{"id":9266,"date":"2024-02-07T12:32:34","date_gmt":"2024-02-07T12:32:34","guid":{"rendered":"https:\/\/www.outlying.works\/vitrine\/?p=9266"},"modified":"2024-03-29T23:27:55","modified_gmt":"2024-03-29T23:27:55","slug":"le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees","status":"publish","type":"post","link":"https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/","title":{"rendered":"Privacy by Design : L&#8217;Essentiel de la Protection des Donn\u00e9es"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"9266\" class=\"elementor elementor-9266\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-347d0eb5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"347d0eb5\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-36e11fa\" data-id=\"36e11fa\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-606de2f9 elementor-widget elementor-widget-text-editor\" data-id=\"606de2f9\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>Dans le paysage num\u00e9rique en constante \u00e9volution, la protection des donn\u00e9es personnelles est devenue une pr\u00e9occupation majeure pour les organisations. Face \u00e0 des r\u00e9glementations de plus en plus strictes et \u00e0 une sensibilisation croissante des utilisateurs, il est devenu imp\u00e9ratif d&#8217;int\u00e9grer des mesures de protection d\u00e8s la conception des syst\u00e8mes et des pratiques commerciales. C\u2019est l\u00e0 que le concept de Privacy by Design (PbD) entre en jeu, offrant une approche proactive et pr\u00e9ventive pour garantir la confidentialit\u00e9 des donn\u00e9es d\u00e8s leur cr\u00e9ation.<\/p>\n<h4><b>Origines du Privacy by Design<\/b><\/h4>\n<p>Ce concept est n\u00e9 au Canada, d\u00e9velopp\u00e9 par Ann Cavoukian, une pionni\u00e8re dans le domaine de la protection de la vie priv\u00e9e. Elle l&#8217;a introduit dans les ann\u00e9es 1990 dans le but d\u2019instaurer une approche proactive de la protection des donn\u00e9es d\u00e8s la conception des syst\u00e8mes d\u2019information.<\/p>\n<h4>Principes Fondamentaux<\/h4>\n<p>Privacy by Design repose sur plusieurs principes pour garantir une protection efficace des donn\u00e9es personnelles :<\/p>\n<h5 style=\"padding-left: 40px;\"><span style=\"font-weight: normal;\">1. Proactivit\u00e9 plut\u00f4t que r\u00e9activit\u00e9 :<\/span><\/h5>\n<p style=\"padding-left: 40px;\">Adoptant une approche proactive, il anticipe les risques potentiels et les pr\u00e9vient avant qu\u2019ils ne surviennent. Plut\u00f4t que de r\u00e9soudre les probl\u00e8mes de confidentialit\u00e9 apr\u00e8s coup, il vise \u00e0 les identifier d\u00e8s le d\u00e9part et \u00e0 mettre en place des mesures pour les att\u00e9nuer, r\u00e9duisant ainsi les co\u00fbts \u00e0 long terme.<\/p>\n<h5 style=\"padding-left: 40px;\"><span style=\"font-weight: normal;\">2. Confidentialit\u00e9 par d\u00e9faut :<\/span><\/h5>\n<p style=\"padding-left: 40px;\"><span class=\"\">Cette approche assure que la protection des donn\u00e9es est la norme par d\u00e9faut, sans n\u00e9cessiter d\u2019actions suppl\u00e9mentaires de la part des utilisateurs.<\/span><\/p>\n<h5 style=\"padding-left: 40px;\"><span style=\"font-weight: normal;\">3.Int\u00e9gration dans la conception :<\/span><\/h5>\n<p style=\"padding-left: 40px;\">Privacy by Design implique d\u2019int\u00e9grer la protection des donn\u00e9es d\u00e8s le d\u00e9but du processus de conception des syst\u00e8mes et des pratiques commerciales.<\/p>\n<h5 style=\"padding-left: 40px;\"><span style=\"font-weight: normal;\">4.Confidentialit\u00e9 embarqu\u00e9e dans le design :<\/span><\/h5>\n<p style=\"padding-left: 40px;\">Il exige que la protection des donn\u00e9es soit int\u00e9gr\u00e9e d\u00e8s le d\u00e9part dans le design des syst\u00e8mes et des pratiques commerciales, en faisant de la confidentialit\u00e9 une composante essentielle de la fonctionnalit\u00e9 principale.<\/p>\n<h5 style=\"padding-left: 40px;\"><span style=\"font-weight: normal;\">5.Fonctionnalit\u00e9 compl\u00e8te :&nbsp;<\/span><\/h5>\n<p style=\"padding-left: 40px;\">Cette approche reconna\u00eet que la confidentialit\u00e9 peut \u00eatre int\u00e9gr\u00e9e de mani\u00e8re harmonieuse pour b\u00e9n\u00e9ficier \u00e0 tous les aspects du syst\u00e8me ou de la pratique commerciale.<\/p>\n<h5 style=\"padding-left: 40px;\"><span style=\"font-weight: normal;\">6.Visibilit\u00e9 et transparence :<\/span><\/h5>\n<p style=\"padding-left: 40px;\">Elle vise \u00e0 garantir \u00e0 tous les acteurs concern\u00e9s que les pratiques commerciales et les technologies respectent effectivement les engagements et les objectifs annonc\u00e9s.<\/p>\n<h5 style=\"padding-left: 40px;\"><span style=\"font-weight: normal;\">7.S\u00e9curit\u00e9 d\u00e8s la conception : <\/span><\/h5>\n<p style=\"padding-left: 40px;\">Il int\u00e8gre \u00e9galement la s\u00e9curit\u00e9 d\u00e8s la conception des syst\u00e8mes et des pratiques commerciales pour prot\u00e9ger les donn\u00e9es contre les menaces potentielles.<\/p>\n<h4><b>Impl\u00e9mentation du Privacy by Design<\/b><\/h4>\n<p><span class=\"\">Pour le mettre en \u0153uvre efficacement, les organisations doivent suivre plusieurs \u00e9tapes cl\u00e9s :<\/span><\/p>\n<ul class=\"list-outside list-disc pl-8\">\n<li><span class=\"\"><strong>\u00c9valuation des risques :<\/strong> Identifier les risques potentiels pour la confidentialit\u00e9 des donn\u00e9es d\u00e8s le d\u00e9but du processus de conception.<\/span><\/li>\n<li><span class=\"\"><strong>Int\u00e9gration des mesures de protection :<\/strong> Int\u00e9grer des mesures de protection des donn\u00e9es d\u00e8s la conception des syst\u00e8mes et des pratiques commerciales.<\/span><\/li>\n<li><span class=\"\"><strong>Formation et sensibilisation :<\/strong> Sensibiliser les \u00e9quipes impliqu\u00e9es \u00e0 l\u2019importance du Privacy by Design et les former aux bonnes pratiques en mati\u00e8re de protection des donn\u00e9es d\u00e8s la conception.<\/span><\/li>\n<\/ul>\n<h4><b>Norme ISO 37001<\/b><\/h4>\n<p><span class=\"\">La norme ISO 37001, ax\u00e9e sur les syst\u00e8mes de gestion anti-corruption, joue un r\u00f4le crucial dans la validation de la mise en \u0153uvre du Privacy by Design. En effet, cette norme offre un cadre structur\u00e9 pour \u00e9valuer et certifier les processus de gestion des risques li\u00e9s \u00e0 la confidentialit\u00e9 des donn\u00e9es et garantir ainsi leur conformit\u00e9 avec les meilleures pratiques internationales.&nbsp;<\/span><\/p><p><span class=\"\">En adoptant une approche proactive de la protection des donn\u00e9es d\u00e8s la conception, le Privacy by Design offre un cadre solide pour garantir la confidentialit\u00e9 des donn\u00e9es personnelles d\u00e8s leur cr\u00e9ation. En suivant les principes du Privacy by Design et en mettant en \u0153uvre les mesures appropri\u00e9es, les organisations peuvent renforcer la confiance des utilisateurs, se conformer aux r\u00e9glementations en mati\u00e8re de protection des donn\u00e9es et pr\u00e9server leur r\u00e9putation en mati\u00e8re de confidentialit\u00e9. La norme ISO 37001 vient compl\u00e9ter ce processus en offrant une certification ind\u00e9pendante de la conformit\u00e9 aux normes internationales de gestion des risques li\u00e9s \u00e0 la confidentialit\u00e9 des donn\u00e9es.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Dans le paysage num\u00e9rique en constante \u00e9volution, la protection des donn\u00e9es personnelles est devenue une pr\u00e9occupation majeure pour les organisations. Face \u00e0 des r\u00e9glementations de plus en plus strictes et \u00e0 une sensibilisation croissante des utilisateurs, il est devenu imp\u00e9ratif d&#8217;int\u00e9grer des mesures de protection d\u00e8s la conception des syst\u00e8mes et des pratiques commerciales. C\u2019est l\u00e0 que le concept de Privacy by Design (PbD) entre en jeu, offrant une approche proactive et pr\u00e9ventive pour garantir la confidentialit\u00e9 des donn\u00e9es d\u00e8s leur cr\u00e9ation. Origines du Privacy by Design Ce concept est n\u00e9 au Canada, d\u00e9velopp\u00e9 par Ann Cavoukian, une pionni\u00e8re dans<\/p>\n","protected":false},"author":1,"featured_media":9338,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pagelayer_contact_templates":[],"_pagelayer_content":"","two_page_speed":[],"footnotes":""},"categories":[7],"tags":[222,211,218,220,224,215,209,210,43,212],"class_list":["post-9266","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cat_technologie","tag-chiffrement-des-donnees","tag-confidentialite","tag-confidentialite-par-defaut","tag-integration-dans-la-conception","tag-minimisation-des-donnees-personnelles","tag-norme-iso-37001","tag-privacy-by-design","tag-protection-des-donnees-personnelles","tag-rgpd","tag-securite-des-donnees"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Privacy by Design : L&#039;Essentiel de la Protection des Donn\u00e9es - Vitrine outlYing<\/title>\n<meta name=\"description\" content=\"Le Privacy by Design est une approche proactive de protection des donn\u00e9es d\u00e8s leur conception et offre une solution aux enjeux de confidentialit\u00e9 dans le monde num\u00e9rique. %Privacy by design\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy by Design : L&#039;Essentiel de la Protection des Donn\u00e9es - Vitrine outlYing\" \/>\n<meta property=\"og:description\" content=\"Le Privacy by Design est une approche proactive de protection des donn\u00e9es d\u00e8s leur conception et offre une solution aux enjeux de confidentialit\u00e9 dans le monde num\u00e9rique. %Privacy by design\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/\" \/>\n<meta property=\"og:site_name\" content=\"Vitrine outlYing\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-07T12:32:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-29T23:27:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/02\/Le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnee-1024x717.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"717\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"outlying\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"outlying\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/\"},\"author\":{\"name\":\"outlying\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8\"},\"headline\":\"Privacy by Design : L&#8217;Essentiel de la Protection des Donn\u00e9es\",\"datePublished\":\"2024-02-07T12:32:34+00:00\",\"dateModified\":\"2024-03-29T23:27:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/\"},\"wordCount\":737,\"publisher\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/02\/Le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnee.png\",\"keywords\":[\"Chiffrement des donn\u00e9es\",\"Confidentialit\u00e9\",\"Confidentialit\u00e9 par d\u00e9faut\",\"Int\u00e9gration dans la conception\",\"Minimisation des donn\u00e9es personnelles\",\"Norme ISO 37001\",\"Privacy by Design\",\"Protection des donn\u00e9es personnelles\",\"rgpd\",\"S\u00e9curit\u00e9 des donn\u00e9es\"],\"articleSection\":[\"Technologies de l'information\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/\",\"name\":\"Privacy by Design : L'Essentiel de la Protection des Donn\u00e9es - Vitrine outlYing\",\"isPartOf\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/02\/Le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnee.png\",\"datePublished\":\"2024-02-07T12:32:34+00:00\",\"dateModified\":\"2024-03-29T23:27:55+00:00\",\"description\":\"Le Privacy by Design est une approche proactive de protection des donn\u00e9es d\u00e8s leur conception et offre une solution aux enjeux de confidentialit\u00e9 dans le monde num\u00e9rique. %Privacy by design\",\"breadcrumb\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/#primaryimage\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/02\/Le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnee.png\",\"contentUrl\":\"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/02\/Le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnee.png\",\"width\":8858,\"height\":6201,\"caption\":\"Privacy by Design : Prot\u00e9ger les donn\u00e9es d\u00e8s la conception - Illustration de l'importance de la confidentialit\u00e9 dans les pratiques num\u00e9riques\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.outlying.works\/vitrine\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy by Design : L&#8217;Essentiel de la Protection des Donn\u00e9es\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#website\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/\",\"name\":\"Vitrine outlYing\",\"description\":\"Site vitrine de outlYing SUARL\",\"publisher\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.outlying.works\/vitrine\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#organization\",\"name\":\"Vitrine outlYing\",\"url\":\"https:\/\/www.outlying.works\/vitrine\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Vitrine outlYing\"},\"image\":{\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8\",\"name\":\"outlying\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g\",\"caption\":\"outlying\"},\"sameAs\":[\"https:\/\/www.outlying.works\/vitrine\"],\"url\":\"https:\/\/www.outlying.works\/vitrine\/author\/outlying\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Privacy by Design : L'Essentiel de la Protection des Donn\u00e9es - Vitrine outlYing","description":"Le Privacy by Design est une approche proactive de protection des donn\u00e9es d\u00e8s leur conception et offre une solution aux enjeux de confidentialit\u00e9 dans le monde num\u00e9rique. %Privacy by design","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/","og_locale":"fr_FR","og_type":"article","og_title":"Privacy by Design : L'Essentiel de la Protection des Donn\u00e9es - Vitrine outlYing","og_description":"Le Privacy by Design est une approche proactive de protection des donn\u00e9es d\u00e8s leur conception et offre une solution aux enjeux de confidentialit\u00e9 dans le monde num\u00e9rique. %Privacy by design","og_url":"https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/","og_site_name":"Vitrine outlYing","article_published_time":"2024-02-07T12:32:34+00:00","article_modified_time":"2024-03-29T23:27:55+00:00","og_image":[{"width":1024,"height":717,"url":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/02\/Le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnee-1024x717.png","type":"image\/png"}],"author":"outlying","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"outlying","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/#article","isPartOf":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/"},"author":{"name":"outlying","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8"},"headline":"Privacy by Design : L&#8217;Essentiel de la Protection des Donn\u00e9es","datePublished":"2024-02-07T12:32:34+00:00","dateModified":"2024-03-29T23:27:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/"},"wordCount":737,"publisher":{"@id":"https:\/\/www.outlying.works\/vitrine\/#organization"},"image":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/#primaryimage"},"thumbnailUrl":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/02\/Le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnee.png","keywords":["Chiffrement des donn\u00e9es","Confidentialit\u00e9","Confidentialit\u00e9 par d\u00e9faut","Int\u00e9gration dans la conception","Minimisation des donn\u00e9es personnelles","Norme ISO 37001","Privacy by Design","Protection des donn\u00e9es personnelles","rgpd","S\u00e9curit\u00e9 des donn\u00e9es"],"articleSection":["Technologies de l'information"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/","url":"https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/","name":"Privacy by Design : L'Essentiel de la Protection des Donn\u00e9es - Vitrine outlYing","isPartOf":{"@id":"https:\/\/www.outlying.works\/vitrine\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/#primaryimage"},"image":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/#primaryimage"},"thumbnailUrl":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/02\/Le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnee.png","datePublished":"2024-02-07T12:32:34+00:00","dateModified":"2024-03-29T23:27:55+00:00","description":"Le Privacy by Design est une approche proactive de protection des donn\u00e9es d\u00e8s leur conception et offre une solution aux enjeux de confidentialit\u00e9 dans le monde num\u00e9rique. %Privacy by design","breadcrumb":{"@id":"https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/#primaryimage","url":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/02\/Le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnee.png","contentUrl":"https:\/\/www.outlying.works\/vitrine\/wp-content\/uploads\/2024\/02\/Le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnee.png","width":8858,"height":6201,"caption":"Privacy by Design : Prot\u00e9ger les donn\u00e9es d\u00e8s la conception - Illustration de l'importance de la confidentialit\u00e9 dans les pratiques num\u00e9riques"},{"@type":"BreadcrumbList","@id":"https:\/\/www.outlying.works\/vitrine\/2024\/02\/07\/le-privacy-by-design-au-coeur-des-pratiques-de-protection-des-donnees\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.outlying.works\/vitrine\/"},{"@type":"ListItem","position":2,"name":"Privacy by Design : L&#8217;Essentiel de la Protection des Donn\u00e9es"}]},{"@type":"WebSite","@id":"https:\/\/www.outlying.works\/vitrine\/#website","url":"https:\/\/www.outlying.works\/vitrine\/","name":"Vitrine outlYing","description":"Site vitrine de outlYing SUARL","publisher":{"@id":"https:\/\/www.outlying.works\/vitrine\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.outlying.works\/vitrine\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.outlying.works\/vitrine\/#organization","name":"Vitrine outlYing","url":"https:\/\/www.outlying.works\/vitrine\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Vitrine outlYing"},"image":{"@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/5f4c0c6776ffaa3d4422b43480d5e1e8","name":"outlying","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.outlying.works\/vitrine\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/64bf4a4a3d315564cb807f3742cdd28795eb19929b6ddd890e368ada8d066b0f?s=96&d=mm&r=g","caption":"outlying"},"sameAs":["https:\/\/www.outlying.works\/vitrine"],"url":"https:\/\/www.outlying.works\/vitrine\/author\/outlying\/"}]}},"_links":{"self":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts\/9266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/comments?post=9266"}],"version-history":[{"count":51,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts\/9266\/revisions"}],"predecessor-version":[{"id":10096,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/posts\/9266\/revisions\/10096"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/media\/9338"}],"wp:attachment":[{"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/media?parent=9266"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/categories?post=9266"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.outlying.works\/vitrine\/wp-json\/wp\/v2\/tags?post=9266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}