virus Software<br \/><\/b><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Anti-virus program is used to protect against malware and regularly scan the information system network and detect hazards. <\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">PC connected to the antivirus server automatically update the latest versions from the server on the subnets where they are located.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Users who are not connected to the domain are kept up to date with different update rules of the anti-virus program.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Removable media (cd-rom, dvd-rom, bluetooth, flash drive, external disc) are always scanned against viruses.<\/span><\/span><\/li><\/ul><p><b>4.2.6. Monitoring of Personal Data Security<br \/><\/b><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Servers are regularly and controlled to update anti-virus databases.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Necessary measures are taken to ensure the uninterrupted and secure operation of database systems.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Unused services and applications are being closed.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Servers are located in physically protected system rooms.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">All security-related events that occur in critical systems are logged.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Security logs related to events not related to the current application on the server, port scanning attacks, and unauthorized persons trying to access privileged accounts are evaluated by the system administrator and necessary precautions are taken, to the data controller.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Transactions of all users, log records are kept regularly.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Once a year, Vulnerability and Penetration tests are carried out and necessary precautions are taken by revealing risks, threats, weaknesses and vulnerabilities regarding information systems.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Risk analysis is carried out by the Law Firm or authorized companies in order to detect system deficiencies and take necessary measures in the K&amp;P Legal&#8217;s computer network.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Evidence is securely collected in undesirable incidents such as the collapse of the information system, malicious software, decommissioning attack, incomplete or incorrect data entry, breaches of confidentiality and integrity, misuse of the information system, etc. stored.<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\"><b>4.2.7. Securing Enviroments Containing Personal Data<br \/><\/b><\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Physical security measures are taken against threats such as the theft or loss of personal data stored in a paper environment and personal data contained on devices.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Confidential information about personal data, which expires and is no longer needed, is destroyed by paper shredder, incineration, etc. <\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">In the event of the destruction of server and network devices, the storage device is physically destroyed by taking precautions that the personal data contained in the storage device may not be read again.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">When leaving the computer, precautions are taken to close the session or to activate screen savers that can be activated with the password.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Documents in a paper environment containing personal data, servers, and backup devices, CDs, DVDs and USB are kept in the system room and archive room with additional security measures for devices such as CDs, DVDs and USB.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">System room and archive room entrances \/ exits are controlled. It is closed to unauthorized persons. <\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The entry of non-corporate visitors and unauthorized personnel into the secure areas is carried out under the supervision of authorized security officers.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Access control authorization and\/or encryption methods are used in cases where devices containing personal data are lost or stolen.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The physical environment (System room, archive room) in which personal data is contained has external risks (fire, flood, etc.) are protected against by appropriate methods.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">For protecting personal data, full disk encryption on devices or a file with personal data on the device is also encrypted.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Anti-virus programs are installed on computers and servers and cannot be deactivated for any reason.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Encryption is used to protect sensitive or critical information stored\/transmitted.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Digital signatures or message verification codes are used to protect the reliability or integrity of sensitive or critical information stored\/transmitted.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Cryptographic techniques are used to obtain evidence of the occurrence or absence of an event or activity.<\/span><\/span><\/li><\/ul><p><b>4.2.8. Information Technology Systems Supply, Development and Maintenance<br \/><\/b><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Safety requirements are taken into account when determining the requirements for the supply, development or improvement of existing systems.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Fails or a maintenance period for coming a manufacturer, dealer, service devices that contain your personal data to third parties such as maintenance and repair of the devices that are sent can be sent for before you to ensure the security of your personal data, stored in the data storage media of the device disassembled, only the defective part of the submission process is applied.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">If external personnel have arrived for purposes such as maintenance and repair, necessary measures are taken to prevent them from copying personal data and moving it out of the institution. <\/span><b>.<\/b><\/li><\/ul><p><b>4.2.9. Backing Up Personal Data<br \/><\/b><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">In cases where personal data is damaged, destroyed, stolen or lost for any reason, it is activated as soon as possible by using backed up data.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Personal data backed up is only accessible to the system administrator.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A backup list is created that determines the systems to be backed up and the system to be backed up is carefully determined.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The backup list is periodically reviewed and updated because the information to be backed up may vary.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The backup process is set up on the backup program agent to be installed on the desired computer and made over the network.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The control of the healthy retrieval of the backup is controlled by providing the reserves.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The physical safety of all reserves is also ensured.<\/span><\/span><\/li><\/ul><p><b>4.3. Personal Data Security Breach Incidents Management<br \/><\/b><\/p><p><span style=\"font-weight: 400;\">In the event that the personal data processed is seized\/disclosed by third parties by unlawful means, even though all administrative and technical measures have been taken within the scope of the personal data processing activity carried out by K&amp;P Legal;<br \/><\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Employees are primarily responsible for working in the face of personal data security breach incidents in order to respond quickly and regularly to personal data security breach incidents. In such a case, the employee is primarily obliged to notify the kplegal.com.tr address. <\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\u201cDisciplinary Policy\u201d is carried out by keeping a \u201cViolation Notification Report\u201d against employees who do not comply with the processes and requirements to be followed in the event that attitudes, behaviors and incidents that violate the rules and which are contrary to the provisions stated in the regulations published within the framework of the law.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">In cases where support is required from the external units or firms related to the identified event, the primary responsibility for establishing and maintaining communication is the liaison person registered with VERBIS.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The contact person is obliged to notify the data subject and the board within 72 hours of the violation and incident notification.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">K&amp;P Legal is also obliged to notify the persons affected by such data breach within a reasonable period of time by appropriate means, such as if the contact address of the person is available directly or if it is not available via K&amp;P Legal\u2019s website.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">In the event that the notification cannot be made within 72 hours, K&amp;P Legal is obliged to inform the Board of the reasons for the delay along with the notification to be made to the Board on a justified basis.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The &#8220;Personal Data Infringement Notification Form&#8221; published by the Board shall be used in the notification to be made to the Board.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">In cases where it is not possible to provide the information contained in the form at the same time, this information will be provided gradually without delay.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Information, effects and measures taken by K&amp;P Legal regarding data breaches will be recorded and the Board will be prepared for its review.<\/span><\/span><\/li><\/ul><p><b>4.4. Conducting Audit Activities related to The Protection of Personal Data<br \/><\/b><\/p><p><span style=\"font-weight: 400;\">The operation of the technical and administrative measures taken by K&amp;P Legal within the scope of the protection and security of personal data are monitored and the practices that will ensure the continuation of the operation are carried out. The results of the audit activities carried out within this scope are reported to the KVK Committee and the relevant department within K&amp;P Legal. In line with the audit results, activities are carried out to improve and improve the measures taken for the protection of data.<br \/><b><\/b><\/span><\/p><p><b>5. PERSONAL DATA DESTRUCTION TECHNIQUES<br \/><\/b><\/p><p><span style=\"font-weight: 400;\">At the end of the period stipulated in the relevant legislation or the retention period required for the purpose for which they are processed, personal data shall be destroyed by K&amp;P Legal in accordance with the provisions of the relevant legislation and again upon the application of the relevant person by the following techniques.<br \/><b><\/b><\/span><\/p><p><b>5.1. Erasure of Personal Data<\/b><\/p><p><b><span style=\"font-weight: 400;\">Personal data is deleted by the methods provided in Table-1.<br \/><\/span><\/b><\/p><p><b><i>Table 1: <\/i><\/b><i><span style=\"font-weight: 400;\">Erasure of Personal Data <\/span><\/i><\/p><table class=\"tg\"><thead><tr><th class=\"tg-x0hw\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Data Recording Environment<\/span><\/th><th class=\"tg-x0hw\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Description<\/span><\/th><\/tr><\/thead><tbody><tr><td class=\"tg-fymr\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Personal Data on Servers<\/span><\/td><td class=\"tg-0pky\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">For those who require storage of personal data on servers, the Information Processing Department will remove the access authority of the relevant users and delete them.<\/span><\/td><\/tr><tr><td class=\"tg-fymr\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Personal Data In Electronic Media<\/span><\/td><td class=\"tg-0pky\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Those whose period of time requiring the storage of electronically contained personal data will be rendered inaccessible and reusable in any way to other employees (related users) except the Information Processing Department.<\/span><\/td><\/tr><tr><td class=\"tg-fymr\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Personal data in the physical environment <\/span><\/td><td class=\"tg-0pky\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">For those who require storage from personal data held in a physical environment, it is rendered inaccessible and reusable in any way to other employees except those responsible for the document archive. In addition, the blackout process is applied by scratching\/painting\/deleting it so that it is unreadable. <\/span><\/td><\/tr><tr><td class=\"tg-fymr\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Personal Data in Portable Media<\/span><\/td><td class=\"tg-0pky\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Those requiring storage of personal data held in flash-based storage environments are encrypted by the It Department and accessed only to the Information Processing Manager, and in secure environments with encryption keys stored.<\/span><\/td><\/tr><\/tbody><\/table><p><b>5.2. Destruction of Personal Data<br \/><\/b><\/p><p><span style=\"font-weight: 400;\"> Personal data is destroyed by K&amp;P Legal using the methods provided in Table-2.<br \/><\/span><\/p><p><b><i>Table 2:<\/i><\/b><i><span style=\"font-weight: 400;\"> Destruction of Personal Data<\/span><\/i><\/p><table class=\"tg\"><thead><tr><th class=\"tg-x0hw\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Data Recording Environment<\/span><\/th><th class=\"tg-x0hw\"><span style=\"font-weight: bold; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Description<\/span><\/th><\/tr><\/thead><tbody><tr><td class=\"tg-fymr\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Personal data in the physical environment <\/span><\/td><td class=\"tg-0pky\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Those that require storage from personal data in a paper environment are irrevocably destroyed in paper clippers.<\/span><\/td><\/tr><tr><td class=\"tg-fymr\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">Personal Data in Optical\/ Magnetic Media<\/span><\/td><td class=\"tg-0pky\"><span style=\"font-weight: 400; font-style: normal; text-decoration: none; color: #000; background-color: transparent;\" data-darkreader-inline-color=\"\" data-darkreader-inline-bgcolor=\"\">The process of physical destruction, such as melting, burning or powdering those who expire, which require storing from personal data in optical media and magnetic media, is applied. In addition, magnetic media is passed through a special device and exposed to a high-value magnetic field, making the data unreadable. <\/span><\/td><\/tr><\/tbody><\/table><p><b>5.3. Anonymizing of Personal Data<br \/><\/b><\/p><p><span style=\"font-weight: 400;\">Anonymization of personal data is the rendering of personal data to be innovated in any way to an identified or identifiable real person, even if it is matched with other data.<\/span><br \/><span style=\"font-weight: 400;\">For personal data to be anonymized; personal data must be returned by the data controller or third parties and\/or made unrelatable to a specific or identifiable real person, even through the use of appropriate techniques in terms of the recording environment and related area of activity, such as matching the data with other data.<br \/><b><\/b><\/span><\/p><p><b>6. STORAGE AND DESTRUCTION PERIOD<br \/><\/b><\/p><p><span style=\"font-weight: 400;\">In relation to the personal data being processed by K&amp;P Legal within the scope of its activities;<br \/><\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Retention periods based on personal data related to all personal data within the scope of activities based on processes are stored in the Personal Data processing Inventory.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Retention times by data categories are recorded to VERBIS.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Process-based retention periods are included in the Personal Data Retention and Destruction Policy.<\/span><\/span><\/li><\/ul><p><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">For personal data whose retention period has expired, deletion by themselves, destruction, or anonymizing is performed.<br \/><b><\/b><\/span><\/span><\/p><p><b>7. PERIODICAL DESTRUCTION PERIOD<br \/><\/b><\/p><p><span style=\"font-weight: 400;\">In accordance with Article 11 of the regulation, K&amp;P Legal has set the period of periodic destruction as 6 months. December and June of each year, periodical destruction process is carried out in the institution.<br \/><b><\/b><\/span><\/p><p><b>8. DATA SUBJECT APPLICATION PROCESSES<br \/><\/b><\/p><p><span style=\"font-weight: 400;\">Owners of personal data defined as the data subject in the law are entitled to make certain requests for the processing of their personal data in Article 11 of the Law.<br \/><\/span><br \/><span style=\"font-weight: 400;\">In accordance with the first paragraph of Article 13 of the Law; K&amp;P Legal responsible for the data must be forwarded to us in writing of applications for these rights or by other methods determined by the Board to the Data Controller in the Notification of The Application Procedures and Principles.<br \/><\/span><\/p><p><span style=\"font-weight: 400;\">In this context, applications to be made K&amp;P Legal- Erdal KARDAS Yelda TOPUZ KARDAS Partnership as \u201cwritten\u201d, by taking the output of the application form;<br \/><\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">With the applicant&#8217;s personal application,<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Through the notary,<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">by authenticating the return by registered mail,<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Through the e-mail address (erdal.kardas@kplegal.com.tr),<\/span><\/span><\/li><\/ul><p><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">be forwarded to us.<br \/><b><\/b><\/span><\/span><\/p><p><b>9. REVISION<br \/><\/b><\/p><p><span style=\"font-weight: 400;\">This Policy here by will be updated by K&amp;P Legal KVK Committee at least once a year and updated if necessary. K&amp;P Leagal KVK Committee is authorized and responsible for the enactment, modification, execution and repeal of this policy.<br \/><b><\/b><\/span><\/p><p><b>10. EFFECTIVE<br \/><\/b><\/p><p><span style=\"font-weight: 400;\">This Policy has been approved by senior management and 01.01.2019 effective date.<br \/><\/span><\/p><p><b> K&amp;P LEGAL LAW FIRM<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>K&amp;P LEGAL LAW FIRMPROTECTION AND DESTRUCTION OF PROCESSING PERSONAL DATA 1. INTRODUCTION 1.1. Purpose The purpose of this Policy; K&amp;P LEGAL LAW FIRM The purpose of this policy; K&amp;P Legal Law Firm\/ Erdal KARDAS \u2013 Yelda TOPUZ KARDAS Partnership processed personal data protection of personal data for various purposes and from the channels written to [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-4287","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Storage and Destruction Policy | K&amp;P Legal | Global Hukuk B\u00fcrosu<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kplegal.com.tr\/en\/storage-and-destruction-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Storage and Destruction Policy | K&amp;P Legal | Global Hukuk B\u00fcrosu\" \/>\n<meta property=\"og:description\" content=\"K&amp;P LEGAL LAW FIRMPROTECTION AND DESTRUCTION OF PROCESSING PERSONAL DATA 1. INTRODUCTION 1.1. Purpose The purpose of this Policy; K&amp;P LEGAL LAW FIRM The purpose of this policy; K&amp;P Legal Law Firm\/ Erdal KARDAS \u2013 Yelda TOPUZ KARDAS Partnership processed personal data protection of personal data for various purposes and from the channels written to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kplegal.com.tr\/en\/storage-and-destruction-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"K&amp;P Legal | Global Hukuk B\u00fcrosu\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/KPLegalTurkey\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-03T13:07:33+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@KPLegalTurkey\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"23 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/kplegal.com.tr\\\/en\\\/storage-and-destruction-policy\\\/\",\"url\":\"https:\\\/\\\/kplegal.com.tr\\\/en\\\/storage-and-destruction-policy\\\/\",\"name\":\"Storage and Destruction Policy | K&amp;P Legal | Global Hukuk B\u00fcrosu\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/kplegal.com.tr\\\/en\\\/#website\"},\"datePublished\":\"2023-01-19T13:24:24+00:00\",\"dateModified\":\"2023-02-03T13:07:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/kplegal.com.tr\\\/en\\\/storage-and-destruction-policy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/kplegal.com.tr\\\/en\\\/storage-and-destruction-policy\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/kplegal.com.tr\\\/en\\\/storage-and-destruction-policy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/kplegal.com.tr\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Storage and Destruction Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/kplegal.com.tr\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/kplegal.com.tr\\\/en\\\/\",\"name\":\"K&amp;P Legal | Global Hukuk B\u00fcrosu\",\"description\":\"Ba\u015far\u0131ya giden yolda g\u00fcvenilir orta\u011f\u0131n\u0131z.\",\"publisher\":{\"@id\":\"https:\\\/\\\/kplegal.com.tr\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/kplegal.com.tr\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/kplegal.com.tr\\\/en\\\/#organization\",\"name\":\"K&P Legal |Global Hukuk B\u00fcrosu\",\"url\":\"https:\\\/\\\/kplegal.com.tr\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/kplegal.com.tr\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/kplegal.com.tr\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/logo2.png\",\"contentUrl\":\"https:\\\/\\\/kplegal.com.tr\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/logo2.png\",\"width\":216,\"height\":64,\"caption\":\"K&P Legal |Global Hukuk B\u00fcrosu\"},\"image\":{\"@id\":\"https:\\\/\\\/kplegal.com.tr\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/KPLegalTurkey\",\"https:\\\/\\\/x.com\\\/KPLegalTurkey\",\"https:\\\/\\\/www.instagram.com\\\/kplegal_lawfirm\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Storage and Destruction Policy | K&amp;P Legal | Global Hukuk B\u00fcrosu","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kplegal.com.tr\/en\/storage-and-destruction-policy\/","og_locale":"en_US","og_type":"article","og_title":"Storage and Destruction Policy | K&amp;P Legal | Global Hukuk B\u00fcrosu","og_description":"K&amp;P LEGAL LAW FIRMPROTECTION AND DESTRUCTION OF PROCESSING PERSONAL DATA 1. INTRODUCTION 1.1. Purpose The purpose of this Policy; K&amp;P LEGAL LAW FIRM The purpose of this policy; K&amp;P Legal Law Firm\/ Erdal KARDAS \u2013 Yelda TOPUZ KARDAS Partnership processed personal data protection of personal data for various purposes and from the channels written to [&hellip;]","og_url":"https:\/\/kplegal.com.tr\/en\/storage-and-destruction-policy\/","og_site_name":"K&amp;P Legal | Global Hukuk B\u00fcrosu","article_publisher":"https:\/\/www.facebook.com\/KPLegalTurkey","article_modified_time":"2023-02-03T13:07:33+00:00","twitter_card":"summary_large_image","twitter_site":"@KPLegalTurkey","twitter_misc":{"Est. reading time":"23 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/kplegal.com.tr\/en\/storage-and-destruction-policy\/","url":"https:\/\/kplegal.com.tr\/en\/storage-and-destruction-policy\/","name":"Storage and Destruction Policy | K&amp;P Legal | Global Hukuk B\u00fcrosu","isPartOf":{"@id":"https:\/\/kplegal.com.tr\/en\/#website"},"datePublished":"2023-01-19T13:24:24+00:00","dateModified":"2023-02-03T13:07:33+00:00","breadcrumb":{"@id":"https:\/\/kplegal.com.tr\/en\/storage-and-destruction-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kplegal.com.tr\/en\/storage-and-destruction-policy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kplegal.com.tr\/en\/storage-and-destruction-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kplegal.com.tr\/en\/"},{"@type":"ListItem","position":2,"name":"Storage and Destruction Policy"}]},{"@type":"WebSite","@id":"https:\/\/kplegal.com.tr\/en\/#website","url":"https:\/\/kplegal.com.tr\/en\/","name":"K&amp;P Legal | Global Hukuk B\u00fcrosu","description":"Ba\u015far\u0131ya giden yolda g\u00fcvenilir orta\u011f\u0131n\u0131z.","publisher":{"@id":"https:\/\/kplegal.com.tr\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kplegal.com.tr\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kplegal.com.tr\/en\/#organization","name":"K&P Legal |Global Hukuk B\u00fcrosu","url":"https:\/\/kplegal.com.tr\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kplegal.com.tr\/en\/#\/schema\/logo\/image\/","url":"https:\/\/kplegal.com.tr\/wp-content\/uploads\/2022\/01\/logo2.png","contentUrl":"https:\/\/kplegal.com.tr\/wp-content\/uploads\/2022\/01\/logo2.png","width":216,"height":64,"caption":"K&P Legal |Global Hukuk B\u00fcrosu"},"image":{"@id":"https:\/\/kplegal.com.tr\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/KPLegalTurkey","https:\/\/x.com\/KPLegalTurkey","https:\/\/www.instagram.com\/kplegal_lawfirm\/"]}]}},"_links":{"self":[{"href":"https:\/\/kplegal.com.tr\/en\/wp-json\/wp\/v2\/pages\/4287","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kplegal.com.tr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kplegal.com.tr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kplegal.com.tr\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/kplegal.com.tr\/en\/wp-json\/wp\/v2\/comments?post=4287"}],"version-history":[{"count":30,"href":"https:\/\/kplegal.com.tr\/en\/wp-json\/wp\/v2\/pages\/4287\/revisions"}],"predecessor-version":[{"id":4520,"href":"https:\/\/kplegal.com.tr\/en\/wp-json\/wp\/v2\/pages\/4287\/revisions\/4520"}],"wp:attachment":[{"href":"https:\/\/kplegal.com.tr\/en\/wp-json\/wp\/v2\/media?parent=4287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}