Overview
Hasan Kalyoncu University holds the ISO/IEC 27001:2022 Information Security Management System certification and is in full compliance with Personal Data Protection Law No. 6698 (KVKK). Multi-layered protection is provided through 24/7 SOC monitoring, annual penetration tests (BIM.PR.03), an incident response workflow (BIM.PR.10), USOM notification integration, and physical plus digital security controls.
- ISO 27001:2022 certifiedIndependently accredited ISMS
- KVKK compliantData Subject Application — BIM.FR.07
- 24/7 SOC monitoringSIEM, IDS/IPS, USOM integration
- Annual penetration testIndependent pentest team (BIM.PR.03)
Our Services
Endpoint EDR
SentinelOne / CrowdStrike-class endpoint detection and response solution.
Firewall + IDS/IPS
Next-generation firewall, intrusion detection/prevention systems.
Phishing Simulation
Periodic controlled phishing tests to raise staff awareness.
Incident Response (BIM.PR.10)
24/7 incident response team and USOM notification workflow.
KVKK Data Subject Application
Exercise of data subject rights via BIM.FR.07 form; 30-day response.
Security Awareness Training
Annual mandatory training for all staff (BIM.TL.05).
Disk Encryption Management
BitLocker / FileVault mandatory installation and key escrow (BIM.TL.06).
SOC Monitoring
24/7 SIEM and log correlation center; instant alerts for critical events.
Service Level
| Scope | Target |
|---|---|
| Incident response — P1 (critical / active attack) | 1 hour |
| Incident response — P2 (high) | 4 hours |
| KVKK Data Subject application response time | 30 days (legal) |
| Data breach notification to KVKK Authority | 72 hours (legal) |
| Penetration test period | Annual (BIM.PR.03) |
| Security awareness training | Annual mandatory (BIM.TL.05) |
| Phishing simulation | Every 3 months |
Who Can Access
- All academic staff (training + incident reporting)
- All administrative staff (training + incident reporting)
- Undergraduate / graduate students (training + reporting)
- KVKK Data Subject application — open to all
- Vendors / contracted parties (confidentiality agreement required)
- Guests / visitors (KVKK notice + limited access)
How to Apply
Suspicious Incident Detection
If you observe unusual activity (a phishing email, abnormal device behaviour, data loss, suspected account compromise), disconnect the device from the network and do not delete any files.
Help Desk Notification
Open an urgent ticket in the “Security Incident” category at destek.hku.edu.tr or report directly to guvenlik@hku.edu.tr. For P1, confirm by phone.
BIM.PR.10 Incident Response Flow
The BIM security team classifies the incident, isolates evidence, responds, and if required notifies USOM and the KVKK Authority within 72 hours. A root-cause report is shared at the conclusion of the process.
Frequently Asked Questions
Do not panic. (1) Disconnect the device from the internet. (2) If you clicked a link or entered credentials, change your password immediately at portal.hku.edu.tr. (3) Forward the email as an attachment (not as a forward) to guvenlik@hku.edu.tr. (4) The device will be scanned through the BIM.PR.10 workflow.
Notify guvenlik@hku.edu.tr immediately. BIM will remotely: (a) sign out all sessions on the device, (b) force sign-out of your M365/Google accounts, (c) if disk encryption (BIM.TL.06) is enabled, data is safe, (d) remote wipe is applied if necessary. Complete the BIM.FR.04 lost/stolen device report form for the official record.
Complete the BIM.FR.07 — Data Subject Application Form and submit it to kvkk@hku.edu.tr or in writing to the University Secretary-General's Office. The legal response period is 30 days. You may exercise your rights to access, rectify, erase, and restrict transfer of your data.
In the event of device loss or theft, personal data within KVKK scope and institutional data on the disk become unreadable; otherwise a data breach occurs (mandatory notification to the KVKK Authority within 72 hours, and risk of significant administrative fines). BIM.TL.06 is mandatory for all institutional devices.
Notification to the KVKK Authority within 72 hours is a legal obligation (Data Subject Notification Regulation). Affected data subjects are also informed as soon as possible. The BIM.PR.10 incident response workflow tracks these timelines automatically; late notification incurs administrative fines.
Related Procedures and Instructions
- BIM.PR.03 — Penetration Testing and Vulnerability Management
- BIM.PR.08 — Information Security Management System (ISMS)
- BIM.PR.10 — Incident Management and Response
- BIM.PR.12 — Password Management
- BIM.PR.13 — Multi-Factor Authentication (2FA)
- BIM.PR.18 — KVKK Compliance and Data Subject Application Management
- BIM.PR.20 — Access Control Management
- BIM.PR.24 — Logging and Log Management
- BIM.TL.05 — Security Awareness Training Instruction
- BIM.TL.06 — Device Disk Encryption Instruction
- BIM.FR.04 — Device Lost/Stolen Report Form
- BIM.FR.06 — Data Breach Notification Form
- BIM.FR.07 — KVKK Data Subject Application Form
- KYS.POL.02 — Information Security Policy
All QMS documents are published at kalite.hku.edu.tr. For urgent security incidents: guvenlik@hku.edu.tr.
