Risk & Security

Security Protection
  • Security Protection Act
  • ISO31000
  • ISO27001

iThe purpose of the Security Protection Act is to safeguard operations that are vital to Sweden’s security against threats such as espionage, sabotage, terrorism, and other crimes. The Act aims to prevent critical information and activities from being unlawfully disclosed, altered, made inaccessible, or destroyed.

iFACTS provides a powerful and user-friendly IT solution for organizations that need to manage and follow up on requirements linked to the Security Protection Act and physical security. The system is designed to ensure regulatory compliance, simplify administration, and create structure in information management where requirements for protection, traceability, and documentation are particularly high.

With iFACTS, you gain support for the entire chain of security protection work — from initial mapping to follow-up. The system enables the management of:

  • Protective security agreements with both internal and external parties
  • Security vetting processes, including decision logging and traceable documentation
  • Security-related case management and handling of classified information
  • Incident and nonconformity reporting related to security
  • Contingency planning, including administration of wartime organizational structures, roles, personnel, vehicles, and critical equipment
  • Documentation and control of physical protection measures, such as access control systems, alarms, and video surveillance

The system offers a structured way to manage and organize information in accordance with the Swedish Security Service (Säkerhetspolisen) guidelines, facilitating audits, inspections, and formal reporting. Through guided workflows, permission-based access, and automated notifications, the platform enables both efficient and secure processes.

Streamlined handling with emphasis on security and flexibility

To meet varying requirements from different types of operations, iFACTS offers several installation options. The system can be delivered as:

  • On-premises installation: Run iFACTS entirely within your own IT environment, fully disconnected from external systems or cloud providers — ideal for organizations with strict sovereignty and security requirements.
  • SaaS delivery: Hosted in secure Swedish datacenters within the EU/EEA. Each customer receives a dedicated instance with no shared environments.

iFACTS' hosting infrastructure is designed for high standards of information security and uptime. All data transfers are encrypted, backups are performed daily and stored for a minimum of 365 days, and regular restore tests are carried out to ensure reliability. Backup and retention policies can be tailored to your specific needs.

Benefits Across the Entire Organization

By digitizing your protective security workflows, iFACTS helps you:

  • Reduce case processing time
  • Minimize manual handling
  • Increase traceability and documentation quality
  • Improve oversight and control
  • Ensure secure and compliant management of sensitive data

The platform is built to support public sector organizations and mission-critical operations but is equally suited to private entities with high demands on structure, transparency, and data protection.

Benefits

With iFACTS, you gain effective support in security protection, including security vetting for personnel and suppliers, SUA agreements, third-party documentation, security protection analysis, risk management, and supplier oversight. The iFACTS methodology is aligned with the Swedish Security Service’s guidelines for security protection. The platform enables a structured, traceable, and standards-compliant approach, supporting personnel security, physical security, and information security, with direct links to incidents, risks, and nonconformities.

Clear and accurate reporting on security protection to management is essential — ensuring leaders can take responsibility and be held accountable.

Workflows

  • Documentation, security classification
  • Security protection analysis
  • SUA (Security Protection Agreement)
  • Information security
  • Physical security
  • Personnel security, security vetting
  • Incident and nonconformity management
  • Continuous monitoring of security protection
  • Nonconformity handling from, e.g., audits or status changes
  • Management reporting

Contact

Simon Tegnell
Phone: +46 72 562 20 15
Email: simon.tegnell@ifacts.se