{"id":8922,"date":"2016-04-26T16:23:54","date_gmt":"2016-04-26T15:23:54","guid":{"rendered":"https:\/\/www.solucominsight.fr\/?p=8922"},"modified":"2019-12-31T10:21:33","modified_gmt":"2019-12-31T09:21:33","slug":"confiance-numerique-que-doit-on-attendre-du-reglement-eidas","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/","title":{"rendered":"Confiance num\u00e9rique: que doit-on attendre du r\u00e8glement eIDAS\u00a0?"},"content":{"rendered":"<p><em>Le r\u00e8glement eIDAS, qui abroge la directive <a href=\"http:\/\/eur-lex.europa.eu\/legal-content\/FR\/ALL\/?uri=CELEX:31999L0093\">1999\/93\/CE<\/a> sur la signature \u00e9lectronique, entrera en vigueur le 1<sup>er<\/sup> juillet 2016. Il fait suite aux insuffisances du cadre pos\u00e9 par ladite directive sur l&#8217;identification \u00e9lectronique et les services de confiance pour les transactions \u00e9lectroniques.<\/em><\/p>\n<p>Cette r\u00e9flexion avait notamment \u00e9t\u00e9 initi\u00e9e par la Commission au Parlement europ\u00e9en dans sa communication du 26 ao\u00fbt 2010 (Une strat\u00e9gie num\u00e9rique pour l\u2019Europe).\u00a0 Bien qu\u2019aujourd\u2019hui le r\u00e8glement reprenne la majeure partie des dispositions de cette directive auxquelles sont apport\u00e9es quelques modifications, de <a href=\"http:\/\/www.ssi.gouv.fr\/administration\/reglementation\/administration-electronique\/le-reglement-n-9102014-du-parlement-europeen-et-du-conseil-sur-lidentification-electronique-et-les-services-de-confiance-pour-les-transactions-electroniques-au-sein-du-marche-interieur\/\"><strong>nouvelles dispositions y sont d\u00e9crites <\/strong><\/a>et viennent <strong>renforcer<\/strong> et <strong>d\u00e9velopper<\/strong> l\u2019acquis qu\u2019elle repr\u00e9sente.<\/p>\n<h2>Cr\u00e9ation d\u2019un cadre transnational et intersectoriel<\/h2>\n<p>Le<strong> principal probl\u00e8me recens\u00e9<\/strong> est notamment cit\u00e9 au point (9) du r\u00e8glement\u00a0:\u00a0<em>\u00ab\u00a0Dans la plupart des cas, <strong>les citoyens ne peuvent pas utiliser leur identification \u00e9lectronique pour s\u2019authentifier dans un autre \u00c9tat membre<\/strong> parce que les syst\u00e8mes nationaux d\u2019identification \u00e9lectronique de leur pays ne sont pas reconnus dans d\u2019autres \u00c9tats membres\u00a0\u00bb<\/em>. Cette <strong>non-reconnaissance<\/strong> est due \u00e0 l\u2019<strong>interpr\u00e9tation<\/strong> et \u00e0 la <strong>mise en \u0153uvre technique<\/strong> par chaque \u00c9tat membre de la directive, ce qui am\u00e8ne ainsi \u00a0des<strong> probl\u00e8mes d\u2019interop\u00e9rabilit\u00e9<\/strong> et des divergences \u00a0lors des contr\u00f4les effectu\u00e9s. Concernant les services de confiance tels que l\u2019horodatage ou encore le cachet, les divergences pouvaient \u00e9maner de l\u2019<strong>absence de cadre juridique<\/strong> clair au niveau europ\u00e9en.<\/p>\n<p>C\u2019est pourquoi, l\u2019objectif du r\u00e8glement eIDAS (electronic IDentification And trust Services)\u00a0est d\u2019<em>\u00abinstaurer un climat de confiance dans l\u2019environnement en ligne \u00bb<\/em> en fournissant un cadre transnational et intersectoriel complet pour des transactions \u00e9lectroniques s\u00fbres, fiables et ais\u00e9es entre citoyens. Ce climat de confiance couvre donc l\u2019<strong>identification<\/strong> et l\u2019<strong>authentification \u00e9lectroniques<\/strong>, mais \u00e9galement d\u2019autres services de confiance tels que l\u2019<strong>horodatage<\/strong> ou encore le <strong>recommand\u00e9 \u00e9lectronique<\/strong>. La mise en place d\u2019un tel cadre permettra d\u2019effectuer des d\u00e9marches administratives dans tous les pays membres de l\u2019Union et imposera la <strong>reconnaissance mutuelle<\/strong>.<\/p>\n<p>Cependant, il est n\u00e9cessaire de souligner que le r\u00e8glement reste <strong>ouvert<\/strong> puisqu\u2019il laisse la libert\u00e9 aux pays membres de d\u00e9finir <strong>d\u2019autres types de services de confiance<\/strong> \u00e0 des fins de reconnaissance au niveau national comme des services de confiance qualifi\u00e9s.<\/p>\n<p>&nbsp;<\/p>\n<h2>Concr\u00e8tement, qu\u2019est-ce que eIDAS va changer\u00a0? <\/h2>\n<p>Un des premiers points notables concerne la <strong>mise en conformit\u00e9 en vue d\u2019une qualification eIDAS pour les Prestataires de Services de Confiance<\/strong> (PSCO). Afin d\u2019int\u00e9grer la liste des PSCO qualifi\u00e9s (qui devra \u00eatre publi\u00e9e r\u00e9guli\u00e8rement) et donc reconnus par les \u00c9tats membres, ils devront respecter un<strong> ensemble d\u2019exigences de s\u00e9curit\u00e9<\/strong> (mesures techniques, organisationnelles, etc.). Pour cela, ils devront s\u2019appuyer sur les <strong>standards d\u00e9crivant les mesures \u00e0 mettre en place\u00a0<\/strong>: analyse de risques, plan de cessation d\u2019activit\u00e9, processus de d\u00e9livrance en face \u00e0 face, notifications en cas d\u2019atteinte \u00e0 la s\u00e9curit\u00e9, contr\u00f4les, responsabilit\u00e9s, etc. L\u2019interop\u00e9rabilit\u00e9 technique des syst\u00e8mes passe donc par la <strong>revue des r\u00e9f\u00e9rentiels nationaux<\/strong>, comme le R\u00e9f\u00e9rentiel G\u00e9n\u00e9ral de S\u00e9curit\u00e9 (RGS)\u00a0; et la <strong>coop\u00e9ration des pays membres.<\/strong><\/p>\n<p>Cependant, la qualification reste une<strong> d\u00e9marche volontaire<\/strong>, et un <strong>label de confiance UE sera cr\u00e9\u00e9 pour identifier les PSCO qualifi\u00e9s<\/strong>. Pour obtenir ce label, les prestataires de services de confiance devront se<strong> soumettre \u00e0 des audits<\/strong> qui attesteront du respect des mesures d\u00e9finies dans les standards adoss\u00e9s au r\u00e8glement. Il est donc fort probable que dans les mois qui viennent, les PSCO recherchant la qualification eIDAS lancent des projets globaux de<strong> mise en conformit\u00e9<\/strong> comprenant la <strong>mise \u00e0 jour documentaire<\/strong> (PC, DPC, PH, DPH, CGU, etc.), la revue de leur architecture d<strong>\u2019Infrastructures de Gestion de Cl\u00e9s<\/strong> (IGC), de leurs gabarits de certificats, etc. \u00c0 noter que les prestataires qualifi\u00e9s dans le cadre de la Directive restent qualifi\u00e9s au sens du r\u00e8glement jusqu\u2019au renouvellement de leur qualification mais devront passer un audit avant le 1er Juillet 2017 pour renouveler leur qualification.<\/p>\n<p>Parmi les autres points remarquables, nous pouvons citer l\u2019apparition d\u2019un <strong>nouveau principe juridique\u00a0: la signature \u00e9lectronique de personne morale<\/strong>. Le cachet \u00e9lectronique permettra donc aux entreprises et administrations de signer \u00e9lectroniquement en leur nom des documents afin de <strong>certifier leur provenance<\/strong>. Concr\u00e8tement, un juge fran\u00e7ais ne pourra pas refuser un cachet ou une signature \u00e9lectronique appos\u00e9 par un italien avec une solution allemande.<\/p>\n<p>Enfin, nous pouvons \u00e9galement souligner l\u2019introduction de la notion de <strong>signature qualifi\u00e9e c\u00f4t\u00e9 serveur,<\/strong> ce qui permettra notamment le d\u00e9veloppement de nouvelles offres (en SaaS)\u00a0; objectif clairement recherch\u00e9 du r\u00e8glement eIDAS.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le r\u00e8glement eIDAS, qui abroge la directive 1999\/93\/CE sur la signature \u00e9lectronique, entrera en vigueur le 1er juillet 2016. Il fait suite aux insuffisances du cadre pos\u00e9 par ladite directive sur l&#8217;identification \u00e9lectronique et les services de confiance pour les&#8230;<\/p>\n","protected":false},"author":251,"featured_media":8921,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3226],"tags":[1325,2626,2960,78,192,3314],"coauthors":[1561],"class_list":["post-8922","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-digital-compliance","tag-confiance-numerique","tag-eidas","tag-eu","tag-reglementation","tag-signature-electronique","tag-trusted-services-eidas"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Confiance num\u00e9rique: que doit-on attendre du r\u00e8glement eIDAS\u00a0? - RiskInsight<\/title>\n<meta name=\"description\" content=\"Le r\u00e8glement eIDAS, qui abroge la directive 1999\/93\/CE sur la signature \u00e9lectronique, entrera en vigueur le 1er juillet 2016. Il fait suite aux insuffisances du cadre pos\u00e9 par ladite directive sur l&#039;identification \u00e9lectronique et les services de confiance pour les transactions \u00e9lectroniques.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Confiance num\u00e9rique: que doit-on attendre du r\u00e8glement eIDAS\u00a0? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Le r\u00e8glement eIDAS, qui abroge la directive 1999\/93\/CE sur la signature \u00e9lectronique, entrera en vigueur le 1er juillet 2016. Il fait suite aux insuffisances du cadre pos\u00e9 par ladite directive sur l&#039;identification \u00e9lectronique et les services de confiance pour les transactions \u00e9lectroniques.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-26T15:23:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T09:21:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/04\/Fotolia_97888180_Subscription_Monthly_M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1570\" \/>\n\t<meta property=\"og:image:height\" content=\"1210\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Florian Feuillard\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Florian Feuillard\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/\"},\"author\":{\"name\":\"Florian Feuillard\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/40a7b7d4f357e6265661954f4a7fcf34\"},\"headline\":\"Confiance num\u00e9rique: que doit-on attendre du r\u00e8glement eIDAS\u00a0?\",\"datePublished\":\"2016-04-26T15:23:54+00:00\",\"dateModified\":\"2019-12-31T09:21:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/\"},\"wordCount\":804,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/04\/Fotolia_97888180_Subscription_Monthly_M.jpg\",\"keywords\":[\"confiance num\u00e9rique\",\"eIDAS\",\"EU\",\"R\u00e8glementation\",\"signature \u00e9lectronique\",\"trusted services &amp; eIDAS\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Digital Compliance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/\",\"name\":\"Confiance num\u00e9rique: que doit-on attendre du r\u00e8glement eIDAS\u00a0? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/04\/Fotolia_97888180_Subscription_Monthly_M.jpg\",\"datePublished\":\"2016-04-26T15:23:54+00:00\",\"dateModified\":\"2019-12-31T09:21:33+00:00\",\"description\":\"Le r\u00e8glement eIDAS, qui abroge la directive 1999\/93\/CE sur la signature \u00e9lectronique, entrera en vigueur le 1er juillet 2016. Il fait suite aux insuffisances du cadre pos\u00e9 par ladite directive sur l'identification \u00e9lectronique et les services de confiance pour les transactions \u00e9lectroniques.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/04\/Fotolia_97888180_Subscription_Monthly_M.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/04\/Fotolia_97888180_Subscription_Monthly_M.jpg\",\"width\":1570,\"height\":1210,\"caption\":\"Digital signature on tablet\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Confiance num\u00e9rique: que doit-on attendre du r\u00e8glement eIDAS\u00a0?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/40a7b7d4f357e6265661954f4a7fcf34\",\"name\":\"Florian Feuillard\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/florian-feuillard\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Confiance num\u00e9rique: que doit-on attendre du r\u00e8glement eIDAS\u00a0? - RiskInsight","description":"Le r\u00e8glement eIDAS, qui abroge la directive 1999\/93\/CE sur la signature \u00e9lectronique, entrera en vigueur le 1er juillet 2016. Il fait suite aux insuffisances du cadre pos\u00e9 par ladite directive sur l'identification \u00e9lectronique et les services de confiance pour les transactions \u00e9lectroniques.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/","og_locale":"en_US","og_type":"article","og_title":"Confiance num\u00e9rique: que doit-on attendre du r\u00e8glement eIDAS\u00a0? - RiskInsight","og_description":"Le r\u00e8glement eIDAS, qui abroge la directive 1999\/93\/CE sur la signature \u00e9lectronique, entrera en vigueur le 1er juillet 2016. Il fait suite aux insuffisances du cadre pos\u00e9 par ladite directive sur l'identification \u00e9lectronique et les services de confiance pour les transactions \u00e9lectroniques.","og_url":"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/","og_site_name":"RiskInsight","article_published_time":"2016-04-26T15:23:54+00:00","article_modified_time":"2019-12-31T09:21:33+00:00","og_image":[{"width":1570,"height":1210,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/04\/Fotolia_97888180_Subscription_Monthly_M.jpg","type":"image\/jpeg"}],"author":"Florian Feuillard","twitter_misc":{"Written by":"Florian Feuillard","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/"},"author":{"name":"Florian Feuillard","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/40a7b7d4f357e6265661954f4a7fcf34"},"headline":"Confiance num\u00e9rique: que doit-on attendre du r\u00e8glement eIDAS\u00a0?","datePublished":"2016-04-26T15:23:54+00:00","dateModified":"2019-12-31T09:21:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/"},"wordCount":804,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/04\/Fotolia_97888180_Subscription_Monthly_M.jpg","keywords":["confiance num\u00e9rique","eIDAS","EU","R\u00e8glementation","signature \u00e9lectronique","trusted services &amp; eIDAS"],"articleSection":["Cybersecurity &amp; Digital Trust","Digital Compliance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/","url":"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/","name":"Confiance num\u00e9rique: que doit-on attendre du r\u00e8glement eIDAS\u00a0? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/04\/Fotolia_97888180_Subscription_Monthly_M.jpg","datePublished":"2016-04-26T15:23:54+00:00","dateModified":"2019-12-31T09:21:33+00:00","description":"Le r\u00e8glement eIDAS, qui abroge la directive 1999\/93\/CE sur la signature \u00e9lectronique, entrera en vigueur le 1er juillet 2016. Il fait suite aux insuffisances du cadre pos\u00e9 par ladite directive sur l'identification \u00e9lectronique et les services de confiance pour les transactions \u00e9lectroniques.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/04\/Fotolia_97888180_Subscription_Monthly_M.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/04\/Fotolia_97888180_Subscription_Monthly_M.jpg","width":1570,"height":1210,"caption":"Digital signature on tablet"},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2016\/04\/confiance-numerique-que-doit-on-attendre-du-reglement-eidas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Confiance num\u00e9rique: que doit-on attendre du r\u00e8glement eIDAS\u00a0?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/40a7b7d4f357e6265661954f4a7fcf34","name":"Florian Feuillard","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/florian-feuillard\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8922","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/251"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=8922"}],"version-history":[{"count":13,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8922\/revisions"}],"predecessor-version":[{"id":9268,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/8922\/revisions\/9268"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/8921"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=8922"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=8922"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=8922"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=8922"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}