Deltagon Blog

Take a look at our blog on security of e-communications and e-services. You can also order up-to-date publications straight to your email.

Subscribe to the blog

Blog

Data Protection in Subject Access Requests (SAR)

The EU’s General Data Protection Regulation (GDPR) has brought numerous rights to the data subject in regard to the..

GDPR General Data Protection Regulation data protection personal data Blog

Blog

How do I verify who fills out a form?

Does your company collect data using forms? If the form is not personally returned, do you have the means to verify who..

Electronic forms electronic services Blog strong identification

Blog

File sharing – by email or in a data sharing service?

Various files are constantly distributed in electronic format. A surprising number of them contains information that..

file sharing Information security Information sharing secure e-mail Blog

Blog

GDPR elevates the information society into a new era

We are approaching the last moments before the EU's General Data Protection Regulation (GDPR) will be applied on 25th of..

GDPR General Data Protection Regulation Articles data protection data protection regulation personal data Blog

Blog

Encrypting your internal e-mail traffic – what is it about?

E-mail should not be used for the exchange of confidential data such as personal information without encryption. But why..

email messaging secure e-mail Blog data security internal email traffic

Blog

Internal approval process – electronically and securely

An employee sends a bill for monthly expenses. A manager must accept the invoice, after which it will be paid. The..

Information security Blog approval process

Blog

Secure data transfer – what to consider

In group communications such as project groups, there is often a need to distribute information and files electronically...

confidential information Blog data security data transfer

Blog

Secure handling of sensitive data

Does your company gather sensitive personal data with electronic forms? Have you ever thought where this information is..

data protection electronic forms secure workspace Blog data security sensitive data sensitive information

Blog

Encrypt emails with your company's own look and feel

E-mail encryption is often perceived difficult. The expression itself can bring up images of encryption keys, passwords,..

Articles e-mail security email encryption secure e-mail Blog

Blog

Share files by using a mobile device

Do you find it important to have your files secured, but easily shareable with both internal and external stakeholders?..

file sharing Information sharing Blog mobile

CTA -banneri

Lorem ipsum dolor sit amet, consectueter adipiscing elit. Sed posure interdum sem. Quisque ligula eros ullamcorper quis, lacinia quis faicilis sed sapien. Mauris varius diam vitae arcu. Sed arcu lectus auctor vitae,

Contact us

Do you have any questions? Do you want more information or a more detailed presentation? Please leave your contact information and we’ll get back to you.