{"id":8505,"date":"2015-11-09T16:00:14","date_gmt":"2015-11-09T15:00:14","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=8505"},"modified":"2015-11-06T17:35:06","modified_gmt":"2015-11-06T16:35:06","slug":"big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/","title":{"rendered":"Big data dans l&#8217;Assurance : g\u00e9rer les risques li\u00e9s aux donn\u00e9es manipul\u00e9es"},"content":{"rendered":"<p>Initier un projet Big data, c\u2019est se poser la question de nouvelles donn\u00e9es \u00e0 collecter, stocker et manipuler pour de nouveaux usages. Autant de besoins qui font peser des risques sur les donn\u00e9es concern\u00e9es et la conformit\u00e9 vis- \u00e0-vis des lois de protection des donn\u00e9es \u00e0 caract\u00e8re personnel.<\/p>\n<h2>Donn\u00e9es personnelles : le cadre r\u00e9glementaire<\/h2>\n<p>Un cadre l\u00e9gal existe d\u00e9j\u00e0 et repose sur la Loi informatique et libert\u00e9s du 6\u00a0janvier\u00a01978, plus particuli\u00e8rement l\u2019article 34 qui impose aux responsables de traitement de \u00ab\u00a0prendre toutes les pr\u00e9cautions utiles, au regard de la nature des donn\u00e9es et des risques pr\u00e9sent\u00e9s par le traitement, pour pr\u00e9server la s\u00e9curit\u00e9 des donn\u00e9es\u00a0\u00bb.<\/p>\n<p>Ce cadre est en \u00e9volution. Un projet de r\u00e8glement europ\u00e9en sur la protection des donn\u00e9es devrait aboutir fin 2015, remettant au go\u00fbt du jour la Directive europ\u00e9enne 95\u00a0\/\u00a046 relative \u00e0 la protection des donn\u00e9es.<\/p>\n<p>Ces textes sont compl\u00e9t\u00e9s par des r\u00e9flexions du G29, groupe de travail des CNIL europ\u00e9ennes \u00e9mettant des opinions sur l\u2019approche par les risques (Article 29 Data Protection Working Party).<\/p>\n<p>Les principes de collecte, transmission, h\u00e9bergement et traitement des donn\u00e9es personnelles doivent suivre des exigences de protection l\u00e9gale tr\u00e8s strictes\u00a0: recueillir le consentement explicite; informer sur la finalit\u00e9 ; collecter uniquement les donn\u00e9es li\u00e9es et n\u00e9cessaires \u00e0 cette finalit\u00e9 ; d\u00e9truire les donn\u00e9es une fois la finalit\u00e9 atteinte ; respecter les droits \u00e0 l\u2019acc\u00e8s, la rectification et la suppression de ces donn\u00e9es ; s\u00e9curiser la collecte, le transfert, l\u2019h\u00e9bergement et le traitement des donn\u00e9es ; effectuer le traitement de fa\u00e7on loyale et licite.<\/p>\n<p>Ceci donne un cadre l\u00e9gal aux d\u00e9marches Big data avec un processus d\u2019am\u00e9lioration continue qui requiert parfois plusieurs it\u00e9rations pour parvenir \u00e0 un dispositif de protection de la vie priv\u00e9e acceptable. Il exige en outre une surveillance des \u00e9volutions dans le temps et des mises \u00e0 jour r\u00e9guli\u00e8res.<\/p>\n<p>Pour faciliter la mise en \u0153uvre concr\u00e8te de ce cadre juridique, la CNIL a publi\u00e9 le 2\u00a0juillet 2015 une m\u00e9thode pour mener une \u00e9tude d\u2019impacts sur la vie priv\u00e9e (EIVP). L\u2019objectif est d\u2019aider les responsables de traitement dans leur d\u00e9marche de conformit\u00e9, de leur permettre de justifier les mesures choisies et de montrer que les solutions ne portent pas atteinte \u00e0 la vie priv\u00e9e.<\/p>\n<p>Cette m\u00e9thode est compl\u00e9t\u00e9e par un guide d\u2019outillage et par un guide de bonnes pratiques. Cette d\u00e9marche de conformit\u00e9 se d\u00e9roule en 4 \u00e9tapes\u00a0: d\u00e9limitation et description du contexte du traitement consid\u00e9r\u00e9 et de ses enjeux ; identification des mesures existantes ou pr\u00e9vues pour respecter les exigences l\u00e9gales et traiter les risques sur la vie priv\u00e9e de mani\u00e8re proportionn\u00e9e ; appr\u00e9ciation des risques sur la vie priv\u00e9e pour v\u00e9rifier qu\u2019ils sont convenablement trait\u00e9s; d\u00e9cision de valider la mani\u00e8re dont il est pr\u00e9vu de respecter les principes de protection de la vie priv\u00e9e et de traiter les risques, ou bien de r\u00e9viser les \u00e9tapes pr\u00e9c\u00e9dentes.<\/p>\n<h3>L&#8217;acc\u00e8s aux donn\u00e9es de Sant\u00e9<\/h3>\n<p>L\u2019article 47 du projet de loi de Sant\u00e9 de Marisol Touraine a \u00e9t\u00e9 adopt\u00e9 par les d\u00e9put\u00e9s le 11\u00a0septembre 2015. Il pr\u00e9voit la cr\u00e9ation d\u2019un syst\u00e8me national des donn\u00e9es de sant\u00e9 (SNDS), grande base de donn\u00e9es m\u00e9dicales centralis\u00e9es accessible au public, afin de faciliter l\u2019acc\u00e8s aux donn\u00e9es m\u00e9dicales issues des divers organismes du secteur.<\/p>\n<p>Suivant l\u2019avis favorable de la CNIL \u00e0 la cr\u00e9ation d\u2019un num\u00e9ro d\u2019identification unique, condition sine qua non de la cr\u00e9ation d\u2019une plateforme num\u00e9rique unique, le Num\u00e9ro d\u2019Inscription au R\u00e9pertoire National (NIR), plus commun\u00e9ment appel\u00e9 num\u00e9ro de s\u00e9curit\u00e9 sociale, deviendra l\u2019identifiant unique de sant\u00e9.<\/p>\n<p>Pour prot\u00e9ger la vie priv\u00e9e des patients et le secret m\u00e9dical, qui reste la principale critique apport\u00e9e par le Syndicat des M\u00e9decins Lib\u00e9raux \u00e0 cet article, de nombreuses garanties ont \u00e9t\u00e9 apport\u00e9es par le l\u00e9gislateur\u00a0:<\/p>\n<ul style=\"list-style-type: disc;\">\n<li>Open data\u00a0: les donn\u00e9es agr\u00e9g\u00e9es et anonymis\u00e9es ne contenant \u00ab\u00a0ni les noms et pr\u00e9noms des personnes, ni leur num\u00e9ro d\u2019inscription au r\u00e9pertoire national d\u2019identification des personnes physiques, ni leur adresse\u00a0\u00bb seront accessibles \u00e0 tous, gratuitement et sans restriction. La r\u00e9utilisation de ces donn\u00e9es sera autoris\u00e9e si elle n\u2019a \u00ab\u00a0ni pour objet, ni pour effet, d\u2019identifier les personnes concern\u00e9es\u00a0\u00bb.<\/li>\n<li>Donn\u00e9es personnelles\u00a0: les donn\u00e9es rendant l\u2019identification possible seront d\u00e9tenues par une structure distincte et ne pourront \u00eatre utilis\u00e9es que sur autorisation de la CNIL et de l\u2019Institut National des Donn\u00e9es de Sant\u00e9 (INDS) \u00e0 des fins de recherche ou d\u2019\u00e9tude pour l\u2019accomplissement de missions poursuivant un motif d\u2019int\u00e9r\u00eat public uniquement. L\u2019article\u00a047 interdit express\u00e9ment l\u2019utilisation de ces donn\u00e9es \u00e0 des fins commerciales ou d\u2019\u00e9volution des primes et contrats d\u2019assurance.<\/li>\n<\/ul>\n<p>En leur permettant d\u2019analyser une population donn\u00e9e, le Big data dans le domaine de la Sant\u00e9 permettrait aux m\u00e9decins d\u2019am\u00e9liorer leurs pratiques de pr\u00e9vention et de soin en mati\u00e8re de maladies chroniques, ainsi que leur connaissance de maladies rares et\u00a0\/\u00a0ou orphelines. Cependant, selon un sondage Odexa paru le 19 janvier 2015, un m\u00e9decin sur deux consid\u00e8re que l\u2019utilisation de la sant\u00e9 connect\u00e9e menace le secret m\u00e9dical et 1\/4 \u00e0 1\/3 d\u2019entre eux qu\u2019elle porte atteinte \u00e0 la libert\u00e9 des patients. En effet, \u00e0 l\u2019heure actuelle, la donn\u00e9e de sant\u00e9 est qualifi\u00e9e de \u00ab\u00a0sensible\u00a0\u00bb par la loi \u00ab\u00a0Informatique et libert\u00e9s\u00a0\u00bb et est par cons\u00e9quent tr\u00e8s prot\u00e9g\u00e9e. Mais, bien qu\u2019un projet de r\u00e8glement europ\u00e9en prenant position sur le sujet soit en cours de r\u00e9daction, les donn\u00e9es de sant\u00e9 et les donn\u00e9es de bien-\u00eatre ne sont toujours pas juridiquement diff\u00e9renciables. Or, si l\u2019on prend l\u2019exemple du \u00ab\u00a0quantified self\u00a0\u00bb, les agissements de l\u2019utilisateur sont enregistr\u00e9s et peuvent \u00eatre utilis\u00e9s. Cette limite doit donc \u00eatre clarifi\u00e9e pour lever les r\u00e9ticences des m\u00e9decins.<\/p>\n<h2>Un contrat de confiance pour anticiper les craintes<\/h2>\n<p>Citoyens et autorit\u00e9s de r\u00e9gulation des donn\u00e9es \u00e0 caract\u00e8re personnel expriment des craintes r\u00e9guli\u00e8rement relay\u00e9es par les m\u00e9dias. Ma\u00eetriser les risques autour du Big data revient \u00e0 anticiper ces craintes en communiquant : sur les usages envisag\u00e9s, la proposition de valeur au regard de ce partage de donn\u00e9es, les comp\u00e9tences des \u00e9quipes en charge des technologies concern\u00e9es et les mesures de s\u00e9curit\u00e9 permettant de garantir la protection des donn\u00e9es manipul\u00e9es.<\/p>\n<p>Il faut donner \u00e0 l\u2019assur\u00e9 la ma\u00eetrise de ses donn\u00e9es personnelles, l\u2019informer sur celles qui seront collect\u00e9es et l\u2019usage qui en sera fait. Il convient ensuite de lui laisser la possibilit\u00e9 d\u2019arbitrer en permanence sur le partage de celles-ci. Les informations demand\u00e9es doivent \u00eatre n\u00e9cessaires \u00e0 la r\u00e9alisation de la finalit\u00e9. L\u2019objet est d\u2019obtenir un consentement, puis d\u00e9truire les donn\u00e9es brutes pour ne conserver que la finalit\u00e9. Il est \u00e9galement envisageable de se limiter aux donn\u00e9es anonymis\u00e9es qui s\u2019av\u00e8rent suffisantes dans de nombreux cas. Enfin, un rapport de proportionnalit\u00e9 est imp\u00e9ratif\u00a0: le service propos\u00e9 gr\u00e2ce \u00e0 ces donn\u00e9es partag\u00e9es doit \u00eatre \u00e0 la hauteur du niveau d\u2019intrusion ressenti.<\/p>\n<p>Ce contrat de confiance pourrait \u00eatre \u00ab\u00a0g\u00e9r\u00e9\u00a0\u00bb via l\u2019espace client\u00a0\/\u00a0adh\u00e9rent, donnant \u00e0 ce dernier la possibilit\u00e9 d\u2019exprimer explicitement son accord ou d\u00e9saccord avec un historique des d\u00e9cisions.<\/p>\n<p>Tout cela permettra de gagner la confiance du client, de mieux le conna\u00eetre et de passer du diagnostic \u00e0 une position prescriptive.<\/p>\n<p>La transparence sur les donn\u00e9es utilis\u00e9es ne fera pas entrave aux secrets de fabrication qui se logent de mani\u00e8re plus structurante sur les algorithmes et sur le volume de donn\u00e9es manipul\u00e9es<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Initier un projet Big data, c\u2019est se poser la question de nouvelles donn\u00e9es \u00e0 collecter, stocker et manipuler pour de nouveaux usages. Autant de besoins qui font peser des risques sur les donn\u00e9es concern\u00e9es et la conformit\u00e9 vis- \u00e0-vis des&#8230;<\/p>\n","protected":false},"author":1067,"featured_media":8506,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[38,37],"tags":[197,189,201,310],"coauthors":[2490,2500],"class_list":["post-8505","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-assurance","category-digital-innovation","tag-assurance-2","tag-big-data","tag-data","tag-risque"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Big data dans l&#039;Assurance : g\u00e9rer les risques li\u00e9s aux donn\u00e9es manipul\u00e9es - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Big data dans l&#039;Assurance : g\u00e9rer les risques li\u00e9s aux donn\u00e9es manipul\u00e9es - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Initier un projet Big data, c\u2019est se poser la question de nouvelles donn\u00e9es \u00e0 collecter, stocker et manipuler pour de nouveaux usages. Autant de besoins qui font peser des risques sur les donn\u00e9es concern\u00e9es et la conformit\u00e9 vis- \u00e0-vis des...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-09T15:00:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/11\/Fotolia_67615387_Subscription_Monthly_XXL-Flat-bolt-icon.\u00a9-oberonsk.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"3873\" \/>\n\t<meta property=\"og:image:height\" content=\"3873\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Laurence Al Neimi, L@urentRen@udot\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Laurence Al Neimi, L@urentRen@udot\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/\"},\"author\":{\"name\":\"Laurence Al Neimi\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/28a7c28088323eb405ffa1c07730d552\"},\"headline\":\"Big data dans l&#8217;Assurance : g\u00e9rer les risques li\u00e9s aux donn\u00e9es manipul\u00e9es\",\"datePublished\":\"2015-11-09T15:00:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/\"},\"wordCount\":1388,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/11\/Fotolia_67615387_Subscription_Monthly_XXL-Flat-bolt-icon.\u00a9-oberonsk.jpg\",\"keywords\":[\"assurance\",\"Big Data\",\"data\",\"Risque\"],\"articleSection\":[\"M\u00e9tiers - Assurance\",\"M\u00e9tiers - Digital &amp; innovation\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/\",\"name\":\"Big data dans l'Assurance : g\u00e9rer les risques li\u00e9s aux donn\u00e9es manipul\u00e9es - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/11\/Fotolia_67615387_Subscription_Monthly_XXL-Flat-bolt-icon.\u00a9-oberonsk.jpg\",\"datePublished\":\"2015-11-09T15:00:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/11\/Fotolia_67615387_Subscription_Monthly_XXL-Flat-bolt-icon.\u00a9-oberonsk.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/11\/Fotolia_67615387_Subscription_Monthly_XXL-Flat-bolt-icon.\u00a9-oberonsk.jpg\",\"width\":3873,\"height\":3873},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Big data dans l&#8217;Assurance : g\u00e9rer les risques li\u00e9s aux donn\u00e9es manipul\u00e9es\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/28a7c28088323eb405ffa1c07730d552\",\"name\":\"Laurence Al Neimi\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/laurence-al-neimi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Big data dans l'Assurance : g\u00e9rer les risques li\u00e9s aux donn\u00e9es manipul\u00e9es - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/","og_locale":"en_US","og_type":"article","og_title":"Big data dans l'Assurance : g\u00e9rer les risques li\u00e9s aux donn\u00e9es manipul\u00e9es - RiskInsight","og_description":"Initier un projet Big data, c\u2019est se poser la question de nouvelles donn\u00e9es \u00e0 collecter, stocker et manipuler pour de nouveaux usages. Autant de besoins qui font peser des risques sur les donn\u00e9es concern\u00e9es et la conformit\u00e9 vis- \u00e0-vis des...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/","og_site_name":"RiskInsight","article_published_time":"2015-11-09T15:00:14+00:00","og_image":[{"width":3873,"height":3873,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/11\/Fotolia_67615387_Subscription_Monthly_XXL-Flat-bolt-icon.\u00a9-oberonsk.jpg","type":"image\/jpeg"}],"author":"Laurence Al Neimi, L@urentRen@udot","twitter_misc":{"Written by":"Laurence Al Neimi, L@urentRen@udot","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/"},"author":{"name":"Laurence Al Neimi","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/28a7c28088323eb405ffa1c07730d552"},"headline":"Big data dans l&#8217;Assurance : g\u00e9rer les risques li\u00e9s aux donn\u00e9es manipul\u00e9es","datePublished":"2015-11-09T15:00:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/"},"wordCount":1388,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/11\/Fotolia_67615387_Subscription_Monthly_XXL-Flat-bolt-icon.\u00a9-oberonsk.jpg","keywords":["assurance","Big Data","data","Risque"],"articleSection":["M\u00e9tiers - Assurance","M\u00e9tiers - Digital &amp; innovation"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/","name":"Big data dans l'Assurance : g\u00e9rer les risques li\u00e9s aux donn\u00e9es manipul\u00e9es - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/11\/Fotolia_67615387_Subscription_Monthly_XXL-Flat-bolt-icon.\u00a9-oberonsk.jpg","datePublished":"2015-11-09T15:00:14+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/11\/Fotolia_67615387_Subscription_Monthly_XXL-Flat-bolt-icon.\u00a9-oberonsk.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2015\/11\/Fotolia_67615387_Subscription_Monthly_XXL-Flat-bolt-icon.\u00a9-oberonsk.jpg","width":3873,"height":3873},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2015\/11\/big-data-dans-lassurance-gerer-les-risques-lies-aux-donnees-manipulees\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Big data dans l&#8217;Assurance : g\u00e9rer les risques li\u00e9s aux donn\u00e9es manipul\u00e9es"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/28a7c28088323eb405ffa1c07730d552","name":"Laurence Al Neimi","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/laurence-al-neimi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8505","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1067"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=8505"}],"version-history":[{"count":4,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8505\/revisions"}],"predecessor-version":[{"id":8511,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8505\/revisions\/8511"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/8506"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=8505"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=8505"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=8505"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=8505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}