Skip to content

Data security and reliability

Using EG Xena is an investment in data security for your company

Our certificates

Certificates are your documentation that we meet the safety requirements

ISO/IEC 27001

An international standard for information security that sets out requirements for roles and responsibilities as well as continuous improvement of our security.

ISAE 3000

Documents that an independent auditor has reviewed our processes related to the processing of your data and that they are in accordance with applicable legislation.

ISAE 3402

Recognized auditing standard that confirms the security and effectiveness of our security policy, risk management, network security and contingency plans.

If you have any questions about our data security, you can always contact EG’s Data Protection Office via dpo@EG.dk.

Effective safety control

We have made it easy for you to secure your and your customers’ data in the best possible way.

  • Passwort
  • Two-factor authentication
  • Encrypted data traffic

Secure backup

We protect your valuable data. Our data center makes daily backups and stores everything safely in Denmark.

  • Automatic backup every day
  • You control and own your data
  • Make your own backup if you wish

We are trained in IT security

EG handles data for thousands of companies and organizations. We want to be a 100% trusted data partner.

  • We keep the systems up to date
  • Stable and secure server environment
  • Our employees are trained in IT security

Frequently asked questions about data and security

More about digital security for your business

The European Cybersecurity Month

The EU's annual campaign dedicated to promoting cybersecurity among EU citizens and organisations.

Go to cybersecuritymonth.eu

Data security at EG

Read more about how EG works with data.

Go to EG's compliance page

Data processing agreement

The agreement describes your rights and our obligations regarding data.

See our data processing agreement

Our Privacy Policy

What data we store, what it is used for and how it is handled.

See our Privacy Policy