{"id":3969,"date":"2013-07-31T16:10:29","date_gmt":"2013-07-31T15:10:29","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=3969"},"modified":"2019-12-31T11:35:08","modified_gmt":"2019-12-31T10:35:08","slug":"notification-des-fuites-de-donnees-clients-lere-de-la-transparence","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/","title":{"rendered":"Notification des fuites de donn\u00e9es clients : vers une transparence syst\u00e9matique ?"},"content":{"rendered":"<p>Ces derni\u00e8res semaines, les annonces de fuites de donn\u00e9es clients ont fleuri (Apple, OVH, Ubisoft\u2026) et attirent de plus en plus l\u2019attention des m\u00e9dias. Exc\u00e8s de z\u00e8le, obligation ou vraie strat\u00e9gie de relation client, que se cache-t-il derri\u00e8re ces annonces de plus en plus visibles\u00a0?<\/p>\n<h2>\u00a0Les donn\u00e9es clients\u00a0: un nouvel or num\u00e9rique convoit\u00e9<\/h2>\n<p>Quel que soit leur secteur, toutes les entreprises sont aujourd\u2019hui expos\u00e9es \u00e0 la cybercriminalit\u00e9. Certaines redoutent le vol de secrets industriels ou encore l\u2019indisponibilit\u00e9 de leurs syst\u00e8mes, mais ils partagent une crainte commune: le vol de donn\u00e9es personnelles de clients, collaborateurs, prospects, partenaires\u2026<\/p>\n<p>Cette richesse des entreprises est particuli\u00e8rement convoit\u00e9e par certains cybercriminels, app\u00e2t\u00e9s par le gain financier qu\u2019elles peuvent repr\u00e9senter. En effet, sur les march\u00e9s parall\u00e8les, les donn\u00e9es peuvent se monnayer jusqu\u2019\u00e0 plusieurs dizaines de dollars par enregistrement\u2026<\/p>\n<h2>\u00a0Des obligations r\u00e9glementaires et l\u00e9gales qui vont se renforcer<\/h2>\n<p>Les initiatives se multiplient pour prot\u00e9ger ces donn\u00e9es et la vie priv\u00e9e des individus face \u00e0 ces nouvelles menaces. La loi informatique et libert\u00e9s, mise \u00e0 jour en 2004, vise depuis de nombreuses ann\u00e9es \u00e0 prot\u00e9ger les libert\u00e9s individuelles et les donn\u00e9es \u00e0 caract\u00e8re personnel de traitement illicites.<\/p>\n<p>Elle a \u00e9t\u00e9 compl\u00e9t\u00e9e en <a href=\"http:\/\/www.solucominsight.fr\/2011\/08\/notification-des-atteintes-a-la-securite-des-donnees-etape-1-les-operateurs-telecoms\/\" target=\"_blank\" rel=\"noopener noreferrer\">ao\u00fbt 2011 par le Paquet T\u00e9l\u00e9coms<\/a>, qui a renforc\u00e9 les obligations des op\u00e9rateurs de t\u00e9l\u00e9communications dans ce domaine en imposant notamment la notification des violations des traitements de donn\u00e9es \u00e0 caract\u00e8re personnel aux victimes. En ligne de mire, permettre aux abonn\u00e9s de conna\u00eetre les risques qu\u2019ils courent quand la s\u00e9curit\u00e9 de leurs donn\u00e9es est en cause. Des premi\u00e8res notifications de faible ampleur ont d\u00e9j\u00e0 eu lieu. Cette obligation sera \u00e9tendue \u00e0 tous les secteurs avec le projet de r\u00e8glement europ\u00e9en qui devrait \u00eatre publi\u00e9 en 2014 ou d\u00e9but 2015.<\/p>\n<p>Mais au-del\u00e0 de la protection de la vie priv\u00e9e, les attaques sur les infrastructures critiques des \u00e9tats inqui\u00e8tent \u00e9galement la France et plus largement l\u2019Europe. Deux textes sont attendus pour y rem\u00e9dier\u00a0: un texte fran\u00e7ais imposant aux Organismes d\u2019Importance Vitale (OIV) un certain nombre d\u2019exigences de s\u00e9curit\u00e9 et de notification, audit\u2026 et un texte europ\u00e9en d\u00e9finissant des sanctions minimales pour punir les cyberattaques. Attendus dans les prochains mois, ces textes doteront les \u00e9tats et les entreprises <a href=\"http:\/\/www.solucominsight.fr\/2013\/06\/cyberdefense-letat-veut-franchir-une-nouvelle-etape\/\" target=\"_blank\" rel=\"noopener noreferrer\">de nouvelles armes pour lutter contre la cybercriminalit\u00e9<\/a>.<\/p>\n<h2>Entre totale transparence et protection des int\u00e9r\u00eats de l\u2019entreprise, quel \u00e9quilibre\u00a0?<\/h2>\n<p>Ces derniers mois, de nombreuses entreprises ont r\u00e9v\u00e9l\u00e9 avoir \u00e9t\u00e9 victimes de piratages\u00a0: Apple, Ubisoft, OVH\u2026 L\u2019enjeu de ces communications\u00a0? Pr\u00e9venir les clients que la s\u00e9curit\u00e9 de leurs donn\u00e9es a \u00e9t\u00e9 remise en cause, pour leur permettre de prendre les actions adapt\u00e9es. Bien souvent, il s\u2019agit d\u2019un changement de mot de passe sur le service, qui peut signifier pour \u00a0l\u2019utilisateur un changement sur l\u2019ensemble des services pour lequel il utilise le m\u00eame mot de passe\u00a0!<\/p>\n<p>Il est int\u00e9ressant d\u2019observer les diff\u00e9rences entre les notifications et ce que cela r\u00e9v\u00e8le sur la relation client des entreprises. <a href=\"http:\/\/status.ovh.net\/?do=details&amp;id=5070\" target=\"_blank\" rel=\"noopener noreferrer\">OVH<\/a>,\u00a0 par exemple a fait preuve d\u2019une grande transparence technique &#8211; ce qui est logique vus ses clients et leurs attentes. Apple, coh\u00e9rent avec ses habitudes de communication, a \u00e9t\u00e9 assez lapidaire dans les informations d\u00e9livr\u00e9es et a pr\u00e9venu les utilisateurs plusieurs jours apr\u00e8s l\u2019arr\u00eat du service. Ils n\u2019ont mis en ligne <a href=\"https:\/\/developer.apple.com\/support\/system-status\/\" target=\"_blank\" rel=\"noopener noreferrer\">qu\u2019une page permettant de suivre la remise en service<\/a> des diff\u00e9rents sites touch\u00e9s.<br \/>\n<a href=\"http:\/\/forums.ubi.com\/showthread.php\/779040-Security-update-regarding-your-Ubisoft-account-please-create-a-new-password?s=3ff4cfa2125bffdc38ad96d0ca8b9263\" target=\"_blank\" rel=\"noopener noreferrer\">Ubisoft<\/a>\u00a0 a, quant \u00e0 lui, eu une approche plus classique, proche de celles des grands acteurs du web qui ont connu des situations similaires (LinkedIn, Evernote\u2026). Cependant, le groupe fran\u00e7ais a connu des soucis de surcharge de ces serveurs au moment de la communication des emails. Cela montre la n\u00e9cessit\u00e9 et l\u2019obligation de pr\u00e9paration face \u00e0 ces \u00e9v\u00e8nements qui peuvent survenir \u00e0 tout moment.<\/p>\n<p>Et si les r\u00e9glementations en place aujourd\u2019hui imposent \u00e0 ceux \u00e0 qui elles s\u2019appliquent une notification sans d\u00e9lai aux autorit\u00e9s et au plus tard dans les trois jours aux personnes, une question essentielle peut alors se poser\u00a0: r\u00e9v\u00e9ler les d\u00e9tails de l\u2019attaque et les actions de s\u00e9curisation d\u00e9cid\u00e9es ne peut-il pas permettre aux attaquants de poursuivre l\u2019attaque en connaissance de cause\u00a0? Il s\u2019agit d\u00e8s lors d\u2019une d\u00e9cision \u00e0 peser soigneusement, en consid\u00e9rant \u00e0 la fois les risques techniques et les risques r\u00e9glementaires.<\/p>\n<h2>\u00a0Se pr\u00e9parer \u00e0 notifier ses clients, sans attendre les obligations r\u00e9glementaires<\/h2>\n<p>L\u2019enjeu est donc aujourd\u2019hui de se pr\u00e9parer \u00e0 notifier ses clients d\u2019une violation de traitement de donn\u00e9es personnelles. Un projet qui concerne r\u00e9glementairement les op\u00e9rateurs t\u00e9l\u00e9communication, mais plus largement toutes les entreprises qui veulent pr\u00e9server leur relation client\u00a0et leur image\u00a0!<\/p>\n<p>Si les attaques ne peuvent \u00eatre anticip\u00e9es pr\u00e9cis\u00e9ment, un cadre de strat\u00e9gie de notification peut d\u00e8s maintenant \u00eatre \u00e9labor\u00e9 en associant juristes, RSSI, DSI et direction marketing pour \u00e9laborer les processus et proc\u00e9dures de notification, le plan de communication et la logistique associ\u00e9e. Et rien de tel qu\u2019un exercice de gestion de crise pour tester ces processus\u00a0!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ces derni\u00e8res semaines, les annonces de fuites de donn\u00e9es clients ont fleuri (Apple, OVH, Ubisoft\u2026) et attirent de plus en plus l\u2019attention des m\u00e9dias. Exc\u00e8s de z\u00e8le, obligation ou vraie strat\u00e9gie de relation client, que se cache-t-il derri\u00e8re ces annonces&#8230;<\/p>\n","protected":false},"author":14,"featured_media":6222,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3222,36,32],"tags":[1241,1240,1158,3304],"coauthors":[782],"class_list":["post-3969","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberrisk-management-strategy","category-cybersecurity-digital-trust","category-marketing-relation-client","tag-cyberattaque","tag-fuite-de-donnees","tag-notification","tag-risk-management-strategy-governance"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Notification des fuites de donn\u00e9es clients : vers une transparence syst\u00e9matique ?<\/title>\n<meta name=\"description\" content=\"Ces derni\u00e8res semaines, les annonces de fuites de donn\u00e9es clients ont fleuri (Apple, OVH, Ubisoft\u2026) et attirent de plus en plus l\u2019attention des m\u00e9dias. Exc\u00e8s de z\u00e8le, obligation ou vraie strat\u00e9gie de relation client, que se cache-t-il derri\u00e8re ces annonces de plus en plus visibles ?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Notification des fuites de donn\u00e9es clients : vers une transparence syst\u00e9matique ?\" \/>\n<meta property=\"og:description\" content=\"Ces derni\u00e8res semaines, les annonces de fuites de donn\u00e9es clients ont fleuri (Apple, OVH, Ubisoft\u2026) et attirent de plus en plus l\u2019attention des m\u00e9dias. Exc\u00e8s de z\u00e8le, obligation ou vraie strat\u00e9gie de relation client, que se cache-t-il derri\u00e8re ces annonces de plus en plus visibles ?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2013-07-31T15:10:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T10:35:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/robert-kotsch-fotolia.com_.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"843\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Marion Couturier\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marion Couturier\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/\"},\"author\":{\"name\":\"Marion Couturier\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/980ace87462d6ae4bd042aac06452e92\"},\"headline\":\"Notification des fuites de donn\u00e9es clients : vers une transparence syst\u00e9matique ?\",\"datePublished\":\"2013-07-31T15:10:29+00:00\",\"dateModified\":\"2019-12-31T10:35:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/\"},\"wordCount\":926,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/robert-kotsch-fotolia.com_.jpg\",\"keywords\":[\"Cyberattaque\",\"fuite de donn\u00e9es\",\"notification\",\"Risk management\"],\"articleSection\":[\"Cyberrisk Management &amp; Strategy\",\"Cybersecurity &amp; Digital Trust\",\"M\u00e9tiers - Marketing et relation client\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/\",\"name\":\"Notification des fuites de donn\u00e9es clients : vers une transparence syst\u00e9matique ?\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/robert-kotsch-fotolia.com_.jpg\",\"datePublished\":\"2013-07-31T15:10:29+00:00\",\"dateModified\":\"2019-12-31T10:35:08+00:00\",\"description\":\"Ces derni\u00e8res semaines, les annonces de fuites de donn\u00e9es clients ont fleuri (Apple, OVH, Ubisoft\u2026) et attirent de plus en plus l\u2019attention des m\u00e9dias. Exc\u00e8s de z\u00e8le, obligation ou vraie strat\u00e9gie de relation client, que se cache-t-il derri\u00e8re ces annonces de plus en plus visibles ?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/robert-kotsch-fotolia.com_.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/robert-kotsch-fotolia.com_.jpg\",\"width\":1500,\"height\":843},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Notification des fuites de donn\u00e9es clients : vers une transparence syst\u00e9matique ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/980ace87462d6ae4bd042aac06452e92\",\"name\":\"Marion Couturier\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/marion-couturier\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Notification des fuites de donn\u00e9es clients : vers une transparence syst\u00e9matique ?","description":"Ces derni\u00e8res semaines, les annonces de fuites de donn\u00e9es clients ont fleuri (Apple, OVH, Ubisoft\u2026) et attirent de plus en plus l\u2019attention des m\u00e9dias. Exc\u00e8s de z\u00e8le, obligation ou vraie strat\u00e9gie de relation client, que se cache-t-il derri\u00e8re ces annonces de plus en plus visibles ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/","og_locale":"en_US","og_type":"article","og_title":"Notification des fuites de donn\u00e9es clients : vers une transparence syst\u00e9matique ?","og_description":"Ces derni\u00e8res semaines, les annonces de fuites de donn\u00e9es clients ont fleuri (Apple, OVH, Ubisoft\u2026) et attirent de plus en plus l\u2019attention des m\u00e9dias. Exc\u00e8s de z\u00e8le, obligation ou vraie strat\u00e9gie de relation client, que se cache-t-il derri\u00e8re ces annonces de plus en plus visibles ?","og_url":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/","og_site_name":"RiskInsight","article_published_time":"2013-07-31T15:10:29+00:00","article_modified_time":"2019-12-31T10:35:08+00:00","og_image":[{"width":1500,"height":843,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/robert-kotsch-fotolia.com_.jpg","type":"image\/jpeg"}],"author":"Marion Couturier","twitter_misc":{"Written by":"Marion Couturier","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/"},"author":{"name":"Marion Couturier","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/980ace87462d6ae4bd042aac06452e92"},"headline":"Notification des fuites de donn\u00e9es clients : vers une transparence syst\u00e9matique ?","datePublished":"2013-07-31T15:10:29+00:00","dateModified":"2019-12-31T10:35:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/"},"wordCount":926,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/robert-kotsch-fotolia.com_.jpg","keywords":["Cyberattaque","fuite de donn\u00e9es","notification","Risk management"],"articleSection":["Cyberrisk Management &amp; Strategy","Cybersecurity &amp; Digital Trust","M\u00e9tiers - Marketing et relation client"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/","url":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/","name":"Notification des fuites de donn\u00e9es clients : vers une transparence syst\u00e9matique ?","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/robert-kotsch-fotolia.com_.jpg","datePublished":"2013-07-31T15:10:29+00:00","dateModified":"2019-12-31T10:35:08+00:00","description":"Ces derni\u00e8res semaines, les annonces de fuites de donn\u00e9es clients ont fleuri (Apple, OVH, Ubisoft\u2026) et attirent de plus en plus l\u2019attention des m\u00e9dias. Exc\u00e8s de z\u00e8le, obligation ou vraie strat\u00e9gie de relation client, que se cache-t-il derri\u00e8re ces annonces de plus en plus visibles ?","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/robert-kotsch-fotolia.com_.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2014\/11\/robert-kotsch-fotolia.com_.jpg","width":1500,"height":843},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2013\/07\/notification-des-fuites-de-donnees-clients-lere-de-la-transparence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Notification des fuites de donn\u00e9es clients : vers une transparence syst\u00e9matique ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/980ace87462d6ae4bd042aac06452e92","name":"Marion Couturier","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/marion-couturier\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/3969","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=3969"}],"version-history":[{"count":7,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/3969\/revisions"}],"predecessor-version":[{"id":12447,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/3969\/revisions\/12447"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6222"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=3969"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=3969"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=3969"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=3969"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}