{"id":1681,"date":"2012-03-23T12:49:28","date_gmt":"2012-03-23T11:49:28","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=1681"},"modified":"2019-12-31T12:15:09","modified_gmt":"2019-12-31T11:15:09","slug":"la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/","title":{"rendered":"La vie priv\u00e9e \u00e0 27 : encadrer la ru\u00e9e vers l\u2019or num\u00e9rique"},"content":{"rendered":"<p><em>Le 25 janvier dernier, la Communaut\u00e9 Europ\u00e9enne d\u00e9voilait son projet de refonte en profondeur de la l\u00e9gislation communautaire en mati\u00e8re de protection des donn\u00e9es \u00e0 caract\u00e8re personnel. Si celui-ci ne pr\u00e9sente aucune surprise de fond, les principales \u00e9volutions ayant d\u00e9j\u00e0 \u00e9t\u00e9 annonc\u00e9es, son entr\u00e9e en vigueur n\u00e9cessitera la conduite de travaux importants au sein de bon nombre d\u2019organismes.<\/em><\/p>\n<p>Les chiffres donnent le vertige\u00a0: lors de la pr\u00e9paration de son introduction en Bourse, Facebook a \u00e9valu\u00e9 ses 850 millions d\u2019amis \u00e0 100 milliards de dollars.<\/p>\n<p>De son c\u00f4t\u00e9, Google recentre de plus en plus ostensiblement son business model sur la collecte et la valorisation des donn\u00e9es relatives \u00e0 ses utilisateurs et du profilage qu\u2019il en d\u00e9duit.<\/p>\n<p>Car ces donn\u00e9es \u00e0 caract\u00e8re personnel constituent bien, des mots m\u00eames de Viviane Reding, <em>la devise des march\u00e9s num\u00e9riques d\u2019aujourd\u2019hui<\/em>. Et la commissaire europ\u00e9enne \u00e0 la Justice d\u2019en d\u00e9duire\u00a0:\u00a0<em>et comme toute monnaie, celle-ci requiert stabilit\u00e9 et confiance. Ce n\u2019est que lorsque les consommateurs pourront avoir pleinement confiance en la protection de leurs donn\u00e9es qu\u2019ils continueront \u00e0 les confier aux entreprises et autorit\u00e9s, \u00e0 acheter en ligne et \u00e0 accepter de nouveaux services.<\/em><\/p>\n<h2>La vie priv\u00e9e \u00e0 l\u2019heure des nouvelles fronti\u00e8res du num\u00e9rique<\/h2>\n<p>Jusqu\u2019\u00e0 pr\u00e9sent, le droit europ\u00e9en en mati\u00e8re de protection des donn\u00e9es \u00e0 caract\u00e8re personnel se fonde sur une Directive de 1995, \u00e9crite alors qu\u2019Internet n\u2019en \u00e9tait qu\u2019\u00e0 ses balbutiements.<\/p>\n<p>Depuis, la part d\u2019Internet dans les communications mondiales est pass\u00e9e de 1% \u00e0 plus de 97%. Cette internationalisation des \u00e9changes de donn\u00e9es, en parall\u00e8le de la mon\u00e9tisation croissante des donn\u00e9es, met en \u00e9vidence les limites et insuffisances de la l\u00e9gislation actuelle.<\/p>\n<p>En ce sens, le projet de refonte d\u00e9voil\u00e9 le 25 janvier dernier est doublement int\u00e9ressant.<\/p>\n<p>Tout d\u2019abord, l\u00e0 o\u00f9 l\u2019on attendait une nouvelle Directive, la Communaut\u00e9 a publi\u00e9 un R\u00e8glement\u00a0: bien loin d\u2019une coquetterie de juriste, il s\u2019agit d\u2019affirmer une approche radicalement diff\u00e9rente de celle qui \u00e9tait jusqu\u2019alors en \u0153uvre et fortement d\u00e9cri\u00e9e. Un R\u00e8glement a ceci de sp\u00e9cifique qu\u2019il s\u2019applique directement aux membres, sans qu\u2019ils aient \u00e0 l\u2019int\u00e9grer \u00e0 leur droit national. En effet, alors que les fronti\u00e8res existent de moins en moins pour les flux de donn\u00e9es, il a \u00e9t\u00e9 estim\u00e9 que les disparit\u00e9s dans les traductions nationales du droit communautaire en la mati\u00e8re co\u00fbtent \u00e0 elles seules jusqu\u2019\u00e0 2,3 milliards par an aux entreprises.<\/p>\n<p>L\u2019objectif, r\u00e9affirm\u00e9 en introduction du document, est donc bien de s\u2019adapter \u00e0 un monde ouvert et d\u2019harmoniser la protection des donn\u00e9es au niveau europ\u00e9en.<\/p>\n<p>Les enjeux, ensuite, ont tr\u00e8s clairement \u00e9volu\u00e9. En 1995, le l\u00e9gislateur mettait le citoyen au c\u0153ur de ses pr\u00e9occupations, puisqu\u2019il entendait le prot\u00e9ger contre l\u2019informatisation croissante des entreprises et des \u00c9tats. En 2012, maturit\u00e9 aidant, les enjeux \u00e9conomiques et commerciaux sont pass\u00e9s au premier plan\u00a0: il ne s\u2019agit plus uniquement de prot\u00e9ger la vie priv\u00e9e \u2013 ce droit \u00e0 la vie priv\u00e9e est pass\u00e9 dans les m\u0153urs \u2013 mais d\u2019apporter confiance au citoyen (et consommateur) et s\u00e9curit\u00e9 juridique aux op\u00e9rateurs priv\u00e9s et publics.<\/p>\n<h2>Les r\u00e9seaux sociaux en ligne de mire<\/h2>\n<p>Un R\u00e8glement donc, pour la forme.<\/p>\n<p>Sur le fond, cette proposition s\u2019attaque sans surprise aux nouveaux enjeux li\u00e9s au d\u00e9veloppement des r\u00e9seaux sociaux.<\/p>\n<p>Elle pose ainsi de nouvelles r\u00e8gles, sp\u00e9cifiques au traitement des donn\u00e9es \u00e0 caract\u00e8re personnel relatives aux enfants de moins de 13 ans, qui sera d\u00e9sormais soumis \u00e0 l\u2019autorisation de leurs parents. Elle instaure \u00e9galement explicitement un droit \u00e0 l\u2019oubli num\u00e9rique, y compris pour les donn\u00e9es rendues publiques par la personne. Les pratiques de profilage, telles que celles mises en \u0153uvre par Google, requerront quant \u00e0 elles le consentement explicite des personnes concern\u00e9es.<\/p>\n<p>En r\u00e9action \u00e0 la d\u00e9mocratisation d\u2019Internet, elle rend de plus obligatoire la mise en place de canaux \u00e9lectroniques pour l\u2019exercice des droits d\u2019acc\u00e8s et de modification, tout en imposant un d\u00e9lai raisonnable du traitement des demandes.<\/p>\n<h2>Une amende \u00e0 500 millions de dollars<\/h2>\n<p>Si chaque \u00c9tat reste ma\u00eetre dans la d\u00e9finition des sanctions p\u00e9nales en cas de non-respect des exigences du R\u00e8glement, les sanctions administratives sont, elles, consid\u00e9rablement augment\u00e9es puisqu\u2019elles pourront atteindre 1 million d\u2019euros ou 2% du chiffre d\u2019affaires mondial de l\u2019entreprise. \u00c0 titre d\u2019illustration, la sanction maximale prononc\u00e9e l\u2019ann\u00e9e derni\u00e8re par la CNIL \u00e0 l\u2019encontre de Google s\u2019\u00e9levait \u00e0 100\u00a0000 \u20ac. Demain, elle pourra s\u2019\u00e9lever \u00e0 pr\u00e8s de 500 millions de dollars\u2026<\/p>\n<h2>Vers l\u2019obligation d\u2019un syst\u00e8me de management de la protection des donn\u00e9es \u00e0 caract\u00e8re personnel<\/h2>\n<p>Ultime raffinement de l\u2019existant, directement inspir\u00e9 des meilleures pratiques du march\u00e9, cette proposition de R\u00e8glement pourrait acc\u00e9l\u00e9rer la mise en \u0153uvre de syst\u00e8mes de management de la protection des donn\u00e9es \u00e0 caract\u00e8re personnel.<\/p>\n<p>On connait les syst\u00e8mes de management tels que d\u00e9finis dans les normes ISO\u00a0: par exemple, la qualit\u00e9, dans l\u2019ISO 9001 (SMQ), la s\u00e9curit\u00e9, dans l\u2019ISO 27001 (SMSI), ou encore l\u2019environnement, dans l\u2019ISO 14001 (SME).<\/p>\n<p>De mani\u00e8re analogue, figurent en effet explicitement dans le texte\u00a0:<\/p>\n<ul>\n<li>A l\u2019instar de l\u2019analyse de risque, qui guide la mise en \u0153uvre des mesures de s\u00e9curit\u00e9 dans un SMSI, l\u2019obligation\u00a0:<\/li>\n<\/ul>\n<p>&#8211; De conduire des analyses d\u2019impacts relatifs \u00e0 la vie priv\u00e9e sur les traitements les plus sensibles.<\/p>\n<p>&#8211; De prendre en compte la protection des donn\u00e9es \u00e0 caract\u00e8re personnel d\u00e8s la conception des syst\u00e8mes (le <em>privacy by design<\/em> anglo-saxon), en fonction des co\u00fbts des mesures de s\u00e9curit\u00e9 et de l\u2019\u00e9tat de l\u2019art en la mati\u00e8re.<\/p>\n<ul>\n<li>A l\u2019instar du contr\u00f4le, ensuite, qui fonde l\u2019am\u00e9lioration continue dans les diff\u00e9rents syst\u00e8mes de management cit\u00e9s, un devoir d\u2019audit de l\u2019efficacit\u00e9 des mesures par le responsable de traitement.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Argument compl\u00e9mentaire, si besoin en \u00e9tait, pour la mise en place de tels syst\u00e8mes\u00a0: si les formalit\u00e9s d\u00e9claratives disparaissent, en contrepartie de l\u2019obligation de d\u00e9signer officiellement un correspondant aux donn\u00e9es \u00e0 caract\u00e8re personnel (le CIL fran\u00e7ais), l\u2019obligation de notification des violations aux traitements de donn\u00e9es \u00e0 caract\u00e8re personnel, actuellement valable pour les op\u00e9rateurs t\u00e9l\u00e9coms, s\u2019appliquera \u00e0 l\u2019ensemble des secteurs.<\/p>\n<h2>Les critiques de la CNIL<\/h2>\n<p>Ce projet de R\u00e8glement constitue ainsi une volont\u00e9 de synth\u00e8se entre les meilleures pratiques du march\u00e9 et des r\u00e9ponses pragmatiques aux difficult\u00e9s des organismes, en particulier multinationaux, \u00e0 r\u00e9pondre aux exigences actuelles.<\/p>\n<p>Dans sa volont\u00e9 d\u2019harmonisation et de renforcement de la coop\u00e9ration europ\u00e9enne en la mati\u00e8re, la Commission propose ainsi un fonctionnement en mode <em>guichet unique<\/em>\u00a0: si le justiciable peut s\u2019adresser \u00e0 l\u2019autorit\u00e9 de contr\u00f4le (les CNIL europ\u00e9ennes) de son choix, chaque entreprise est plac\u00e9e sous la responsabilit\u00e9 d\u2019une autorit\u00e9 unique, en fonction de la localisation de son si\u00e8ge europ\u00e9en.<\/p>\n<p>Et c\u2019est l\u00e0 que le b\u00e2t blesse.<\/p>\n<p>Dans un communiqu\u00e9 publi\u00e9 d\u00e9but mars, la CNIL s\u2019est ainsi fait la voix des nombreux d\u00e9tracteurs de cet aspect du R\u00e8glement. Intitul\u00e9 <em>La d\u00e9fense de la vie priv\u00e9e s\u2019\u00e9loigne du citoyen<\/em>, cet article fait \u00e9tat de l\u2019opposition ferme de la commission \u00e0 ce principe, qui constitue, selon ses termes, <em>une v\u00e9ritable r\u00e9gression vis-\u00e0-vis des droits des citoyens<\/em>.<\/p>\n<p>Pour autant, la majorit\u00e9 des autres points du R\u00e8glement ont d\u2019ores-et-d\u00e9j\u00e0 emport\u00e9 l\u2019adh\u00e9sion de nombreux sp\u00e9cialistes du sujets, juristes et op\u00e9rationnels. Les organismes seraient donc bien avis\u00e9s d\u00e8s maintenant de les int\u00e9grer \u00e0 leur r\u00e9flexion afin d\u2019\u00eatre \u00e0 m\u00eame de respecter les futures exigences l\u00e9gales.<\/p>\n<p>Et Facebook ne s\u2019y est pas tromp\u00e9, qui a fait figurer en bonne position parmi les risques mentionn\u00e9s dans son dossier d\u2019introduction en bourse le durcissement de la l\u00e9gislation en mati\u00e8re de donn\u00e9es \u00e0 caract\u00e8re personnel.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le 25 janvier dernier, la Communaut\u00e9 Europ\u00e9enne d\u00e9voilait son projet de refonte en profondeur de la l\u00e9gislation communautaire en mati\u00e8re de protection des donn\u00e9es \u00e0 caract\u00e8re personnel. Si celui-ci ne pr\u00e9sente aucune surprise de fond, les principales \u00e9volutions ayant d\u00e9j\u00e0&#8230;<\/p>\n","protected":false},"author":120,"featured_media":3381,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3226],"tags":[410,3299,412,409,411,413],"coauthors":[967],"class_list":["post-1681","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-digital-compliance","tag-cnil","tag-digital-privacy","tag-donnees-a-caractere-personnel","tag-numerique","tag-protection","tag-vie-privee"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>La vie priv\u00e9e \u00e0 27 : encadrer la ru\u00e9e vers l\u2019or num\u00e9rique - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La vie priv\u00e9e \u00e0 27 : encadrer la ru\u00e9e vers l\u2019or num\u00e9rique - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Le 25 janvier dernier, la Communaut\u00e9 Europ\u00e9enne d\u00e9voilait son projet de refonte en profondeur de la l\u00e9gislation communautaire en mati\u00e8re de protection des donn\u00e9es \u00e0 caract\u00e8re personnel. Si celui-ci ne pr\u00e9sente aucune surprise de fond, les principales \u00e9volutions ayant d\u00e9j\u00e0...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2012-03-23T11:49:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T11:15:09+00:00\" \/>\n<meta name=\"author\" content=\"Marianne Benichou\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marianne Benichou\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/\"},\"author\":{\"name\":\"Marianne Benichou\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/1ea0d262e777b748dd507570b97597ea\"},\"headline\":\"La vie priv\u00e9e \u00e0 27 : encadrer la ru\u00e9e vers l\u2019or num\u00e9rique\",\"datePublished\":\"2012-03-23T11:49:28+00:00\",\"dateModified\":\"2019-12-31T11:15:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/\"},\"wordCount\":1405,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/#primaryimage\"},\"thumbnailUrl\":\"\",\"keywords\":[\"CNIL\",\"Digital privacy\",\"DPO\",\"num\u00e9rique\",\"protection\",\"vie priv\u00e9e\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Digital Compliance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/\",\"name\":\"La vie priv\u00e9e \u00e0 27 : encadrer la ru\u00e9e vers l\u2019or num\u00e9rique - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2012-03-23T11:49:28+00:00\",\"dateModified\":\"2019-12-31T11:15:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La vie priv\u00e9e \u00e0 27 : encadrer la ru\u00e9e vers l\u2019or num\u00e9rique\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/1ea0d262e777b748dd507570b97597ea\",\"name\":\"Marianne Benichou\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/marianne-benichou\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La vie priv\u00e9e \u00e0 27 : encadrer la ru\u00e9e vers l\u2019or num\u00e9rique - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/","og_locale":"en_US","og_type":"article","og_title":"La vie priv\u00e9e \u00e0 27 : encadrer la ru\u00e9e vers l\u2019or num\u00e9rique - RiskInsight","og_description":"Le 25 janvier dernier, la Communaut\u00e9 Europ\u00e9enne d\u00e9voilait son projet de refonte en profondeur de la l\u00e9gislation communautaire en mati\u00e8re de protection des donn\u00e9es \u00e0 caract\u00e8re personnel. Si celui-ci ne pr\u00e9sente aucune surprise de fond, les principales \u00e9volutions ayant d\u00e9j\u00e0...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/","og_site_name":"RiskInsight","article_published_time":"2012-03-23T11:49:28+00:00","article_modified_time":"2019-12-31T11:15:09+00:00","author":"Marianne Benichou","twitter_misc":{"Written by":"Marianne Benichou","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/"},"author":{"name":"Marianne Benichou","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/1ea0d262e777b748dd507570b97597ea"},"headline":"La vie priv\u00e9e \u00e0 27 : encadrer la ru\u00e9e vers l\u2019or num\u00e9rique","datePublished":"2012-03-23T11:49:28+00:00","dateModified":"2019-12-31T11:15:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/"},"wordCount":1405,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/#primaryimage"},"thumbnailUrl":"","keywords":["CNIL","Digital privacy","DPO","num\u00e9rique","protection","vie priv\u00e9e"],"articleSection":["Cybersecurity &amp; Digital Trust","Digital Compliance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/","name":"La vie priv\u00e9e \u00e0 27 : encadrer la ru\u00e9e vers l\u2019or num\u00e9rique - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/#primaryimage"},"thumbnailUrl":"","datePublished":"2012-03-23T11:49:28+00:00","dateModified":"2019-12-31T11:15:09+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/03\/la-vie-privee-a-27-encadrer-la-ruee-vers-lor-numerique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"La vie priv\u00e9e \u00e0 27 : encadrer la ru\u00e9e vers l\u2019or num\u00e9rique"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/1ea0d262e777b748dd507570b97597ea","name":"Marianne Benichou","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/marianne-benichou\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1681","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/120"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=1681"}],"version-history":[{"count":6,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1681\/revisions"}],"predecessor-version":[{"id":3432,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1681\/revisions\/3432"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=1681"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=1681"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=1681"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=1681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}