{"id":26512,"date":"2022-04-19T15:50:00","date_gmt":"2022-04-19T13:50:00","guid":{"rendered":"https:\/\/perseus.de\/securite-des-donnees\/"},"modified":"2026-03-30T09:51:52","modified_gmt":"2026-03-30T07:51:52","slug":"securite-des-donnees","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/securite-des-donnees\/","title":{"rendered":"S\u00e9curit\u00e9 des donn\u00e9es"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26512\" class=\"elementor elementor-26512 elementor-22208\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-315b0b1 e-con-full e-flex e-con e-child\" data-id=\"315b0b1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">S\u00e9curit\u00e9 des donn\u00e9es\n<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25818\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4a9a58f8 e-flex e-con-boxed e-con e-parent\" data-id=\"4a9a58f8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-53990d56 e-con-full e-flex e-con e-child\" data-id=\"53990d56\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e839854 elementor-widget elementor-widget-text-editor\" data-id=\"e839854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<header class=\"Single__header Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size6D\"><div class=\"Share\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><p>La s\u00e9curit\u00e9 des donn\u00e9es est assur\u00e9e lorsque la confidentialit\u00e9, l\u2019int\u00e9grit\u00e9 et la disponibilit\u00e9 des donn\u00e9es sont assur\u00e9es. Le terme est \u00e9galement utilis\u00e9 comme synonyme de \u00ab s\u00e9curit\u00e9 de l\u2019information \u00bb. <\/p><h4> <\/h4><h4>Que signifie en d\u00e9tail le terme s\u00e9curit\u00e9 des donn\u00e9es ?<\/h4><div> <\/div><ul><li>Confidentialit\u00e9 : Les donn\u00e9es sont prot\u00e9g\u00e9es contre tout acc\u00e8s non autoris\u00e9.<\/li><li>Int\u00e9grit\u00e9 : Les donn\u00e9es sont prot\u00e9g\u00e9es contre la destruction et la perte.<\/li><li>Disponibilit\u00e9 : Les donn\u00e9es peuvent \u00eatre consult\u00e9es \u00e0 tout moment par des personnes autoris\u00e9es.<\/li><li>Il n\u2019existe pas de s\u00e9curit\u00e9 \u00e0 100 %. Mais il existe de nombreuses fa\u00e7ons d\u2019accro\u00eetre la s\u00e9curit\u00e9 des donn\u00e9es. <\/li><li>L\u2019augmentation de la s\u00e9curit\u00e9 des donn\u00e9es implique de nombreux \u00e9l\u00e9ments, notamment le chiffrement, les mots de passe forts, la cybers\u00e9curit\u00e9, les sauvegardes, et bien plus encore.<\/li><li>Une bonne protection de base informatique am\u00e9liore la s\u00e9curit\u00e9 des donn\u00e9es<\/li><\/ul><p>Il est important pour la s\u00e9curit\u00e9 des donn\u00e9es de clarifier o\u00f9 les donn\u00e9es sont cr\u00e9\u00e9es et existent. Entre autres, les smartphones, montres connect\u00e9es, dispositifs de stockage amovibles, clouds, e-mails et ce qu\u2019on appelle l\u2019informatique fant\u00f4me doivent \u00e9galement \u00eatre pris en compte. <\/p><h4> <\/h4><h4>O\u00f9 puis-je rencontrer le sujet de la s\u00e9curit\u00e9 des donn\u00e9es dans mon travail quotidien ?<\/h4><div> <\/div><p>Vous \u00eates confront\u00e9 \u00e0 la s\u00e9curit\u00e9 des donn\u00e9es en permanence dans votre travail quotidien. Par exemple, chaque saisie de mot de passe, chaque classement correct d\u2019un fichier ou d\u2019un document sert \u00e0 la s\u00e9curit\u00e9 des donn\u00e9es. Dans certains cas, la s\u00e9curit\u00e9 des donn\u00e9es recoupe des sujets tout aussi importants que la protection des donn\u00e9es et la cybers\u00e9curit\u00e9.  <\/p><h4> <\/h4><h4>Que puis-je faire pour am\u00e9liorer ma s\u00e9curit\u00e9 ?<\/h4><div> <\/div><p>Juste quelques exemples :<\/p><p><em>Confidentialit\u00e9<\/em> (les donn\u00e9es sont prot\u00e9g\u00e9es contre tout acc\u00e8s non autoris\u00e9)<\/p><ul><li>Utilisation du chiffrement<\/li><li>Attribuer des droits d\u2019acc\u00e8s \u00e0 plusieurs niveaux dans les r\u00e9seaux<\/li><li>Utilisez des mots de passe forts<\/li><li>Supprimez imm\u00e9diatement les connexions, comptes et comptes d\u2019anciens employ\u00e9s apr\u00e8s leur d\u00e9part<\/li><li>Des emplois s\u00e9curis\u00e9s m\u00eame lors de courtes absences<\/li><\/ul><p><em> <\/em><\/p><p><em>Int\u00e9grit\u00e9<\/em> (les donn\u00e9es sont prot\u00e9g\u00e9es contre la destruction et la perte)<\/p><ul><li>R\u00e9duisez les risques cyber gr\u00e2ce \u00e0 la sensibilisation des employ\u00e9s, aux antivirus de scanners, aux pare-feux, aux comptes utilisateurs sans droits d\u2019administrateur, et bien plus encore.    <\/li><li>Sauvegardes r\u00e9guli\u00e8res, dont au moins une copie est gard\u00e9e hors ligne et \u00e0 un autre endroit<\/li><\/ul><p><em> <\/em><\/p><p><em>Disponibilit\u00e9<\/em> (les donn\u00e9es peuvent \u00eatre consult\u00e9es \u00e0 tout moment par des personnes autoris\u00e9es)<\/p><ul><li>Ici aussi : des sauvegardes r\u00e9guli\u00e8res stock\u00e9es de mani\u00e8re s\u00e9curis\u00e9e<\/li><li>Droits d\u2019acc\u00e8s bien pens\u00e9s<\/li><\/ul><h4> <\/h4><h4>Informations g\u00e9n\u00e9rales int\u00e9ressantes<\/h4><ul><li>Le <a href=\"https:\/\/www.bsi.bund.de\/DE\/Themen\/Unternehmen-und-Organisationen\/Standards-und-Zertifizierung\/IT-Grundschutz\/IT-Grundschutz-Kompendium\/it-grundschutz-kompendium_node.html\">Compendium de la protection de base des technologies de l\u2019information \u2013 \u00c9dition 2022<\/a> de l\u2019Office f\u00e9d\u00e9ral de la s\u00e9curit\u00e9 de l\u2019information (BSI)<\/li><li>Page th\u00e9matique \u00ab <a href=\"http:\/\/www.it-sicherheit-in-der-wirtschaft.de\/ITS\/Redaktion\/DE\/Artikel\/Themen\/datenschutz-und-datensicherheit.html\">Protection des donn\u00e9es et s\u00e9curit\u00e9 des donn\u00e9es<\/a> \u00bb de l\u2019Initiative IT-Sicherheit in der Wirtschaft :  <\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb1ddf2 e-flex e-con-boxed e-con e-parent\" data-id=\"cb1ddf2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-17d935d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"17d935d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>S\u00e9curit\u00e9 des donn\u00e9es La s\u00e9curit\u00e9 des donn\u00e9es est assur\u00e9e lorsque la confidentialit\u00e9, l\u2019int\u00e9grit\u00e9 et la disponibilit\u00e9 des donn\u00e9es sont assur\u00e9es. Le terme est \u00e9galement utilis\u00e9 comme synonyme de \u00ab s\u00e9curit\u00e9 de l\u2019information \u00bb. Que signifie en d\u00e9tail le terme s\u00e9curit\u00e9 des donn\u00e9es ? Confidentialit\u00e9 : Les donn\u00e9es sont prot\u00e9g\u00e9es contre tout acc\u00e8s non autoris\u00e9. Int\u00e9grit\u00e9 [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[58],"tags":[],"class_list":["post-26512","post","type-post","status-publish","format-standard","hentry","category-cyberlexique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>S\u00e9curit\u00e9 des donn\u00e9es - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/securite-des-donnees\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curit\u00e9 des donn\u00e9es - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"S\u00e9curit\u00e9 des donn\u00e9es La s\u00e9curit\u00e9 des donn\u00e9es est assur\u00e9e lorsque la confidentialit\u00e9, l\u2019int\u00e9grit\u00e9 et la disponibilit\u00e9 des donn\u00e9es sont assur\u00e9es. Le terme est \u00e9galement utilis\u00e9 comme synonyme de \u00ab s\u00e9curit\u00e9 de l\u2019information \u00bb. Que signifie en d\u00e9tail le terme s\u00e9curit\u00e9 des donn\u00e9es ? Confidentialit\u00e9 : Les donn\u00e9es sont prot\u00e9g\u00e9es contre tout acc\u00e8s non autoris\u00e9. Int\u00e9grit\u00e9 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/securite-des-donnees\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-19T13:50:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T07:51:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/securite-des-donnees\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/securite-des-donnees\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"S\u00e9curit\u00e9 des donn\u00e9es\",\"datePublished\":\"2022-04-19T13:50:00+00:00\",\"dateModified\":\"2026-03-30T07:51:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/securite-des-donnees\\\/\"},\"wordCount\":528,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/securite-des-donnees\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Cyberlexique\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/securite-des-donnees\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/securite-des-donnees\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/securite-des-donnees\\\/\",\"name\":\"S\u00e9curit\u00e9 des donn\u00e9es - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/securite-des-donnees\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/securite-des-donnees\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-04-19T13:50:00+00:00\",\"dateModified\":\"2026-03-30T07:51:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/securite-des-donnees\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/securite-des-donnees\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/securite-des-donnees\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/securite-des-donnees\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e9curit\u00e9 des donn\u00e9es\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e9curit\u00e9 des donn\u00e9es - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/securite-des-donnees\/","og_locale":"fr_FR","og_type":"article","og_title":"S\u00e9curit\u00e9 des donn\u00e9es - Perseus Technologies","og_description":"S\u00e9curit\u00e9 des donn\u00e9es La s\u00e9curit\u00e9 des donn\u00e9es est assur\u00e9e lorsque la confidentialit\u00e9, l\u2019int\u00e9grit\u00e9 et la disponibilit\u00e9 des donn\u00e9es sont assur\u00e9es. Le terme est \u00e9galement utilis\u00e9 comme synonyme de \u00ab s\u00e9curit\u00e9 de l\u2019information \u00bb. Que signifie en d\u00e9tail le terme s\u00e9curit\u00e9 des donn\u00e9es ? Confidentialit\u00e9 : Les donn\u00e9es sont prot\u00e9g\u00e9es contre tout acc\u00e8s non autoris\u00e9. Int\u00e9grit\u00e9 [&hellip;]","og_url":"https:\/\/perseus.de\/fr\/securite-des-donnees\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-19T13:50:00+00:00","article_modified_time":"2026-03-30T07:51:52+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/securite-des-donnees\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/securite-des-donnees\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"S\u00e9curit\u00e9 des donn\u00e9es","datePublished":"2022-04-19T13:50:00+00:00","dateModified":"2026-03-30T07:51:52+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/securite-des-donnees\/"},"wordCount":528,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/securite-des-donnees\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Cyberlexique"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/securite-des-donnees\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/securite-des-donnees\/","url":"https:\/\/perseus.de\/fr\/securite-des-donnees\/","name":"S\u00e9curit\u00e9 des donn\u00e9es - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/securite-des-donnees\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/securite-des-donnees\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-04-19T13:50:00+00:00","dateModified":"2026-03-30T07:51:52+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/securite-des-donnees\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/securite-des-donnees\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/securite-des-donnees\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/securite-des-donnees\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"S\u00e9curit\u00e9 des donn\u00e9es"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26512","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=26512"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26512\/revisions"}],"predecessor-version":[{"id":26513,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/26512\/revisions\/26513"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=26512"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=26512"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=26512"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}