{"id":71886,"date":"2024-04-03T13:14:54","date_gmt":"2024-04-03T04:14:54","guid":{"rendered":"https:\/\/monolith.law\/tr\/?p=71886"},"modified":"2024-08-03T11:03:54","modified_gmt":"2024-08-03T02:03:54","slug":"china-cyber-security-law","status":"publish","type":"post","link":"https:\/\/monolith.law\/tr\/general-corporate\/china-cyber-security-law","title":{"rendered":"\u00c7in Siber G\u00fcvenlik Yasas\u0131 Nedir? Uyulmas\u0131 Gereken Noktalar\u0131 A\u00e7\u0131kl\u0131yoruz"},"content":{"rendered":"\n<p><a href=\"https:\/\/www.tdb.co.jp\/report\/watching\/press\/p220705.html\" target=\"_blank\" rel=\"noreferrer noopener\">Teikoku Databank&#8217;\u0131n \u00d6zel Raporu: Japon \u015eirketlerinin &#8216;\u00c7in&#8217;e Giri\u015f&#8217; E\u011filimleri Ara\u015ft\u0131rmas\u0131 (2022)[ja]<\/a>\u2019ne g\u00f6re, \u00c7in&#8217;de faaliyet g\u00f6steren Japon \u015firketlerinin say\u0131s\u0131 12,706 olarak belirlenmi\u015ftir. \u00c7in ile ili\u015fkili i\u015f yapan \u015firketlerin say\u0131s\u0131 ise bu rakamdan daha fazla olabilir. \u00c7in&#8217;de, 2017 y\u0131l\u0131nda &#8216;\u00c7in Siber G\u00fcvenlik Yasas\u0131&#8217; y\u00fcr\u00fcrl\u00fc\u011fe girmi\u015ftir.<\/p>\n\n\n\n<p>Bu durum, \u00c7in&#8217;de i\u015f yapmak isteyen \u015firketlerin, yasalara uygun d\u00fczenlemeler yapmalar\u0131n\u0131 ve teknik koruma \u00f6nlemleri almalar\u0131n\u0131 zorunlu k\u0131lm\u0131\u015ft\u0131r. Ancak, hangi yasalar\u0131n ge\u00e7erli oldu\u011funu veya nas\u0131l bir yakla\u015f\u0131m sergilemeleri gerekti\u011fini bilmeyenler de olabilir.<\/p>\n\n\n\n<p>Bu nedenle, bu makalede &#8216;\u00c7in Siber G\u00fcvenlik Yasas\u0131&#8217;n\u0131n genel \u00e7er\u00e7evesi, d\u00fczenlemelerin kapsam\u0131 ve al\u0131nmas\u0131 gereken \u00f6nlemler hakk\u0131nda bilgi verilecektir. \u00c7in&#8217;de i\u015f yapmakta olan veya gelecekte giri\u015f yapmay\u0131 d\u00fc\u015f\u00fcnen ki\u015filer i\u00e7in bu bilgiler olduk\u00e7a faydal\u0131 olacakt\u0131r.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_53 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<span class=\"ez-toc-title-toggle\"><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/monolith.law\/tr\/general-corporate\/china-cyber-security-law\/#Cin_Siber_Guvenlik_Yasasi%E2%80%99nin_Genel_Bakisi\" title=\"\u00c7in Siber G\u00fcvenlik Yasas\u0131&#8217;n\u0131n Genel Bak\u0131\u015f\u0131\">\u00c7in Siber G\u00fcvenlik Yasas\u0131&#8217;n\u0131n Genel Bak\u0131\u015f\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/monolith.law\/tr\/general-corporate\/china-cyber-security-law\/#Cin_Siber_Guvenlik_Yasasi%E2%80%99nin_Duzenleme_Kapsami\" title=\"\u00c7in Siber G\u00fcvenlik Yasas\u0131&#8217;n\u0131n D\u00fczenleme Kapsam\u0131\">\u00c7in Siber G\u00fcvenlik Yasas\u0131&#8217;n\u0131n D\u00fczenleme Kapsam\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/monolith.law\/tr\/general-corporate\/china-cyber-security-law\/#Cin_Siber_Guvenlik_Yasasi%E2%80%99nin_Icerigi\" title=\"\u00c7in Siber G\u00fcvenlik Yasas\u0131&#8217;n\u0131n \u0130\u00e7eri\u011fi\">\u00c7in Siber G\u00fcvenlik Yasas\u0131&#8217;n\u0131n \u0130\u00e7eri\u011fi<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/monolith.law\/tr\/general-corporate\/china-cyber-security-law\/#Siber_Guvenlik_Derecelendirme_Sistemi_Kurulumu\" title=\"Siber G\u00fcvenlik Derecelendirme Sistemi Kurulumu\">Siber G\u00fcvenlik Derecelendirme Sistemi Kurulumu<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/monolith.law\/tr\/general-corporate\/china-cyber-security-law\/#Ulkenin_Zorunlu_Standartlarina_Uyum\" title=\"\u00dclkenin Zorunlu Standartlar\u0131na Uyum\">\u00dclkenin Zorunlu Standartlar\u0131na Uyum<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/monolith.law\/tr\/general-corporate\/china-cyber-security-law\/#Gercek_Isim_Kaydi_Gereklidir\" title=\"Ger\u00e7ek \u0130sim Kayd\u0131 Gereklidir\">Ger\u00e7ek \u0130sim Kayd\u0131 Gereklidir<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/monolith.law\/tr\/general-corporate\/china-cyber-security-law\/#Onemli_Bilgi_Altyapisi_Tesisleri_Isletmecilerine_Yuklenen_Yukumlulukler\" title=\"\u00d6nemli Bilgi Altyap\u0131s\u0131 Tesisleri \u0130\u015fletmecilerine Y\u00fcklenen Y\u00fck\u00fcml\u00fcl\u00fckler\">\u00d6nemli Bilgi Altyap\u0131s\u0131 Tesisleri \u0130\u015fletmecilerine Y\u00fcklenen Y\u00fck\u00fcml\u00fcl\u00fckler<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/monolith.law\/tr\/general-corporate\/china-cyber-security-law\/#Yonetim_ve_Yanit_Sistemi_Kurulumu\" title=\"Y\u00f6netim ve Yan\u0131t Sistemi Kurulumu\">Y\u00f6netim ve Yan\u0131t Sistemi Kurulumu<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/monolith.law\/tr\/general-corporate\/china-cyber-security-law\/#Siber_Guvenlik_Yasasi_Ihlallerinde_Uygulanacak_Yaptirimlar\" title=\"Siber G\u00fcvenlik Yasas\u0131 \u0130hlallerinde Uygulanacak Yapt\u0131r\u0131mlar\">Siber G\u00fcvenlik Yasas\u0131 \u0130hlallerinde Uygulanacak Yapt\u0131r\u0131mlar<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/monolith.law\/tr\/general-corporate\/china-cyber-security-law\/#Japon_Sirketlerin_Almasi_Gereken_Siber_Guvenlik_Yasasi_Onlemleri\" title=\"Japon \u015eirketlerin Almas\u0131 Gereken Siber G\u00fcvenlik Yasas\u0131 \u00d6nlemleri\">Japon \u015eirketlerin Almas\u0131 Gereken Siber G\u00fcvenlik Yasas\u0131 \u00d6nlemleri<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/monolith.law\/tr\/general-corporate\/china-cyber-security-law\/#Bilgi_Sistemleri_ve_DX_Ilgili_Departmanlarla_Koordinasyon_Icinde_Bir_Sistem_Kurmak\" title=\"Bilgi Sistemleri ve DX \u0130lgili Departmanlarla Koordinasyon \u0130\u00e7inde Bir Sistem Kurmak\">Bilgi Sistemleri ve DX \u0130lgili Departmanlarla Koordinasyon \u0130\u00e7inde Bir Sistem Kurmak<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/monolith.law\/tr\/general-corporate\/china-cyber-security-law\/#Sirketin_Sahip_Oldugu_Her_Sistemin_Hangi_Dereceye_Uygun_Oldugunu_Belirlemek\" title=\"\u015eirketin Sahip Oldu\u011fu Her Sistemin Hangi Dereceye Uygun Oldu\u011funu Belirlemek\">\u015eirketin Sahip Oldu\u011fu Her Sistemin Hangi Dereceye Uygun Oldu\u011funu Belirlemek<\/a><ul class='ez-toc-list-level-4'><li class='ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/monolith.law\/tr\/general-corporate\/china-cyber-security-law\/#Hukuk_Genel_Isler_ve_Risk_Yonetimi_Departmanlari\" title=\"Hukuk, Genel \u0130\u015fler ve Risk Y\u00f6netimi Departmanlar\u0131\">Hukuk, Genel \u0130\u015fler ve Risk Y\u00f6netimi Departmanlar\u0131<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-4'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/monolith.law\/tr\/general-corporate\/china-cyber-security-law\/#Bilgi_Sistemleri_ve_DX_Ilgili_Departmanlar\" title=\"Bilgi Sistemleri ve DX \u0130lgili Departmanlar\">Bilgi Sistemleri ve DX \u0130lgili Departmanlar<\/a><\/li><\/ul><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/monolith.law\/tr\/general-corporate\/china-cyber-security-law\/#Ozet_Sirketinizin_uyum_surecinde_yardima_ihtiyaciniz_olursa_uzmanlara_danisin\" title=\"\u00d6zet: \u015eirketinizin uyum s\u00fcrecinde yard\u0131ma ihtiyac\u0131n\u0131z olursa, uzmanlara dan\u0131\u015f\u0131n\">\u00d6zet: \u015eirketinizin uyum s\u00fcrecinde yard\u0131ma ihtiyac\u0131n\u0131z olursa, uzmanlara dan\u0131\u015f\u0131n<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-16\" href=\"https:\/\/monolith.law\/tr\/general-corporate\/china-cyber-security-law\/#Hukuk_Buromuz_Tarafindan_Sunulan_Cozumler\" title=\"Hukuk B\u00fcromuz Taraf\u0131ndan Sunulan \u00c7\u00f6z\u00fcmler\">Hukuk B\u00fcromuz Taraf\u0131ndan Sunulan \u00c7\u00f6z\u00fcmler<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Cin_Siber_Guvenlik_Yasasi%E2%80%99nin_Genel_Bakisi\"><\/span>\u00c7in Siber G\u00fcvenlik Yasas\u0131&#8217;n\u0131n Genel Bak\u0131\u015f\u0131<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"http:\/\/Monolith.law\/wp-content\/uploads\/2024\/01\/woman.jpg\" alt=\"Rehberlik eden kad\u0131n\" class=\"wp-image-63921\" \/><\/figure>\n\n\n\n<p>\u00c7in Siber G\u00fcvenlik Yasas\u0131 (\u7f51\u7edc\u5b89\u5168\u6cd5), 2017 y\u0131l\u0131 Haziran ay\u0131nda y\u00fcr\u00fcrl\u00fc\u011fe giren bir \u00c7in yasas\u0131d\u0131r. Yasan\u0131n amac\u0131, ilk madde de a\u015fa\u011f\u0131daki gibi belirtilmi\u015ftir:<\/p>\n\n\n\n<ul>\n<li>A\u011f g\u00fcvenli\u011fini sa\u011flamak<\/li>\n\n\n\n<li>Siber uzay\u0131n egemenli\u011fini, \u00fclkenin g\u00fcvenli\u011fini ve kamu yarar\u0131n\u0131 korumak<\/li>\n\n\n\n<li>Bireylerin, t\u00fczel ki\u015filerin ve di\u011fer organizasyonlar\u0131n me\u015fru hak ve \u00e7\u0131karlar\u0131n\u0131 korumak<\/li>\n\n\n\n<li>Ekonomik ve sosyal bilgi toplumunun geli\u015fimini te\u015fvik etmek<\/li>\n<\/ul>\n\n\n\n<p>A\u011f, &#8220;bilgisayarlar, di\u011fer bilgi terminalleri ve ilgili ekipmanlar taraf\u0131ndan olu\u015fturulan ve bilgi toplama, saklama, iletim, de\u011fi\u015fim ve i\u015fleme gibi belirli kurallar ve programlara g\u00f6re i\u015flev g\u00f6ren sistem (76. madde)&#8221; olarak tan\u0131mlanmaktad\u0131r ve sadece interneti de\u011fil, intraneti de kapsamaktad\u0131r.<\/p>\n\n\n\n<p>\u00c7in Siber G\u00fcvenlik Yasas\u0131, AB Genel Veri Koruma T\u00fcz\u00fc\u011f\u00fc (GDPR) veya Japon Ki\u015fisel Bilgi Koruma Yasas\u0131&#8217;ndan farkl\u0131 olarak, sadece &#8220;bireylerin ve organizasyonlar\u0131n bilgilerini koruma&#8221; amac\u0131 g\u00fctmekle kalmay\u0131p, &#8220;\u00c7in&#8217;in ulusal g\u00fcvenli\u011fini ve kamu yarar\u0131n\u0131 koruma&#8221;y\u0131 da hedeflemesiyle \u00f6ne \u00e7\u0131kmaktad\u0131r. Yasada, ilgili i\u015fletmelere siber g\u00fcvenlik seviye korumas\u0131n\u0131n uygulanmas\u0131, uyumun sa\u011flanmas\u0131 ve hak ve y\u00fck\u00fcml\u00fcl\u00fcklerin netle\u015ftirilmesi gibi konular d\u00fczenlenmi\u015ftir.<\/p>\n\n\n\n<p>Siber g\u00fcvenlikle ilgili di\u011fer yasalar aras\u0131nda \u00c7in Veri G\u00fcvenlik Yasas\u0131 da bulunmaktad\u0131r.<\/p>\n\n\n\n<p>\u0130lgili makale: <a href=\"https:\/\/monolith.law\/corporate\/china-data-security-law\" target=\"_blank\" rel=\"noreferrer noopener\">\u00c7in Veri G\u00fcvenlik Yasas\u0131 Nedir? Japon \u015eirketlerin Almas\u0131 Gereken \u00d6nlemler[ja]<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Cin_Siber_Guvenlik_Yasasi%E2%80%99nin_Duzenleme_Kapsami\"><\/span>\u00c7in Siber G\u00fcvenlik Yasas\u0131&#8217;n\u0131n D\u00fczenleme Kapsam\u0131<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/monolith.law\/wp-content\/uploads\/2024\/01\/rule.jpg\" alt=\"Kurallar\" class=\"wp-image-63923\" \/><\/figure>\n\n\n\n<p>Japon \u015firketlerin \u00c7in Siber G\u00fcvenlik Yasas\u0131 kapsam\u0131na girmesi, a\u015fa\u011f\u0131daki durumlar i\u00e7in ge\u00e7erlidir:<\/p>\n\n\n\n<ul>\n<li>\u00c7in i\u00e7inde bilgi i\u015fleme faaliyetleri bulunmas\u0131<\/li>\n\n\n\n<li>\u00c7in&#8217;den Japonya&#8217;ya bilgi transferi yap\u0131lmas\u0131<\/li>\n<\/ul>\n\n\n\n<p>Merkezi Japonya&#8217;da olsa bile, yukar\u0131daki durumlara dahilse yasa kapsam\u0131na girer. Ayr\u0131ca, d\u00fczenleme kapsam\u0131ndaki ki\u015filer aras\u0131nda &#8216;a\u011f operat\u00f6rleri&#8217; ve &#8216;kritik bilgi altyap\u0131s\u0131 tesislerinin operat\u00f6rleri&#8217; bulunmaktad\u0131r.<\/p>\n\n\n\n<p>A\u011f operat\u00f6r\u00fc, a\u011f\u0131n sahibi veya y\u00f6neticisi, a\u011f hizmeti sa\u011flayan ki\u015fileri ifade eder.<\/p>\n\n\n\n<p>Kritik bilgi altyap\u0131s\u0131 tesislerinin operat\u00f6r\u00fc ise, zarar g\u00f6rmesi durumunda ulusal g\u00fcvenli\u011fi tehdit edebilecek alanlarda (enerji, ula\u015f\u0131m, finans, kamu hizmetleri vb.) faaliyet g\u00f6steren ve hasar veya veri s\u0131z\u0131nt\u0131s\u0131 gibi durumlarla ulusal g\u00fcvenlik, halk\u0131n ya\u015fam\u0131 ve kamu yarar\u0131n\u0131 ciddi \u015fekilde tehlikeye atabilecek tesisleri i\u015fleten ki\u015fileri kapsar.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Cin_Siber_Guvenlik_Yasasi%E2%80%99nin_Icerigi\"><\/span>\u00c7in Siber G\u00fcvenlik Yasas\u0131&#8217;n\u0131n \u0130\u00e7eri\u011fi<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/monolith.law\/wp-content\/uploads\/2024\/01\/woman2.jpg\" alt=\"Kad\u0131n foto\u011fraf\u0131\" class=\"wp-image-63924\" \/><\/figure>\n\n\n\n<p>\u00c7in Siber G\u00fcvenlik Yasas\u0131, a\u015fa\u011f\u0131daki gibi \u00e7e\u015fitli y\u00fck\u00fcml\u00fcl\u00fckler getirmektedir:<\/p>\n\n\n\n<ul>\n<li>Siber g\u00fcvenlik seviyesinin belirlenmesi<\/li>\n\n\n\n<li>Ulusal zorunlu standartlara uyum<\/li>\n\n\n\n<li>Ger\u00e7ek isim kayd\u0131 zorunlulu\u011fu<\/li>\n\n\n\n<li>Kritik bilgi altyap\u0131s\u0131 i\u015fletmecilerine y\u00f6nelik y\u00fck\u00fcml\u00fcl\u00fckler<\/li>\n\n\n\n<li>Y\u00f6netim ve yan\u0131t verme sisteminin olu\u015fturulmas\u0131<\/li>\n<\/ul>\n\n\n\n<p>Burada, her bir detay\u0131 a\u00e7\u0131kl\u0131yoruz.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Siber_Guvenlik_Derecelendirme_Sistemi_Kurulumu\"><\/span>Siber G\u00fcvenlik Derecelendirme Sistemi Kurulumu<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>\u00c7in Siber G\u00fcvenlik Yasas\u0131&#8217;n\u0131n (Chinese Cybersecurity Law) 21. maddesinde, a\u011f operat\u00f6rlerinin uymas\u0131 gereken &#8216;dereceli koruma sistemi&#8217; belirlenmi\u015ftir ve \u00c7in&#8217;de a\u011f sahibi olan \u015firketlerin ve organizasyonlar\u0131n dereceli koruma sertifikas\u0131 almas\u0131 gerekmektedir.<\/p>\n\n\n\n<p>Dereceli koruma sistemi, a\u011f g\u00fcvenlik y\u00f6netim sistemine y\u00f6nelik resmi bir de\u011ferlendirme sistemidir. Hedef al\u0131nan kapsam a\u015fa\u011f\u0131daki gibidir:<\/p>\n\n\n\n<ul>\n<li>A\u011f altyap\u0131s\u0131<\/li>\n\n\n\n<li>IoT (Nesnelerin \u0130nterneti)<\/li>\n\n\n\n<li>End\u00fcstriyel kontrol sistemleri<\/li>\n\n\n\n<li>B\u00fcy\u00fck \u00f6l\u00e7ekli internet siteleri ve veri merkezleri<\/li>\n\n\n\n<li>Kamu hizmet platformlar\u0131<\/li>\n<\/ul>\n\n\n\n<p>Dereceli koruma sistemi, bilgi sistemlerinin zarar g\u00f6rmesi durumunda etki alan\u0131 ve hasar b\u00fcy\u00fckl\u00fc\u011f\u00fcne g\u00f6re a\u015fa\u011f\u0131daki be\u015f dereceye ayr\u0131lm\u0131\u015ft\u0131r:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td rowspan=\"2\"><\/td><td colspan=\"3\">Zarar\u0131n Derecesi<\/td><\/tr><tr><td>Genel zarar<\/td><td>Ciddi zarar<\/td><td>\u00d6zellikle ciddi zarar<\/td><\/tr><tr><td>Vatanda\u015flar ve t\u00fczel ki\u015filer vb.<\/td><td>1. Derece<\/td><td>2. Derece<\/td><td>3. Derece<\/td><\/tr><tr><td>Sosyal d\u00fczen ve kamu yarar\u0131<\/td><td>2. Derece<\/td><td>3. Derece<\/td><td>4. Derece<\/td><\/tr><tr><td>Ulusal g\u00fcvenlik<\/td><td>3. Derece<\/td><td>4. Derece<\/td><td>5. Derece<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Ayr\u0131ca, her derecenin tan\u0131m\u0131 a\u015fa\u011f\u0131daki gibidir:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>Derece<\/td><td>Tan\u0131m<\/td><\/tr><tr><td>1. Derece<\/td><td>Y\u0131k\u0131ld\u0131\u011f\u0131nda, ilgili vatanda\u015flar\u0131n, t\u00fczel ki\u015filerin ve di\u011fer organizasyonlar\u0131n yasal hak ve \u00e7\u0131karlar\u0131n\u0131 zedeler, ancak ulusal g\u00fcvenlik, sosyal d\u00fczen veya kamu yarar\u0131n\u0131 etkilemeyen genel a\u011flar<\/td><\/tr><tr><td>2. Derece<\/td><td>Y\u0131k\u0131ld\u0131\u011f\u0131nda, ilgili vatanda\u015flar\u0131n ve t\u00fczel ki\u015filerin yasal hak ve \u00e7\u0131karlar\u0131na ciddi zarar verir veya sosyal d\u00fczen ve kamu yarar\u0131na zarar getirir, ancak ulusal g\u00fcvenli\u011fi etkilemeyen genel a\u011flar<\/td><\/tr><tr><td>3. Derece<\/td><td>Y\u0131k\u0131ld\u0131\u011f\u0131nda, ilgili vatanda\u015flar\u0131n, t\u00fczel ki\u015filerin ve di\u011fer organizasyonlar\u0131n yasal hak ve \u00e7\u0131karlar\u0131na \u00e7ok ciddi zararlar verir veya ulusal g\u00fcvenli\u011fe zarar veren \u00f6nemli a\u011flar<\/td><\/tr><tr><td>4. Derece<\/td><td>Y\u0131k\u0131ld\u0131\u011f\u0131nda, sosyal d\u00fczeni ve kamu yarar\u0131n\u0131 ciddi \u015fekilde zedeler veya ulusal g\u00fcvenli\u011fe \u00e7ok \u00f6nemli zararlar veren \u00f6zellikle \u00f6nemli a\u011flar<\/td><\/tr><tr><td>5. Derece<\/td><td>Y\u0131k\u0131ld\u0131\u011f\u0131nda, ulusal g\u00fcvenli\u011fe son derece ciddi zararlar veren en \u00f6nemli a\u011flar<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Bu s\u0131n\u0131fland\u0131rmaya g\u00f6re, uyulmas\u0131 gereken bilgi g\u00fcvenli\u011fi standartlar\u0131 belirlenmi\u015ftir. A\u011f operat\u00f6rleri genellikle 2. Derece ve \u00fczeri, \u00f6nemli bilgi altyap\u0131s\u0131 operat\u00f6rleri ise 3. Derece ve \u00fczeri derecelendirmeye tabidir.<\/p>\n\n\n\n<p>Derece almak i\u00e7in, operat\u00f6rler \u00f6ncelikle kendi derecelerini yetkililere ba\u015fvurur, ancak son onay\u0131 Kamu G\u00fcvenlik Bakanl\u0131\u011f\u0131&#8217;ndan (Public Security Department) almak zorundad\u0131rlar. Ayr\u0131ca, dereceli koruma sisteminde 2. Derece ve \u00fczeri i\u00e7in de\u011ferlendirme kurulu\u015flar\u0131 taraf\u0131ndan bir de\u011ferlendirme yap\u0131lmas\u0131 gerekmektedir. Dereceli koruma sistemine ayk\u0131r\u0131l\u0131k durumunda cezai yapt\u0131r\u0131mlar uygulanabilece\u011fi i\u00e7in dikkatli olunmal\u0131d\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ulkenin_Zorunlu_Standartlarina_Uyum\"><\/span>\u00dclkenin Zorunlu Standartlar\u0131na Uyum<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>\u0130nternet \u00fcr\u00fcnleri ve hizmetleri sa\u011flay\u0131c\u0131lar\u0131n\u0131n sundu\u011fu hizmetler, \u00fclkenin zorunlu standartlar\u0131na uygun olmal\u0131d\u0131r (Madde 22). Sa\u011flay\u0131c\u0131lar, k\u00f6t\u00fc ama\u00e7l\u0131 programlar y\u00fckleyemezler.<\/p>\n\n\n\n<p>Ayr\u0131ca, \u00fcr\u00fcnlerde veya hizmetlerde bir kusur, g\u00fcvenlik a\u00e7\u0131\u011f\u0131 veya ba\u015fka riskler ke\u015ffettiklerinde, derhal \u00f6nlem almal\u0131 ve kullan\u0131c\u0131lara bilgi verip ilgili yetkili makamlara raporlamal\u0131d\u0131rlar.<\/p>\n\n\n\n<p>2021 y\u0131l\u0131 Eyl\u00fcl ay\u0131nda (Reiwa 3 (2021)), a\u011f operat\u00f6rlerini hedef alan &#8216;\u0130nternet \u00dcr\u00fcn G\u00fcvenli\u011fi Zafiyet Y\u00f6netimi Y\u00f6netmelikleri (\u7f51\u7edc\u4ea7\u54c1\u5b89\u5168\u6f0f\u6d1e\u7ba1\u7406\u89c4\u5b9a)&#8217; y\u00fcr\u00fcrl\u00fc\u011fe girmi\u015ftir, bu nedenle sa\u011flay\u0131c\u0131lar\u0131n bu y\u00f6netmeliklere de ba\u015fvurarak uygun \u00f6nlemleri almas\u0131 gerekti\u011fi s\u00f6ylenebilir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Gercek_Isim_Kaydi_Gereklidir\"><\/span>Ger\u00e7ek \u0130sim Kayd\u0131 Gereklidir<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Network ba\u011flant\u0131 hizmetleri, sabit telefon ve cep telefonu network ba\u011flant\u0131 i\u015flemleri, bilgi payla\u015f\u0131m hizmetleri, anl\u0131k mesajla\u015fma servisleri gibi hizmetleri kullan\u0131c\u0131lara sunarken, kullan\u0131c\u0131lar\u0131n ger\u00e7ek isim kayd\u0131n\u0131 yapmak zorunlulu\u011fu bulunmaktad\u0131r. Kullan\u0131c\u0131lar ger\u00e7ek isim kayd\u0131n\u0131 yapmad\u0131klar\u0131 takdirde, hizmetin sunulmamas\u0131 gerekmektedir.<\/p>\n\n\n\n<p>Ayr\u0131ca, network i\u015fletmecilerinin, kullan\u0131c\u0131lar\u0131n yay\u0131nlad\u0131\u011f\u0131 bilgilerin yasalara ayk\u0131r\u0131 olup olmad\u0131\u011f\u0131n\u0131 denetleme y\u00fck\u00fcml\u00fcl\u00fc\u011f\u00fc de bulunmaktad\u0131r.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Onemli_Bilgi_Altyapisi_Tesisleri_Isletmecilerine_Yuklenen_Yukumlulukler\"><\/span>\u00d6nemli Bilgi Altyap\u0131s\u0131 Tesisleri \u0130\u015fletmecilerine Y\u00fcklenen Y\u00fck\u00fcml\u00fcl\u00fckler<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>\u00d6nemli Bilgi Altyap\u0131s\u0131 Tesislerinin i\u015fletmecileri, a\u011f operat\u00f6rlerine y\u00fcklenen g\u00fcvenlik \u00f6nlemlerini alman\u0131n yan\u0131 s\u0131ra, a\u015fa\u011f\u0131daki gibi ek tedbirlerin de al\u0131nmas\u0131 gerekti\u011fi belirtilmektedir:<\/p>\n\n\n\n<ul>\n<li>Sistem ve veritabanlar\u0131n\u0131n d\u00fczenli olarak yedeklenmesi<\/li>\n\n\n\n<li>G\u00fcvenlik olaylar\u0131na m\u00fcdahale plan\u0131n\u0131n haz\u0131rlanmas\u0131<\/li>\n\n\n\n<li>Y\u0131ll\u0131k g\u00fcvenlik de\u011ferlendirmesi<\/li>\n\n\n\n<li>Veri yerelle\u015ftirme<\/li>\n<\/ul>\n\n\n\n<p class=\"has-small-font-size\">Veri Yerelle\u015ftirme: Verilerin olu\u015fturuldu\u011fu \u00fclkenin s\u0131n\u0131rlar\u0131 i\u00e7inde saklanmas\u0131n\u0131 ve i\u015flenmesini ifade eden s\u00fcre\u00e7<\/p>\n\n\n\n<p>2021 (Reiwa 3) y\u0131l\u0131 Eyl\u00fcl ay\u0131nda y\u00fcr\u00fcrl\u00fc\u011fe giren &#8216;\u00d6nemli Bilgi Altyap\u0131s\u0131 Tesisleri G\u00fcvenlik Koruma Y\u00f6netmeli\u011fi&#8217;nde, \u00f6nemli bilgi altyap\u0131s\u0131 tesislerinin y\u00f6netimi, tan\u0131mlanmas\u0131 ve i\u015fletmecilerin y\u00fck\u00fcml\u00fcl\u00fckleri gibi konular daha da somut bir \u015fekilde belirlenmi\u015ftir, bu nedenle bu y\u00f6netmeli\u011fe de ba\u015fvurulmas\u0131 gerekmektedir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Yonetim_ve_Yanit_Sistemi_Kurulumu\"><\/span>Y\u00f6netim ve Yan\u0131t Sistemi Kurulumu<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>A\u011f operat\u00f6rlerinden beklenenler aras\u0131nda a\u015fa\u011f\u0131dakiler s\u0131ralanabilir (21. madde).<\/p>\n\n\n\n<ul>\n<li>G\u00fcvenlik y\u00f6netim sistemi ve i\u015flem prosed\u00fcrlerinin olu\u015fturulmas\u0131<\/li>\n\n\n\n<li>A\u011f g\u00fcvenlik sorumlusunun belirlenmesi<\/li>\n\n\n\n<li>G\u00fcvenlik ihlallerine kar\u015f\u0131 yan\u0131t planlar\u0131n\u0131n haz\u0131rlanmas\u0131 ve teknik \u00f6nlemlerin al\u0131nmas\u0131<\/li>\n\n\n\n<li>A\u011f izleme teknolojilerinin uygulanmas\u0131, log kay\u0131tlar\u0131n\u0131n saklanmas\u0131 (en az 6 ay)<\/li>\n\n\n\n<li>Veri s\u0131n\u0131fland\u0131rmas\u0131, kritik verilerin yedeklenmesi ve \u015fifrelenmesi gibi koruma \u00f6nlemleri<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Siber_Guvenlik_Yasasi_Ihlallerinde_Uygulanacak_Yaptirimlar\"><\/span>Siber G\u00fcvenlik Yasas\u0131 \u0130hlallerinde Uygulanacak Yapt\u0131r\u0131mlar<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/monolith.law\/wp-content\/uploads\/2024\/01\/caution.jpg\" alt=\"Dikkat Uyar\u0131s\u0131\" class=\"wp-image-63925\" \/><\/figure>\n\n\n\n<p>Derecelendirme koruma sistemi kapsam\u0131nda talep edilen g\u00fcvenlik gereksinimlerine uyulmamas\u0131 durumunda, d\u00fczeltme emri ve uyar\u0131 verilir. Emri reddetmek veya a\u011f g\u00fcvenli\u011fini tehlikeye atmak durumunda, 10 bin yuan (yakla\u015f\u0131k 1.500 dolar) ile 100 bin yuan (yakla\u015f\u0131k 15.000 dolar) aras\u0131nda bir para cezas\u0131 \u00f6denmesi gerekmektedir. Ayr\u0131ca, do\u011frudan sorumlu ki\u015filere 5 bin yuan (yakla\u015f\u0131k 750 dolar) ile 50 bin yuan (yakla\u015f\u0131k 7.500 dolar) aras\u0131nda para cezas\u0131 uygulan\u0131r.<\/p>\n\n\n\n<p>K\u00f6t\u00fc niyetli programlar kurulmas\u0131 veya \u00fcr\u00fcn ve hizmetlerdeki kusurlar ve g\u00fcvenlik a\u00e7\u0131klar\u0131 gibi risklere kar\u015f\u0131 \u00f6nlem al\u0131nmamas\u0131 durumlar\u0131nda da d\u00fczeltme emri ve uyar\u0131 \u00e7\u0131kar\u0131l\u0131r ve bu emirler reddedilirse para cezas\u0131 \u00f6deme y\u00fck\u00fcml\u00fcl\u00fc\u011f\u00fc do\u011far.<\/p>\n\n\n\n<p>\u0130hlalin niteli\u011fine g\u00f6re para cezas\u0131n\u0131n miktar\u0131 de\u011fi\u015febilir ve web sitesinin kapat\u0131lmas\u0131, i\u015fletme lisans\u0131n\u0131n iptali veya faaliyetlerin durdurulmas\u0131 gibi daha a\u011f\u0131r yapt\u0131r\u0131mlar\u0131n uygulanmas\u0131 riski de bulunmaktad\u0131r. Ge\u00e7mi\u015fte, ihlaller nedeniyle para cezalar\u0131na \u00e7arpt\u0131r\u0131lan ve ilgili personelin \u00f6m\u00fcr boyu ayn\u0131 sekt\u00f6rde \u00e7al\u0131\u015fmas\u0131n\u0131n yasakland\u0131\u011f\u0131 durumlar da olmu\u015ftur, bu nedenle siber g\u00fcvenlik \u00f6nlemlerinin al\u0131nmas\u0131 zorunludur diyebiliriz.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Japon_Sirketlerin_Almasi_Gereken_Siber_Guvenlik_Yasasi_Onlemleri\"><\/span>Japon \u015eirketlerin Almas\u0131 Gereken Siber G\u00fcvenlik Yasas\u0131 \u00d6nlemleri<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"http:\/\/Monolith.law\/wp-content\/uploads\/2024\/01\/man-guiding.jpg\" alt=\"Yol g\u00f6steren adam\" class=\"wp-image-63914\" \/><\/figure>\n\n\n\n<p>\u00c7in Siber G\u00fcvenlik Yasas\u0131 karma\u015f\u0131k oldu\u011fundan, nereden ba\u015flayaca\u011f\u0131n\u0131z\u0131 bilemeyenler olabilir. Bu yaz\u0131da, Japon \u015firketlerin almas\u0131 gereken \u00f6nlemleri a\u00e7\u0131kl\u0131yoruz.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Bilgi_Sistemleri_ve_DX_Ilgili_Departmanlarla_Koordinasyon_Icinde_Bir_Sistem_Kurmak\"><\/span>Bilgi Sistemleri ve DX \u0130lgili Departmanlarla Koordinasyon \u0130\u00e7inde Bir Sistem Kurmak<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>\u00c7in Siber G\u00fcvenlik Yasas\u0131&#8217;na uyum sa\u011flamak i\u00e7in, i\u015fletme s\u00fcre\u00e7lerinin olu\u015fturulmas\u0131 ve ki\u015fisel bilgi y\u00f6netim politikalar\u0131n\u0131n geli\u015ftirilmesi ve eklenmesi gibi ad\u0131mlar at\u0131lmal\u0131d\u0131r. Ayr\u0131ca, derecelendirme koruma sistemine uyum sa\u011flamak i\u00e7in, \u015firketin sistemlerine teknik \u00f6nlemler almak zorunludur.<\/p>\n\n\n\n<p>Hukuk, genel i\u015fler gibi departmanlar\u0131n her birinin ayr\u0131 ayr\u0131 hareket etmesi yerine, bilgi sistemleri ve DX ilgili departmanlarla koordinasyon i\u00e7inde bir sistem kurulmas\u0131 gerekecektir.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Sirketin_Sahip_Oldugu_Her_Sistemin_Hangi_Dereceye_Uygun_Oldugunu_Belirlemek\"><\/span>\u015eirketin Sahip Oldu\u011fu Her Sistemin Hangi Dereceye Uygun Oldu\u011funu Belirlemek<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>\u00d6ncelikle, \u015firket sistemlerinin derecelendirilmesini yapmal\u0131s\u0131n\u0131z. Bu dereceye uygun olarak, her departman siber g\u00fcvenlik kurallar\u0131na g\u00f6re hareket etmelidir. Hukuk, genel i\u015fler ve risk y\u00f6netimi departmanlar\u0131nda, yasalara uygun d\u00fczenlemelerin ve i\u015fletme prosed\u00fcrlerinin g\u00f6zden ge\u00e7irilmesi ve revize edilmesi, bilgi sistemleri ve DX ilgili departmanlar\u0131nda ise teknik \u00f6nlemlerin al\u0131nmas\u0131 gerekmektedir. Burada, her bir \u00f6nlemin detaylar\u0131 a\u00e7\u0131klanacakt\u0131r.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Hukuk_Genel_Isler_ve_Risk_Yonetimi_Departmanlari\"><\/span>Hukuk, Genel \u0130\u015fler ve Risk Y\u00f6netimi Departmanlar\u0131<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Derecelendirmede belirtilen hususlarla \u015firketin y\u00f6netim durumu ve bilgi g\u00fcvenli\u011fi sistemini kar\u015f\u0131la\u015ft\u0131rarak, d\u00fczenlemelerin eklenmesi ve i\u015fletme yap\u0131s\u0131n\u0131n g\u00f6zden ge\u00e7irilmesi gerekmektedir. Daha sonra, nas\u0131l bir yakla\u015f\u0131m sergilenece\u011fi \u00fczerine d\u00fc\u015f\u00fcn\u00fclerek, sistemlerin kurulmas\u0131 ve d\u00fczenlemelerin yap\u0131lmas\u0131 gerekecektir.<\/p>\n\n\n\n<p>Derece 2. seviye ve \u00fczeri ise, yetkililere bildirimde bulunulmal\u0131d\u0131r. \u015eirket \u00f6nemli bilgi altyap\u0131s\u0131 i\u015fletmecisi olarak kabul ediliyorsa, 3. seviye ve \u00fczeri derecelendirme koruma sertifikas\u0131 al\u0131nmas\u0131 gerekecektir. Ayr\u0131ca, veri yerelle\u015ftirme d\u00fczenlemelerine uyum, \u00e7al\u0131\u015fanlara d\u00fczenli bilgi g\u00fcvenli\u011fi e\u011fitimi ve teknik e\u011fitimler verilmesi gibi bir\u00e7ok konuda \u00f6nlem al\u0131nmas\u0131 gerekmektedir. \u00d6nemli bilgi altyap\u0131s\u0131 i\u015fletmecisi olma ihtimaliniz varsa, dan\u0131\u015fman avukatlarla g\u00f6r\u00fc\u015ferek bir eylem plan\u0131 belirlemek faydal\u0131 olacakt\u0131r.<\/p>\n\n\n\n<p>Son y\u0131llarda \u00c7in&#8217;de g\u00fcvenlikle ilgili bir\u00e7ok yeni d\u00fczenleme y\u00fcr\u00fcrl\u00fc\u011fe girmi\u015ftir. Bu nedenle, risk y\u00f6netimi departman\u0131nda, yeni d\u00fczenlemelere uygun risk y\u00f6netimi stratejileri geli\u015ftirilmesi gerekecektir.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Bilgi_Sistemleri_ve_DX_Ilgili_Departmanlar\"><\/span>Bilgi Sistemleri ve DX \u0130lgili Departmanlar<span class=\"ez-toc-section-end\"><\/span><\/h4>\n\n\n\n<p>Bilgi sistemleri ve DX ilgili departmanlar, dereceye uygun g\u00fcvenlik koruma \u00f6nlemlerinin sistemlere entegrasyonunu sa\u011flamal\u0131d\u0131r. \u00d6ncelikle, mevcut sistemlerin g\u00fcvenlik koruma \u00f6nlemlerini g\u00f6zden ge\u00e7irip, eksiklikler varsa, Siber G\u00fcvenlik Yasas\u0131&#8217;na uygun sistemleri entegre etmelisiniz.<\/p>\n\n\n\n<p>Siber G\u00fcvenlik Yasas\u0131&#8217;n\u0131n yan\u0131 s\u0131ra, veri yerelle\u015ftirme d\u00fczenlemeleri, s\u0131n\u0131r \u00f6tesi k\u0131s\u0131tlamalar ve h\u00fck\u00fcmet eri\u015fimi gibi konularda da uyum sa\u011flamak zorundas\u0131n\u0131z. Hangi verilerin \u00c7in d\u0131\u015f\u0131na aktar\u0131ld\u0131\u011f\u0131n\u0131 anlamak ve \u015firketin veri toplama ve saklama durumunu g\u00f6zden ge\u00e7irmek gerekmektedir.<\/p>\n\n\n\n<p>Siber G\u00fcvenlik Yasas\u0131&#8217;nda, sadece d\u00fczenlemelerin revize edilmesi yeterli olmay\u0131p, teknik koruma \u00f6nlemlerinin de al\u0131nmas\u0131 gerekti\u011finden, ilgili departmanlar\u0131n i\u015f birli\u011fi \u015fartt\u0131r.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Ozet_Sirketinizin_uyum_surecinde_yardima_ihtiyaciniz_olursa_uzmanlara_danisin\"><\/span>\u00d6zet: \u015eirketinizin uyum s\u00fcrecinde yard\u0131ma ihtiyac\u0131n\u0131z olursa, uzmanlara dan\u0131\u015f\u0131n<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"https:\/\/monolith.law\/wp-content\/uploads\/2024\/01\/man-and-woman.jpg\" alt=\"Erkek ve kad\u0131n foto\u011fraf\u0131\" class=\"wp-image-63926\" \/><\/figure>\n\n\n\n<p>\u00c7in Siber G\u00fcvenlik Yasas\u0131, \u00c7in&#8217;in ulusal g\u00fcvenli\u011fini korumak amac\u0131yla olu\u015fturulmu\u015f bir d\u00fczenlemedir. Siber G\u00fcvenlik Yasas\u0131&#8217;na uyum sa\u011flamak i\u00e7in sadece hukuk veya genel i\u015fler departmanlar\u0131 taraf\u0131ndan d\u00fczenlemelerin revize edilmesi de\u011fil, ayn\u0131 zamanda teknik koruma \u00f6nlemlerinin de al\u0131nmas\u0131 gerekmektedir.<\/p>\n\n\n\n<p>Siber G\u00fcvenlik Yasas\u0131 y\u00fcr\u00fcrl\u00fc\u011fe girdikten sonra, &#8220;\u0130nternet \u00dcr\u00fcn G\u00fcvenli\u011fi Zafiyet Y\u00f6netimi Y\u00f6netmeli\u011fi&#8221; ve &#8220;Siber G\u00fcvenlik \u0130nceleme Y\u00f6ntemi (Ulusal G\u00fcvenlik \u0130nceleme Sistemi&#8217;nin somutla\u015ft\u0131r\u0131lmas\u0131)&#8221; gibi veri uyumlulu\u011fu ile ilgili yasalar pe\u015f pe\u015fe y\u00fcr\u00fcrl\u00fc\u011fe girmi\u015ftir. \u0130hlal edilmesi durumunda para cezas\u0131, web sitesinin kapat\u0131lmas\u0131 veya i\u015fletme izninin iptali gibi idari yapt\u0131r\u0131mlarla kar\u015f\u0131 kar\u015f\u0131ya kal\u0131nabilece\u011finden dikkatli olunmas\u0131 gerekmektedir. \u00c7in&#8217;de i\u015f yapmakta olan veya gelecekte i\u015f yapmay\u0131 planlayan \u015firketler i\u00e7in, \u00c7in hukuku konusunda uzman avukatlara dan\u0131\u015fman\u0131z\u0131 tavsiye ederiz.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Hukuk_Buromuz_Tarafindan_Sunulan_Cozumler\"><\/span>Hukuk B\u00fcromuz Taraf\u0131ndan Sunulan \u00c7\u00f6z\u00fcmler<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Monolith Hukuk B\u00fcrosu, IT, internet ve i\u015f d\u00fcnyas\u0131nda uzmanla\u015fm\u0131\u015f bir hukuk firmas\u0131d\u0131r. \u00c7in, Amerika, Avrupa Birli\u011fi \u00fclkeleri gibi d\u00fcnya genelindeki bir\u00e7ok \u00fclkenin davalar\u0131na bakm\u0131\u015ft\u0131r. Yurtd\u0131\u015f\u0131nda i\u015f yaparken bir\u00e7ok hukuki riskle kar\u015f\u0131la\u015f\u0131ld\u0131\u011f\u0131 i\u00e7in, deneyimli avukatlar taraf\u0131ndan sa\u011flanan destek hayati \u00f6nem ta\u015f\u0131r. B\u00fcromuz, yerel yasalar ve d\u00fczenlemeler konusunda derin bilgiye sahip olup, d\u00fcnya genelindeki hukuk b\u00fcrolar\u0131yla i\u015f birli\u011fi i\u00e7indedir.<\/p>\n\n\n\n<p>Monolith Hukuk B\u00fcrosu&#8217;nun Uzmanl\u0131k Alanlar\u0131: <a href=\"https:\/\/monolith.law\/global-jpn2fgn\" target=\"_blank\" rel=\"noreferrer noopener\">Uluslararas\u0131 Hukuk ve Yurtd\u0131\u015f\u0131 \u0130\u015fler[ja]<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Teikoku Databank&#8217;\u0131n \u00d6zel Raporu: Japon \u015eirketlerinin &#8216;\u00c7in&#8217;e Giri\u015f&#8217; E\u011filimleri Ara\u015ft\u0131rmas\u0131 (2022)[ja]\u2019ne g\u00f6re, \u00c7in&#8217;de faaliyet g\u00f6steren Japon \u015firketlerinin say\u0131s\u0131 12,706 o [&hellip;]<\/p>\n","protected":false},"author":32,"featured_media":72254,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18],"tags":[24,29],"acf":[],"_links":{"self":[{"href":"https:\/\/monolith.law\/tr\/wp-json\/wp\/v2\/posts\/71886"}],"collection":[{"href":"https:\/\/monolith.law\/tr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/monolith.law\/tr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/monolith.law\/tr\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/monolith.law\/tr\/wp-json\/wp\/v2\/comments?post=71886"}],"version-history":[{"count":2,"href":"https:\/\/monolith.law\/tr\/wp-json\/wp\/v2\/posts\/71886\/revisions"}],"predecessor-version":[{"id":72255,"href":"https:\/\/monolith.law\/tr\/wp-json\/wp\/v2\/posts\/71886\/revisions\/72255"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/monolith.law\/tr\/wp-json\/wp\/v2\/media\/72254"}],"wp:attachment":[{"href":"https:\/\/monolith.law\/tr\/wp-json\/wp\/v2\/media?parent=71886"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/monolith.law\/tr\/wp-json\/wp\/v2\/categories?post=71886"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/monolith.law\/tr\/wp-json\/wp\/v2\/tags?post=71886"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}