The efsta process offers several levels of security making sure irregularities, malicious attacks and manipulation attempts are immediately detected and stopped. Efsta’s encoding techniques and intelligent defense algorithms ensure maximum data protection and data security (see expert report).


It is made sure that only the owner of the data is able to produce the data in readable form. Therefore only the owner of the data is able to create an access code to allow third parties (e.g. auditors or accountants) to access the data. Data access can be limited as to time or content.


Authentication is provided by a trustworthy agency (country-specific)