Yazılım Mühendisim Terms of Service

This clarification text, which of your personal data by the data controller; It has been prepared to inform you about for what purpose, how and for what reason it is processed, with whom it is shared and for how long it is stored. Disclosure is made within the scope of Article 10 of the Law on the Protection of Personal Data No. 6698.

Yazılım Mühendisim As, we present the information text that we have prepared in accordance with Article 10 of the Law on the Protection of Personal Data No. 6698 (“Law”) and which contains information about the personal data processing activity for all data categories and person groups, to the public and the relevant persons;

ARTICLE 1: DATA RESPONSIBLE

Your personal data, in the capacity of data controller yazilimmuhendisim.com may be processed within the scope described below.

What should be understood from the concept of data controller; is the natural or legal person who determines the purposes and means of processing personal data and is responsible for the establishment and management of the data recording system.

You can use the following channels to contact the data controller:

E-mail : [email protected]

ARTICLE 2: PERSONAL DATA PROCESSED AND PURPOSE OF PROCESSING PERSONAL DATA

The categories of personal data belonging to the visitors of the website and processed by us are listed below, and each data category is processed for the purposes stated opposite:

  1. Execution of Identity / Communication activities
  2. Communication / Execution of communication activities
  3. Transaction security / Informing authorized persons, institutions and organizations

ARTICLE 3: THE PARTIES THAT PERSONAL DATA MAY BE TRANSFERRED AND THE PURPOSE OF TRANSFER

Among the personal data subject to this clarification text, those that can be transferred in order to fulfill legal obligations and the places where they can be transferred are listed below:

  1. Identity / Authorized public institutions and organizations
  2. Contact / Authorized public institutions and organizations
  3. Transaction security / Authorized public institutions and organizations

ARTICLE 4: PERSONAL DATA COLLECTION METHODS AND LEGAL REASONS

One of the information obtained is the IP address of the visitors and this process is carried out automatically by the server.

Identity and contact information from these personal data obtained from visitors; It consists of the visitor's name and e-mail information, and personal data is processed by obtaining the explicit consent of the visitor when filling out the contact form in order to communicate.

The registration of the visitor's IP address is processed within the scope of Article 5/2-f of the Law on the Protection of Personal Data No. 6698.

ARTICLE 5: STORAGE PERIOD OF PERSONAL DATA

The storage periods of the personal data written in this clarification text according to the data categories are listed below and the personal data is destroyed at the end of the period.

  1. 10 years from the acquisition of the Identity / Identity information
  2. Contact / 10 years from acquisition of contact information
  3. Transaction security / 10 years from the processing of personal data

ARTICLE 6: RIGHTS OF THE RELATED PERSON

The natural person whose personal data is processed is defined as the relevant person and has the following rights regarding himself/herself by applying to the workplace:

  1. Learning whether personal data is processed
  2. If personal data has been processed, requesting information about it
  3. Learning the purpose of processing personal data and whether they are used in accordance with the purpose
  4. Knowing the third parties to whom personal data is transferred at home or abroad
  5. Requesting correction of personal data if it is incomplete or incorrectly processed
  6. Request deletion or destruction of personal data
  7. Requesting notification of the transactions made pursuant to subparagraphs (e) and (f) to third parties to whom personal data has been transferred
  8. Objecting to the emergence of a result against the person himself by analyzing the processed data exclusively through automated systems
  9. Requesting the compensation of the damage in case of loss due to unlawful processing of personal data

Best regards;

Yazılım Mühendisim