{"id":1941,"date":"2012-06-18T10:59:12","date_gmt":"2012-06-18T09:59:12","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=1941"},"modified":"2019-12-30T17:54:54","modified_gmt":"2019-12-30T16:54:54","slug":"dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/","title":{"rendered":"D\u00e9mat\u00e9rialisation et syst\u00e8mes d\u2019archivage \u00e0 valeur probante : vers une gestion s\u00e9curis\u00e9e de la preuve num\u00e9rique ?"},"content":{"rendered":"<p>La confiance num\u00e9rique continue \u00e0 faire parler d\u2019elle et s\u2019invite \u00e0 la Commission Europ\u00e9enne. En effet, l\u2019Union Europ\u00e9enne \u00a0a r\u00e9cemment d\u00e9cider d\u2019harmoniser ses pratiques en mati\u00e8re de signature \u00e9lectronique par la mise en place de \u00ab\u00a0cross-border signature\u00a0\u00bb (cf. article <a href=\"http:\/\/www.secureidnews.com\/2012\/06\/06\/eu-to-enable-cross-border-electronic-signatures\" target=\"_blank\" rel=\"noopener noreferrer\">SecurIDNews<\/a> du 12\/06).<\/p>\n<p>Si la \u00a0signature \u00e9lectronique conquiert peu \u00e0 peu ses lettres de noblesse, les tenants et aboutissants d\u2019un de ses usages cl\u00e9s, l\u2019archivage \u00e0 valeur probante, sont encore \u00e0 \u00e9clairer.<\/p>\n<p>Aujourd\u2019hui, la d\u00e9mat\u00e9rialisation des documents et des processus est ancr\u00e9e dans les projets de transformation des SI et repr\u00e9sente une v\u00e9ritable priorit\u00e9 pour les DSI.<\/p>\n<p>L\u2019archivage \u00e9lectronique \u00e0 valeur probante ou \u00ab\u00a0l\u00e9gal\u00a0\u00bb se distingue de l\u2019archivage \u00ab\u00a0classique\u00a0\u00bb par sa capacit\u00e9 \u00e0 authentifier de mani\u00e8re absolue des documents. Il permet d\u2019utiliser <strong>ces documents nativement num\u00e9riques comme preuves<\/strong> dans le cadre de proc\u00e9dures p\u00e9nales ou administratives. Mais \u00e0 quels besoins de s\u00e9curit\u00e9 r\u00e9pond la mise en place d\u2019un tel syst\u00e8me d\u2019archivage\u00a0? Quelles sont les r\u00e9ponses techniques pour construire cette gestion de la preuve num\u00e9rique\u00a0?<\/p>\n<h2>Deux piliers de l\u2019archivage : garantir la p\u00e9rennit\u00e9 et l\u2019int\u00e9grit\u00e9 des donn\u00e9es de l\u2019entreprise<\/h2>\n<p>Encadr\u00e9 par le Code civil et le Code du commerce, l\u2019archivage des documents est un devoir pour les entreprises fran\u00e7aises. Pour respecter le droit \u00e0 l\u2019oubli impos\u00e9 par la CNIL, la dur\u00e9e de conservation des documents est limit\u00e9e dans le temps et varie en fonction de leurs valeurs administratives. Confront\u00e9 \u00e0 ces longues dur\u00e9es, il est donc n\u00e9cessaire de conserver ces documents sous un format p\u00e9renne (XML, PDF\/A, etc.) dans un Syst\u00e8me d\u2019Archivage \u00c9lectronique <strong>(SAE)<\/strong>. Durant toute la dur\u00e9e de conservation, le SAE doit \u00e9galement garantir l\u2019<strong>int\u00e9grit\u00e9<\/strong> des documents par un stockage fid\u00e8le, sans alt\u00e9ration ni destruction (ou modification) possible. Vous l\u2019avez compris, c\u2019est la signature \u00e9lectronique qui permet de r\u00e9pondre \u00e0 ce besoin.<\/p>\n<h2>Signature \u00e9lectronique et horodatage \u2013 deux r\u00e9ponses techniques \u00e0 la gestion de la preuve num\u00e9rique<\/h2>\n<p>L\u2019article 1316 du Code civil (13\/03\/2000) stipule que \u00ab\u00a0l&#8217;\u00e9crit sous forme \u00e9lectronique est admis en preuve au m\u00eame titre que l&#8217;\u00e9crit sur support papier, sous r\u00e9serve que puisse \u00eatre d\u00fbment identifi\u00e9e la personne dont il \u00e9mane\u00a0\u00bb. Pour r\u00e9pondre \u00e0 ces besoins d\u2019<strong>authenticit\u00e9<\/strong> et de <strong>tra\u00e7abilit\u00e9<\/strong>, les solutions techniques retenues par les SAE \u00e0 valeur probante sont respectivement\u00a0:<\/p>\n<ul>\n<li>la <strong>signature \u00e9lectronique<\/strong>, pr\u00e9f\u00e9r\u00e9e \u00e0 un stockage sur support physique WORM (Write Once Read Many)\u00a0;<\/li>\n<li>l\u2019utilisation de contremarques de temps sign\u00e9es\u00a0: <strong>les jetons d\u2019horodatage<\/strong>.<\/li>\n<\/ul>\n<p>L\u2019archivage d\u2019un document dans ces SAE consiste donc \u00e0 signer \u00e9lectroniquement ce document d\u2019une part et d\u2019y apposer un jeton d\u2019horodatage d\u2019autre part. Ainsi, la signature permet de garantir l\u2019int\u00e9grit\u00e9 du document mais aussi l\u2019identit\u00e9 de la personne ayant r\u00e9alis\u00e9 l\u2019archivage. Le jeton, quant \u00e0 lui, permet d\u2019attester la date \u00e0 laquelle a eu lieu l\u2019archivage.<\/p>\n<h2><strong>Un cadre normatif (toujours\u00a0!) : la NF Z42-013 <\/strong><\/h2>\n<p>La norme NFZ42-013 est le r\u00e9f\u00e9rentiel pour tous acteurs du march\u00e9, int\u00e9grateurs comme fournisseurs en mode SaaS. Cette derni\u00e8re, tr\u00e8s contraignante, sp\u00e9cifie les mesures techniques et organisationnelles \u00e0 respecter pour concevoir et mettre \u00e0 disposition un SAE \u00e0 valeur probante. Cette norme met notamment en exergue la m\u00e9thodologie \u00e0 suivre pour un projet\u00a0: de la cr\u00e9ation d\u2019une politique d\u2019archivage aux r\u00e9ponses techniques.<\/p>\n<p>En France, les solutions du march\u00e9 des SAE \u00e0 valeur probante sont arriv\u00e9es \u00e0 maturit\u00e9 et les projets d\u2019archivage sont florissants depuis 2009. Catalys\u00e9s par les institutions publiques qui montrent l\u2019exemple et le boom de la d\u00e9mat\u00e9rialisation, le secteur priv\u00e9 a emboit\u00e9 \u00a0le pas permettant ainsi de se conformer au cadre r\u00e9glementaire en vigueur, mais aussi d\u2019optimiser leurs processus et de r\u00e9aliser des \u00e9conomies.<\/p>\n<p>Ce respect du cadre r\u00e9glementaire, \u00e0 l\u2019\u00e9chelle nationale (et bient\u00f4t \u00e0 l\u2019\u00e9chelle europ\u00e9enne\u00a0?) n\u2019est pas le seul facteur-cl\u00e9 de r\u00e9ussite d\u2019un projet d\u2019archivage. Il est tout aussi crucial d\u2019impliquer les responsables m\u00e9tiers d\u00e8s la ligne de d\u00e9part et d\u2019anticiper la peur du changement utilisateurs lors de la prise en main de l\u2019outil. Une fois ces \u00e9l\u00e9ments en t\u00eate, il n\u2019y a plus qu\u2019\u00e0\u2026<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La confiance num\u00e9rique continue \u00e0 faire parler d\u2019elle et s\u2019invite \u00e0 la Commission Europ\u00e9enne. En effet, l\u2019Union Europ\u00e9enne \u00a0a r\u00e9cemment d\u00e9cider d\u2019harmoniser ses pratiques en mati\u00e8re de signature \u00e9lectronique par la mise en place de \u00ab\u00a0cross-border signature\u00a0\u00bb (cf. article SecurIDNews&#8230;<\/p>\n","protected":false},"author":112,"featured_media":6343,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3223,36],"tags":[529],"coauthors":[954],"class_list":["post-1941","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security","category-cybersecurity-digital-trust","tag-archivage"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>D\u00e9mat\u00e9rialisation et syst\u00e8mes d\u2019archivage \u00e0 valeur probante : vers une gestion s\u00e9curis\u00e9e de la preuve num\u00e9rique ? - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"D\u00e9mat\u00e9rialisation et syst\u00e8mes d\u2019archivage \u00e0 valeur probante : vers une gestion s\u00e9curis\u00e9e de la preuve num\u00e9rique ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"La confiance num\u00e9rique continue \u00e0 faire parler d\u2019elle et s\u2019invite \u00e0 la Commission Europ\u00e9enne. En effet, l\u2019Union Europ\u00e9enne \u00a0a r\u00e9cemment d\u00e9cider d\u2019harmoniser ses pratiques en mati\u00e8re de signature \u00e9lectronique par la mise en place de \u00ab\u00a0cross-border signature\u00a0\u00bb (cf. article SecurIDNews...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2012-06-18T09:59:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-30T16:54:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"573\" \/>\n\t<meta property=\"og:image:height\" content=\"214\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Johan Le Billan\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Johan Le Billan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/\"},\"author\":{\"name\":\"Johan Le Billan\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/16b93b446236cc5b7237b46c3743b933\"},\"headline\":\"D\u00e9mat\u00e9rialisation et syst\u00e8mes d\u2019archivage \u00e0 valeur probante : vers une gestion s\u00e9curis\u00e9e de la preuve num\u00e9rique ?\",\"datePublished\":\"2012-06-18T09:59:12+00:00\",\"dateModified\":\"2019-12-30T16:54:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/\"},\"wordCount\":760,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"keywords\":[\"Archivage\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/\",\"name\":\"D\u00e9mat\u00e9rialisation et syst\u00e8mes d\u2019archivage \u00e0 valeur probante : vers une gestion s\u00e9curis\u00e9e de la preuve num\u00e9rique ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"datePublished\":\"2012-06-18T09:59:12+00:00\",\"dateModified\":\"2019-12-30T16:54:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"width\":573,\"height\":214},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"D\u00e9mat\u00e9rialisation et syst\u00e8mes d\u2019archivage \u00e0 valeur probante : vers une gestion s\u00e9curis\u00e9e de la preuve num\u00e9rique ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/16b93b446236cc5b7237b46c3743b933\",\"name\":\"Johan Le Billan\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/johan-le-billan\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"D\u00e9mat\u00e9rialisation et syst\u00e8mes d\u2019archivage \u00e0 valeur probante : vers une gestion s\u00e9curis\u00e9e de la preuve num\u00e9rique ? - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/","og_locale":"en_US","og_type":"article","og_title":"D\u00e9mat\u00e9rialisation et syst\u00e8mes d\u2019archivage \u00e0 valeur probante : vers une gestion s\u00e9curis\u00e9e de la preuve num\u00e9rique ? - RiskInsight","og_description":"La confiance num\u00e9rique continue \u00e0 faire parler d\u2019elle et s\u2019invite \u00e0 la Commission Europ\u00e9enne. En effet, l\u2019Union Europ\u00e9enne \u00a0a r\u00e9cemment d\u00e9cider d\u2019harmoniser ses pratiques en mati\u00e8re de signature \u00e9lectronique par la mise en place de \u00ab\u00a0cross-border signature\u00a0\u00bb (cf. article SecurIDNews...","og_url":"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/","og_site_name":"RiskInsight","article_published_time":"2012-06-18T09:59:12+00:00","article_modified_time":"2019-12-30T16:54:54+00:00","og_image":[{"width":573,"height":214,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","type":"image\/jpeg"}],"author":"Johan Le Billan","twitter_misc":{"Written by":"Johan Le Billan","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/"},"author":{"name":"Johan Le Billan","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/16b93b446236cc5b7237b46c3743b933"},"headline":"D\u00e9mat\u00e9rialisation et syst\u00e8mes d\u2019archivage \u00e0 valeur probante : vers une gestion s\u00e9curis\u00e9e de la preuve num\u00e9rique ?","datePublished":"2012-06-18T09:59:12+00:00","dateModified":"2019-12-30T16:54:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/"},"wordCount":760,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","keywords":["Archivage"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/","url":"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/","name":"D\u00e9mat\u00e9rialisation et syst\u00e8mes d\u2019archivage \u00e0 valeur probante : vers une gestion s\u00e9curis\u00e9e de la preuve num\u00e9rique ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","datePublished":"2012-06-18T09:59:12+00:00","dateModified":"2019-12-30T16:54:54+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","width":573,"height":214},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2012\/06\/dematerialisation-et-systemes-darchivage-a-valeur-probante-vers-une-gestion-securisee-de-la-preuve-numerique\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"D\u00e9mat\u00e9rialisation et syst\u00e8mes d\u2019archivage \u00e0 valeur probante : vers une gestion s\u00e9curis\u00e9e de la preuve num\u00e9rique ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/16b93b446236cc5b7237b46c3743b933","name":"Johan Le Billan","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/johan-le-billan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1941","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/112"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=1941"}],"version-history":[{"count":8,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1941\/revisions"}],"predecessor-version":[{"id":12470,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/1941\/revisions\/12470"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6343"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=1941"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=1941"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=1941"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=1941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}