Security

Security

At Express, we always prioritize security, responsibility, and precision

Vores forretning hviler på vores kunders tillid – tillid til, at vi håndterer de data, vi betros, i overensstemmelse med interne retningslinjer, lovgivningen og kundernes forventninger.

We protect your data through clear, transparent, and efficient processes, where both handling and access are always limited to what is strictly necessary to complete the task.

Vi tager ikke tillid for givet – vi gør os fortjent til den. Derfor har vi etableret et solidt fundament af politikker, procedurer og kontroller, som vi følger konsekvent i det daglige arbejde. Vores indsats bliver løbende dokumenteret og valideret via to årlige ISAE 3000 type II-erklæringer, udført af Ernst & Young.

At Express A/S, we know that trust begins with security.

Data security

We host all our servers with Sentia in highly secured data centers located in Denmark. This ensures that your data always remains under Danish jurisdiction, where GDPR and data protection are an integral part of operations.

All data exchange takes place exclusively via encrypted connections (SFTP) to prevent unauthorized access, and we only retain data for as long as necessary to complete the specific task.

Data is deleted according to clearly defined and regularly reviewed procedures once the purpose has been fulfilled.

Vores IT-infrastruktur er bygget på gennemsigtighed, enkelhed og naturligvis sikkerhed.

Vi arbejder med sikkerhed gennem enkelhed – jo færre led, jo færre risici.

Data security

We host all our servers with Sentia in highly secured data centers located in Denmark. This ensures that your data always remains under Danish jurisdiction, where GDPR and data protection are an integral part of operations. 

All data exchange takes place exclusively via encrypted connections (SFTP) to prevent unauthorized access, and we only retain data for as long as necessary to complete the specific task.

Security through simplicity – fewer links, fewer risks.

  • Data is deleted according to clearly defined and regularly reviewed procedures once the purpose has been fulfilled.
  • Our IT infrastructure is built on simplicity, transparency, and security.
  • Customer information is handled safely and securely every step of the way. 

GDPR and process

Hver enkelt opgave behandles fuldstændigt isoleret i sit eget, afgrænsede område på vores servere. Denne adskillelse gælder gennem hele vores infrastruktur – fra databaser og filsystemer til interne processer og adgangsstyring.

På den måde sikrer vi, at data fra forskellige kunder eller projekter aldrig blandes eller krydser hinanden, og at ingen information utilsigtet kan tilgås på tværs af opgaver. Det er en enkel og sikker metode, der reducerer kompleksitet og minimerer risikoen for fejl eller datalæk.

Samtidig gør den det lettere at dokumentere og efterleve gældende krav til informationssikkerhed. Resultatet er en gennemsigtig og kontrolleret proces, hvor alle kundedata håndteres korrekt og i fuld overensstemmelse med GDPR.

GDPR and process

Each task is managed entirely within its own isolated environment on our servers. This separation applies throughout our entire infrastructure – from databases and file systems to internal processes and access management. In this way, we ensure that data from different clients or projects is never mixed or intersected, and that no information can be unintentionally accessed across tasks.

It is a simple and secure method that reduces complexity and minimizes the risk of errors or data leaks. At the same time, it makes it easier to document and comply with applicable information security requirements. The result is a transparent and controlled process, where all customer data is handled correctly and in full compliance with the GDPR.

Production

Production takes place in a security zone with physical access control, where only PET-cleared employees with a documented work-related need are granted access.

We follow our core principle: simplicity creates security. Each task is handled completely separately – from printing and enveloping to delivery. For example, if we receive 811 letters, we deliver exactly 811 letters. This manual reconciliation, combined with the clear separation of tasks, allows us to document every single step of the process.

The result is full traceability and peace of mind.

You can trust that all data is handled correctly, securely, and without any risk of mix-up or unauthorized overlap.

Vi læser, registrerer eller gemmer aldrig nogle personoplysninger fra brevene.

Security through simplicity – because the most secure solution is often the simplest one.

All processes are carried out under strictly controlled conditions.

Production

Production takes place in a security zone with physical access control, where only PET-cleared employees with a documented work-related need are granted access. 

We follow our core principle: simplicity creates security. Each task is handled completely separately – from printing and enveloping to delivery. For example, if we receive 811 letters, we deliver exactly 811 letters. This manual reconciliation, combined with the clear separation of tasks, allows us to document every single step of the process.

The result is full traceability and peace of mind.

  • You can trust that all data is handled correctly, securely, and without any risk of mix-up or unauthorized overlap.
  • We never read, record, or store any personal data from any of the letters.
  • Security through simplicity – because the most secure solution is often the simplest one.
  • All processes are carried out under strictly controlled conditions.