Deltagon Blog

Take a look at our blog on security of e-communications and e-services. You can also order up-to-date publications straight to your email.



Data Protection in Subject Access Requests (SAR)

The EU’s General Data Protection Regulation (GDPR) has brought numerous rights to the data subject in regard to the..

GDPR General Data Protection Regulation data protection personal data Blog


GDPR elevates the information society into a new era

We are approaching the last moments before the EU's General Data Protection Regulation (GDPR) will be applied on 25th of..

GDPR General Data Protection Regulation Articles data protection data protection regulation personal data Blog


Secure handling of sensitive data

Does your company gather sensitive personal data with electronic forms? Have you ever thought where this information is..

data protection electronic forms secure workspace Blog data security sensitive data sensitive information


3 steps: How to prepare in advance to the EU Data Protection reform of 2018

The reform gives companies and organizations a good opportunity to check and put their own data security processes into..

GDPR General Data Protection Regulation Articles data protection Data protection Data Protection reform Information security personal data personal data register personal information Blog


Data protection package making progress in EU

The EU Parliament and Council negotiators have come to an agreement on the new data protection package that aims to..

EU data protection Data protection News


Basics of information security in email – getting to know the terminology

As communication has become electronic also information security and data protection are more talked about. What then is..

Information Security availability confidentiality data protection Data protection Information security integrity Security of e-mail Blog


Four steps to identify critical information

Do you know what kind of confidential information moves between your company and the outside world? If not, I recommend..

Information Security confidential information critical information data protection Data protection Information security Blog


Good information security practices – Take this into account!

Probably every computer user is familiar with the words information security, and each one of us has some kind of..

data protection Data protection e-mail security electronic information security Information security information security guideline information security practice security of electronic communication Security of e-mail Blog

CTA -banneri

Lorem ipsum dolor sit amet, consectueter adipiscing elit. Sed posure interdum sem. Quisque ligula eros ullamcorper quis, lacinia quis faicilis sed sapien. Mauris varius diam vitae arcu. Sed arcu lectus auctor vitae,

Contact us

Do you have any questions? Do you want more information or a more detailed presentation? Please leave your contact information and we’ll get back to you.