<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>digital transformation - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/digital-transformation/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/digital-transformation/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Fri, 03 Jan 2020 08:21:46 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>digital transformation - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/digital-transformation/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The evolution of the Human Resource management: what are the impacts on personal data protection?</title>
		<link>https://www.riskinsight-wavestone.com/en/2017/03/evolution-human-ressource-management-impacts-data-protection/</link>
		
		<dc:creator><![CDATA[Commerly]]></dc:creator>
		<pubDate>Thu, 23 Mar 2017 10:02:02 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[digital transformation]]></category>
		<category><![CDATA[digital trust]]></category>
		<category><![CDATA[human resources]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[privacy by design]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=9637/</guid>

					<description><![CDATA[<p>Ensuring the respect of privacy in a digital world not only requires integration into every project, but integration into every company culture. This approach will also facilitate compliance with new regulations in the respective countries. Analytical assessment made possible thanks...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/03/evolution-human-ressource-management-impacts-data-protection/">The evolution of the Human Resource management: what are the impacts on personal data protection?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Ensuring the respect of privacy in a digital world not only requires integration into every project, but <a href="https://www.riskinsight-wavestone.com/en/?p=9642%2F&amp;preview=true">integration into every company culture</a>. This approach will also facilitate compliance with new regulations in the respective countries. </em></p>
<p><em>Analytical assessment made possible thanks to the testimonies of <strong>Jean-Christophe Procot</strong> and <strong>Hervé Commerly</strong>, Human Resources experts from Wavestone. </em></p>
<p><em>This blog post is a part of a series of articles which is itself the result of a <a href="https://www.wavestone.com/en/insight/privacy-digital-world-compliance-trust/">synthesis on Privacy at the digital age</a> published on our website. </em></p>
<h2>How is the concept of privacy between employees and employers perceived?</h2>
<p>It is a <strong>concept that has changed significantly</strong> over the last few years. The privacy concerns of employers about their employees is that they often do not devote enough time to their work. For employees, the notion of privacy goes hand in hand with <strong>flexible</strong> working conditions such as flexible hours, reduced surveillance and teleworking arrangements. Employees also value a limit on the amount of information that the employer can gather about them. On the basis of this concept of privacy and to improve employee privacy, employers increasingly seek <strong>to support employees</strong> in their personal lives through well-being services such as laundry and daycare services, company restaurants and complementary insurance. However, providing such support also requires that the employer <strong>knows more and more</strong> about the private life of employees, such as the composition of their family and eating habits linked to religious beliefs.</p>
<h2>What explains such concerns?</h2>
<p>It should be understood that employers are increasingly interested <strong>in collecting data</strong> to improve understanding of their employees. Employees are increasingly reluctant to communicate this information, especially the younger workforces. Employers wants to retain their employees for longer, facilitate their decision-making and help them to perform more effectively and efficiently in the professional and personal lives. The employer collects such data not directly communicated by the employee themselves but <strong>from third parties</strong>, such as social networks, previous employers, managers, and data inputs from work tools. Both employees and customers are concerned by this development. It would almost say that, by definition, employees suspect employers of attempting to monitor their every move. The employee is then left to wonder how it is possible to retain <strong>control over privacy</strong> if employers collect all this information about them, not necessarily provided by the employee themselves, leaving them powerless if the employer chooses to correlate data for making decisions about an employee, unbeknown to them.</p>
<h2>Do you have an example of a recent project which echoed such concerns?</h2>
<p>The plan of the French government plan to introduce <strong>a tax withheld at source</strong>. An employee’s salary withheld is an example of this. The aim is to simplify an individual’s life by avoiding deferred payments which can lead to difficult situations. For example, tax collection methods for the state can be improved with a reduction in income set by the employer as an indication that an employee is no longer able to pay the tax rate of the previous year. However, citizens are quick to express <strong>concerns</strong> about the information their employer holds about them. As well as financial information, a tax return can contain additional private information such as marital status, children, ancillary income and any assistance provided to persons with difficulties. The objective should be therefore to ensure that the purpose of the data collected will be <strong>limited</strong> to tax purposes and that access to such data will be controlled. The employee wants to ensure that his or her data <strong>will not be used for any purposes other than that previously agreed to</strong>, such as modifying a salary due to learning the employee’s ancillary income.</p>
<h2>What developments have taken place in human resources management that will impact the protection of personal data?</h2>
<p>Several major trends have emerged:</p>
<ul>
<li><strong>Big Data</strong> in recruitment activities, particularly sourcing, which should be supervised in order to ensure legitimacy when collecting data;</li>
<li>The <strong>multiplication of decision-making</strong> for career managers (for example, the creation of succession trees or the identification of key personnel) for automated decision-making, a sensitive topic for regulators;</li>
<li><strong>Mobility</strong>, with an increasingly frequent introduction of new professional mobile terminals which do not facilitate the separation between the data produced in private settings and data produced in professional settings. The question of the “right to disconnect” is also alluded to regularly.</li>
</ul>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/03/evolution-human-ressource-management-impacts-data-protection/">The evolution of the Human Resource management: what are the impacts on personal data protection?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Privacy and Digital Transformation: the retail relies on a Trust policy</title>
		<link>https://www.riskinsight-wavestone.com/en/2017/03/privacy-digital-transformation-retail-industry-bets-trusftul-strategy/</link>
		
		<dc:creator><![CDATA[Armand de Vallois]]></dc:creator>
		<pubDate>Mon, 20 Mar 2017 13:55:57 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Compliance]]></category>
		<category><![CDATA[digital transformation]]></category>
		<category><![CDATA[digital trust]]></category>
		<category><![CDATA[mass retail sector]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[privacy by design]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=9639/</guid>

					<description><![CDATA[<p>Ensuring the respect of privacy in a digital world not only requires integration into every project, but integration into every company culture. This approach will also facilitate compliance with new regulations in the respective countries. Analytical assessment of a concrete...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/03/privacy-digital-transformation-retail-industry-bets-trusftul-strategy/">Privacy and Digital Transformation: the retail relies on a Trust policy</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Ensuring the respect of privacy in a digital world not only requires integration into every project, but <a href="https://www.riskinsight-wavestone.com/en/?p=9642%2F&amp;preview=true">integration into every company culture</a>. This approach will also facilitate compliance with new regulations in the respective countries.</em></p>
<p><em>Analytical assessment of a concrete project within the mass retail sector, made possible thanks to the testimony of <strong>Armand de Vallois,</strong> Consumer goods &amp; distribution expert from Wavestone.</em></p>
<p><em>This blog post is a part of a serie of articles which is itself the result of a synthesis on <a href="https://www.wavestone.com/en/insight/privacy-digital-world-compliance-trust/">Privacy at the digital age</a> published on our website. </em></p>
<h2>What changes have occured over the last few years in the mass retail sector?</h2>
<p>Over the last decade, we have shifted from a distribution model focusing on costs and volume to a model based upon understanding our <strong>customers</strong>. Mass distribution is thus a thing of the past, as it completely overlooks the interests of the customer relationship. Nowadays, our model gathers and stores knowledge about our <strong>customers</strong>, allowing us to develop closer <strong>proximity</strong> with the customer and loyalty programs which support the frequency and consistency of their purchases.</p>
<h2>How should organisations handle such changes?</h2>
<p>In recent years, awareness by business stakeholders of the opportunities that come with the high potential of customer <strong>data</strong> has increased. Nevertheless, resources must be used <strong>wisely</strong> in supporting the efforts of organisations to get closer to their customers. Data must be collected, handled and reconciled against frameworks which correspond to customer expectations and regulatory requirements. For example, the “opt-in” option is a good way to ensure that customers are well informed and accept the collection and processing of their data. Increasingly, <strong>rewards</strong> are used as a means for encouraging customers to accept the disclosure of their data. However, this model has its limitations. It is essential to ensure that services are of interest to customers and contribute to the ease of their lives, as well as ensuring that individuals have agreed to provide their data.</p>
<h2>Do you have some examples of projects which created apprehension?</h2>
<p><strong>The introduction of RFID chips</strong> (integrated technology which enables the identification and follow-up of objects or people) in electronic tagging is a good example. Many projects have been launched in the textile industry based on optimising production costs, inventory automation in stores and warehouses as well as the ease of chip insertion into clothes. It is crucial to have real-time knowledge of stock levels and to have reliable information in an <strong>omni-channel context</strong>, where it is increasingly common to see online purchases made ahead of in-store collections. RFID chips can also contribute to data production based on<strong> customer journeys</strong> and the actual product itself, for example calculating ratios to record the number of times a product has been tried on in a fitting rooms compared to successful purchases of that product. This type of information is essential in the context of fast fashion in the textile industry. However, such chips are also a cause for <strong>concern</strong>. For example, <strong>salesmen can “potentially” connect a customer to a product</strong> (the RFID chips use unique identifiers) and track their activity over the duration of their shop visit (the chipset remains activated).</p>
<h2>How did you adress these concerns?</h2>
<p>We implemented what we call “Privacy By Design”, which goes beyond strict principles regarding chip use (identification and follow-up of products, not customers) and incorporates several other principles:</p>
<ul>
<li><strong>A visible marker</strong> showing that clothes are equipped with a RFID chip</li>
<li><strong>Training sales teams</strong> so they are better qualified to respond to customer queries, such as informing customers that chips may be removed by cutting the tags attached to a product, a service offered in stores, or declaring that the company in question will never connect a customer and a chip</li>
<li><strong>Dedicated webpages</strong> for communicating all information required to understand the chip and the data it collects</li>
</ul>
<p>These are some examples of best practices which are applicable to all projects involving the treatment of sensitive data. We must <strong>lead by example</strong> when handling and informing individuals about how to handle such data. It is therefore crucial to <strong>reassure</strong> customers and answer their questions so as to <strong>anticipate</strong> and alleviate their concerns.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/03/privacy-digital-transformation-retail-industry-bets-trusftul-strategy/">Privacy and Digital Transformation: the retail relies on a Trust policy</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Privacy within the digital transformation: four major principles</title>
		<link>https://www.riskinsight-wavestone.com/en/2017/02/privacy-within-digital-transformation-four-major-principles/</link>
		
		<dc:creator><![CDATA[Raphaël Brun]]></dc:creator>
		<pubDate>Sun, 26 Feb 2017 08:19:49 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Compliance]]></category>
		<category><![CDATA[digital transformation]]></category>
		<category><![CDATA[digital trust]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[synthesis]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=9721/</guid>

					<description><![CDATA[<p>Ensuring the respect of privacy in a digital world not only requires integration into every project, but integration into every company culture. This approach will also facilitate compliance with new regulations in the respective countries. This blog post is a...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/02/privacy-within-digital-transformation-four-major-principles/">Privacy within the digital transformation: four major principles</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Ensuring the respect of privacy in a digital world not only requires integration into every project, but integration into every company culture. This approach will also facilitate compliance with new regulations in the respective countries.</em></p>
<p><em>This blog post is a part of a series of articles which is itself the result of a synthesis on <a href="https://www.wavestone.com/en/insight/privacy-digital-world-compliance-trust/">Privacy at the digital age</a> published on our website. </em></p>
<h2>Many projects aim at digitalising business processes and customer relationships in order to optimise existing processes, introduce customer proximity or offer new services</h2>
<p>The following examples, based on Wavestone’s consulting experience, illustrate such trends. <strong>Historically</strong>, postmen, meter readers and service technicians have worked with paper (address databases, meter-reading or maintenance documentation). Work is organised according to the tasks to be performed and can usually be operated <strong>alone and independently throughout the day, before information is collected and consolidated at the end of a work shift</strong>.</p>
<p>The <strong>dematerialisation of such paper-based processes is intended to help organisations or agents in their activities</strong> by collecting data, better organising the work to be performed and sequencing tasks. This digitalisation process occurs in different sectors for specific purposes. For example, in the energy sector, smart meters create innovative opportunities around energy saving and fraud management through the collation of consumption data. In the insurance sector, accumulating data on customer preferences enables the personalisation and customisation of services and the development of additional offerings.</p>
<p>Such <strong>developments require the collation and manipulation of masses of personal data</strong>.</p>
<h2>Cybersecurity alone is not sufficient for protecting digital privacy</h2>
<p>To protect personal data so crucial to the digital market, organisations will pursue cybersecurity measures, such as secure transfer protocols or data encryption. However, we may question if such measures are sufficient, while concerns over data misuse, profiling and automated decision-making intensify.</p>
<p><strong>An IT security-oriented approach alone is not sufficient.</strong> To address the fears over the respect of privacy, <strong>it is essential for organisations to reassure individuals</strong> by guaranteeing the non-manipulation of data without their prior knowledge and against their will.</p>
<h2>Four Major Principles</h2>
<p>The following guiding principles are to be applied in the collation and use of personal data</p>
<figure id="post-9674 media-9674" class="align-none">
<figure id="post-9723 media-9723" class="align-none"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-9723 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/04/Image1.png" alt="" width="2025" height="198" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2017/04/Image1.png 2025w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/04/Image1-437x43.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/04/Image1-768x75.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2017/04/Image1-71x7.png 71w" sizes="(max-width: 2025px) 100vw, 2025px" /></figure>
</figure>
<h3 class="align-none">1- Communicate transparently and explicitly,</h3>
<p>informing individuals on the data that is collected about them even if not directly obtained from those concerned. Our survey essentially illustrates <strong>this meaning of privacy to citizens: what kind of information is accessible about me, and to whom</strong>? It also means sharing the reasons behind data collection and the intended usage. Under no circumstances should data be collected without the purpose of collection disclosed to the persons concerned. Recent sanctions from regulators have illustrated that such activity is always exposed in the media, with heavy reputational impact and lost customer confidence often the damaging consequences. Building a relationship of trust takes years, whereas losing it only takes minutes.</p>
<h3 class="align-none">2- Minimise the collection and storage of personal data</h3>
<p>Less data collected about an individual means a lower risk of unauthorised and non-compliant use. <strong>For existing data, it is possible to process data while minimising risks through the use of “declassifying”</strong> techniques such as anonymisation, pseudonymisation (replacing direct identifiers with “codes”), randomisation (randomly generated data which retains the statistical value but conceals the origin) or generalisation of data sets.</p>
<p><strong>Regarding data sharing and exchange,</strong> mathematical methods facilitate the exchange of data between two organisations, whilst ensuring data anonymity. When selecting such methods, it is important<strong> to assess their limitations</strong>. <strong>A poorly executed “sensitivity reduction” can still directly lead to the source of original data</strong>. For example, this can involve deleting the name but keeping the date of birth, place of birth and address.</p>
<p><strong>Such methods enable organisations to optimise the customer relationship in two ways:</strong> by providing a better understanding of the digital customers’ profile and by demonstrating <strong>respect for customer privacy</strong>. This is the path chosen by Apple through the concept of <strong>differential privacy</strong> to differentiate from competitors Google and Microsoft.</p>
<h3 class="align-none">3- Ensure individuals are in control of their personal data</h3>
<p>not by generating value through the access to data, but rather by providing individuals with control over their data, allowing services to develop based on their needs.</p>
<p>This approach, labelled <strong>“self-data”</strong>, can be applied in the context of an energy consumption optimisation project, an example of which is to ask customers to indicate the temperature in their homes to record the potential cost savings associated with heating reduction. An individual will then be informed of the potential cost savings by autonomously using and managing a self-data Cloud platform, connected to his personal equipment to enable the cross-analysis of data through consultation of his digital thermometer and energy bills.</p>
<p>Use cases for self-data are also subject to research in the insurance sector, with some insurance companies contemplating the complete removal of client spaces to instead install them on self-data Cloud platforms. The insurer will then have access to the data belonging to his client but is no longer in ownership of that data. Beyond self-data, such trends may even lead to the “Green Button” mechanism where individuals explicitly validate access to their data at any time. This principle, albeit difficult to implement in practice, can be restricted to particularly sensitive data, such as health data.</p>
<h3 class="align-none">4- Implement a win-win model</h3>
<p><strong>by clearly demonstrating the benefits generated by collecting and using data, not only for the organisation but also for individuals.</strong> Such benefits can be shared with customers through various means, such as additional services, rebates and compensation.</p>
<p>This approach may even <strong>drive the ease in adoption</strong> of new uses in an environment where increases in market share carry significant impact.</p>
<p>Ultimately, we are able to identify several levers in motion for<strong> building an honourable circle</strong> of trust when using an individuals’ data with respect and for the purposes of increasing the level of confidence.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2017/02/privacy-within-digital-transformation-four-major-principles/">Privacy within the digital transformation: four major principles</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Collectivités &#038; digital : think global, act local</title>
		<link>https://www.riskinsight-wavestone.com/en/2016/02/collectivites-digital-think-digital-act-local/</link>
		
		<dc:creator><![CDATA[Dina Mercier]]></dc:creator>
		<pubDate>Mon, 01 Feb 2016 14:36:28 +0000</pubDate>
				<category><![CDATA[Métiers - Digital & innovation]]></category>
		<category><![CDATA[Métiers - Stratégie d’entreprise]]></category>
		<category><![CDATA[internet des objets]]></category>
		<category><![CDATA[open data]]></category>
		<category><![CDATA[transformation digitale]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=8741</guid>

					<description><![CDATA[<p>Collectivités territoriales et transformation digitale : deux univers que tout semble opposer. Si l’on en juge par les investissements en hausse dans le digital, malgré des budgets globalement en baisse dans le secteur public, les mutations qui s’opèrent dans notre économie...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2016/02/collectivites-digital-think-digital-act-local/">Collectivités &#038; digital : think global, act local</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Collectivités territoriales et transformation digitale : deux univers que tout semble opposer. Si l’on en juge par les investissements en hausse dans le digital, malgré des budgets globalement en baisse dans le secteur public, les mutations qui s’opèrent dans notre économie et nos technologies sont loin d’être pourtant l’apanage du privé.</p>
<h2>Les réformes publiques, moteur de la transformation digitale des collectivités territoriales en France</h2>
<p>Tirées par des réglementations et une dynamique imposant à la fois une maîtrise des dépenses publiques et un renouveau dans la relation avec l’usager, <strong>les collectivités territoriales sont bien engagées dans une révolution numérique.</strong> Celle-ci s’accompagne d’une transformation profonde du service public de proximité visant à générer des économies tout en créant de la valeur, comme en témoignent les initiatives autour de la Smart City. Au-delà d’une simple informatisation, <strong>c’est une véritable optimisation qui s’opère, dans laquelle le digital joue un rôle central</strong> : améliorer l’efficacité des services existants, développer la transparence et favoriser les démarches participatives des citoyens.</p>
<p>Force est de constater que le large spectre de compétences des collectivités laisse toute sa place au numérique. Gestion  de l’état civil, de la voirie publique, mobilité et organisation des transports, collecte des déchets, distribution de l’eau et de l’énergie, enseignement, culture, patrimoine : nombreuses sont les activités pouvant tirer profit de cette modernisation, et notamment de l’internet des objets pour la gestion de l’éclairage public, de l’information urbaine ou encore de la signalisation. Si les outils collaboratifs et la dématérialisation des documents et des processus arrivent en tête des projets numériques des collectivités, encouragés notamment par l’obligation de dématérialiser les factures à partir de 2017, les enjeux d’attractivité du territoire conduisent de plus en plus les élus à investir dans les outils d’analyse et de surveillance du territoire (monitoring urbain), de services aux usagers et de modernisation des infrastructures.</p>
<h2>La transformation numérique territoriale : un écosystème diversifié</h2>
<p>À l’intérieur des collectivités territoriales tout d’abord, si la révolution numérique fait passer la DSI des collectivités d’un centre de coût à un rôle de créateur de valeur, elle n’est pas le seul acteur de la transformation locale. La direction de la communication est depuis toujours son interlocuteur privilégié, tout particulièrement en ce qui concerne la stratégie d’information des usagers. La direction financière n’est pas en reste, comme nous l’avons observé précédemment, avec les nombreuses dématérialisations en cours (dématérialisation des échanges avec le trésor public) et à venir. Dans certaines collectivités, on voit même s’ouvrir des postes ou des directions de la transformation numérique, sans que ses membres n’aient nécessairement toute latitude pour mettre en œuvre une stratégie propre. En interne toujours, les Directions métiers ne sont pas en reste, et surtout la direction des relations usagers, véritable partenaire de la DSI qui dispose d’une expertise en matière de parcours et de profils usagers. Se développe ainsi une approche de plus en plus transversale pour piloter la stratégie de transformation digitale.</p>
<p>Certaines compétences des collectivités territoriales sont également historiquement déléguées à des acteurs privés ou d’économie mixte. Il s’agit en particulier des services de transports, de la distribution d’énergie (gaz, électricité), de l’eau ou encore de la collecte des déchets. Ces opérateurs participent donc activement aux mutations profondes du territoire et expérimentent même à l’échelle locale des projets innovants pour améliorer leur qualité de service et accompagner le besoin de transparence, les nouveaux usages et les nouveaux canaux digitaux. <a href="http://www.smart-electric-lyon.fr/" target="_blank">C’est le cas par exemple du groupe EDF qui au travers de son expérimentation Smart Electric Lyon</a> équipe les clients volontaires de compteurs communicants dits « intelligents ».</p>
<p>Enfin n’oublions pas le citoyen lui-même qui grâce aux objets connectés prend un rôle d’acteur de la ville intelligente et rentre dans une véritable démarche participative. S’il est consommateur de l’information mise à sa disposition, le citoyen peut également produire de l’information partagée et créer de la valeur ajoutée, qu’il s’agisse par exemple d’indiquer la présence éventuelle de trous dans la chaussée &#8211; informations agrégées dans des plateformes de crowdsourcing &#8211; ou encore de proposer à la collectivité un service de covoiturage. Si beaucoup s’interrogent encore sur l’existence d’une véritable e-démocratie, les technologies numériques et les supports mobiles viennent sans nul doute décloisonner les données et faciliter l’implication citoyenne.</p>
<h2>Cartographie du territoire en temps réel et analyse prédictive</h2>
<p>Petit à petit, un nouvel acteur émerge dans ce paysage. Il s’agit des start-ups dont les solutions applicatives et les objets connectés aident les collectivités à optimiser l’exploitation des réseaux : mesure des débits et de la qualité de l’eau, du bruit, du remplissage des poubelles, connaissance quasi-instantanée des données de consommation énergétique, gestion des réseaux urbains multimodaux…</p>
<p>Si ces capteurs permettent de visualiser et de piloter l’état réel des flux sous forme de cartes et de tableaux de bord personnalisables, l’intérêt des collectivités locales se porte de plus en plus sur l’analyse de ces données et la construction de modèles prédictifs. Toutes les administrations publiques collectent en effet des milliers de données structurées qui pourraient être mises à la disposition de tiers pour le développement de nouveaux services aux citoyens et l’amélioration de la qualité de vie. Comme en témoigne <a href="http://tempsreel.nouvelobs.com/sante/20150319.OBS5044/loi-sante-l-article-47-menace-t-il-le-secret-medical.html" target="_blank">le projet de loi Touraine dont l’article 47 sur l’ouverture des données de santé au public a tant fait débat</a>, cette diffusion de l’information (Open Data) pose cependant des contraintes juridiques dans un cadre contractuel restant à définir, et se heurte à la volonté des pouvoirs publics de conserver le contrôle des données sensibles.</p>
<p>L’avènement de la Métropole, et avec lui la rationalisation de la gouvernance sur le territoire, devrait cependant ouvrir la voie à de nouvelles initiatives dans ce domaine et faciliter le passage d’une démarche d’expérimentation opportuniste à la mise en œuvre d’une véritable stratégie locale de transformation digitale. Au-delà, l’État doit devenir le véritable chef d’orchestre de la révolution numérique en cours, et un organisme pourrait même être créé à l’échelle européenne, pour gérer les politiques d’ouverture des données des différents pays de manière plus uniforme.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2016/02/collectivites-digital-think-digital-act-local/">Collectivités &#038; digital : think global, act local</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
