Data Controller: CeyBer Group
Address: Kazımdirik City University Street No:120, 35110 Bornova/İzmir
Phone: 0232 215 01 06
E-mail: kvk@ceyber.com
Website: www.Ceyber.com
Specially states that we attach the utmost importance to the security and confidentiality of your personal data; in accordance with the Law on the Protection of Personal Data No. 6698 (“KVKK”) and the Communication on Procedures and Principles to Be Observed in Fulfilling the Disclosure Obligation, Ceyber Group is a smart assistant (chatbot) via our website with the capacity of a data enquiry. We would like to inform you about your personal data that we collect through the contact form, the online interview/appointment system or other electronic channels.
1. Categories of Personal Data Processed
-Identification Information: First and last name, Turkish ID number, date of birth.
-Contact Information: Email address, phone number, address.
-Education and Work Experience Information: Study status, graduated school/faculty/department, start/end dates, work experiences (position, firm, industry, job description, mode of work, etc.), foreign language information and level.
-Candidate Application Specific Data: Applicant unit/position, application date, driver's license information, health information, study eligibility.
-Transaction Security Data: IP address, access date/time, browser information, log records.
-Interview/Content Data: Smart assistant chats, requests specified in the form, online interview messages.
2. Purposes of Processing Personal Data
Your personal data is processed within the scope of KVKK for the following purposes:
-Receiving, evaluating and responding to your service request.
-Receiving, evaluating, analyzing suitability and conducting recruitment processes of your job application request.
-Providing support via intelligent assistant/chatbot and contact form.
-Conducting online interview/appointment processes.
-Making contact, giving information, reminders of appointment/answers.
-Ensuring system and information security, preventing malicious uses.
-Fulfillment of legal obligations.
-For service quality improvement and analysis purposes (within the scope of legitimate interest)
-Prevention of fraud and illegal activities.
3. Collection, Transfer, Storage and Destruction Methods of Personal Data and Legal Reasons
Collection, transfer, storage period and methods of destruction of your Personal Data and the reasons for tort www.Ceyber.com through the Personal Data Protection Policy on our website, or https://www.ceyberdigital.com/en/kvkk You can find it at the link.
4. Your Rights as a Contact Person
-Find out if your personal data has been processed.
-Requesting information if it has been processed Learning the purpose of processing and whether it has been used appropriately.
-Asking for the correction of missing/incorrect data.
-Don't ask for it to be deleted/destroyed.
- Request that correction/deletion operations be reported to transferred third parties.
-Do not challenge the result of analysis against you with automated systems.
-Don't demand that your damages be recouped.
These are your rights kvk@ceyber.com You can send it in writing to your address. Your claims will be completed free of charge within 30 days at the latest. Official documents may be required for authentication. This clarification text applies when you use the smart assistant on our website, when you fill out a form or communicate online. “Trust & Compliance” on our website for detailed information (https://www.ceyberdigital.com/en/kvkkYou can visit the section).
We would like to inform you about the types of cookies used on our website, the purposes for which cookies are used and the settings, management and deletion of these cookies. You can visit our website without providing any personal information and meet your needs by getting information about our products and services. Some cookies are used to collect information about the use of the site during visits. Our goal here is to provide convenience to the user who visits our website and to improve the functioning of our website.
What is a Cookie?
A cookie is a small-sized text file that is saved to your computer or mobile device via your browser when you visit a site. Cookies allow a site to function more efficiently, as well as to provide you with personalized pages to provide a more convenient and faster visit experience to your personal needs. Cookies only contain information about your visit history on the internet and do not collect any information about files stored on your computer or mobile device.
Types of Cookies and Purposes of Use
According to their validity period, there are two types of cookies: Permanent Cookie and Temporary Cookie. Temporary cookies are created while you visit the website and are valid only until you close your browser. Persistent cookies, on the other hand, are created when you visit the website and remain until you delete them or they expire. Persistent cookies are used for actions such as providing a personalized experience that is compatible with your settings. The types of cookies and their purpose of use are described below.
Mandatory Cookies are essential for the proper functioning of our website. For example, mandatory cookies are used for purposes such as authentication, so that information about your current session is not lost. These cookies are used for purposes such as security and verification and are not used for any marketing purposes.
Cookies Necessary for Functionality
They are cookies that allow users who visit our website to remember their preferences. It allows, for example, to remember the visitor's language preference or text font size selection. Failure to allow the use of such cookies may cause you not to use a special feature and prevent them from remembering your preferences.
Cookies Necessary for Performance and Analysis
They are cookies that help improve our website. Such cookies collect information about visitors' use of the site, are used to control whether the site is working properly and to detect errors received.
Targeting and Advertising Cookies
These cookies are used to promote products and services on our website or in channels other than our site, to show you relevant and personalized ads with our partners with whom we cooperate, and to measure the effectiveness of advertising campaigns.
How to collect cookies?
The data is collected through your devices through which you access the browsers. This information collected is device-specific. It can be deleted by the user at any time and access to information can be turned off.
Our Privacy Policy
Your privacy is important to us, your privacy and security rights are our basic principle. In this context, you can find our clarification text on the protection of personal data here.
How Can You Control Cookies?
You can delete cookies that are already on your computer and prevent the saving/placing of cookies on your internet browser. Internet browsers are predefined to automatically accept cookies. As managing cookies varies from browser to browser, you can consult the help menu of your browser or app for detailed information. As an example, you can manage it with the option “Google Chrome -> Settings -> Advanced -> Privacy and Security -> Site Settings -> Cookies and Site Data -> Allow sites to save and read cookie data”. You can manage it from the menu “Internet Explorer -> Settings -> Internet Options -> Privacy -> Advanced settings”. Most Internet browsers allow you to:
View saved cookies and delete the ones you wish
Blocking third-party cookies
Blocking cookies from certain sites
Blocking all cookies
How to delete all cookies when you close the Internet browser
If you choose to delete cookies, your preferences on the relevant website will be deleted. In addition, many websites and digital platforms, including websites owned by Akbank, may not function properly if you choose to block cookies altogether. To control cookies on your mobile device; on Apple Devices;
You can clear your browsing history and cookies with the steps “Settings -> Safari -> Delete History and Website Data”.
To delete cookies and keep your history, you can follow the steps “Settings -> Safari -> Advanced -> Website Data -> Erase All Website Data”.
If you do not want historical data to be kept when visiting the Sites;
You can activate private roaming by following the steps “Safari -> icon -> Custom -> Done”.
You can block cookies with the steps “Settings -> Safari -> Block All Cookies”. However, when you block cookies, some websites and features may not work properly.
On Android Devices;
You can clear your cookie with the option “Chrome app -> Settings -> Privacy -> Clear browsing data -> Cookies, media licenses and site data -> Clear Data”.
You can allow or block cookies with the option “Chrome App -> Settings -> Site Settings -> Cookies”.
During our activities at Ceyber, it is our primary goal to ensure the trust of the institutions and organizations we serve, employees and suppliers, and to ensure the confidentiality, integrity and accessibility of the information assets we use for the services we provide.
For this purpose, by our Senior Management,
Maintaining the ISO 27001 Quality Management system and continuously improving its effectiveness, constantly reviewing our risks and applying controls for risks above the acceptable level, conducting awareness trainings to maintain the information security awareness of our employees, communicating information and obligations on information security of our stakeholders in internal and external matters, Interruption of our activities to ensure its continuity, to comply fully with the laws and regulations of the Republic of Turkey and to ensure the confidentiality of personal data,
We are committed to providing the necessary resources to implement, maintain its continuity and systematic management of information security studies.
CeyBer Call Center was established in Izmir in 2016 with employee and customer-oriented service approach.
Adopting the mission of “Happy Employee, Happy Customer”, we include it in all our processes.
With an expert staff of 650 people, we continue to grow every day. With our capacity of over 1000 employees, we respond to customer demands in many different areas such as e-commerce, logistics and technology. We take team spirit and cooperation at the heart of all our business processes. Thanks to this, we achieve success by hand.
As a CeyBer Call Center, we manage the customer experience through many different channels such as inbound, outbound, live support, back office. We make a difference in the industry with the exclusive services we offer. We provide employment in the call center sector with our Izmir, Istanbul and Adıyaman locations. In order to improve our service quality and improve customer experience, we adopt integrated quality management systems within the scope of occupational health and safety, business continuity, information security, environmental management, customer complaint and customer management.
1. Objective
Eliminate risks that may occur as a result of unauthorized access or improper use of information shared to them during or outside of working hours.
2. Scope
Work desks, screens, printers, printed documents, documents, records.
3. Responsible
All employees and all managers are responsible for ensuring that employees act in accordance with this policy.
4. Application
Computers should be turned off outside working hours. In case of leaving the computer during working hours, the computer must be left locked (encrypted). Documents containing personal information and confidential information (even if they are on file) should not be left on the printers.
Computer passwords should not be shared outside of computing personnel. Passwords should not be left in writing, strictly on paper. At the end of work, documents belonging to the Company, containing corporate or personal information should not be left on the work table, but should be stored in secure environments (steel case, locked drawer, etc.).
Documents that fall into the critical information class such as secret, top secret, etc. must be destroyed according to PR.KY.02 BGYS and the Procedure for Control of Records. Computer desktops and desks should not contain documents containing critical information belonging to the company.
Printed information that has expired, which is decided no longer needed, must be torn and destroyed so that it cannot be read with the approval of its official. Devices used in all types of communication (telephones, faxes, copiers) should not be left to unauthorized access. Documents, documents should not be left on the devices.