{"id":432,"date":"2011-07-04T08:36:27","date_gmt":"2011-07-04T07:36:27","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=432"},"modified":"2019-12-31T12:26:56","modified_gmt":"2019-12-31T11:26:56","slug":"bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/","title":{"rendered":"Bring Your Own Device : quelle fronti\u00e8re entre sph\u00e8re professionnelle et personnelle ?"},"content":{"rendered":"<h2><strong>BYOD, une nouvelle tendance susceptible d\u2019en int\u00e9resser plus d\u2019un\u00a0!<\/strong><\/h2>\n<p>Pas encore connue de tous, une nouvelle tendance se dessine au sein m\u00eame des entreprises, le <em>Bring Your Own Device<\/em>.\u00a0 Le BYOD, c\u2019est la fusion des t\u00e9l\u00e9phones personnel et professionnel, ou comment se servir de son propre terminal pour un usage d\u2019entreprise.<\/p>\n<p><a href=\"http:\/\/www.solucominsight.fr\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/graphique-byod\/\" rel=\"attachment wp-att-436\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-436 alignnone\" title=\"graphique BYOD\" src=\"http:\/\/www.solucominsight.fr\/wp-content\/uploads\/2011\/07\/graphique-BYOD-240x191.png\" alt=\"\" width=\"243\" height=\"193\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Ce ph\u00e9nom\u00e8ne a une explication\u00a0: l\u2019explosion du taux de p\u00e9n\u00e9tration des smartphones sur le march\u00e9 Grand Public. En 2010, 270 millions de ces smartphones ont \u00e9t\u00e9 vendus dans le monde, soit 55% de plus qu&#8217;en 2009.<\/p>\n<p>Aux \u00c9tats-Unis, ce sont 43\u00a0% des cadres des entreprises de plus de 500\u00a0salari\u00e9s qui utilisent d\u00e9j\u00e0 des \u00e9quipements personnels sur les r\u00e9seaux et les syst\u00e8mes d&#8217;entreprise[1].<\/p>\n<h2><strong>Cependant, l\u2019entreprise devra faire face \u00e0 quelques difficult\u00e9s\u2026<\/strong><\/h2>\n<p>Du point de vue de l\u2019entreprise, la question de la gestion multi-OS \/ terminaux pourrait s\u2019av\u00e9rer d\u00e9licate et complexe pour les DSI. \u00a0Outre l\u2019aspect de la s\u00e9curit\u00e9 des informations qui transitent, les mises \u00e0 jour\u00a0 des terminaux peuvent \u00eatre source de grandes difficult\u00e9s au sein du d\u00e9partement t\u00e9l\u00e9com qui g\u00e8re cette flotte. Cependant, des solutions industrielles sont aujourd\u2019hui capables de g\u00e9rer la diversit\u00e9 des plates-formes et des terminaux mobiles.<\/p>\n<p>Du cot\u00e9 des DSI, 3 points n\u00e9cessitent d\u2019\u00eatre trait\u00e9s :<\/p>\n<p>&#8211; La s\u00e9curit\u00e9 du SI vis-\u00e0-vis du terminal (contr\u00f4le des acc\u00e8s, chiffrement et contr\u00f4le des flux\u2026)<\/p>\n<p>&#8211; La s\u00e9curit\u00e9 du terminal lui-m\u00eame (authentification locale, chiffrement des donn\u00e9es stock\u00e9es\u2026)<\/p>\n<p>&#8211; La gestion du parc de terminaux mobiles (<em>Mobile Device Management <\/em>ou MDM)<\/p>\n<h2><strong>Comment l\u2019entreprise doit-elle g\u00e9rer ce ph\u00e9nom\u00e8ne\u00a0?<\/strong><\/h2>\n<p>Un grand nombre d&#8217;entreprises cherchent \u00e0 int\u00e9grer les iPhone personnels de leurs salari\u00e9s dans un environnement professionnel. Astra Zeneca, par exemple, estime qu&#8217;il lui serait possible de r\u00e9duire ses co\u00fbts de 2\u00a0millions de dollars par an, en demandant simplement \u00e0 ses sous-traitants et \u00e0 certains de ses employ\u00e9s d&#8217;utiliser leurs propres \u00e9quipements. Les employ\u00e9s qui ont adopt\u00e9 cette \u00ab\u00a0BYOD Attitude\u00a0\u00bb la jugent plus rentable et plus efficace dans leur quotidien.<\/p>\n<p>Face \u00e0 cette tendance, il existe en r\u00e9alit\u00e9 trois \u00e9coles chez la plupart des responsables T\u00e9l\u00e9com et S\u00e9curit\u00e9 :<\/p>\n<p>&#8211; La premi\u00e8re pr\u00f4ne le \u00ab\u00a0laissez-faire, laissez-passer\u00a0\u00bb\u00a0: cela consiste \u00e0 ne mettre aucune barri\u00e8re dans l\u2019usage professionnel des mobiles personnels des employ\u00e9s. Cette approche peut s\u2019av\u00e9rer p\u00e9rilleuse car presque aucun contr\u00f4le n\u2019est effectu\u00e9 sur les flux entrants et sortants touchant le r\u00e9seau de l\u2019entreprise. La s\u00e9curit\u00e9 des donn\u00e9es de l\u2019entreprise, l\u2019un des points d\u2019attention principaux du BYOD, \u00a0est alors mise \u00e0 rude \u00e9preuve.<\/p>\n<p>&#8211;\u00a0 La seconde \u00e9cole\u00a0: celle du \u00ab\u00a0protectionnisme\u00a0\u00bb, consiste \u00e0 interdire le BYOD au sein de l\u2019entreprise. Cette m\u00e9thode met en avant une s\u00e9curit\u00e9 des donn\u00e9es intacte et la potentielle perte de productivit\u00e9 g\u00e9n\u00e9r\u00e9e par l\u2019usage de terminaux personnels au travail. Mais elle fait peu de cas de la r\u00e9alit\u00e9 des usages et peut d\u00e9boucher sur la critique par les employ\u00e9s, d\u2019une politique trop rigide, voire suspicieuse de la DSI. Notons que cette approche m\u00e8ne presque toujours \u00e0 des pratiques \u00ab\u00a0sauvages\u00a0\u00bb hors contr\u00f4le.<\/p>\n<p>&#8211;\u00a0 Derni\u00e8re \u00e9cole, enfin\u00a0: l\u2019ouverture de l\u2019acc\u00e8s au r\u00e9seau de l\u2019entreprise de certains types de terminaux \/ certaines plates-formes uniquement, iPhone et BlackBerry en t\u00eate.<\/p>\n<h2><strong>Des solutions techniques existent pour g\u00e9rer le compromis S\u00e9curit\u00e9 \/ Ouverture\u2026<\/strong><\/h2>\n<p>Des solutions sp\u00e9cialis\u00e9es existent \u00e0 date sur le march\u00e9\u00a0pour permettre l\u2019usage professionnel de son terminalpersonnel. Ces solutions reposent sur la mise en place de silos \u00ab entreprise \u00bb permettant d\u2019isoler les donn\u00e9es sensibles dans des espaces sp\u00e9cifiques (applications, boite aux lettres, agenda\u2026).<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.solucominsight.fr\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/iphone-et-securite\/\" rel=\"attachment wp-att-437\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-437 aligncenter\" title=\"iPhone et s\u00e9curit\u00e9\" src=\"http:\/\/www.solucominsight.fr\/wp-content\/uploads\/2011\/07\/iPhone-et-s\u00e9curit\u00e9-160x191.png\" alt=\"\" width=\"169\" height=\"204\" \/><\/a><\/p>\n<p style=\"text-align: left;\">Certaines consistent \u00e0 d\u00e9ployer une plate-forme d\u00e9di\u00e9e, entre autres celles de Sybase et de Good Technology. Concr\u00e8tement, ces suites incluent la gestion centralis\u00e9e des emails, du calendrier, des contacts, des t\u00e2ches ou encore l&#8217;acc\u00e8s \u00e0 distance aux applications m\u00e9tiers.<\/p>\n<p>Cette brique technologique peut \u00eatre adress\u00e9e au travers de l\u2019op\u00e9rateur mobile de l\u2019entreprise\u00a0: il a int\u00e9r\u00eat \u00e0 se positionner comme fournisseur de service afin de trouver la solution idoine capable de r\u00e9pondre aux exigences particuli\u00e8res des comptes qu\u2019il g\u00e8re.<\/p>\n<h2><strong>\u2026 Mais l\u2019entreprise se doit de statuer sur les points d\u2019attention juridiques et RH g\u00e9n\u00e9r\u00e9s par la tendance BYOD<\/strong><\/h2>\n<p>Attention\u00a0: cette mutation de l\u2019usage des Smartphones pour acc\u00e9der au SI de l\u2019entreprise, est per\u00e7ue de fa\u00e7on diff\u00e9rente par les utilisateurs et les discours divergent\u00a0:<\/p>\n<p>&#8211;\u00a0 l\u00e0 o\u00f9 certains voient un outil qui leur simplifie la vie\u2026<\/p>\n<p>&#8211;\u00a0 \u2026d\u2019autres per\u00e7oivent une contrainte suppl\u00e9mentaire qui les incite \u00e0 \u00e9tendre leur travail au-del\u00e0 des heures de bureau.<\/p>\n<p>A l\u2019heure o\u00f9 de nombreux t\u00e9moignages rapportent que \u00ab\u00a0l\u2019hyper-connectivit\u00e9\u00a0\u00bb devient addictive, il est important que les d\u00e9partements RH se positionnent sur plusieurs th\u00e8mes\u00a0:<\/p>\n<p>&nbsp;<\/p>\n<p>&#8211;\u00a0 Le fait de lire ses mails professionnels sur ton propre t\u00e9l\u00e9phone dans le m\u00e9tro peut-il (ou doit-il) \u00eatre consid\u00e9r\u00e9 comme du temps de travail suppl\u00e9mentaire\u00a0?<\/p>\n<p>&#8211;\u00a0 Quels sont les impacts de l\u2019usage de son terminal personnel\u00a0: y-a-t-il un stress induit par le fait d\u2019\u00eatre connect\u00e9 en permanence\u00a0?<\/p>\n<p>&#8211;\u00a0 Il peut parfois aussi s\u2019av\u00e9rer important de veiller \u00e0 ne pas cr\u00e9er de discrimination entre les collaborateurs qui peuvent\/veulent acheter un Smartphone et les autres.<\/p>\n<p>L\u2019aspect juridique doit, lui aussi, \u00eatre clairement d\u00e9fini, et les questions qui sont g\u00e9n\u00e9ralement pos\u00e9es sont les suivantes :<\/p>\n<p>&#8211;\u00a0 Jusqu\u2019o\u00f9 l\u2019entreprise peut-elle ma\u00eetriser le terminal personnel de l\u2019utilisateur\u00a0 (le tracer, effacer son terminal \u00e0 distance, r\u00e9cup\u00e9rer certaines donn\u00e9es personnelles\u2026) ? N\u2019oublions pas qu\u2019elle reste responsable de l\u2019usage qui est fait par les moyens qu\u2019elle offre \u00e0 ses employ\u00e9s.<\/p>\n<p>&#8211;\u00a0 Jusqu\u2019o\u00f9 l\u2019usage de l\u2019employ\u00e9 peut-il aller, en particulier concernant des donn\u00e9es de l\u2019entreprise\u00a0? Il semble clair, aux yeux de la loi, qu\u2019elles restent bien la propri\u00e9t\u00e9 de cette derni\u00e8re, m\u00eame si elles sont stock\u00e9es sur un terminal personnel.<\/p>\n<p>&#8211;\u00a0 Qu\u2019en est-il de la partie mat\u00e9rielle\u00a0? Si un collaborateur casse son Smartphone alors qu\u2019il l\u2019utilisait pour consulter ses e-mails professionnels, qui doit payer la r\u00e9paration\u00a0?<\/p>\n<p>Pour couvrir ces sujets, une modification du contrat de travail semble \u00eatre une action trop longue et complexe. On lui pr\u00e9f\u00e8re en g\u00e9n\u00e9ral une charte sign\u00e9e par l\u2019utilisateur, et par exemple annex\u00e9e au r\u00e8glement int\u00e9rieur.<\/p>\n<p>Il reste cependant une grande inconnue, sur laquelle il para\u00eet t\u00f4t de se positionner : le BYOD va-t-il trouver sa place comme pratique \u00e0 long terme\u00a0? Le ph\u00e9nom\u00e8ne de \u00ab\u00a0consum\u00e9risation\u00a0\u00bb fait en effet l\u2019objet de nombreux d\u00e9bats depuis des ann\u00e9es, sans que l\u2019on puisse affirmer qu\u2019il a r\u00e9ellement r\u00e9ussi \u00e0 percer\u2026<\/p>\n<div>\n<p>[1] Gartner, &#8220;Economic Factors Accelerate Employees&#8217; Use of Personally Owned Equipment&#8221;, 7\u00a0janvier 2009<\/p>\n<div><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>BYOD, une nouvelle tendance susceptible d\u2019en int\u00e9resser plus d\u2019un\u00a0! Pas encore connue de tous, une nouvelle tendance se dessine au sein m\u00eame des entreprises, le Bring Your Own Device.\u00a0 Le BYOD, c\u2019est la fusion des t\u00e9l\u00e9phones personnel et professionnel, ou&#8230;<\/p>\n","protected":false},"author":119,"featured_media":6343,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3222,36,37,32,43],"tags":[64,3304],"coauthors":[966,801],"class_list":["post-432","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyberrisk-management-strategy","category-cybersecurity-digital-trust","category-digital-innovation","category-marketing-relation-client","category-telcos","tag-byod","tag-risk-management-strategy-governance"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bring Your Own Device : quelle fronti\u00e8re entre sph\u00e8re professionnelle et personnelle ? - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bring Your Own Device : quelle fronti\u00e8re entre sph\u00e8re professionnelle et personnelle ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"BYOD, une nouvelle tendance susceptible d\u2019en int\u00e9resser plus d\u2019un\u00a0! Pas encore connue de tous, une nouvelle tendance se dessine au sein m\u00eame des entreprises, le Bring Your Own Device.\u00a0 Le BYOD, c\u2019est la fusion des t\u00e9l\u00e9phones personnel et professionnel, ou...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2011-07-04T07:36:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T11:26:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"573\" \/>\n\t<meta property=\"og:image:height\" content=\"214\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Antoine Marcou, Chadi Hantouche\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Antoine Marcou, Chadi Hantouche\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/\"},\"author\":{\"name\":\"Antoine Marcou\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/030acb12ebf38199906abfd9f1859330\"},\"headline\":\"Bring Your Own Device : quelle fronti\u00e8re entre sph\u00e8re professionnelle et personnelle ?\",\"datePublished\":\"2011-07-04T07:36:27+00:00\",\"dateModified\":\"2019-12-31T11:26:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/\"},\"wordCount\":1220,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"keywords\":[\"BYOD\",\"Risk management\"],\"articleSection\":[\"Cyberrisk Management &amp; Strategy\",\"Cybersecurity &amp; Digital Trust\",\"M\u00e9tiers - Digital &amp; innovation\",\"M\u00e9tiers - Marketing et relation client\",\"M\u00e9tiers - Telcos\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/\",\"name\":\"Bring Your Own Device : quelle fronti\u00e8re entre sph\u00e8re professionnelle et personnelle ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"datePublished\":\"2011-07-04T07:36:27+00:00\",\"dateModified\":\"2019-12-31T11:26:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"width\":573,\"height\":214},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bring Your Own Device : quelle fronti\u00e8re entre sph\u00e8re professionnelle et personnelle ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/030acb12ebf38199906abfd9f1859330\",\"name\":\"Antoine Marcou\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/antoine-marcou\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bring Your Own Device : quelle fronti\u00e8re entre sph\u00e8re professionnelle et personnelle ? - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/","og_locale":"en_US","og_type":"article","og_title":"Bring Your Own Device : quelle fronti\u00e8re entre sph\u00e8re professionnelle et personnelle ? - RiskInsight","og_description":"BYOD, une nouvelle tendance susceptible d\u2019en int\u00e9resser plus d\u2019un\u00a0! Pas encore connue de tous, une nouvelle tendance se dessine au sein m\u00eame des entreprises, le Bring Your Own Device.\u00a0 Le BYOD, c\u2019est la fusion des t\u00e9l\u00e9phones personnel et professionnel, ou...","og_url":"https:\/\/www.riskinsight-wavestone.com\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/","og_site_name":"RiskInsight","article_published_time":"2011-07-04T07:36:27+00:00","article_modified_time":"2019-12-31T11:26:56+00:00","og_image":[{"width":573,"height":214,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","type":"image\/jpeg"}],"author":"Antoine Marcou, Chadi Hantouche","twitter_misc":{"Written by":"Antoine Marcou, Chadi Hantouche","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/"},"author":{"name":"Antoine Marcou","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/030acb12ebf38199906abfd9f1859330"},"headline":"Bring Your Own Device : quelle fronti\u00e8re entre sph\u00e8re professionnelle et personnelle ?","datePublished":"2011-07-04T07:36:27+00:00","dateModified":"2019-12-31T11:26:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/"},"wordCount":1220,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","keywords":["BYOD","Risk management"],"articleSection":["Cyberrisk Management &amp; Strategy","Cybersecurity &amp; Digital Trust","M\u00e9tiers - Digital &amp; innovation","M\u00e9tiers - Marketing et relation client","M\u00e9tiers - Telcos"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/","url":"https:\/\/www.riskinsight-wavestone.com\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/","name":"Bring Your Own Device : quelle fronti\u00e8re entre sph\u00e8re professionnelle et personnelle ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","datePublished":"2011-07-04T07:36:27+00:00","dateModified":"2019-12-31T11:26:56+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","width":573,"height":214},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/07\/bring-your-own-device-quelle-frontiere-entre-sphere-professionnelle-et-personnelle\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Bring Your Own Device : quelle fronti\u00e8re entre sph\u00e8re professionnelle et personnelle ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/030acb12ebf38199906abfd9f1859330","name":"Antoine Marcou","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/antoine-marcou\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/432","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/119"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=432"}],"version-history":[{"count":66,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/432\/revisions"}],"predecessor-version":[{"id":6525,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/432\/revisions\/6525"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6343"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=432"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=432"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=432"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=432"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}