{"id":27491,"date":"2020-12-03T15:30:00","date_gmt":"2020-12-03T14:30:00","guid":{"rendered":"https:\/\/perseus.de\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\/"},"modified":"2026-03-30T16:43:24","modified_gmt":"2026-03-30T14:43:24","slug":"la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite","status":"publish","type":"post","link":"https:\/\/perseus.de\/fr\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\/","title":{"rendered":"\u00ab La protection des donn\u00e9es et la cybers\u00e9curit\u00e9 vont de pair avec la s\u00e9curit\u00e9 \u00bb"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27491\" class=\"elementor elementor-27491 elementor-22798\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"401\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Data_joshua-sortino_Unsplash.jpg-600x401-1.png\" class=\"attachment-medium_large size-medium_large wp-image-27490\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Data_joshua-sortino_Unsplash.jpg-600x401-1.png 600w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Data_joshua-sortino_Unsplash.jpg-600x401-1-300x201.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Cr\u00e9dit image : Joshua Sortino via Unsplash<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-184962d8 e-flex e-con-boxed e-con e-parent\" data-id=\"184962d8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-5a6e84d e-con-full e-flex e-con e-child\" data-id=\"5a6e84d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0059cfb e-con-full e-flex e-con e-child\" data-id=\"0059cfb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-037ae8b elementor-widget elementor-widget-text-editor\" data-id=\"037ae8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>03.12.2020<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ab3163 elementor-widget elementor-widget-heading\" data-id=\"1ab3163\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00ab La protection des donn\u00e9es et la cybers\u00e9curit\u00e9 vont de pair avec la s\u00e9curit\u00e9 \u00bb\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-043bf63 elementor-widget elementor-widget-text-editor\" data-id=\"043bf63\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybers\u00e9curit\u00e9 | Protection informatique | Politique de confidentialit\u00e9 | Entretien<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1398b61 e-con-full e-flex e-con e-child\" data-id=\"1398b61\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9b64fd1 elementor-widget elementor-widget-text-editor\" data-id=\"9b64fd1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Surtout \u00e0 l\u2019\u00e8re de la num\u00e9risation avanc\u00e9e et de r\u00e9seaux plus complexes, les entreprises qui traitent les donn\u00e9es personnelles devraient placer la protection des donn\u00e9es en t\u00eate de liste de priorit\u00e9s. Cependant, le travail conforme au RGPD pose encore d\u2019importants d\u00e9fis \u00e0 de nombreuses entreprises. Cependant, une infraction ou un non-respect du r\u00e8glement RGPD peut entra\u00eener de lourdes amendes.  <\/strong><\/p><p><strong>L\u2019experte en protection des donn\u00e9es Annika Fuchs-Langanke, avocate et propri\u00e9taire du cabinet Fuchs &amp; Coll. Rechtsanwaltsgesellschaft mbH \u00e0 Potsdam, explique dans une interview accord\u00e9e \u00e0 Perseus ce qui doit particuli\u00e8rement \u00eatre pris en compte <\/strong><\/p><p><strong>L\u2019introduction du RGPD en Allemagne remonte \u00e0 environ deux ans. Existe-t-il une \u00e9valuation g\u00e9n\u00e9rale de la mani\u00e8re dont les entreprises les ont accept\u00e9es et mises en \u0153uvre ? <\/strong><\/p><p><em> <\/em><\/p><p><em>Il n\u2019y a certainement pas de r\u00e9ponse g\u00e9n\u00e9rale \u00e0 cette question. Les grandes entreprises en particulier ont d\u00e9ploy\u00e9 des efforts consid\u00e9rables pour devenir \u00ab conformes au RGPD \u00bb. Mais ici aussi, certaines entreprises risquent de devoir rattraper leur retard \u00e0 un endroit ou un autre \u2013 je pense par exemple au sujet de la \u00ab suppression \u00bb.  <\/em><\/p><p><em>Pour les entreprises de taille moyenne et surtout les petites, la situation est probablement beaucoup plus diff\u00e9renci\u00e9e. Ici aussi, de nombreuses entreprises ont fait des efforts et se retrouvent d\u00e9sormais dans une bonne position. Malheureusement, certaines entreprises ont aussi fait relativement peu en mati\u00e8re de RGPD. Il y a certainement encore un besoin de mise en \u0153uvre ici. Cependant, cela ne peut \u00eatre g\u00e9n\u00e9ralis\u00e9<\/em>.<\/p><p><strong> <\/strong><\/p><p><strong>La protection des donn\u00e9es et la cybers\u00e9curit\u00e9 vont de pair, ou se g\u00eanent-elles mutuellement ?<\/strong><\/p><p><em>La protection des donn\u00e9es et la cybers\u00e9curit\u00e9 vont de pair avec la s\u00e9curit\u00e9. Par exemple, le RGPD exige que les entreprises prennent des mesures appropri\u00e9es pour prot\u00e9ger les donn\u00e9es personnelles qu\u2019elles traitent. Surtout \u00e0 une \u00e9poque o\u00f9 les donn\u00e9es personnelles sont principalement trait\u00e9es num\u00e9riquement, des mesures telles que les pare-feux, les m\u00e9canismes de chiffrement, la gestion des correctifs et les sauvegardes jouent un r\u00f4le de plus en plus important. Il suffit de penser au sujet du \u00ab home office \u00bb, qui devient de plus en plus pertinent et ne serait pas envisageable sans mesures de cybers\u00e9curit\u00e9.   <\/em><\/p><p><strong> <\/strong><\/p><p><strong>En mati\u00e8re de protection des donn\u00e9es, quels types de cyberattaques sont particuli\u00e8rement dangereux ? Et quelles donn\u00e9es sont particuli\u00e8rement int\u00e9ressantes pour les cybercriminels ? <\/strong><\/p><p><em>Bien s\u00fbr, toutes les attaques impliquant des donn\u00e9es personnelles sont particuli\u00e8rement dangereuses, et celles qui peuvent entra\u00eener destruction, perte, alt\u00e9ration et, surtout, divulgation non autoris\u00e9e. Les cybercriminels sont susceptibles de cibler les donn\u00e9es bancaires, entre autres. Mais cela ne doit pas toujours \u00eatre le cas. Par exemple, les cybercriminels peuvent \u00e9galement cibler des donn\u00e9es d\u2019acc\u00e8s ou des mots de passe et causer des d\u00e9g\u00e2ts consid\u00e9rables.   <\/em><\/p><p><strong> <\/strong><\/p><p><strong>Une entreprise a \u00e9t\u00e9 victime d\u2019une cyberattaque. Quand un responsable de la protection des donn\u00e9es doit-il \u00eatre consult\u00e9, et quelles sont exactement les d\u00e9marches qu\u2019il ou elle entreprend ? <\/strong><\/p><p><em>Il n\u2019y a pas de r\u00e9ponse g\u00e9n\u00e9rale \u00e0 cette question. Bien s\u00fbr, cela d\u00e9pend toujours de la mani\u00e8re dont une entreprise s\u2019est organis\u00e9e, qu\u2019elle ait un responsable de la protection des donn\u00e9es interne ou externe. M\u00eame s\u2019il est logique que les petites entreprises aient un responsable de la protection des donn\u00e9es, cela n\u2019est pas toujours exig\u00e9 par la loi.  <\/em><\/p><p><em>Quoi qu\u2019il en soit, les entreprises \u2013 qu\u2019elles soient petites ou grandes \u2013 doivent savoir quoi faire en cas de cyberattaque ou de violation de donn\u00e9es tr\u00e8s susceptible d\u2019en r\u00e9sulter, et fournir un processus appropri\u00e9 pour y parvenir.<\/em><\/p><p><em>Du point de vue de la protection des donn\u00e9es, la chose la plus importante ici est d\u2019abord d\u2019acqu\u00e9rir des connaissances sur la cyberattaque \u2013 puis de ne pas perdre de temps. Bien s\u00fbr, des mesures correctives doivent \u00eatre prises imm\u00e9diatement. De plus, il faut d\u00e9terminer si la violation de donn\u00e9es est susceptible de pr\u00e9senter un risque, voire un risque \u00e9lev\u00e9, pour les personnes concern\u00e9es. Si n\u00e9cessaire, l\u2019autorit\u00e9 de surveillance doit \u00eatre inform\u00e9e et les personnes concern\u00e9es inform\u00e9es. Bien s\u00fbr, la violation de donn\u00e9es et les mesures prises doivent \u00e9galement \u00eatre document\u00e9es en cons\u00e9quence.    <\/em><\/p><p><strong> <\/strong><\/p><p><strong>En supposant que l\u2019autorit\u00e9 de surveillance doive \u00eatre inform\u00e9e, existe-t-il des exigences l\u00e9gales concernant la date \u00e0 laquelle cette notification doit \u00eatre faite ?<\/strong><\/p><p><em>Il y en a. Le RGPD exige que les violations de donn\u00e9es susceptibles de pr\u00e9senter un risque pour les personnes concern\u00e9es soient signal\u00e9es imm\u00e9diatement \u00e0 l\u2019autorit\u00e9 de surveillance et, si possible, dans les 72 heures suivant leur prise de connaissance. <\/em><\/p><p><strong> <\/strong><\/p><p><strong>Quelles sont les cons\u00e9quences possibles si cette obligation de signalement est ignor\u00e9e ?  <\/strong><\/p><p><em>Tout d\u2019abord, une violation de l\u2019obligation de d\u00e9claration peut entra\u00eener une amende allant jusqu\u2019\u00e0 10 millions d\u2019euros ou jusqu\u2019\u00e0 2 % du chiffre d\u2019affaires de l\u2019ann\u00e9e pr\u00e9c\u00e9dente. M\u00eame si les autorit\u00e9s de surveillance disposent d\u2019un cadre de sanction ici, c\u2019est-\u00e0-dire qu\u2019elles n\u2019ont pas n\u00e9cessairement \u00e0 imposer une amende de cette ampleur, le risque d\u2019une amende s\u00e9v\u00e8re doit de toute fa\u00e7on \u00eatre pris au s\u00e9rieux. <\/em><\/p><p><em>Mais des r\u00e9clamations en dommages-int\u00e9r\u00eats et, bien s\u00fbr, une perte d\u2019image consid\u00e9rable ne peuvent \u00eatre exclues si une tentative est faite pour \u00e9touffer une violation de donn\u00e9es.<\/em><\/p><p>Vous pouvez lire tout ce que vous devez savoir sur la s\u00e9curit\u00e9 <a href=\"http:\/\/52.57.197.213\/2022\/04\/19\/datensicherheit\/\">des donn\u00e9es ici<\/a>.<\/p><p>Vous pouvez lire comment se comporter correctement en cas d\u2019urgence cybern\u00e9tique dans notre guide \u00ab Que faire en cas d\u2019urgence cyber \u00bb.<\/p><p>Vous pouvez lire sur les infractions punies par des amendes et sur leur niveau \u00e9lev\u00e9 dans <a href=\"https:\/\/www.sueddeutsche.de\/politik\/datenschutz-hannover-datenschutz-knapp-480-000-euro-bussgelder-verhaengt-dpa.urn-newsml-dpa-com-20090101-200903-99-417777\">un article du S\u00fcddeutsche Zeitung<\/a>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d84bbc e-flex e-con-boxed e-con e-parent\" data-id=\"4d84bbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05a335d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"05a335d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Surtout \u00e0 l\u2019\u00e8re de la num\u00e9risation avanc\u00e9e et de r\u00e9seaux plus complexes, les entreprises qui traitent les donn\u00e9es personnelles devraient placer la protection des donn\u00e9es en t\u00eate de liste de priorit\u00e9s. Cependant, le travail conforme au RGPD pose encore d\u2019importants d\u00e9fis \u00e0 de nombreuses entreprises. Cependant, une infraction ou un non-respect du r\u00e8glement RGPD peut entra\u00eener de lourdes amendes.  <\/p>\n","protected":false},"author":3,"featured_media":27490,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[61],"tags":[],"class_list":["post-27491","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u00ab La protection des donn\u00e9es et la cybers\u00e9curit\u00e9 vont de pair avec la s\u00e9curit\u00e9 \u00bb - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/fr\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00ab La protection des donn\u00e9es et la cybers\u00e9curit\u00e9 vont de pair avec la s\u00e9curit\u00e9 \u00bb - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Surtout \u00e0 l\u2019\u00e8re de la num\u00e9risation avanc\u00e9e et de r\u00e9seaux plus complexes, les entreprises qui traitent les donn\u00e9es personnelles devraient placer la protection des donn\u00e9es en t\u00eate de liste de priorit\u00e9s. Cependant, le travail conforme au RGPD pose encore d\u2019importants d\u00e9fis \u00e0 de nombreuses entreprises. Cependant, une infraction ou un non-respect du r\u00e8glement RGPD peut entra\u00eener de lourdes amendes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/fr\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-03T14:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T14:43:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Data_joshua-sortino_Unsplash.jpg-600x401-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"401\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"\u00ab La protection des donn\u00e9es et la cybers\u00e9curit\u00e9 vont de pair avec la s\u00e9curit\u00e9 \u00bb\",\"datePublished\":\"2020-12-03T14:30:00+00:00\",\"dateModified\":\"2026-03-30T14:43:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\\\/\"},\"wordCount\":1059,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Data_joshua-sortino_Unsplash.jpg-600x401-1.png\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\\\/\",\"name\":\"\u00ab La protection des donn\u00e9es et la cybers\u00e9curit\u00e9 vont de pair avec la s\u00e9curit\u00e9 \u00bb - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Data_joshua-sortino_Unsplash.jpg-600x401-1.png\",\"datePublished\":\"2020-12-03T14:30:00+00:00\",\"dateModified\":\"2026-03-30T14:43:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/fr\\\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Data_joshua-sortino_Unsplash.jpg-600x401-1.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Data_joshua-sortino_Unsplash.jpg-600x401-1.png\",\"width\":600,\"height\":401},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/fr\\\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00ab La protection des donn\u00e9es et la cybers\u00e9curit\u00e9 vont de pair avec la s\u00e9curit\u00e9 \u00bb\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/fr\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00ab La protection des donn\u00e9es et la cybers\u00e9curit\u00e9 vont de pair avec la s\u00e9curit\u00e9 \u00bb - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/fr\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\/","og_locale":"fr_FR","og_type":"article","og_title":"\u00ab La protection des donn\u00e9es et la cybers\u00e9curit\u00e9 vont de pair avec la s\u00e9curit\u00e9 \u00bb - Perseus Technologies","og_description":"Surtout \u00e0 l\u2019\u00e8re de la num\u00e9risation avanc\u00e9e et de r\u00e9seaux plus complexes, les entreprises qui traitent les donn\u00e9es personnelles devraient placer la protection des donn\u00e9es en t\u00eate de liste de priorit\u00e9s. Cependant, le travail conforme au RGPD pose encore d\u2019importants d\u00e9fis \u00e0 de nombreuses entreprises. Cependant, une infraction ou un non-respect du r\u00e8glement RGPD peut entra\u00eener de lourdes amendes.","og_url":"https:\/\/perseus.de\/fr\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\/","og_site_name":"Perseus Technologies","article_published_time":"2020-12-03T14:30:00+00:00","article_modified_time":"2026-03-30T14:43:24+00:00","og_image":[{"width":600,"height":401,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Data_joshua-sortino_Unsplash.jpg-600x401-1.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Xenia Silbe","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/fr\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/fr\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"\u00ab La protection des donn\u00e9es et la cybers\u00e9curit\u00e9 vont de pair avec la s\u00e9curit\u00e9 \u00bb","datePublished":"2020-12-03T14:30:00+00:00","dateModified":"2026-03-30T14:43:24+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/fr\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\/"},"wordCount":1059,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/fr\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Data_joshua-sortino_Unsplash.jpg-600x401-1.png","articleSection":["Blog"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/fr\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/fr\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\/","url":"https:\/\/perseus.de\/fr\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\/","name":"\u00ab La protection des donn\u00e9es et la cybers\u00e9curit\u00e9 vont de pair avec la s\u00e9curit\u00e9 \u00bb - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/fr\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/fr\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Data_joshua-sortino_Unsplash.jpg-600x401-1.png","datePublished":"2020-12-03T14:30:00+00:00","dateModified":"2026-03-30T14:43:24+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/fr\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/fr\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/fr\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Data_joshua-sortino_Unsplash.jpg-600x401-1.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Data_joshua-sortino_Unsplash.jpg-600x401-1.png","width":600,"height":401},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/fr\/la-protection-des-donnees-et-la-cybersecurite-vont-de-pair-avec-la-securite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"\u00ab La protection des donn\u00e9es et la cybers\u00e9curit\u00e9 vont de pair avec la s\u00e9curit\u00e9 \u00bb"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/fr\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27491","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/comments?post=27491"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27491\/revisions"}],"predecessor-version":[{"id":27492,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/posts\/27491\/revisions\/27492"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media\/27490"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/media?parent=27491"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/categories?post=27491"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/fr\/wp-json\/wp\/v2\/tags?post=27491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}