{"id":45592,"date":"2022-10-06T12:59:00","date_gmt":"2022-10-06T19:59:00","guid":{"rendered":"https:drivesaversdatarecovery.com\/\/?p=45592"},"modified":"2026-04-27T03:46:15","modified_gmt":"2026-04-27T10:46:15","slug":"conformite-de-la-securite-des-donnees-un-aide-memoire-pour-linformatique","status":"publish","type":"post","link":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/blog\/data-security-compliance-a-cheat-sheet-for-it\/","title":{"rendered":"Conformit\u00e9 de la s\u00e9curit\u00e9 des donn\u00e9es : Un aide-m\u00e9moire pour les services informatiques"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div class=\"vc_section wpex-relative\"><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1665011962892 vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative wpex-vc_row-has-fill wpex-vc-reset-negative-margin\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_dashed vc_sep_border_width_3 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_white wpb_content_element  wpb_content_element\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_column-gap-10 vc_row-o-equal-height vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative no-bottom-margins tablet-fullwidth-columns\"><div class=\"wpb_column vc_column_container vc_col-sm-3 vc_hidden-md vc_hidden-sm vc_hidden-xs\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><figure class=\"vcex-image vcex-module\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block\"><img width=\"273\" height=\"273\" src=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2022\/09\/clean-room-guide.png\" class=\"vcex-image-img wpex-align-middle\" alt=\"DriveSavers Clean Room Guide\" decoding=\"async\" srcset=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2022\/09\/clean-room-guide.png 273w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2022\/09\/clean-room-guide-150x150.png 150w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2022\/09\/clean-room-guide-12x12.png 12w\" sizes=\"(max-width: 273px) 100vw, 273px\" \/><\/div><\/figure><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-9\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Que vous travailliez pour une organisation soumise \u00e0 des normes de conformit\u00e9 ou que vous soyez un informaticien ind\u00e9pendant cherchant \u00e0 d\u00e9velopper son activit\u00e9, les r\u00e9glementations sectorielles relatives \u00e0 la s\u00e9curit\u00e9 des donn\u00e9es, \u00e9galement appel\u00e9e s\u00e9curit\u00e9 de l'information, peuvent parfois constituer un v\u00e9ritable casse-t\u00eate.<\/p>\n<p>Poursuivez votre lecture pour d\u00e9couvrir un ensemble unique de lignes directrices \u00e0 suivre qui peuvent \u00eatre appliqu\u00e9es \u00e0 toutes les r\u00e9glementations sectorielles.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1664828670153 vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative wpex-vc_row-has-fill wpex-vc-reset-negative-margin\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_dashed vc_sep_border_width_3 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_white wpb_content_element  wpb_content_element\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1662569792245 vc_rtl-columns-reverse vc_row-o-content-middle vc_row-flex wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-animated-text.vcex_69f4fffb56f5b{text-align:start;color:#1c1c1c;font-size:3.5em;}@media (max-width:1024px){.vcex-animated-text.vcex_69f4fffb56f5b{font-size:2em;}}@media (max-width:959px){.vcex-animated-text.vcex_69f4fffb56f5b{font-size:2em;}}@media (max-width:767px){.vcex-animated-text.vcex_69f4fffb56f5b{font-size:2em;}}@media (max-width:479px){.vcex-animated-text.vcex_69f4fffb56f5b{font-size:2em;}}<\/style><h2 class=\"vcex-animated-text vcex-module wpex-m-0 wpex-text-xl wpex-text-1 wpex-font-semibold wpex-leading-none vcex-typed-text-wrap wpex-text-left vc_custom_1665078411154 vcex_69f4fffb56f5b\"><span class=\"vcex-animated-text__before vcex-typed-text-before vcex-before\">LA RAISON D'\u00caTRE DES R\u00c9GLEMENTATIONS EN MATI\u00c8RE DE S\u00c9CURIT\u00c9 DES DONN\u00c9ES<\/span> <span class=\"vcex-animated-text__inner vcex-typed-text-inner vcex-typed-text-css wpex-inline-block wpex-max-w-100\"><span class=\"screen-reader-text\"><\/span><span class=\"vcex-animated-text__placeholder vcex-ph wpex-inline-block wpex-invisible\"><\/span><span class=\"vcex-animated-text__content vcex-typed-text\" aria-hidden=\"true\" data-settings=\"{&quot;loop&quot;:false,&quot;showCursor&quot;:false,&quot;typeSpeed&quot;:40,&quot;backDelay&quot;:500,&quot;backSpeed&quot;:0,&quot;startDelay&quot;:2000}\" data-strings=\"[]\"><\/span><\/span><\/h2>\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Les exigences en mati\u00e8re de s\u00e9curit\u00e9 des donn\u00e9es impos\u00e9es par l'industrie ont une bonne raison d'\u00eatre. Les num\u00e9ros de s\u00e9curit\u00e9 sociale, les num\u00e9ros de carte de cr\u00e9dit, les dates de naissance, etc. sont tous extr\u00eamement pr\u00e9cieux sur le march\u00e9 noir. L\u00e0 o\u00f9 il y a des donn\u00e9es personnelles, il y a des pirates informatiques qui essaient de s'en emparer. Selon le\u00a0<a href=\"https:\/\/www.idtheftcenter.org\/notified\">Centre de ressources sur le vol d'identit\u00e9 (ITRC)<\/a>Le nombre de compromissions de donn\u00e9es en 2021 a augment\u00e9 de 23 % par rapport au record historique pr\u00e9c\u00e9dent.<\/p>\n<p>Des histoires d'horreur circulent sur le vol de donn\u00e9es par des soci\u00e9t\u00e9s de r\u00e9cup\u00e9ration de donn\u00e9es tierces ou, pire encore, sur le vol de donn\u00e9es par des soci\u00e9t\u00e9s de r\u00e9cup\u00e9ration de donn\u00e9es tierces,\u00a0<a href=\"https:\/\/drivesaversdatarecovery.com\/fr-fr\/press-coverage\/les-problemes-de-disque-dur-dun-homme-conduisent-a-une-extorsion-de-fonds\/\">vendu au plus offrant<\/a>. C'est pourquoi il est extr\u00eamement important de disposer d'une\u00a0<a href=\"\/fr-fr\/programmes-de-partenariat\/entreprise-2\/\">pr\u00e9-v\u00e9rifi\u00e9<\/a>\u00a0de r\u00e9cup\u00e9ration de donn\u00e9es \u00e0 Atlanta, GA.<\/p>\n<p>DriveSavers fait l'objet d'un\u00a0<a href=\"https:\/\/drivesaversdatarecovery.com\/fr-fr\/pourquoi-nous\/recuperation-de-donnees-securisee-et-certifiee\/audit-annuel-soc-2-type-ii\/\">Audit SOC 2 de type II\u00a0<\/a>de ses contr\u00f4les internes d'h\u00e9bergement et de traitement des donn\u00e9es afin de garantir que nos services de r\u00e9cup\u00e9ration des donn\u00e9es respectent les protocoles rigoureux de s\u00e9curit\u00e9 et de confidentialit\u00e9 des donn\u00e9es impos\u00e9s par les entreprises clientes et les agences gouvernementales que nous servons. Les\u00a0<a href=\"\/fr-fr\/pourquoi-nous\/recuperation-de-donnees-securisee-et-certifiee\/audit-annuel-soc-2-type-ii\/\">SOC 2 Type II<\/a>\u00a0 couvre tous les protocoles.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1664828596217 vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative wpex-vc_row-has-fill wpex-vc-reset-negative-margin\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_dashed vc_sep_border_width_3 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_white wpb_content_element  wpb_content_element\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1665009131074 vc_rtl-columns-reverse vc_row-o-content-middle vc_row-flex wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-animated-text.vcex_69f4fffb57f59{text-align:start;color:#1c1c1c;font-size:3.5em;}@media (max-width:1024px){.vcex-animated-text.vcex_69f4fffb57f59{font-size:2em;}}@media (max-width:959px){.vcex-animated-text.vcex_69f4fffb57f59{font-size:2em;}}@media (max-width:767px){.vcex-animated-text.vcex_69f4fffb57f59{font-size:2em;}}@media (max-width:479px){.vcex-animated-text.vcex_69f4fffb57f59{font-size:2em;}}<\/style><h2 class=\"vcex-animated-text vcex-module wpex-m-0 wpex-text-xl wpex-text-1 wpex-font-semibold wpex-leading-none vcex-typed-text-wrap wpex-text-left vc_custom_1665006294726 vcex_69f4fffb57f59\"><span class=\"vcex-animated-text__before vcex-typed-text-before vcex-before\">Termes de l'industrie que les services informatiques doivent conna\u00eetre<\/span> <span class=\"vcex-animated-text__inner vcex-typed-text-inner vcex-typed-text-css wpex-inline-block wpex-max-w-100\"><span class=\"screen-reader-text\"><\/span><span class=\"vcex-animated-text__placeholder vcex-ph wpex-inline-block wpex-invisible\"><\/span><span class=\"vcex-animated-text__content vcex-typed-text\" aria-hidden=\"true\" data-settings=\"{&quot;loop&quot;:false,&quot;showCursor&quot;:false,&quot;typeSpeed&quot;:40,&quot;backDelay&quot;:500,&quot;backSpeed&quot;:0,&quot;startDelay&quot;:2000}\" data-strings=\"[]\"><\/span><\/span><\/h2><div class=\"vc_row wpb_row vc_inner vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-3\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><figure class=\"vcex-image vcex-module\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block overlay-parent overlay-parent-magnifying-hover overlay-h wpex-overflow-hidden overlay-ms\"><a href=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Certified_Compliant-8.5x11_2210.04.png\" class=\"wpex-lightbox\"><img width=\"2550\" height=\"3300\" src=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Certified_Compliant-8.5x11_2210.04.png\" class=\"vcex-image-img wpex-align-middle\" alt=\"\" decoding=\"async\" srcset=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Certified_Compliant-8.5x11_2210.04.png 2550w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Certified_Compliant-8.5x11_2210.04-232x300.png 232w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Certified_Compliant-8.5x11_2210.04-791x1024.png 791w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Certified_Compliant-8.5x11_2210.04-768x994.png 768w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Certified_Compliant-8.5x11_2210.04-1187x1536.png 1187w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Certified_Compliant-8.5x11_2210.04-1583x2048.png 1583w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Certified_Compliant-8.5x11_2210.04-232x300@2x.png 464w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Certified_Compliant-8.5x11_2210.04-600x776.png 600w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Certified_Compliant-8.5x11_2210.04-600x776@2x.png 1200w\" sizes=\"(max-width: 2550px) 100vw, 2550px\" \/>\n<div class=\"magnifying-hover theme-overlay overlay-hide wpex-absolute wpex-inset-0 wpex-transition-all wpex-duration-300 wpex-text-white wpex-text-2xl wpex-flex wpex-items-center wpex-justify-center\" aria-hidden=\"true\">\n\t<span class=\"overlay-bg wpex-bg-black wpex-block wpex-absolute wpex-inset-0 wpex-opacity-60\"><\/span>\n\t<span class=\"wpex-relative wpex-icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M416 208c0 45.9-14.9 88.3-40 122.7L502.6 457.4c12.5 12.5 12.5 32.8 0 45.3s-32.8 12.5-45.3 0L330.7 376c-34.4 25.2-76.8 40-122.7 40C93.1 416 0 322.9 0 208S93.1 0 208 0S416 93.1 416 208zM208 352a144 144 0 1 0 0-288 144 144 0 1 0 0 288z\"\/><\/svg><\/span><\/div>\n<\/a><\/div><figcaption class=\"vcex-image-caption wpex-mt-10\">Click image to enlarge<\/figcaption><\/figure><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-9\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69f4fffb595fa{font-size:2em;font-family:Oswald;font-weight:600;line-height:1.2;}@media (max-width:959px){.vcex-heading.vcex_69f4fffb595fa{font-size:1.5em;}}@media (max-width:767px){.vcex-heading.vcex_69f4fffb595fa{font-size:1.5em;}}@media (max-width:479px){.vcex-heading.vcex_69f4fffb595fa{font-size:1.5em;}}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h3 vc_custom_1665090513179 vcex_69f4fffb595fa\"><span class=\"vcex-heading-inner wpex-inline-block\">Vocabulaire et normes de conformit\u00e9<\/span><\/h3>\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element vc_custom_1665009074676\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Chacun de ces secteurs suit un ensemble diff\u00e9rent de r\u00e8gles et utilise un vocabulaire diff\u00e9rent. Vous devez vous familiariser avec les termes utilis\u00e9s dans les secteurs avec lesquels vous envisagez de travailler.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<style>.vcex-heading.vcex_69f4fffb59f5e{font-size:2em;font-family:Oswald;font-weight:600;line-height:1.2;}@media (max-width:959px){.vcex-heading.vcex_69f4fffb59f5e{font-size:1.5em;}}@media (max-width:767px){.vcex-heading.vcex_69f4fffb59f5e{font-size:1.5em;}}@media (max-width:479px){.vcex-heading.vcex_69f4fffb59f5e{font-size:1.5em;}}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h3 vc_custom_1665006445365 vcex_69f4fffb59f5e\"><span class=\"vcex-heading-inner wpex-inline-block\">Soci\u00e9t\u00e9s et autres entreprises<\/span><\/h3>\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Toute entreprise soucieuse de la cybers\u00e9curit\u00e9 qui ne rel\u00e8ve pas de l'un des mandats de conformit\u00e9 susmentionn\u00e9s aura \u00e9labor\u00e9 son propre ensemble de lignes directrices en mati\u00e8re de s\u00e9curit\u00e9 des donn\u00e9es. En fait, ces entreprises individuelles \u00e9laborent souvent des politiques qui sont encore plus rigoureuses que les mandats f\u00e9d\u00e9raux !<\/p>\n<p>\u00c9tant donn\u00e9 que ces entreprises ont \u00e9labor\u00e9 leur propre ensemble de r\u00e8gles et ne suivent aucun mandat de l'industrie, elles ont souvent leur propre vocabulaire. Il est important d'apprendre les termes utilis\u00e9s par les entreprises auxquelles vous fournissez des services informatiques et de vous familiariser avec leurs exigences en mati\u00e8re de s\u00e9curit\u00e9 de l'information et de cybers\u00e9curit\u00e9.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_column-gap-25 wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69f4fffb5ac54{font-size:2em;font-family:Oswald;font-weight:600;line-height:1.2;}@media (max-width:959px){.vcex-heading.vcex_69f4fffb5ac54{font-size:1.5em;}}@media (max-width:767px){.vcex-heading.vcex_69f4fffb5ac54{font-size:1.5em;}}@media (max-width:479px){.vcex-heading.vcex_69f4fffb5ac54{font-size:1.5em;}}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h3 vc_custom_1665090448500 vcex_69f4fffb5ac54\"><span class=\"vcex-heading-inner wpex-inline-block\">Banque et finance<\/span><\/h3>\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>As described in\u00a0section 4(k) of the Bank Holding Company Act, any business that is \u201csignificantly engaged\u201d in \u201cfinancial activities\u201d must comply with GLBA. If a business falls into this category and is also publicly traded, that organization will also need to comply with SOX.<\/p>\n<ul>\n<li aria-level=\"1\">Pr\u00eateurs hypoth\u00e9caires non bancaires<\/li>\n<li aria-level=\"1\">\u00c9valuateurs de biens immobiliers<\/li>\n<li aria-level=\"1\">Courtiers en pr\u00eats<\/li>\n<li aria-level=\"1\">Certains conseillers financiers ou d'investissement<\/li>\n<li aria-level=\"1\">Agents de recouvrement<\/li>\n<li aria-level=\"1\">Pr\u00e9parateurs de d\u00e9clarations fiscales<\/li>\n<li aria-level=\"1\">Banques<\/li>\n<li aria-level=\"1\">Prestataires de services de r\u00e8glement immobilier<\/li>\n<li aria-level=\"1\">Toute autre entreprise qui est \"engag\u00e9e de mani\u00e8re significative\" dans des \"activit\u00e9s financi\u00e8res\".<\/li>\n<\/ul>\n<p><strong>Termes \u00e0 conna\u00eetre :<\/strong><\/p>\n<ul>\n<li aria-level=\"1\">GLBA : Loi Gramm-Leach-Bliley<\/li>\n<li aria-level=\"1\">SOX : loi Sarbanes-Oxley de 2002<\/li>\n<li aria-level=\"1\">NPI : Informations personnelles non publiques<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6 vc_hidden-md vc_hidden-sm vc_hidden-xs\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69f4fffb5b6b6{font-size:2em;font-family:Oswald;font-weight:600;line-height:1.2;}@media (max-width:959px){.vcex-heading.vcex_69f4fffb5b6b6{font-size:1.5em;}}@media (max-width:767px){.vcex-heading.vcex_69f4fffb5b6b6{font-size:1.5em;}}@media (max-width:479px){.vcex-heading.vcex_69f4fffb5b6b6{font-size:1.5em;}}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h3 vc_custom_1665090452993 vcex_69f4fffb5b6b6\"><span class=\"vcex-heading-inner wpex-inline-block\">Soins de sant\u00e9<\/span><\/h3>\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Toute organisation travaillant dans le domaine de la sant\u00e9 doit se conformer \u00e0 la r\u00e9glementation HIPAA.<\/p>\n<ul>\n<li aria-level=\"1\">R\u00e9gimes de sant\u00e9<\/li>\n<li aria-level=\"1\">Centres d'\u00e9change d'informations sur les soins de sant\u00e9<\/li>\n<li aria-level=\"1\">Prestataires de soins de sant\u00e9<\/li>\n<li aria-level=\"1\">les partenaires commerciaux des personnes susmentionn\u00e9es (y compris VOUS !)<\/li>\n<\/ul>\n<p><strong>Termes \u00e0 conna\u00eetre :<\/strong><\/p>\n<ul>\n<li aria-level=\"1\">HIPAA : Health Insurance Portability and Accountability Act (loi sur la portabilit\u00e9 et la responsabilit\u00e9 de l'assurance maladie) de 1996<\/li>\n<li aria-level=\"1\">ePHI : Informations \u00e9lectroniques prot\u00e9g\u00e9es sur la sant\u00e9<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_column-gap-25 wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-6 vc_hidden-md vc_hidden-sm vc_hidden-xs\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69f4fffb5c367{font-size:2em;font-family:Oswald;font-weight:600;line-height:1.2;}@media (max-width:959px){.vcex-heading.vcex_69f4fffb5c367{font-size:1.5em;}}@media (max-width:767px){.vcex-heading.vcex_69f4fffb5c367{font-size:1.5em;}}@media (max-width:479px){.vcex-heading.vcex_69f4fffb5c367{font-size:1.5em;}}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h3 vc_custom_1665090459083 vcex_69f4fffb5c367\"><span class=\"vcex-heading-inner wpex-inline-block\">L'\u00e9ducation<\/span><\/h3>\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Tout \u00e9tablissement d'enseignement qui re\u00e7oit un financement f\u00e9d\u00e9ral, quel qu'il soit, doit respecter la FERPA.<\/p>\n<ul>\n<li aria-level=\"1\">\u00c9coles primaires et secondaires publiques<\/li>\n<li aria-level=\"1\">Les \u00e9coles primaires et secondaires priv\u00e9es ou \u00e0 charte qui b\u00e9n\u00e9ficient d'un financement f\u00e9d\u00e9ral.<\/li>\n<li aria-level=\"1\">Coll\u00e8ges et universit\u00e9s d'\u00c9tat<\/li>\n<li aria-level=\"1\">Les \u00e9tablissements d'enseignement sup\u00e9rieur priv\u00e9s qui b\u00e9n\u00e9ficient d'un financement f\u00e9d\u00e9ral<\/li>\n<li aria-level=\"1\">Toute autre organisation \u00e9ducative recevant un financement f\u00e9d\u00e9ral<\/li>\n<\/ul>\n<p><strong>Termes \u00e0 conna\u00eetre :<\/strong><\/p>\n<ul>\n<li aria-level=\"1\">FERPA : Loi sur les droits et la protection de la vie priv\u00e9e dans le domaine de l'\u00e9ducation<\/li>\n<li aria-level=\"1\">IPI : Informations personnelles identifiables<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69f4fffb5cdc0{font-size:2em;font-family:Oswald;font-weight:600;line-height:1.2;}@media (max-width:959px){.vcex-heading.vcex_69f4fffb5cdc0{font-size:1.5em;}}@media (max-width:767px){.vcex-heading.vcex_69f4fffb5cdc0{font-size:1.5em;}}@media (max-width:479px){.vcex-heading.vcex_69f4fffb5cdc0{font-size:1.5em;}}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h3 vc_custom_1665090464132 vcex_69f4fffb5cdc0\"><span class=\"vcex-heading-inner wpex-inline-block\">Gouvernement et arm\u00e9e des \u00c9tats-Unis<\/span><\/h3>\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Toutes les agences du gouvernement am\u00e9ricain et leurs partenaires commerciaux doivent se conformer \u00e0 la FISMA, qui suit les recommandations du NIST. Fondamentalement, ces organisations doivent adh\u00e9rer aux recommandations du NIST en tant que r\u00e8gles.<\/p>\n<ul>\n<li aria-level=\"1\">Agences du gouvernement f\u00e9d\u00e9ral<\/li>\n<li aria-level=\"1\">Les entreprises fournissant des services au nom ou \u00e0 l'intention d'une agence du gouvernement f\u00e9d\u00e9ral (y compris VOUS !)<\/li>\n<\/ul>\n<p><strong>Termes \u00e0 conna\u00eetre :<\/strong><\/p>\n<ul>\n<li aria-level=\"1\">FISMA : Federal Information Security Management Act (loi f\u00e9d\u00e9rale sur la gestion de la s\u00e9curit\u00e9 de l'information)<\/li>\n<li aria-level=\"1\">NIST : Institut national des normes et de la technologie<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1661794759383 vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative wpex-vc_row-has-fill wpex-vc-reset-negative-margin\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_dashed vc_sep_border_width_3 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_white wpb_content_element  wpb_content_element\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-animated-text.vcex_69f4fffb5dd36{text-align:start;color:#1c1c1c;font-size:3.5em;}@media (max-width:1024px){.vcex-animated-text.vcex_69f4fffb5dd36{font-size:2em;}}@media (max-width:959px){.vcex-animated-text.vcex_69f4fffb5dd36{font-size:2em;}}@media (max-width:767px){.vcex-animated-text.vcex_69f4fffb5dd36{font-size:2em;}}@media (max-width:479px){.vcex-animated-text.vcex_69f4fffb5dd36{font-size:2em;}}<\/style><h2 class=\"vcex-animated-text vcex-module wpex-m-0 wpex-text-xl wpex-text-1 wpex-font-semibold wpex-leading-none vcex-typed-text-wrap wpex-text-left vc_custom_1664829708426 vcex_69f4fffb5dd36\"><span class=\"vcex-animated-text__before vcex-typed-text-before vcex-before\">Cinq \u00e9tapes vers la conformit\u00e9<\/span> <span class=\"vcex-animated-text__inner vcex-typed-text-inner vcex-typed-text-css wpex-inline-block wpex-max-w-100\"><span class=\"screen-reader-text\"><\/span><span class=\"vcex-animated-text__placeholder vcex-ph wpex-inline-block wpex-invisible\"><\/span><span class=\"vcex-animated-text__content vcex-typed-text\" aria-hidden=\"true\" data-settings=\"{&quot;loop&quot;:false,&quot;showCursor&quot;:false,&quot;typeSpeed&quot;:40,&quot;backDelay&quot;:500,&quot;backSpeed&quot;:0,&quot;startDelay&quot;:2000}\" data-strings=\"[]\"><\/span><\/span><\/h2><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-3\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><figure class=\"vcex-image vcex-module\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block overlay-parent overlay-parent-magnifying-hover overlay-h wpex-overflow-hidden overlay-ms\"><a href=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Data_Security_Compliance_v2.png\" class=\"wpex-lightbox\"><img width=\"1200\" height=\"1623\" src=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Data_Security_Compliance_v2.png\" class=\"vcex-image-img wpex-align-middle\" alt=\"\" decoding=\"async\" srcset=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Data_Security_Compliance_v2.png 1200w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Data_Security_Compliance_v2-222x300.png 222w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Data_Security_Compliance_v2-757x1024.png 757w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Data_Security_Compliance_v2-768x1039.png 768w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Data_Security_Compliance_v2-1136x1536.png 1136w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/>\n<div class=\"magnifying-hover theme-overlay overlay-hide wpex-absolute wpex-inset-0 wpex-transition-all wpex-duration-300 wpex-text-white wpex-text-2xl wpex-flex wpex-items-center wpex-justify-center\" aria-hidden=\"true\">\n\t<span class=\"overlay-bg wpex-bg-black wpex-block wpex-absolute wpex-inset-0 wpex-opacity-60\"><\/span>\n\t<span class=\"wpex-relative wpex-icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M416 208c0 45.9-14.9 88.3-40 122.7L502.6 457.4c12.5 12.5 12.5 32.8 0 45.3s-32.8 12.5-45.3 0L330.7 376c-34.4 25.2-76.8 40-122.7 40C93.1 416 0 322.9 0 208S93.1 0 208 0S416 93.1 416 208zM208 352a144 144 0 1 0 0-288 144 144 0 1 0 0 288z\"\/><\/svg><\/span><\/div>\n<\/a><\/div><figcaption class=\"vcex-image-caption wpex-mt-10\">Click image to enlarge<\/figcaption><\/figure><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-9\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69f4fffb5f3a1{font-size:2em;font-family:Oswald;font-weight:600;line-height:1.2;}@media (max-width:959px){.vcex-heading.vcex_69f4fffb5f3a1{font-size:1.5em;}}@media (max-width:767px){.vcex-heading.vcex_69f4fffb5f3a1{font-size:1.5em;}}@media (max-width:479px){.vcex-heading.vcex_69f4fffb5f3a1{font-size:1.5em;}}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h3 vc_custom_1665009397492 vcex_69f4fffb5f3a1\"><span class=\"vcex-heading-inner wpex-inline-block\">Une voie unique pour toutes les industries<\/span><\/h3><div class=\"vc_row wpb_row vc_inner vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><span style=\"font-weight: 400;\">Bien que les diff\u00e9rents secteurs soient tenus de suivre des lignes directrices diff\u00e9rentes, les \u00e9l\u00e9ments de s\u00e9curit\u00e9 de l'information dont les services informatiques doivent vraiment se pr\u00e9occuper se recoupent assez bien.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">M\u00eame si certaines informations personnelles ne sont pas soumises \u00e0 des normes de conformit\u00e9, du point de vue informatique, on peut supposer que toutes les informations personnelles des clients, des employ\u00e9s ou autres doivent \u00eatre prot\u00e9g\u00e9es contre une violation, une exposition accidentelle ou d'autres transgressions li\u00e9es \u00e0 la cybers\u00e9curit\u00e9.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Afin d'obtenir et de maintenir la conformit\u00e9 \u00e0 tout protocole de s\u00e9curit\u00e9 de l'information impos\u00e9 par l'industrie ou le gouvernement, vous devez disposer de politiques et de proc\u00e9dures de s\u00e9curit\u00e9 des donn\u00e9es document\u00e9es et valid\u00e9es qui sont utilis\u00e9es par votre entreprise. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Les cinq \u00e9tapes que vous devez suivre en tant qu'informaticien en ce qui concerne les politiques et les proc\u00e9dures de cybers\u00e9curit\u00e9 sont assez classiques.\u00a0<\/span><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_column-gap-25 wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12 vc_hidden-md vc_hidden-sm vc_hidden-xs\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69f4fffb60456{font-size:2em;font-family:Oswald;font-weight:600;line-height:1.2;}@media (max-width:959px){.vcex-heading.vcex_69f4fffb60456{font-size:1.5em;}}@media (max-width:767px){.vcex-heading.vcex_69f4fffb60456{font-size:1.5em;}}@media (max-width:479px){.vcex-heading.vcex_69f4fffb60456{font-size:1.5em;}}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h3 vc_custom_1665090019637 vcex_69f4fffb60456\"><span class=\"vcex-heading-inner wpex-inline-block\">1. Analyse des risques<\/span><\/h3>\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>L'analyse des risques, parfois \u00e9galement appel\u00e9e\u00a0<i>analyse des lacunes\u00a0<\/i>ou\u00a0<i>l'\u00e9valuation des risques de s\u00e9curit\u00e9<\/i>L'\u00e9valuation des risques de s\u00e9curit\u00e9 est la premi\u00e8re \u00e9tape de l'\u00e9laboration d'une politique de s\u00e9curit\u00e9 des donn\u00e9es. Les \u00e9valuations des risques de s\u00e9curit\u00e9 doivent \u00eatre effectu\u00e9es chaque ann\u00e9e, deux fois par an ou \u00e0 chaque fois qu'un changement survient, comme l'achat de nouveaux \u00e9quipements ou l'expansion des services de l'entreprise.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_row wpb_row vc_inner vc_row-fluid vc_custom_1664841595083 wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>L'objectif de l'analyse des risques est de comprendre le syst\u00e8me existant et d'identifier les lacunes de la politique et les risques potentiels pour la s\u00e9curit\u00e9. Comme l'explique le\u00a0<a href=\"https:\/\/www.sans.org\/white-papers\/76\/\">Institut SANS<\/a>Le processus doit permettre de r\u00e9pondre aux questions suivantes :<\/p>\n<ul>\n<li aria-level=\"1\">Que faut-il prot\u00e9ger ?<\/li>\n<li aria-level=\"1\">Quelles sont les menaces et les vuln\u00e9rabilit\u00e9s ?<\/li>\n<li aria-level=\"1\">Quelles sont les cons\u00e9quences d'une d\u00e9t\u00e9rioration ou d'une perte de ces documents ?<\/li>\n<li aria-level=\"1\">Quelle est la valeur pour l'organisation ?<\/li>\n<li aria-level=\"1\">Que peut-on faire pour minimiser l'exposition \u00e0 la perte ou au dommage ?<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Zones \u00e0 examiner pour assurer une s\u00e9curit\u00e9 ad\u00e9quate :<\/p>\n<ul>\n<li aria-level=\"1\">Configuration des postes de travail et des serveurs<\/li>\n<li aria-level=\"1\">S\u00e9curit\u00e9 physique<\/li>\n<li aria-level=\"1\">Administration de l'infrastructure de r\u00e9seau<\/li>\n<li aria-level=\"1\">Contr\u00f4les d'acc\u00e8s au syst\u00e8me<\/li>\n<li aria-level=\"1\">Classification et gestion des donn\u00e9es<\/li>\n<li aria-level=\"1\">D\u00e9veloppement et maintenance des applications<\/li>\n<li aria-level=\"1\">Menaces existantes et potentielles<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>M\u00e9thodes de s\u00e9curit\u00e9 \u00e0 revoir :<\/p>\n<ul>\n<li aria-level=\"1\">Acc\u00e8s et authentification : l'acc\u00e8s doit \u00eatre physiquement inaccessible \u00e0 toute personne non autoris\u00e9e.<\/li>\n<li aria-level=\"1\">Gestion des comptes utilisateurs<\/li>\n<li aria-level=\"1\">S\u00e9curit\u00e9 des r\u00e9seaux<\/li>\n<li aria-level=\"1\">Contr\u00f4le<\/li>\n<li aria-level=\"1\">S\u00e9paration des t\u00e2ches<\/li>\n<li aria-level=\"1\">S\u00e9curit\u00e9 physique<\/li>\n<li aria-level=\"1\">V\u00e9rification des ant\u00e9c\u00e9dents des employ\u00e9s<\/li>\n<li aria-level=\"1\">Accords de confidentialit\u00e9<\/li>\n<li aria-level=\"1\">Formation \u00e0 la s\u00e9curit\u00e9<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div>\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.sans.org\/white-papers\/76\/\">Ce document de l'Institut SANS<\/a> donne d'excellentes instructions pour r\u00e9aliser une analyse de risque approfondie pour votre entreprise.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_column-gap-25 wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12 vc_hidden-md vc_hidden-sm vc_hidden-xs\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69f4fffb61faa{font-size:2em;font-family:Oswald;font-weight:600;line-height:1.2;}@media (max-width:959px){.vcex-heading.vcex_69f4fffb61faa{font-size:1.5em;}}@media (max-width:767px){.vcex-heading.vcex_69f4fffb61faa{font-size:1.5em;}}@media (max-width:479px){.vcex-heading.vcex_69f4fffb61faa{font-size:1.5em;}}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h3 vc_custom_1665089999436 vcex_69f4fffb61faa\"><span class=\"vcex-heading-inner wpex-inline-block\">2. \u00c9laboration de politiques et de proc\u00e9dures<\/span><\/h3>\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Sur la base des r\u00e9sultats de l'analyse des risques, les politiques et proc\u00e9dures de s\u00e9curit\u00e9 de l'information pour la protection des donn\u00e9es doivent \u00eatre mises \u00e0 jour ou, s'il n'en existe pas, r\u00e9dig\u00e9es \u00e0 partir de z\u00e9ro.<\/p>\n<p>Identifier, d\u00e9velopper et documenter :<\/p>\n<ul>\n<li aria-level=\"1\">Un plan complet d\u00e9crivant les politiques de s\u00e9curit\u00e9 des donn\u00e9es et de cybers\u00e9curit\u00e9<\/li>\n<li aria-level=\"1\">Responsabilit\u00e9s individuelles du personnel en mati\u00e8re de s\u00e9curit\u00e9 des donn\u00e9es<\/li>\n<li aria-level=\"1\">les outils \u00e0 utiliser pour minimiser les risques li\u00e9s \u00e0 la s\u00e9curit\u00e9 des donn\u00e9es, tels que les cam\u00e9ras de s\u00e9curit\u00e9, les pare-feu ou les logiciels de s\u00e9curit\u00e9<\/li>\n<li aria-level=\"1\">Lignes directrices en mati\u00e8re de cybers\u00e9curit\u00e9 concernant l'utilisation de l'internet, de l'intranet et de l'extranet<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_column-gap-25 wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-6 vc_hidden-md vc_hidden-sm vc_hidden-xs\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69f4fffb62c45{font-size:2em;font-family:Oswald;font-weight:600;line-height:1.2;}@media (max-width:959px){.vcex-heading.vcex_69f4fffb62c45{font-size:1.5em;}}@media (max-width:767px){.vcex-heading.vcex_69f4fffb62c45{font-size:1.5em;}}@media (max-width:479px){.vcex-heading.vcex_69f4fffb62c45{font-size:1.5em;}}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h3 vc_custom_1665090025298 vcex_69f4fffb62c45\"><span class=\"vcex-heading-inner wpex-inline-block\">3. Mise en \u0153uvre<\/span><\/h3>\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Une fois que les politiques et proc\u00e9dures de s\u00e9curit\u00e9 de l'information de votre entreprise ont \u00e9t\u00e9 identifi\u00e9es, planifi\u00e9es et document\u00e9es, elles doivent \u00eatre mises en \u0153uvre et suivies.<\/p>\n<ul>\n<li aria-level=\"1\">Acheter des logiciels de s\u00e9curit\u00e9 et d'autres outils jug\u00e9s n\u00e9cessaires.<\/li>\n<li aria-level=\"1\">Mettre \u00e0 jour les logiciels et les syst\u00e8mes d'exploitation existants qui sont obsol\u00e8tes<\/li>\n<li aria-level=\"1\">Organiser des programmes obligatoires de formation et de sensibilisation \u00e0 la s\u00e9curit\u00e9 pour tous les employ\u00e9s et exiger des signatures sur les documents \u00e0 lire obligatoirement.<\/li>\n<li aria-level=\"1\">V\u00e9rifier les ant\u00e9c\u00e9dents de tous les employ\u00e9s<\/li>\n<li aria-level=\"1\">V\u00e9rifier les fournisseurs tiers pour s'assurer qu'ils maintiennent et documentent des protocoles de s\u00e9curit\u00e9 de l'information identiques ou plus robustes que ceux en place dans votre entreprise.<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69f4fffb636b9{font-size:2em;font-family:Oswald;font-weight:600;line-height:1.2;}@media (max-width:959px){.vcex-heading.vcex_69f4fffb636b9{font-size:1.5em;}}@media (max-width:767px){.vcex-heading.vcex_69f4fffb636b9{font-size:1.5em;}}@media (max-width:479px){.vcex-heading.vcex_69f4fffb636b9{font-size:1.5em;}}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h3 vc_custom_1665090029908 vcex_69f4fffb636b9\"><span class=\"vcex-heading-inner wpex-inline-block\">4. La validation<\/span><\/h3>\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Afin de prouver que votre entreprise est en conformit\u00e9 avec les r\u00e9glementations du secteur, vous devez demander \u00e0 une soci\u00e9t\u00e9 tierce de s\u00e9curit\u00e9 des donn\u00e9es de valider les protocoles et proc\u00e9dures de s\u00e9curit\u00e9 de votre entreprise, ainsi que la mise en \u0153uvre de ces politiques et proc\u00e9dures. Ce contr\u00f4le doit \u00eatre effectu\u00e9 chaque ann\u00e9e ou tous les deux ans.<\/p>\n<p>Ce processus peut \u00eatre co\u00fbteux, chronophage et intrusif ; cependant, ce type de v\u00e9rification aidera votre entreprise \u00e0 maintenir la s\u00e9curit\u00e9 des donn\u00e9es et ajoutera de la valeur \u00e0 vos services \u00e0 l'intention de vos clients.<\/p>\n<p>Un\u00a0<a href=\"\/fr-fr\/pourquoi-nous\/recuperation-de-donnees-securisee-et-certifiee\/audit-annuel-soc-2-type-ii\/\">SOC 2 Type II<\/a> peut couvrir un large \u00e9ventail d'exigences en mati\u00e8re de s\u00e9curit\u00e9 des donn\u00e9es r\u00e9glement\u00e9es par l'industrie, y compris toutes celles qui sont abord\u00e9es dans cet article : HIPAA, GLBA, SOX, FERPA, FISMA et NIST.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_column-gap-25 wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12 vc_hidden-md vc_hidden-sm vc_hidden-xs\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69f4fffb642bf{font-size:2em;font-family:Oswald;font-weight:600;line-height:1.2;}@media (max-width:959px){.vcex-heading.vcex_69f4fffb642bf{font-size:1.5em;}}@media (max-width:767px){.vcex-heading.vcex_69f4fffb642bf{font-size:1.5em;}}@media (max-width:479px){.vcex-heading.vcex_69f4fffb642bf{font-size:1.5em;}}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h3 vc_custom_1665090077473 vcex_69f4fffb642bf\"><span class=\"vcex-heading-inner wpex-inline-block\">5. Application de la loi<\/span><\/h3>\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Les politiques et proc\u00e9dures de s\u00e9curit\u00e9 de l'information peuvent \u00eatre appliqu\u00e9es par le biais de l'\u00e9ducation et de sanctions.<\/p>\n<p>Vous avez peut-\u00eatre remarqu\u00e9 que l'\u00e9ducation rel\u00e8ve \u00e0 la fois\u00a0<i>mise en \u0153uvre<\/i>\u00a0et\u00a0<i>l'application<\/i>. Il s'agit de la partie la plus importante de la s\u00e9curit\u00e9 de l'information de votre entreprise et elle doit \u00eatre propos\u00e9e en permanence. Des programmes obligatoires de formation et de sensibilisation \u00e0 la s\u00e9curit\u00e9 des donn\u00e9es doivent \u00eatre programm\u00e9s pour les employ\u00e9s afin de garantir la protection des donn\u00e9es sensibles et confidentielles. Veillez \u00e0 ce que toute personne susceptible de toucher des donn\u00e9es prot\u00e9g\u00e9es re\u00e7oive une formation sur les politiques et les risques actuels, et \u00e0 ce qu'elle soit tenue au courant des mises \u00e0 jour des politiques ou de l'identification de nouveaux risques.<\/p>\n<p>Par exemple, assurez-vous que tous les employ\u00e9s concern\u00e9s sont conscients des menaces de cybers\u00e9curit\u00e9 telles que les escroqueries par hame\u00e7onnage, de la mani\u00e8re de les identifier, de ce qu'il faut faire si quelqu'un pense \u00eatre cibl\u00e9 et de ce qu'il faut faire s'il a \u00e9t\u00e9 victime d'une telle escroquerie, exposant \u00e9ventuellement des donn\u00e9es prot\u00e9g\u00e9es. Au fur et \u00e0 mesure de l'apparition de nouveaux types d'escroqueries, envoyez des courriels \u00e0 l'ensemble de l'entreprise pour expliquer en d\u00e9tail les m\u00e9thodes d'identification et de protection.<\/p>\n<p>La deuxi\u00e8me partie de l'application consiste \u00e0 \u00e9liminer la tentation d'ignorer les protocoles de s\u00e9curit\u00e9 des donn\u00e9es et \u00e0 encourager le respect des r\u00e8gles. Cela peut se faire en imposant des sanctions, financi\u00e8res ou autres, \u00e0 ceux qui ne respectent pas les proc\u00e9dures importantes.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1665012861811 vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative wpex-vc_row-has-fill wpex-vc-reset-negative-margin\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_dashed vc_sep_border_width_3 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_white wpb_content_element  wpb_content_element\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1665014565986 vc_column-gap-20 wpex-relative wpex-vc_row-has-fill no-bottom-margins wpex-vc-reset-negative-margin\"><div class=\"wpb_column vc_column_container vc_col-sm-2\/5\"><div class=\"vc_column-inner vc_custom_1665014537840\"><div class=\"wpb_wrapper\"><style>.vcex-button.vcex_69f4fffb6570b{color:#ffffff!important;}<\/style><div class=\"theme-button-wrap theme-button-expanded-wrap wpex-clr\"><a href=\"https:\/\/drivesaversdatarecovery.com\/fr-fr\/programmes-de-partenariat\/entreprise-2\/\" class=\"vcex-button theme-button large align-left expanded sh-campaign-1304 hvr hvr-buzz-out expanded vcex_69f4fffb6570b\"><span class=\"vcex-button-inner theme-button-inner wpex-flex wpex-flex-wrap wpex-items-center wpex-justify-center\"><span class=\"vcex-button-icon vcex-icon-wrap theme-button-icon-left\"><span class=\"wpex-icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M160 64c0-8.8 7.2-16 16-16s16 7.2 16 16V200c0 10.3 6.6 19.5 16.4 22.8s20.6-.1 26.8-8.3c3-3.9 7.6-6.4 12.8-6.4c8.8 0 16 7.2 16 16c0 10.3 6.6 19.5 16.4 22.8s20.6-.1 26.8-8.3c3-3.9 7.6-6.4 12.8-6.4c7.8 0 14.3 5.6 15.7 13c1.6 8.2 7.3 15.1 15.1 18s16.7 1.6 23.3-3.6c2.7-2.1 6.1-3.4 9.9-3.4c8.8 0 16 7.2 16 16l0 16V392c0 39.8-32.2 72-72 72H272 212.3h-.9c-37.4 0-72.4-18.7-93.2-49.9L50.7 312.9c-4.9-7.4-2.9-17.3 4.4-22.2s17.3-2.9 22.2 4.4L116 353.2c5.9 8.8 16.8 12.7 26.9 9.7s17-12.4 17-23V320 64zM176 0c-35.3 0-64 28.7-64 64V261.7C91.2 238 55.5 232.8 28.5 250.7C-.9 270.4-8.9 310.1 10.8 339.5L78.3 440.8c29.7 44.5 79.6 71.2 133.1 71.2h.9H272h56c66.3 0 120-53.7 120-120V288l0-16c0-35.3-28.7-64-64-64c-4.5 0-8.8 .5-13 1.3c-11.7-15.4-30.2-25.3-51-25.3c-6.9 0-13.5 1.1-19.7 3.1C288.7 170.7 269.6 160 248 160c-2.7 0-5.4 .2-8 .5V64c0-35.3-28.7-64-64-64zm48 304c0-8.8-7.2-16-16-16s-16 7.2-16 16v96c0 8.8 7.2 16 16 16s16-7.2 16-16V304zm48-16c-8.8 0-16 7.2-16 16v96c0 8.8 7.2 16 16 16s16-7.2 16-16V304c0-8.8-7.2-16-16-16zm80 16c0-8.8-7.2-16-16-16s-16 7.2-16 16v96c0 8.8 7.2 16 16 16s16-7.2 16-16V304z\"\/><\/svg><\/span><\/span>Vet DriveSavers<\/span><\/a><\/div> <div class=\"vcex-spacing wpex-w-100 wpex-clear\"><\/div><style>.vcex-bullets.vcex_69f4fffb65c37 .vcex-bullets-icon{color:#e31f26;}.vcex-bullets.vcex_69f4fffb65c37{color:#222222;}<\/style><div class=\"vcex-module vcex-bullets vcex-bullets--horizontal wpex-gap-10 custom-icon vcex_69f4fffb65c37\">\n<ul role=\"list\">\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon wpex-icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M256 512A256 256 0 1 0 256 0a256 256 0 1 0 0 512zM369 209L241 337c-9.4 9.4-24.6 9.4-33.9 0l-64-64c-9.4-9.4-9.4-24.6 0-33.9s24.6-9.4 33.9 0l47 47L335 175c9.4-9.4 24.6-9.4 33.9 0s9.4 24.6 0 33.9z\"\/><\/svg><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">S\u00e9curit\u00e9<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon wpex-icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M256 512A256 256 0 1 0 256 0a256 256 0 1 0 0 512zM369 209L241 337c-9.4 9.4-24.6 9.4-33.9 0l-64-64c-9.4-9.4-9.4-24.6 0-33.9s24.6-9.4 33.9 0l47 47L335 175c9.4-9.4 24.6-9.4 33.9 0s9.4 24.6 0 33.9z\"\/><\/svg><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Conformit\u00e9 de l'industrie<\/div><\/div><\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3\/5\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#222222;font-size:25px;font-weight:500;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element wpex-antialiased\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>La conformit\u00e9 du secteur et la s\u00e9curit\u00e9 globale des donn\u00e9es seront <strong>aider \u00e0 pr\u00e9server la s\u00e9curit\u00e9 des donn\u00e9es de votre organisation<\/strong>et constituent un excellent argument de vente lors de la prospection de clients.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1665012861811 vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative wpex-vc_row-has-fill wpex-vc-reset-negative-margin\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_dashed vc_sep_border_width_3 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_white wpb_content_element  wpb_content_element\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_column-gap-25 wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-6 vc_hidden-md vc_hidden-sm vc_hidden-xs\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69f4fffb66f55{font-size:2em;font-family:Oswald;font-weight:600;line-height:1.2;}@media (max-width:959px){.vcex-heading.vcex_69f4fffb66f55{font-size:1.5em;}}@media (max-width:767px){.vcex-heading.vcex_69f4fffb66f55{font-size:1.5em;}}@media (max-width:479px){.vcex-heading.vcex_69f4fffb66f55{font-size:1.5em;}}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h3 vc_custom_1664841128577 vcex_69f4fffb66f55\"><span class=\"vcex-heading-inner wpex-inline-block\">Pour en savoir plus<\/span><\/h3>\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<ul>\n<li><a href=\"https:\/\/drivesaversdatarecovery.com\/fr-fr\/white-papers\/livre-blanc-rapport-sur-la-cybersecurite-le-risque-neglige-de-la-recuperation-de-donnees-par-des-tiers\/\">Rapport sur la cybers\u00e9curit\u00e9 : Le risque n\u00e9glig\u00e9 de la r\u00e9cup\u00e9ration de donn\u00e9es par des tiers<\/a><a href=\"https:\/\/drivesaversdatarecovery.com\/fr-fr\/pourquoi-nous\/recuperation-de-donnees-securisee-et-certifiee\/conformite-a-la-loi-sur-la-securite-de-linformation-hipaa\/\"><br \/>\n<\/a><\/li>\n<li class=\"translation-block\"><span class=\"vcex-heading-inner wpex-inline-block\">Pourquoi la <span class=\"wpex-font-semibold\" style=\"color:#E31F26\">s\u00e9curit\u00e9 des donn\u00e9es<\/span> est-elle importante lors d\u2019une r\u00e9cup\u00e9ration\u202f?<\/span><\/li>\n<li><a href=\"https:\/\/drivesaversdatarecovery.com\/fr-fr\/pourquoi-nous\/recuperation-de-donnees-securisee-et-certifiee\/audit-annuel-soc-2-type-ii\/\">Audit\u00e9 et certifi\u00e9 : SOC 2 Type II<\/a><a href=\"https:\/\/drivesaversdatarecovery.com\/fr-fr\/pourquoi-nous\/recuperation-de-donnees-securisee-et-certifiee\/conformite-a-la-loi-sur-la-securite-de-linformation-hipaa\/\"><br \/>\n<\/a><\/li>\n<li><a href=\"https:\/\/drivesaversdatarecovery.com\/fr-fr\/pourquoi-nous\/recuperation-de-donnees-securisee-et-certifiee\/conformite-a-la-loi-sur-la-securite-de-linformation-hipaa\/\">Conformit\u00e9 \u00e0 la s\u00e9curit\u00e9 HIPAA<\/a><a href=\"https:\/\/drivesaversdatarecovery.com\/fr-fr\/pourquoi-nous\/recuperation-de-donnees-securisee-et-certifiee\/conformite-a-la-loi-sur-la-securite-de-linformation-hipaa\/\"><br \/>\n<\/a><\/li>\n<li><a href=\"https:\/\/drivesaversdatarecovery.com\/fr-fr\/pourquoi-nous\/recuperation-de-donnees-securisee-et-certifiee\/visite-virtuelle\/\">Vid\u00e9o : S\u00e9curit\u00e9 DriveSavers lors de la r\u00e9cup\u00e9ration de donn\u00e9es<\/a><\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"Whether you work for an organization controlled by compliance standards or you are an independent IT looking to build your enterprise business, industry regulations regarding data security, also known as information security, can sometimes cause a real headache. Keep reading for a single set of guidelines to follow that can be applied to all industry&hellip;","protected":false},"author":25,"featured_media":62133,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"inline_featured_image":false,"footnotes":""},"categories":[264],"tags":[143],"post_series":[],"class_list":["post-45592","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-security","entry","has-media"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Data Security Compliance Cheat Sheet<\/title>\n<meta name=\"description\" content=\"Whether you work for an organization controlled by compliance standards or you are an independent IT looking to build your enterprise business, industry regulations regarding data security, also known as information security, can sometimes cause a real headache. Here\u2019s a single set of guidelines to follow that can be applied to all industry regulations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/drivesaversdatarecovery.com\/fr-fr\/blog\/conformite-de-la-securite-des-donnees-un-aide-memoire-pour-linformatique\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Security Compliance: A Cheat Sheet for IT\" \/>\n<meta property=\"og:url\" content=\"https:\/\/drivesaversdatarecovery.com\/fr-fr\/blog\/conformite-de-la-securite-des-donnees-un-aide-memoire-pour-linformatique\/\" \/>\n<meta property=\"og:site_name\" content=\"DriveSavers Data Recovery Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DriveSavers\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-06T19:59:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-27T10:46:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/data_thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mike Cobb\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:site\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mike Cobb\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/data-security-compliance-a-cheat-sheet-for-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/data-security-compliance-a-cheat-sheet-for-it\\\/\"},\"author\":{\"name\":\"Mike Cobb\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/71a038c3b180b1f2df821d2b015b8ee6\"},\"headline\":\"Data Security Compliance: A Cheat Sheet for IT\",\"datePublished\":\"2022-10-06T19:59:00+00:00\",\"dateModified\":\"2026-04-27T10:46:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/data-security-compliance-a-cheat-sheet-for-it\\\/\"},\"wordCount\":3131,\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/data-security-compliance-a-cheat-sheet-for-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/data_thumb.jpg\",\"keywords\":[\"security\"],\"articleSection\":[\"DriveSavers Blog\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/data-security-compliance-a-cheat-sheet-for-it\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/data-security-compliance-a-cheat-sheet-for-it\\\/\",\"name\":\"Data Security Compliance Cheat Sheet\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/data-security-compliance-a-cheat-sheet-for-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/data-security-compliance-a-cheat-sheet-for-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/data_thumb.jpg\",\"datePublished\":\"2022-10-06T19:59:00+00:00\",\"dateModified\":\"2026-04-27T10:46:15+00:00\",\"description\":\"Whether you work for an organization controlled by compliance standards or you are an independent IT looking to build your enterprise business, industry regulations regarding data security, also known as information security, can sometimes cause a real headache. Here\u2019s a single set of guidelines to follow that can be applied to all industry regulations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/data-security-compliance-a-cheat-sheet-for-it\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/data-security-compliance-a-cheat-sheet-for-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/data-security-compliance-a-cheat-sheet-for-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/data_thumb.jpg\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/data_thumb.jpg\",\"width\":1200,\"height\":627},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/data-security-compliance-a-cheat-sheet-for-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Security Compliance: A Cheat Sheet for IT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"name\":\"DriveSavers Data Recovery Services\",\"description\":\"The Worldwide Leader in Data Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\",\"name\":\"DriveSavers Data Recovery\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"width\":1092,\"height\":1087,\"caption\":\"DriveSavers Data Recovery\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DriveSavers\",\"https:\\\/\\\/x.com\\\/drivesavers\",\"https:\\\/\\\/www.instagram.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/drivesavers-data-recovery\\\/\",\"https:\\\/\\\/www.pinterest.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCBlynLMdFWQgid-Gwm0zJ1A\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/DriveSavers\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/71a038c3b180b1f2df821d2b015b8ee6\",\"name\":\"Mike Cobb\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g\",\"caption\":\"Mike Cobb\"},\"description\":\"Mike Cobb, Director of Engineering and CISO As Director of Engineering, Mike Cobb manages the day-to-day operations of the Engineering Department, including the physical and logical recoveries of rotational media, SSDs, smart devices and flash media. He also oversees the R&amp;D efforts for past, present, and future storage technologies. Mike encourages growth and ensures that each of the departments and their engineers continues to gain knowledge in their field. Each DriveSavers engineer has been trained to ensure the successful and complete recovery of data is their top priority. As Chief Information Security Officer (CISO), Mike oversees cybersecurity at DriveSavers, including maintaining and updating security certifications such as SOC 2 Type II compliance, coordinating company security policy, and employee cybersecurity education. Mike joined DriveSavers in 1994 and has a B.S. degree in Computer Science from the University of California, Riverside.\",\"sameAs\":[\"http:\\\/\\\/\\\/\"],\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/fr-fr\\\/author\\\/mikecobb\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Aide-m\u00e9moire sur la conformit\u00e9 en mati\u00e8re de s\u00e9curit\u00e9 des donn\u00e9es","description":"Que vous travailliez pour une organisation soumise \u00e0 des normes de conformit\u00e9 ou que vous soyez un informaticien ind\u00e9pendant cherchant \u00e0 d\u00e9velopper son entreprise, les r\u00e9glementations sectorielles relatives \u00e0 la s\u00e9curit\u00e9 des donn\u00e9es, \u00e9galement appel\u00e9e s\u00e9curit\u00e9 de l'information, peuvent parfois constituer un v\u00e9ritable casse-t\u00eate. Voici un ensemble unique de lignes directrices \u00e0 suivre qui peuvent s'appliquer \u00e0 toutes les r\u00e9glementations sectorielles.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/blog\/conformite-de-la-securite-des-donnees-un-aide-memoire-pour-linformatique\/","og_locale":"fr_FR","og_type":"article","og_title":"Data Security Compliance: A Cheat Sheet for IT","og_url":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/blog\/conformite-de-la-securite-des-donnees-un-aide-memoire-pour-linformatique\/","og_site_name":"DriveSavers Data Recovery Services","article_publisher":"https:\/\/www.facebook.com\/DriveSavers","article_published_time":"2022-10-06T19:59:00+00:00","article_modified_time":"2026-04-27T10:46:15+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/data_thumb.jpg","type":"image\/jpeg"}],"author":"Mike Cobb","twitter_card":"summary_large_image","twitter_creator":"@drivesavers","twitter_site":"@drivesavers","twitter_misc":{"\u00c9crit par":"Mike Cobb","Dur\u00e9e de lecture estim\u00e9e":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/data-security-compliance-a-cheat-sheet-for-it\/#article","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/data-security-compliance-a-cheat-sheet-for-it\/"},"author":{"name":"Mike Cobb","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/71a038c3b180b1f2df821d2b015b8ee6"},"headline":"Data Security Compliance: A Cheat Sheet for IT","datePublished":"2022-10-06T19:59:00+00:00","dateModified":"2026-04-27T10:46:15+00:00","mainEntityOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/data-security-compliance-a-cheat-sheet-for-it\/"},"wordCount":3131,"publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/data-security-compliance-a-cheat-sheet-for-it\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/data_thumb.jpg","keywords":["security"],"articleSection":["DriveSavers Blog"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/data-security-compliance-a-cheat-sheet-for-it\/","url":"https:\/\/drivesaversdatarecovery.com\/blog\/data-security-compliance-a-cheat-sheet-for-it\/","name":"Aide-m\u00e9moire sur la conformit\u00e9 en mati\u00e8re de s\u00e9curit\u00e9 des donn\u00e9es","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/data-security-compliance-a-cheat-sheet-for-it\/#primaryimage"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/data-security-compliance-a-cheat-sheet-for-it\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/data_thumb.jpg","datePublished":"2022-10-06T19:59:00+00:00","dateModified":"2026-04-27T10:46:15+00:00","description":"Que vous travailliez pour une organisation soumise \u00e0 des normes de conformit\u00e9 ou que vous soyez un informaticien ind\u00e9pendant cherchant \u00e0 d\u00e9velopper son entreprise, les r\u00e9glementations sectorielles relatives \u00e0 la s\u00e9curit\u00e9 des donn\u00e9es, \u00e9galement appel\u00e9e s\u00e9curit\u00e9 de l'information, peuvent parfois constituer un v\u00e9ritable casse-t\u00eate. Voici un ensemble unique de lignes directrices \u00e0 suivre qui peuvent s'appliquer \u00e0 toutes les r\u00e9glementations sectorielles.","breadcrumb":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/data-security-compliance-a-cheat-sheet-for-it\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/drivesaversdatarecovery.com\/blog\/data-security-compliance-a-cheat-sheet-for-it\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/data-security-compliance-a-cheat-sheet-for-it\/#primaryimage","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/data_thumb.jpg","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/data_thumb.jpg","width":1200,"height":627},{"@type":"BreadcrumbList","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/data-security-compliance-a-cheat-sheet-for-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/drivesaversdatarecovery.com\/"},{"@type":"ListItem","position":2,"name":"Data Security Compliance: A Cheat Sheet for IT"}]},{"@type":"WebSite","@id":"https:\/\/drivesaversdatarecovery.com\/#website","url":"https:\/\/drivesaversdatarecovery.com\/","name":"Services de r\u00e9cup\u00e9ration de donn\u00e9es DriveSavers","description":"Le leader mondial de la r\u00e9cup\u00e9ration de donn\u00e9es","publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/drivesaversdatarecovery.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/drivesaversdatarecovery.com\/#organization","name":"DriveSavers R\u00e9cup\u00e9ration de Donn\u00e9es","url":"https:\/\/drivesaversdatarecovery.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","width":1092,"height":1087,"caption":"DriveSavers Data Recovery"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DriveSavers","https:\/\/x.com\/drivesavers","https:\/\/www.instagram.com\/drivesavers\/","https:\/\/www.linkedin.com\/company\/drivesavers-data-recovery\/","https:\/\/www.pinterest.com\/drivesavers\/","https:\/\/www.youtube.com\/channel\/UCBlynLMdFWQgid-Gwm0zJ1A","https:\/\/en.wikipedia.org\/wiki\/DriveSavers"]},{"@type":"Person","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/71a038c3b180b1f2df821d2b015b8ee6","name":"Mike Cobb","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g","caption":"Mike Cobb"},"description":"Mike Cobb, directeur de l'ing\u00e9nierie et RSSI En tant que directeur de l'ing\u00e9nierie, Mike Cobb g\u00e8re les op\u00e9rations quotidiennes du d\u00e9partement d'ing\u00e9nierie, y compris les restaurations physiques et logiques des supports rotatifs, des disques SSD, des dispositifs intelligents et des supports flash. Il supervise \u00e9galement les efforts de R&amp;D pour les technologies de stockage pass\u00e9es, pr\u00e9sentes et futures. Mike encourage la croissance et s'assure que chaque d\u00e9partement et ses ing\u00e9nieurs continuent d'acqu\u00e9rir des connaissances dans leur domaine. Chaque ing\u00e9nieur de DriveSavers a \u00e9t\u00e9 form\u00e9 pour s'assurer que la r\u00e9cup\u00e9ration compl\u00e8te et r\u00e9ussie des donn\u00e9es est leur priorit\u00e9 absolue. En tant que responsable de la s\u00e9curit\u00e9 de l'information (CISO), Mike supervise la cybers\u00e9curit\u00e9 chez DriveSavers, y compris le maintien et la mise \u00e0 jour des certifications de s\u00e9curit\u00e9 telles que la conformit\u00e9 SOC 2 Type II, la coordination de la politique de s\u00e9curit\u00e9 de l'entreprise et la formation des employ\u00e9s en mati\u00e8re de cybers\u00e9curit\u00e9. Mike a rejoint DriveSavers en 1994 et est titulaire d'une licence en informatique de l'Universit\u00e9 de Californie, Riverside.","sameAs":["http:\/\/\/"],"url":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/author\/mikecobb\/"}]}},"_links":{"self":[{"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/posts\/45592","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/comments?post=45592"}],"version-history":[{"count":4,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/posts\/45592\/revisions"}],"predecessor-version":[{"id":83922,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/posts\/45592\/revisions\/83922"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/media\/62133"}],"wp:attachment":[{"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/media?parent=45592"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/categories?post=45592"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/tags?post=45592"},{"taxonomy":"post_series","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/fr-fr\/wp-json\/wp\/v2\/post_series?post=45592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}