{"id":11272,"date":"2018-09-25T12:45:53","date_gmt":"2018-09-25T11:45:53","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=11272\/"},"modified":"2020-01-02T13:36:25","modified_gmt":"2020-01-02T12:36:25","slug":"3-idees-recues-sur-les-obligations-du-rgpd-33","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/","title":{"rendered":"3 id\u00e9e re\u00e7ues sur les obligations du RGPD (3\/3)"},"content":{"rendered":"<p><em>Suite \u00e0 l\u2019adoption du RGPD en 2016, la plupart des entreprises se sont dot\u00e9es d\u2019une d\u00e9marche structur\u00e9e et, maintenant que l\u2019\u00e9ch\u00e9ance de mai 2018 est pass\u00e9e, ont pour la plupart entam\u00e9 leur plan de mise en conformit\u00e9. Mais nous observons encore certaines interpr\u00e9tations du texte qui peuvent s\u2019av\u00e9rer inexactes. Nous avons donc lanc\u00e9 une s\u00e9rie de 3 articles visant \u00e0 d\u00e9construire ces id\u00e9es re\u00e7ues. Apr\u00e8s un premier article sur <a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/05\/3-idees-recues-sur-les-obligations-du-rgpd-13\/\">l\u2019obligation de consentement <\/a>et un second sur <a href=\"https:\/\/www.riskinsight-wavestone.com\/2018\/06\/3-idees-recues-sur-les-obligations-du-rgpd-23\/\">les techniques de protection telles qu\u2019anonymisation, pseudonymisation et chiffrement<\/a>, voici le troisi\u00e8me et dernier de la s\u00e9rie, traitant des dur\u00e9es de conservation.<\/em><\/p>\n<p>&nbsp;<\/p>\n<h2>Id\u00e9e re\u00e7ue #3 \u2013 Il y a une dur\u00e9e maximale de conservation des donn\u00e9es<\/h2>\n<p>Cette dur\u00e9e n\u2019est pas fix\u00e9e de mani\u00e8re absolue par le RGPD en mois ou en ann\u00e9es. La r\u00e8gle est toujours la m\u00eame\u00a0: les donn\u00e9es ne peuvent \u00eatre conserv\u00e9es que si elles sont utilis\u00e9es pour un traitement qui est couvert par une justification (contrat, consentement, obligation l\u00e9gale\u2026).<a href=\"#_edn1\" name=\"_ednref1\">[1]<\/a><sup>,<a href=\"#_edn2\" name=\"_ednref2\">[2]<\/a><\/sup> Si la justification tombe (par exemple par retrait du consentement ou fin d\u2019un contrat) pour un traitement donn\u00e9, la donn\u00e9e ne peut plus \u00eatre utilis\u00e9e pour ce traitement. Si aucun autre traitement n\u2019utilise ces donn\u00e9es, <strong>celles-ci doivent \u00eatre effac\u00e9es imm\u00e9diatement<\/strong>, ou pour le dire comme le r\u00e8glement, \u00ab\u00a0dans les meilleurs d\u00e9lais\u00a0\u00bb<a href=\"#_edn3\" name=\"_ednref3\">[3]<\/a>.<\/p>\n<p>Les donn\u00e9es peuvent \u00eatre conserv\u00e9es tant qu\u2019elles servent \u00e0 au moins un <strong>traitement<\/strong> couvert par une <strong>justification<\/strong>\u00a0!<\/p>\n<p>Il existe de nombreux cas o\u00f9 la fin d\u2019une justification, comme l\u2019arr\u00eat d\u2019un contrat, ne va pas impliquer la suppression des donn\u00e9es, car une autre justification est pr\u00e9sente. Par exemple, si mon contrat t\u00e9l\u00e9phonique prend fin, l\u2019op\u00e9rateur peut \u00eatre amen\u00e9 \u00e0 conserver les donn\u00e9es dans le cadre de mon contrat internet que j\u2019ai conclu avec lui. Il est des cas \u00e9galement o\u00f9 la soci\u00e9t\u00e9 a un int\u00e9r\u00eat, voire l\u2019obligation, de conserver certaines donn\u00e9es, par exemple pour archivage\u00a0: c\u2019est le cas par exemple des CV de candidats non retenus, des bulletins de paie ou encore des relev\u00e9s d\u2019information des assureurs.<\/p>\n<p>&nbsp;<\/p>\n<h3>Il existe n\u00e9anmoins dans certains cas, et pour certaines cat\u00e9gories de donn\u00e9es, une dur\u00e9e de conservation maximale autoris\u00e9e ou minimale requise<\/h3>\n<p>Ces dur\u00e9es ne sont pas indiqu\u00e9es dans le RGPD. Il peut exister des dur\u00e9es sp\u00e9cifiques \u00e0 certaines cat\u00e9gories de donn\u00e9es, propres \u00e0 la nature de la donn\u00e9e en question, et <strong>d\u00e9coulant d\u2019autres textes de loi<\/strong>, comme le Code de la S\u00e9curit\u00e9 Sociale (ex.\u00a0: prescription des paiements de l\u2019assurance maladie, d\u00e9comptes), le Code du Travail (ex.\u00a0: conservation des bulletins de paie), le Code Civil (ex.\u00a0: prescription d\u2019un contrat de travail), ou encore des textes relatifs \u00e0 des secteurs sp\u00e9cifiques, comme le Code des Assurances (ex.\u00a0: prescription d\u2019un contrat d\u2019assurance vie). Il s\u2019agit souvent de dur\u00e9es minimales, au bout desquelles une prescription autorise l\u2019effacement des donn\u00e9es.<\/p>\n<p>De plus, la CNIL a d\u00e9fini, dans le contexte l\u00e9gislatif pr\u00e9c\u00e9dent le RGPD, des Normes Simplifi\u00e9es, sp\u00e9cifiant souvent des dur\u00e9es de conservation maximale, par exemple dans le domaine de la relation commerciale<a href=\"#_edn4\" name=\"_ednref4\">[4]<\/a>, ou encore dans le recrutement<a href=\"#_edn5\" name=\"_ednref5\">[5]<\/a>. Ces documents n\u2019ont plus de valeur juridique<a href=\"#_edn6\" name=\"_ednref6\">[6]<\/a> depuis l\u2019entr\u00e9e en vigueur du RGPD, mais en attendant la production de nouveaux r\u00e9f\u00e9rentiels bas\u00e9s sur le RGPD, ils peuvent continuer \u00e0 servir de guide, afin de d\u00e9finir une dur\u00e9e de conservation qui satisfasse aux besoins de l\u2019entreprise tout en n\u2019\u00e9tant pas abusive vis-\u00e0-vis des personnes concern\u00e9es.<\/p>\n<p>Il existe donc <strong>deux raisons<\/strong> qui peuvent n\u00e9cessiter l\u2019effacement d\u2019une donn\u00e9e\u00a0:<\/p>\n<ul>\n<li>la caducit\u00e9 d\u2019une base l\u00e9gale<a href=\"#_edn7\" name=\"_ednref7\">[7]<\/a> (retrait du consentement, fin du contrat, \u00e9coulement de la dur\u00e9e l\u00e9gale minimale de conservation, etc.), sans qu\u2019aucun autre traitement licite ne justifie la conservation de la donn\u00e9e\u00a0;<a href=\"#_edn8\" name=\"_ednref8\">[8]<\/a><\/li>\n<li>l\u2019\u00e9coulement de la dur\u00e9e maximale de conservation pour les donn\u00e9es qui y sont soumises (par exemple les dur\u00e9es d\u00e9finies par la CNIL), l\u00e0 aussi sans qu\u2019aucun autre traitement licite ne justifie la conservation de la donn\u00e9e.<\/li>\n<\/ul>\n<p>C\u2019est pour ces raisons que le RGPD impose que la dur\u00e9e de conservation soit ma\u00eetris\u00e9e, notamment par la mise en place \u2013 recommand\u00e9e \u2013 d\u2019un <strong>d\u00e9lai butoir<\/strong>, au bout duquel on r\u00e9viserait la lic\u00e9it\u00e9 du traitement et de la conservation.<a href=\"#_edn9\" name=\"_ednref9\">[9]<\/a><sup>,<a href=\"#_edn10\" name=\"_ednref10\">[10]<\/a><\/sup> Pour reprendre les mots du consid\u00e9rant 39\u00a0: \u00ab\u00a0afin de garantir que les donn\u00e9es ne sont pas conserv\u00e9es plus longtemps que n\u00e9cessaire, des d\u00e9lais devraient \u00eatre fix\u00e9s par le responsable du traitement pour leur effacement ou pour un examen p\u00e9riodique\u00a0\u00bb, \u00e0 sa discr\u00e9tion.<\/p>\n<p>&nbsp;<\/p>\n<h3>Une impl\u00e9mentation du d\u00e9lai butoir centralis\u00e9e avec la gestion des bases l\u00e9gales<\/h3>\n<p>Nous voyons bien ci-dessus les parall\u00e8les entre la gestion des bases l\u00e9gales et les dur\u00e9es de conservation\u00a0: en effet, il s\u2019agit dans les deux cas de g\u00e9rer les situations o\u00f9 un \u00e9v\u00e9nement (par exemple le retrait d\u2019un consentement ou la fin d\u2019une dur\u00e9e l\u00e9gale de conservation) n\u00e9cessite de revoir les justifications qui permettent de conserver une donn\u00e9e, et d\u2019effacer cette donn\u00e9e si plus aucune justification ne la couvre.<\/p>\n<p>La complexit\u00e9 suppl\u00e9mentaire avec les dur\u00e9es de conservation est qu\u2019elles sont d\u00e9finies au cas par cas par diff\u00e9rentes lois sur certaines cat\u00e9gories de donn\u00e9es, qu\u2019elles sont tant\u00f4t maximales, tant\u00f4t minimales, et qu\u2019elles courent \u00e0 partir d\u2019un \u00e9l\u00e9ment d\u00e9clencheur. Dans tous les cas, il convient de les g\u00e9rer de fa\u00e7on centralis\u00e9e avec les bases l\u00e9gales, \u00e9tant donn\u00e9 que pour les deux il va falloir cr\u00e9er des r\u00e8gles de gestion applicables aux donn\u00e9es d\u2019une personne identifi\u00e9e conduisant \u00e9ventuellement \u00e0 leur effacement.<\/p>\n<p>L\u00e0 o\u00f9 la gestion peut diff\u00e9rer, c\u2019est que dans les cas des dur\u00e9es de conservation, l\u2019on peut proc\u00e9der :<\/p>\n<ul>\n<li>soit <strong>de fa\u00e7on \u00e9v\u00e9nementielle<\/strong>: l\u2019\u00e9coulement de la dur\u00e9e de conservation d\u00e9finie par le responsable du traitement entra\u00eene directement la suppression de la donn\u00e9e,<\/li>\n<li>soit <strong>de fa\u00e7on planifi\u00e9e<\/strong>, \u00e0 une fr\u00e9quence \u00e0 d\u00e9finir\u00a0: par exemple avec une purge mensuelle ou trimestrielle o\u00f9 l\u2019on supprimerait tous les CV de candidats avec qui il n\u2019y a plus eu de contact depuis 2 ans.<\/li>\n<\/ul>\n<p>Dans tous les cas, une gestion automatis\u00e9e n\u00e9cessite \u00e9videmment de tracer de mani\u00e8re pr\u00e9cise les actions (ex.\u00a0: contacts avec le candidat) et de relier les donn\u00e9es aux bases l\u00e9gales qui justifient leur conservation afin de ne pas supprimer des donn\u00e9es qui ne le devraient pas (exemple pour un assureur\u00a0: suppression au bout des 10 ans l\u00e9gaux d\u2019un contrat d\u2019assurance et des donn\u00e9es de la personne associ\u00e9e, alors qu\u2019elle a un autre contrat en cours ou que l\u2019on a son consentement pour un autre traitement).<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"post-11273 media-11273\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-11273 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/09\/image-1-1.png\" alt=\"\" width=\"1846\" height=\"528\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/09\/image-1-1.png 1846w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/09\/image-1-1-437x125.png 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/09\/image-1-1-768x220.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2018\/09\/image-1-1-71x20.png 71w\" sizes=\"auto, (max-width: 1846px) 100vw, 1846px\" \/><\/figure>\n<p style=\"text-align: center;\"><em>Figure 1 \/ Exemple de r\u00e8gle de gestion pour g\u00e9rer une dur\u00e9e de conservation li\u00e9e \u00e0 un contrat<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Enfin, les dur\u00e9es de conservation, tout comme les bases l\u00e9gales justifiant chaque traitement, doivent \u00eatre d\u00e9finies par le m\u00e9tier et les directions juridique ou de la conformit\u00e9, afin que la DSI puisse les impl\u00e9menter en concevant les r\u00e8gles de gestions appropri\u00e9es. Ces r\u00e8gles de gestion devraient g\u00e9rer de fa\u00e7on similaire et crois\u00e9e les \u00e9ventuelles actions automatiques sur la donn\u00e9e d\u00e9coulant des dur\u00e9es de conservation et celles d\u00e9coulant des bases l\u00e9gales (fin de contrat, consentement), afin notamment que des donn\u00e9es ne soient pas supprim\u00e9es inutilement.<\/p>\n<p>Le RGPD ne sp\u00e9cifie pas de dur\u00e9e en tant que telle, mais demande que soient d\u00e9finies, mesur\u00e9es et ma\u00eetris\u00e9es des dur\u00e9es de conservation, qui dans certains cas sont d\u00e9finies par d\u2019autres lois. Ce travail n\u00e9cessite une collaboration entre les services juridiques ou conformit\u00e9 d\u2019une part et les m\u00e9tiers (ou MOA) d\u2019autre part. L\u2019impl\u00e9mentation, quant \u00e0 elle, n\u00e9cessite d\u2019int\u00e9grer ces dur\u00e9es de conservation aux m\u00eames r\u00e8gles de gestion que celles qui r\u00e9gissent les bases l\u00e9gales, comme en cas de retrait du consentement ou de fin d\u2019un contrat.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"#_ednref1\" name=\"_edn1\">[1]<\/a> Voir notre article pr\u00e9c\u00e9dent <a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/\"><u>Id\u00e9e re\u00e7ue #1 \u2013 Le consentement est obligatoire<\/u>\u00a0<\/a><\/p>\n<p><a href=\"#_ednref2\" name=\"_edn2\">[2]<\/a> \u00ab\u00a0conserv\u00e9es sous une forme permettant l&#8217;identification des personnes concern\u00e9es pendant une dur\u00e9e n&#8217;exc\u00e9dant pas celle n\u00e9cessaire au regard des finalit\u00e9s pour lesquelles elles sont trait\u00e9es\u00a0\u00bb, Article 5, paragraphe 1, point e)<\/p>\n<p><a href=\"#_ednref3\" name=\"_edn3\">[3]<\/a> Article 17, paragraphe 1<\/p>\n<p><a href=\"#_ednref4\" name=\"_edn4\">[4]<\/a> CNIL (11\/07\/2013). Norme Simplifi\u00e9e NS-056 \u00ab\u00a0Fiche clients-prospects des assureurs\u00a0\u00bb. Disponible \u00e0 l\u2019adresse\u00a0: <a href=\"https:\/\/www.cnil.fr\/fr\/declaration\/ns-056-fichier-clients-prospects-des-assureurs\">https:\/\/www.cnil.fr\/fr\/declaration\/ns-056-fichier-clients-prospects-des-assureurs<\/a>, consult\u00e9e le 18\/09\/2018<\/p>\n<p><a href=\"#_ednref5\" name=\"_edn5\">[5]<\/a> Fiche explicative de la CNIL\u00a0: CNIL (octobre 2016). \u00ab\u00a0Travail &amp; donn\u00e9es personnelles\u00a0\u2013 Le recrutement et la gestion du personnel\u00a0\u00bb. Disponible \u00e0 l\u2019adresse\u00a0: <a href=\"https:\/\/www.cnil.fr\/sites\/default\/files\/atoms\/files\/_travail-vie_privee_recrutement_gestion_du_personnel.pdf\">https:\/\/www.cnil.fr\/sites\/default\/files\/atoms\/files\/_travail-vie_privee_recrutement_gestion_du_personnel.pdf<\/a>, consult\u00e9e le 25\/04\/2018.<\/p>\n<p><a href=\"#_ednref6\" name=\"_edn6\">[6]<\/a> CNIL. \u00ab\u00a0Les normes et les dispenses de d\u00e9claration\u00a0\u00bb. Disponible \u00e0 l\u2019adresse\u00a0: <a href=\"https:\/\/www.cnil.fr\/fr\/liste-des-normes-et-des-dispenses\">https:\/\/www.cnil.fr\/fr\/liste-des-normes-et-des-dispenses<\/a>, consult\u00e9e le 18\/09\/2018<\/p>\n<p><a href=\"#_ednref7\" name=\"_edn7\">[7]<\/a> Voir notre article pr\u00e9c\u00e9dent <a href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/\"><u>Id\u00e9e re\u00e7ue #1 \u2013 Le consentement est obligatoire<\/u><\/a><\/p>\n<p><a href=\"#_ednref8\" name=\"_edn8\">[8]<\/a> Article 5, paragraphe 1, point e)<\/p>\n<p><a href=\"#_ednref9\" name=\"_edn9\">[9]<\/a> Consid\u00e9rant 39<\/p>\n<p><a href=\"#_ednref10\" name=\"_edn10\">[10]<\/a> Article 30, paragraphe 1, point f)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Suite \u00e0 l\u2019adoption du RGPD en 2016, la plupart des entreprises se sont dot\u00e9es d\u2019une d\u00e9marche structur\u00e9e et, maintenant que l\u2019\u00e9ch\u00e9ance de mai 2018 est pass\u00e9e, ont pour la plupart entam\u00e9 leur plan de mise en conformit\u00e9. Mais nous observons&#8230;<\/p>\n","protected":false},"author":1318,"featured_media":9902,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3226],"tags":[417,2959,3299,3045,2842,413],"coauthors":[2980],"class_list":["post-11272","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-digital-compliance","tag-conformite","tag-consentement","tag-digital-privacy","tag-duree-de-conservation","tag-rgpd","tag-vie-privee"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>3 id\u00e9e re\u00e7ues sur les obligations du RGPD (3\/3) - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 id\u00e9e re\u00e7ues sur les obligations du RGPD (3\/3) - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Suite \u00e0 l\u2019adoption du RGPD en 2016, la plupart des entreprises se sont dot\u00e9es d\u2019une d\u00e9marche structur\u00e9e et, maintenant que l\u2019\u00e9ch\u00e9ance de mai 2018 est pass\u00e9e, ont pour la plupart entam\u00e9 leur plan de mise en conformit\u00e9. Mais nous observons...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-25T11:45:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-02T12:36:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/07\/Fotolia_76746871_Subscription_Monthly_M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1489\" \/>\n\t<meta property=\"og:image:height\" content=\"1276\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Forest0Giulio\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Forest0Giulio\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/\"},\"author\":{\"name\":\"Forest0Giulio\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/022367a67c2c7b38c0dab4b7671a7193\"},\"headline\":\"3 id\u00e9e re\u00e7ues sur les obligations du RGPD (3\/3)\",\"datePublished\":\"2018-09-25T11:45:53+00:00\",\"dateModified\":\"2020-01-02T12:36:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/\"},\"wordCount\":1627,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/07\/Fotolia_76746871_Subscription_Monthly_M.jpg\",\"keywords\":[\"conformit\u00e9\",\"Consentement\",\"Digital privacy\",\"dur\u00e9e de conservation\",\"RGPD\",\"vie priv\u00e9e\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Digital Compliance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/\",\"name\":\"3 id\u00e9e re\u00e7ues sur les obligations du RGPD (3\/3) - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/07\/Fotolia_76746871_Subscription_Monthly_M.jpg\",\"datePublished\":\"2018-09-25T11:45:53+00:00\",\"dateModified\":\"2020-01-02T12:36:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/07\/Fotolia_76746871_Subscription_Monthly_M.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/07\/Fotolia_76746871_Subscription_Monthly_M.jpg\",\"width\":1489,\"height\":1276,\"caption\":\"Vector illustration of online shopping with realistic computer and contour icons\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"3 id\u00e9e re\u00e7ues sur les obligations du RGPD (3\/3)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/022367a67c2c7b38c0dab4b7671a7193\",\"name\":\"Forest0Giulio\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/forest0giulio\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 id\u00e9e re\u00e7ues sur les obligations du RGPD (3\/3) - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/","og_locale":"en_US","og_type":"article","og_title":"3 id\u00e9e re\u00e7ues sur les obligations du RGPD (3\/3) - RiskInsight","og_description":"Suite \u00e0 l\u2019adoption du RGPD en 2016, la plupart des entreprises se sont dot\u00e9es d\u2019une d\u00e9marche structur\u00e9e et, maintenant que l\u2019\u00e9ch\u00e9ance de mai 2018 est pass\u00e9e, ont pour la plupart entam\u00e9 leur plan de mise en conformit\u00e9. Mais nous observons...","og_url":"https:\/\/www.riskinsight-wavestone.com\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/","og_site_name":"RiskInsight","article_published_time":"2018-09-25T11:45:53+00:00","article_modified_time":"2020-01-02T12:36:25+00:00","og_image":[{"width":1489,"height":1276,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/07\/Fotolia_76746871_Subscription_Monthly_M.jpg","type":"image\/jpeg"}],"author":"Forest0Giulio","twitter_misc":{"Written by":"Forest0Giulio","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/"},"author":{"name":"Forest0Giulio","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/022367a67c2c7b38c0dab4b7671a7193"},"headline":"3 id\u00e9e re\u00e7ues sur les obligations du RGPD (3\/3)","datePublished":"2018-09-25T11:45:53+00:00","dateModified":"2020-01-02T12:36:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/"},"wordCount":1627,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/07\/Fotolia_76746871_Subscription_Monthly_M.jpg","keywords":["conformit\u00e9","Consentement","Digital privacy","dur\u00e9e de conservation","RGPD","vie priv\u00e9e"],"articleSection":["Cybersecurity &amp; Digital Trust","Digital Compliance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/","url":"https:\/\/www.riskinsight-wavestone.com\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/","name":"3 id\u00e9e re\u00e7ues sur les obligations du RGPD (3\/3) - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/07\/Fotolia_76746871_Subscription_Monthly_M.jpg","datePublished":"2018-09-25T11:45:53+00:00","dateModified":"2020-01-02T12:36:25+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/07\/Fotolia_76746871_Subscription_Monthly_M.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/07\/Fotolia_76746871_Subscription_Monthly_M.jpg","width":1489,"height":1276,"caption":"Vector illustration of online shopping with realistic computer and contour icons"},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2018\/09\/3-idees-recues-sur-les-obligations-du-rgpd-33\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"3 id\u00e9e re\u00e7ues sur les obligations du RGPD (3\/3)"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/022367a67c2c7b38c0dab4b7671a7193","name":"Forest0Giulio","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/forest0giulio\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11272","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1318"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=11272"}],"version-history":[{"count":8,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11272\/revisions"}],"predecessor-version":[{"id":12333,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11272\/revisions\/12333"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/9902"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=11272"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=11272"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=11272"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=11272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}