{"id":81077,"date":"2022-12-13T03:01:42","date_gmt":"2022-12-13T02:01:42","guid":{"rendered":"https:\/\/blog.bluebeam.com\/se\/?p=81077"},"modified":"2022-12-13T15:56:21","modified_gmt":"2022-12-13T14:56:21","slug":"data-document-security-in-construction","status":"publish","type":"post","link":"https:\/\/blog.bluebeam.com\/se\/data-document-security-in-construction\/","title":{"rendered":"Ledare i byggbranschen: \u00e4r era dokumentdata s\u00e4kra?"},"content":{"rendered":"\n<p class=\"has-drop-cap\">I en allt mer digital och sammankopplad v\u00e4rld gl\u00f6mmer m\u00e5nga f\u00f6retag bort ett av de enklaste teknologiska verktygen, som kan ha en stor inverkan p\u00e5 produktivitet och effektivitet: dokuments\u00e4kerheten.<\/p>\n\n\n\n<p>Att f\u00f6rst\u00e5 vikten av att skydda och s\u00e4kert distribuera de data som ing\u00e5r i byggdokument \u00e4r det f\u00f6rsta steget mot att fr\u00e4mja tillv\u00e4xt och effektivitet inom bygg- och fastighets\u00e4garbranschen.<\/p>\n\n\n\n<p>Enligt en unders\u00f6kning som <a href=\"https:\/\/www.constructiondive.com\/news\/contractors-lost-18-trillion-globally-in-2020-due-to-bad-data-new-report\/606939\/\" target=\"_blank\" rel=\"noreferrer noopener\">Autodesk och FMI<\/a> nyligen genomf\u00f6rde kostade felaktiga data den globala byggbranschen uppskattningsvis 1,85 biljoner dollar (cirka 19,8 biljoner kronor) 2020. Att uppr\u00e4tth\u00e5lla relevanta, korrekta och fullst\u00e4ndiga datam\u00e4ngder som kan anv\u00e4ndas f\u00f6r att informera datadrivna beslut \u00e4r ett viktigt steg f\u00f6r byggf\u00f6retag som vill lyckas i informationsteknikens tids\u00e5lder.<\/p>\n\n\n\n<p>Att skydda data g\u00e5r dock hand i hand med att skapa och underh\u00e5lla dem. Surkay Baykara, chefskonsult f\u00f6r informationss\u00e4kerhet p\u00e5 PCI DSS, s\u00e4ger: \u201d[Data]s\u00e4kerhet inneb\u00e4r underh\u00e5ll av alla viktiga dokument som lagras, arkiveras, s\u00e4kerhetskopieras, bearbetas, levereras och s\u00e5 sm\u00e5ningom kasseras n\u00e4r de inte l\u00e4ngre beh\u00f6vs.\u201d Enligt <a href=\"https:\/\/cyber-edge.com\/wp-content\/uploads\/2021\/04\/CyberEdge-2021-CDR-Report-v1.1-1.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">2021 \u00e5rs Cyberthreat Defense Report<\/a> hade ungef\u00e4r 86&nbsp;% av de 1&nbsp;200 tillfr\u00e5gade f\u00f6retagen sett sina data \u00e4ventyrade av minst en lyckad cyberattack under 2021. Det motsvarar den st\u00f6rsta \u00e5rliga \u00f6kningen sedan 2015.<\/p>\n\n\n\n<p>Ut\u00f6ver den \u00f6kade cyberbrottsligheten blir dataintr\u00e5ng utan onda avsikter ocks\u00e5 allt vanligare, nu n\u00e4r en stor andel av arbetskraften har g\u00e5tt \u00f6ver till distansarbete. Den h\u00e4r typen av intr\u00e5ng beror ofta p\u00e5 m\u00e4nskliga fel, till exempel att man av misstag skickar data till fel mottagare (via e-post eller post), att fel data visas i en individs onlineportal eller att man helt enkelt skickar filer till flera mottagare som d\u00e5 kan se varandras uppgifter.<\/p>\n\n\n\n<p>Du kan bidra till att minska den h\u00e4r typen av incidenter genom att utbilda ditt team om deras ansvar, och h\u00e5lla kommunikationssystem och andra system uppdaterade.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Datas\u00e4kerhetens stadier<\/strong><\/h3>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/Slide-1_SE.png\" alt=\"\" class=\"wp-image-81080\" width=\"737\" height=\"352\" srcset=\"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/Slide-1_SE.png 710w, https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/Slide-1_SE-300x143.png 300w\" sizes=\"(max-width: 737px) 100vw, 737px\" \/><\/figure>\n\n\n\n<p><strong>Insamling<\/strong>: Det h\u00e4r stadiet i processen beskriver hur information kommer in i datahanteringssystemet. Det kan handla om att skanna pappersdokument, arkivera e-postmeddelanden eller skapa och spara dokument direkt fr\u00e5n ett program. F\u00f6rutom insamlingen av data \u00e4r det av lika stor vikt att de ocks\u00e5 skickas vidare (&#8221;routing&#8221;) till en l\u00e4mplig lagringsplats.<\/p>\n\n\n\n<p><strong>Lagring<\/strong>: Datalagring kan till\u00e4mpas p\u00e5 s\u00e5v\u00e4l pappersdokument som elektroniska system. Vilken typ av lagring, lagringsplats och \u00e5tkomsts\u00e4kerhet som kr\u00e4vs f\u00f6r respektive datatyp \u00e4r viktiga \u00f6verv\u00e4ganden f\u00f6r f\u00f6retag som inf\u00f6r den h\u00e4r typen av processer.<\/p>\n\n\n\n<p><strong>Datahantering<\/strong>: Det h\u00e4r steget i processen handlar om att hantera beh\u00f6righeter, anv\u00e4ndarroller, versionskontroll och granskningskedjor f\u00f6r data. En viktig aspekt av en s\u00e4ker datamilj\u00f6 \u00e4r att begr\u00e4nsa \u00e5tkomsten till de individer som beh\u00f6ver ha direkt tillg\u00e5ng till informationen, och att uppr\u00e4tth\u00e5lla register \u00f6ver varje aktivitet eller transaktion som till\u00e4mpas p\u00e5 en viss dataenhet (vem som har gjort vad och n\u00e4r). P\u00e5 s\u00e5 s\u00e4tt kan f\u00f6retag bevaka verksamhet som g\u00e4ller att uppr\u00e4tth\u00e5lla lagrade uppgifters s\u00e4kerhet, s\u00e4rskilt om ett dataintr\u00e5ng skulle intr\u00e4ffa.<\/p>\n\n\n\n<p><strong>Bevaring<\/strong>: Datalagring \u00e4r en viktig aspekt av validering och s\u00e4kerst\u00e4llande av en s\u00e4ker datamilj\u00f6. Men eftersom resurserna \u2013 till exempel det digitala eller fysiska lagringsutrymmet \u2013 \u00e4r begr\u00e4nsade kr\u00e4vs underh\u00e5ll f\u00f6r att ta bort felaktiga eller f\u00f6r\u00e5ldrade data. Vissa uppgifter m\u00e5ste enligt lag sparas under ett visst antal \u00e5r. N\u00e4r data inte l\u00e4ngre beh\u00f6ver lagras \u00e4r det viktigt att konfigurera principer f\u00f6r att p\u00e5 ett s\u00e4kert s\u00e4tt ta bort dem.<\/p>\n\n\n\n<p><strong>\u00c5tkomst och delning<\/strong>: Det h\u00e4r stadiet kallas \u00e4ven \u201dleverans\u201d, och fokuserar p\u00e5 hur data kan delas p\u00e5 ett s\u00e4kert s\u00e4tt med andra anv\u00e4ndare eller aff\u00e4rspartners. Detta uppn\u00e5s ofta genom delade mappar eller enheter, men om det inte hanteras p\u00e5 r\u00e4tt s\u00e4tt kan det leda till obeh\u00f6rig \u00e5tkomst och dataintr\u00e5ng. N\u00e4r det g\u00e5r att komma \u00e5t data via mobila enheter \u2013 till exempel surfplattor eller telefoner \u2013 blir \u00e5tkomstskyddet \u00e4nnu mer komplicerat.<\/p>\n\n\n\n<p><strong>Integration<\/strong>: Utbyte av information med andra f\u00f6retagsprogram g\u00f6r det m\u00f6jligt att f\u00e5 en omfattande \u00f6versikt \u00f6ver system eller data, s\u00e5 att m\u00e4nniskor kan fatta logiska, datadrivna beslut. F\u00f6r att det h\u00e4r verkligen ska lyckas m\u00e5ste man ta h\u00e4nsyn till samtliga av de f\u00f6reg\u00e5ende stadierna f\u00f6r att tillhandah\u00e5lla konsekventa och korrekta data.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Olika typer av datas\u00e4kerhet<\/strong><\/h3>\n\n\n\n<p>Till sist, hur kan f\u00f6retag och individer b\u00f6rja validera de data som de skapar p\u00e5 ett s\u00e4kert s\u00e4tt? Nedan hittar du en infografik som beskriver sex vanliga dataskyddsmetoder. D\u00e4refter f\u00f6ljer en serie infografik d\u00e4r vi j\u00e4mf\u00f6r byggbranschens tre vanligaste s\u00e4tt att validera data f\u00f6r \u00f6verf\u00f6ring. Att f\u00f6rst\u00e5 de verktyg som \u00e4r tillg\u00e4ngliga f\u00f6r ditt f\u00f6retag kan hj\u00e4lpa dig att fatta mer v\u00e4linformerade beslut i fr\u00e5gor som r\u00f6r s\u00e4kerhet och validering.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/Slide-2_SE-900x355.png\" alt=\"\" class=\"wp-image-81081\" width=\"743\" height=\"293\" srcset=\"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/Slide-2_SE-900x355.png 900w, https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/Slide-2_SE-300x118.png 300w, https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/Slide-2_SE-768x303.png 768w, https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/Slide-2_SE.png 1071w\" sizes=\"(max-width: 743px) 100vw, 743px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/Slide-3_SE-900x347.png\" alt=\"\" class=\"wp-image-81083\" width=\"745\" height=\"287\" srcset=\"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/Slide-3_SE-900x347.png 900w, https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/Slide-3_SE-300x116.png 300w, https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/Slide-3_SE-768x296.png 768w, https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/Slide-3_SE.png 1072w\" sizes=\"(max-width: 745px) 100vw, 745px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/Slide-4_SE-900x214.png\" alt=\"\" class=\"wp-image-81084\" width=\"743\" height=\"177\" srcset=\"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/Slide-4_SE-900x214.png 900w, https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/Slide-4_SE-300x71.png 300w, https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/Slide-4_SE-768x183.png 768w, https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/Slide-4_SE.png 1070w\" sizes=\"(max-width: 743px) 100vw, 743px\" \/><\/figure>\n\n\n\n<div style=\"background-color:#111;text-align:center\" class=\"wp-block-atomic-blocks-ab-cta ab-block-cta\"><div class=\"ab-cta-image-wrap\"><img decoding=\"async\" class=\"ab-cta-image has-background-dim-60 has-background-dim\" src=\"https:\/\/blog.bluebeam.com\/wp-content\/uploads\/2021\/11\/Cybersecurity-Feature.jpg\" alt=\"Cybers\u00e4kerhet i byggbranschen\"><\/div><div class=\"ab-cta-content\"><h2 class=\"ab-cta-title ab-font-size-32\" style=\"color:#FFF\"><strong>Cybers\u00e4kerhetens grunder: det h\u00e4r beh\u00f6ver entrepren\u00f6rer veta.<\/strong><\/h2><div class=\"ab-cta-text ab-font-size-32\" style=\"color:#FFF\"><\/div><\/div><div class=\"ab-cta-button\"><a href=\"https:\/\/blog.bluebeam.com\/se\/cybersecurity-101\/\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"ab-button ab-button-shape-rounded ab-button-size-medium\" style=\"color:#ffffff;background-color:#3373dc\">VISA MIG<\/a><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Byggbranschen blir allt mer digital, och ledare i branschen m\u00e5ste se till att r\u00e4tt protokoll anv\u00e4nds f\u00f6r att skydda viktiga dokument och projektdata \u2013 s\u00e5 h\u00e4r g\u00f6r du<\/p>\n","protected":false},"author":678,"featured_media":81078,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[145],"tags":[16843,16927,16716],"class_list":["post-81077","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-innovation","tag-cybersakerhet","tag-infora-teknologi","tag-technology","category-145","description-off"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ledare i byggbranschen: \u00e4r era dokumentdata s\u00e4kra? | Built<\/title>\n<meta name=\"description\" content=\"Byggbranschen blir allt mer digital, och ledare i branschen m\u00e5ste se till att r\u00e4tt protokoll anv\u00e4nds f\u00f6r att skydda viktiga dokument och projektdata \u2013 s\u00e5 h\u00e4r g\u00f6r du.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.bluebeam.com\/se\/data-document-security-in-construction\/\" \/>\n<meta property=\"og:locale\" content=\"sv_SE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ledare i byggbranschen: \u00e4r era dokumentdata s\u00e4kra? | Built\" \/>\n<meta property=\"og:description\" content=\"Byggbranschen blir allt mer digital, och ledare i branschen m\u00e5ste se till att r\u00e4tt protokoll anv\u00e4nds f\u00f6r att skydda viktiga dokument och projektdata \u2013 s\u00e5 h\u00e4r g\u00f6r du.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.bluebeam.com\/se\/data-document-security-in-construction\/\" \/>\n<meta property=\"og:site_name\" content=\"Built | SE\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/bluebeamSE\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-13T02:01:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-13T14:56:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/Functional-Document-Security-Feature.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Erin Brayley\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@bluebeam\" \/>\n<meta name=\"twitter:site\" content=\"@bluebeam\" \/>\n<meta name=\"twitter:label1\" content=\"Skriven av\" \/>\n\t<meta name=\"twitter:data1\" content=\"Erin Brayley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Ber\u00e4knad l\u00e4stid\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/data-document-security-in-construction\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/data-document-security-in-construction\\\/\"},\"author\":{\"name\":\"Erin Brayley\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#\\\/schema\\\/person\\\/ecbf806a0bb099b5c77da4597c6b3cc6\"},\"headline\":\"Ledare i byggbranschen: \u00e4r era dokumentdata s\u00e4kra?\",\"datePublished\":\"2022-12-13T02:01:42+00:00\",\"dateModified\":\"2022-12-13T14:56:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/data-document-security-in-construction\\\/\"},\"wordCount\":879,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/data-document-security-in-construction\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2022\\\/12\\\/Functional-Document-Security-Feature.jpg\",\"keywords\":[\"Cybers\u00e4kerhet\",\"Inf\u00f6ra teknologi\",\"Teknologi\"],\"articleSection\":[\"Innovation\"],\"inLanguage\":\"sv-SE\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/data-document-security-in-construction\\\/\",\"url\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/data-document-security-in-construction\\\/\",\"name\":\"Ledare i byggbranschen: \u00e4r era dokumentdata s\u00e4kra? | Built\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/data-document-security-in-construction\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/data-document-security-in-construction\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2022\\\/12\\\/Functional-Document-Security-Feature.jpg\",\"datePublished\":\"2022-12-13T02:01:42+00:00\",\"dateModified\":\"2022-12-13T14:56:21+00:00\",\"description\":\"Byggbranschen blir allt mer digital, och ledare i branschen m\u00e5ste se till att r\u00e4tt protokoll anv\u00e4nds f\u00f6r att skydda viktiga dokument och projektdata \u2013 s\u00e5 h\u00e4r g\u00f6r du.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/data-document-security-in-construction\\\/#breadcrumb\"},\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/data-document-security-in-construction\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/data-document-security-in-construction\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2022\\\/12\\\/Functional-Document-Security-Feature.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2022\\\/12\\\/Functional-Document-Security-Feature.jpg\",\"width\":900,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/data-document-security-in-construction\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ledare i byggbranschen: \u00e4r era dokumentdata s\u00e4kra?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#website\",\"url\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/\",\"name\":\"Built | SE\",\"description\":\"The Bluebeam Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sv-SE\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#organization\",\"name\":\"Bluebeam Inc.\",\"url\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2020\\\/05\\\/bluebeam.png\",\"contentUrl\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2020\\\/05\\\/bluebeam.png\",\"width\":840,\"height\":630,\"caption\":\"Bluebeam Inc.\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/bluebeamSE\",\"https:\\\/\\\/x.com\\\/bluebeam\",\"https:\\\/\\\/www.instagram.com\\\/bluebeam_nordics\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/bluebeam-sweden\",\"https:\\\/\\\/youtube.com\\\/bluebeampdfrevu\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.bluebeam.com\\\/se\\\/#\\\/schema\\\/person\\\/ecbf806a0bb099b5c77da4597c6b3cc6\",\"name\":\"Erin Brayley\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/812f85d2912c6bc4a0b96234ad01e90a92496817c6ade1896753725c90322a00?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/812f85d2912c6bc4a0b96234ad01e90a92496817c6ade1896753725c90322a00?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/812f85d2912c6bc4a0b96234ad01e90a92496817c6ade1896753725c90322a00?s=96&d=mm&r=g\",\"caption\":\"Erin Brayley\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ledare i byggbranschen: \u00e4r era dokumentdata s\u00e4kra? | Built","description":"Byggbranschen blir allt mer digital, och ledare i branschen m\u00e5ste se till att r\u00e4tt protokoll anv\u00e4nds f\u00f6r att skydda viktiga dokument och projektdata \u2013 s\u00e5 h\u00e4r g\u00f6r du.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.bluebeam.com\/se\/data-document-security-in-construction\/","og_locale":"sv_SE","og_type":"article","og_title":"Ledare i byggbranschen: \u00e4r era dokumentdata s\u00e4kra? | Built","og_description":"Byggbranschen blir allt mer digital, och ledare i branschen m\u00e5ste se till att r\u00e4tt protokoll anv\u00e4nds f\u00f6r att skydda viktiga dokument och projektdata \u2013 s\u00e5 h\u00e4r g\u00f6r du.","og_url":"https:\/\/blog.bluebeam.com\/se\/data-document-security-in-construction\/","og_site_name":"Built | SE","article_publisher":"https:\/\/www.facebook.com\/bluebeamSE","article_published_time":"2022-12-13T02:01:42+00:00","article_modified_time":"2022-12-13T14:56:21+00:00","og_image":[{"width":900,"height":600,"url":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/Functional-Document-Security-Feature.jpg","type":"image\/jpeg"}],"author":"Erin Brayley","twitter_card":"summary_large_image","twitter_creator":"@bluebeam","twitter_site":"@bluebeam","twitter_misc":{"Skriven av":"Erin Brayley","Ber\u00e4knad l\u00e4stid":"5 minuter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.bluebeam.com\/se\/data-document-security-in-construction\/#article","isPartOf":{"@id":"https:\/\/blog.bluebeam.com\/se\/data-document-security-in-construction\/"},"author":{"name":"Erin Brayley","@id":"https:\/\/blog.bluebeam.com\/se\/#\/schema\/person\/ecbf806a0bb099b5c77da4597c6b3cc6"},"headline":"Ledare i byggbranschen: \u00e4r era dokumentdata s\u00e4kra?","datePublished":"2022-12-13T02:01:42+00:00","dateModified":"2022-12-13T14:56:21+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.bluebeam.com\/se\/data-document-security-in-construction\/"},"wordCount":879,"publisher":{"@id":"https:\/\/blog.bluebeam.com\/se\/#organization"},"image":{"@id":"https:\/\/blog.bluebeam.com\/se\/data-document-security-in-construction\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/Functional-Document-Security-Feature.jpg","keywords":["Cybers\u00e4kerhet","Inf\u00f6ra teknologi","Teknologi"],"articleSection":["Innovation"],"inLanguage":"sv-SE"},{"@type":"WebPage","@id":"https:\/\/blog.bluebeam.com\/se\/data-document-security-in-construction\/","url":"https:\/\/blog.bluebeam.com\/se\/data-document-security-in-construction\/","name":"Ledare i byggbranschen: \u00e4r era dokumentdata s\u00e4kra? | Built","isPartOf":{"@id":"https:\/\/blog.bluebeam.com\/se\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.bluebeam.com\/se\/data-document-security-in-construction\/#primaryimage"},"image":{"@id":"https:\/\/blog.bluebeam.com\/se\/data-document-security-in-construction\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/Functional-Document-Security-Feature.jpg","datePublished":"2022-12-13T02:01:42+00:00","dateModified":"2022-12-13T14:56:21+00:00","description":"Byggbranschen blir allt mer digital, och ledare i branschen m\u00e5ste se till att r\u00e4tt protokoll anv\u00e4nds f\u00f6r att skydda viktiga dokument och projektdata \u2013 s\u00e5 h\u00e4r g\u00f6r du.","breadcrumb":{"@id":"https:\/\/blog.bluebeam.com\/se\/data-document-security-in-construction\/#breadcrumb"},"inLanguage":"sv-SE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.bluebeam.com\/se\/data-document-security-in-construction\/"]}]},{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/blog.bluebeam.com\/se\/data-document-security-in-construction\/#primaryimage","url":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/Functional-Document-Security-Feature.jpg","contentUrl":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/Functional-Document-Security-Feature.jpg","width":900,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/blog.bluebeam.com\/se\/data-document-security-in-construction\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.bluebeam.com\/se\/"},{"@type":"ListItem","position":2,"name":"Ledare i byggbranschen: \u00e4r era dokumentdata s\u00e4kra?"}]},{"@type":"WebSite","@id":"https:\/\/blog.bluebeam.com\/se\/#website","url":"https:\/\/blog.bluebeam.com\/se\/","name":"Built | SE","description":"The Bluebeam Blog","publisher":{"@id":"https:\/\/blog.bluebeam.com\/se\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.bluebeam.com\/se\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sv-SE"},{"@type":"Organization","@id":"https:\/\/blog.bluebeam.com\/se\/#organization","name":"Bluebeam Inc.","url":"https:\/\/blog.bluebeam.com\/se\/","logo":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/blog.bluebeam.com\/se\/#\/schema\/logo\/image\/","url":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2020\/05\/bluebeam.png","contentUrl":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2020\/05\/bluebeam.png","width":840,"height":630,"caption":"Bluebeam Inc."},"image":{"@id":"https:\/\/blog.bluebeam.com\/se\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/bluebeamSE","https:\/\/x.com\/bluebeam","https:\/\/www.instagram.com\/bluebeam_nordics\/","https:\/\/www.linkedin.com\/showcase\/bluebeam-sweden","https:\/\/youtube.com\/bluebeampdfrevu"]},{"@type":"Person","@id":"https:\/\/blog.bluebeam.com\/se\/#\/schema\/person\/ecbf806a0bb099b5c77da4597c6b3cc6","name":"Erin Brayley","image":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/secure.gravatar.com\/avatar\/812f85d2912c6bc4a0b96234ad01e90a92496817c6ade1896753725c90322a00?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/812f85d2912c6bc4a0b96234ad01e90a92496817c6ade1896753725c90322a00?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/812f85d2912c6bc4a0b96234ad01e90a92496817c6ade1896753725c90322a00?s=96&d=mm&r=g","caption":"Erin Brayley"}}]}},"featured_image_src":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/Functional-Document-Security-Feature-600x400.jpg","featured_image_src_square":"https:\/\/blog.bluebeam.com\/se\/wp-content\/uploads\/sites\/4\/2022\/12\/Functional-Document-Security-Feature-600x600.jpg","author_info":{"display_name":"Erin Brayley","author_link":"https:\/\/blog.bluebeam.com\/se\/author\/ebrayley\/"},"_links":{"self":[{"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/posts\/81077","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/users\/678"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/comments?post=81077"}],"version-history":[{"count":0,"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/posts\/81077\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/media\/81078"}],"wp:attachment":[{"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/media?parent=81077"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/categories?post=81077"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.bluebeam.com\/se\/wp-json\/wp\/v2\/tags?post=81077"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}