This procedure has been prepared to define, implement and sustain the fundamental principles for the processing and protection of personal data by Ones Bilişim Teknolojileri Anonim Şirketi (“Ones Technology”). The procedure complies with the Law on the Protection of Personal Data No. 6698 (KVKK), the Turkish Penal Code No. 5237 (TCK), Law No. 5651 and the ISO/IEC 27001:2022 Information Security Management System standard.
The procedure covers all Ones Technology employees, interns, contracted personnel, service providers, shareholders, visitors, consultants, customers and every system in which personal data are processed. Third parties that process data on behalf of Ones Technology also fall within the scope of this procedure.
Personal data may be processed without explicit consent in accordance with Articles 5 and 6 of the KVKK when:
Special-category data are processed only with explicit consent or in cases prescribed by law.
The data subject is informed through disclosure texts. The content of these texts is prepared in line with Article 10 of the KVKK, the Communiqué on the Obligation to Inform and ISO 27001 control A.5.1.1. Processes related to the obligation to inform are recorded.
When providing biometric identity-verification solutions, Ones Technology takes the measures stipulated by the Board while processing special-category data. Explicit consent is essential, and technical and administrative measures are applied. Physical and digital security measures, encryption, access control and confidentiality protocols are implemented.
Data categories and processing purposes include Human Resources Management, Business Continuity, Security, Customer Relationship Management, Product-Service Delivery and Fulfilment of Legal Obligations. All data, including special categories, are processed in line with these purposes.
Personal data are deleted, destroyed or anonymised when the processing purpose ends or when the statutory period expires. Periodic destruction is carried out twice a year. During retention, encryption, logging, access controls and physical security measures are applied under ISO 27001.
Personal data may be transferred domestically or abroad only with explicit consent or within the exceptions in Articles 8 and 9 of the KVKK. Necessary contractual and technical safeguards are provided for transferred data.
Entry-exit, camera and internet-access data obtained from visitors are processed under Law No. 5651 and the KVKK. Visitors are informed, log records are kept and digital-access security is ensured.
Data whose processing conditions have ended are destroyed by deletion, destruction or anonymisation techniques. The process is carried out only by authorised personnel. Log records are kept for three years. Periodic destruction takes place in June and December.
The data subject has the right to access, correct, delete, object to processing and claim compensation for their data. Applications are made via the Ones Technology KVKK application form and are answered within 30 days.
Applications under the KVKK must be submitted to the data controller in writing or by the methods determined by the Board.
Submission Method | Submission Address |
|---|---|
Wet-signed application (in person, mail, courier, notary) | https://ones.com.tr/contact/ |
KEP application | |
Application from e-mail address registered in the company system | idari |
E-signature/mobile-signature application | idari |
Applications must include:
The application date is the date the request reaches the data controller.
If a data breach is detected, the Board and affected persons are notified within 72 hours. The notification includes:
This procedure enters into force on its publication date. It is reviewed at least once a year and updated according to technological developments, legislative changes and audit results.

| Call Center | : | +90 850 305 66 37 |
| Fax | : | +90 312 213 06 20 |
| : | info |
Biometric and Card-Based Access Control Solutions
High-Priority Facility Security Solutions
Biometric Access Solutions to Operating Systems
Printer – Print Security Solutions
Mobile Access and Attendance Control Solutions
Security Solutions Supporting All Type of Cards
Integrated Physical and Cyber Security Solutions
Biometric and Card-Based Personnel Attendance Control Solutions (PACS)
Identity Verification Solutions Compliant with KVKK and GDPR
Data Center Security Solutions
Login Solutions to Applications via Card and Biometrics
Identity Verification Solutions Tailored for the Healthcare Sector
