{"id":4389,"date":"2021-02-10T14:04:27","date_gmt":"2021-02-10T13:04:27","guid":{"rendered":"https:\/\/www.arcadsoftware.com\/dot\/?p=4389"},"modified":"2025-10-14T11:30:04","modified_gmt":"2025-10-14T09:30:04","slug":"rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection","status":"publish","type":"post","link":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection\/","title":{"rendered":"RGPD : un enjeu de cybers\u00e9curit\u00e9 et une vraie cyberprotection"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:20px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"940\" height=\"350\" alt=\"Banner article DOT RGPD\" title=\"Banner article DOT RGPD\" src=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD.png\" data-orig-src=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD.png\" class=\"lazyload img-responsive wp-image-6243\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD-200x74.png 200w, https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD-400x149.png 400w, https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD-600x223.png 600w, https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD-800x298.png 800w, https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD.png 940w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 640px) 100vw, 800px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:20px;--awb-padding-left:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-content-alignment:left;\"><p>Le RGPD (r\u00e8glement g\u00e9n\u00e9ral sur la protection des donn\u00e9es) n\u2019a pas toujours bonne presse aupr\u00e8s des entreprises, qui s\u2019y plient bon gr\u00e9 mal gr\u00e9, par crainte des sanctions plus que dans une d\u00e9marche volontariste. En s\u00e9curisant les donn\u00e9es personnelles des utilisateurs des sites, le RGPD se r\u00e9v\u00e8le pourtant un rempart efficace en termes de cybers\u00e9curit\u00e9 et de protection contre le cybercrime.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">1. S\u00e9curiser les donn\u00e9es personnelles des internautes europ\u00e9ens<\/h2><\/div><div class=\"fusion-text fusion-text-2\" style=\"--awb-content-alignment:left;\"><p>Le <strong>RGPD<\/strong> est un r\u00e8glement europ\u00e9en mis en place depuis le mois de mai 2018 qui impose aux organismes publics et priv\u00e9s (aux entreprises dans la plupart des cas) des r\u00e8gles contraignantes en mati\u00e8re de gestion et de traitement des donn\u00e9es personnelles des utilisateurs de leurs plateformes Internet. L\u2019objectif affich\u00e9 de l\u2019Union europ\u00e9enne\u00a0: s\u00e9curiser les donn\u00e9es personnelles collect\u00e9es en ligne\u00a0!<\/p>\n<p>Les gestionnaires de sites doivent donc d\u00e9sormais offrir des garanties fortes \u00e0 tout moment pour rester en conformit\u00e9 avec le RGPD. En France, la commission nationale informatique et libert\u00e9s (Cnil) recommande notamment 6 \u00e9tapes pour garantir la conformit\u00e9 : ne r\u00e9colter que les donn\u00e9es vraiment n\u00e9cessaires, \u00eatre totalement transparent, organiser et faciliter le droit des personnes, fixer des dur\u00e9es de conservation des donn\u00e9es, s\u00e9curiser les donn\u00e9es et identifier les risques, et inscrire la mise en conformit\u00e9 dans une d\u00e9marche continue.<\/p>\n<p>Autant de grands principes qui doivent \u00eatre mis en place et ajust\u00e9s dans le contexte de chaque organisation et de chaque entreprise, et qui concernent tout \u00e0 la fois les utilisateurs externes de sites, que les employ\u00e9s au sein d\u2019une entreprise. Autant de raisons qui expliquent que le RGPD est souvent per\u00e7u de mani\u00e8re n\u00e9gative par les gestionnaires de sites et en particulier par les professionnels. Pourtant, malgr\u00e9 sa lourdeur, le RGPD offre des avantages non n\u00e9gligeables en termes de renforcement de la <strong>cybers\u00e9curit\u00e9<\/strong>.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_3_5 3_5 fusion-flex-column cta-box\" style=\"--awb-padding-top:25px;--awb-padding-right:40px;--awb-padding-bottom:30px;--awb-padding-left:40px;--awb-bg-image:radial-gradient(circle at center center, #daeaf65e 0%,#daeaf61a 100%);--awb-bg-size:cover;--awb-box-shadow:3px 3px 4px 0px #daeaf65e;;--awb-border-color:var(--awb-color5);--awb-border-style:solid;--awb-width-large:60%;--awb-margin-top-large:25px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3 fusion-text-no-margin\" style=\"--awb-content-alignment:center;--awb-font-size:25px;--awb-text-color:var(--awb-color6);--awb-margin-bottom:15px;--awb-text-font-family:&quot;Poppins&quot;;--awb-text-font-style:normal;--awb-text-font-weight:800;\"><p>RGPD : Data Masking et Anonymisation. Pourquoi g\u00e9rer vos donn\u00e9es personnelles avec le Data Masking et l\u2019Anonymisation ?<\/p>\n<\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-medium button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:#ffffff;--button_border_color:var(--awb-color6);--button_accent_hover_color:var(--awb-color1);--button_border_hover_color:var(--awb-color6);--button_gradient_top_color:var(--awb-color6);--button_gradient_bottom_color:var(--awb-color6);--button_gradient_top_color_hover:var(--awb-color6);--button_gradient_bottom_color_hover:var(--awb-color6);\" target=\"_self\" data-hover=\"text_slide_up\" href=\"\/dot\/ressources\/white-papers\/data-masking-et-anonymisation-white-paper\/\"><div class=\"awb-button-text-transition  awb-button__hover-content--centered\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Lire le White Paper<\/span><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Lire le White Paper<\/span><\/div><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">2. RGPD : une mauvaise nouvelle\u2026 surtout pour les hackers<\/h2><\/div><div class=\"fusion-text fusion-text-4\" style=\"--awb-content-alignment:left;\"><p>Plus que les entreprises, ce sont bien les hackers qui semblent \u00eatre les grands perdants de la r\u00e9glementation europ\u00e9ennes qui a notamment fortement frein\u00e9 au cours des deux derni\u00e8res ann\u00e9es les fragilit\u00e9s des organisations en termes de ransomware. Les contraintes mises en place par le <a href=\"\/dot\/anonymisation-et-rgpd-enjeux-obligations-et-bonnes-pratiques\/\">RGPD<\/a> leur compliquent la t\u00e2che et ont de ce fait s\u00e9curis\u00e9 les r\u00e9seaux des entreprises, ainsi que les donn\u00e9es personnelles de leurs utilisateurs et de leurs employ\u00e9s.<\/p>\n<p>Plus on limite l\u2019\u00e9tendue des donn\u00e9es personnelles exploit\u00e9es par les entreprises (que ce soit en volume ou en dur\u00e9e de conservation), et moins les hackers ont de possibilit\u00e9s de mener des attaques et de prendre le contr\u00f4le sur des bases de donn\u00e9es sensibles qu\u2019ils pourraient exploiter au d\u00e9triment des utilisateurs.<\/p>\n<p>Ce n\u2019est d\u2019ailleurs pas une co\u00efncidence si, d\u2019apr\u00e8s le rapport Provider Lens Cyber Security - Solutions &amp; Services 2020, r\u00e9alis\u00e9 par le groupe Information Services Group (ISG), les entreprises fran\u00e7aises ont effectu\u00e9 une mont\u00e9e en gamme et en comp\u00e9tences en mati\u00e8re de cybers\u00e9curit\u00e9 depuis la mise en place du RGPD. C\u2019est le Web dans son ensemble qui est ressorti plus s\u00e9curis\u00e9 des dispositions du RGPD. En mai 2019, soit un an apr\u00e8s le lancement du RGPD, 39 500 organisations fran\u00e7aises avaient d\u00e9sign\u00e9 un responsable de la protection des donn\u00e9es (DPO) dans l\u2019Hexagone.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-video fusion-youtube\" style=\"--awb-max-width:560px;--awb-max-height:315px;--awb-align-self:center;--awb-width:100%;\"><div class=\"video-shortcode\"><lite-youtube videoid=\"jzZ3r5gY9Nw\" class=\"landscape\" params=\"wmode=transparent&autoplay=1rel=0&amp;enablejsapi=1\" title=\"YouTube video player 1\" data-button-label=\"Play Video\" width=\"560\" height=\"315\" data-thumbnail-size=\"auto\" data-no-cookie=\"on\"><\/lite-youtube><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>En s\u00e9curisant les donn\u00e9es personnelles des utilisateurs des sites, le RGPD se r\u00e9v\u00e8le un rempart efficace en termes de cybers\u00e9curit\u00e9.<\/p>\n","protected":false},"author":5,"featured_media":6243,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[71],"tags":[],"class_list":["post-4389","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Le RGPD : un enjeu de cybers\u00e9curit\u00e9 et une vraie cyberprotection<\/title>\n<meta name=\"description\" content=\"En s\u00e9curisant les donn\u00e9es personnelles des utilisateurs des sites, le RGPD se r\u00e9v\u00e8le un rempart efficace en termes de cybers\u00e9curit\u00e9.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Le RGPD : un enjeu de cybers\u00e9curit\u00e9 et une vraie cyberprotection\" \/>\n<meta property=\"og:description\" content=\"En s\u00e9curisant les donn\u00e9es personnelles des utilisateurs des sites, le RGPD se r\u00e9v\u00e8le un rempart efficace en termes de cybers\u00e9curit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection\/\" \/>\n<meta property=\"og:site_name\" content=\"DOT - Data Oriented Testing\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-10T13:04:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-14T09:30:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD.png\" \/>\n\t<meta property=\"og:image:width\" content=\"940\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Myriam Goutte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Myriam Goutte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection\/\"},\"author\":{\"name\":\"Myriam Goutte\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\"},\"headline\":\"RGPD : un enjeu de cybers\u00e9curit\u00e9 et une vraie cyberprotection\",\"datePublished\":\"2021-02-10T13:04:27+00:00\",\"dateModified\":\"2025-10-14T09:30:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection\/\"},\"wordCount\":2344,\"image\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD.png\",\"articleSection\":[\"Articles de blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection\/\",\"url\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection\/\",\"name\":\"Le RGPD : un enjeu de cybers\u00e9curit\u00e9 et une vraie cyberprotection\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD.png\",\"datePublished\":\"2021-02-10T13:04:27+00:00\",\"dateModified\":\"2025-10-14T09:30:04+00:00\",\"author\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\"},\"description\":\"En s\u00e9curisant les donn\u00e9es personnelles des utilisateurs des sites, le RGPD se r\u00e9v\u00e8le un rempart efficace en termes de cybers\u00e9curit\u00e9.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection\/#primaryimage\",\"url\":\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD.png\",\"contentUrl\":\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD.png\",\"width\":940,\"height\":350,\"caption\":\"Banner article DOT RGPD\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/\",\"name\":\"DOT - Data Oriented Testing\",\"description\":\"Confidential Data Testing Automation\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\",\"name\":\"Myriam Goutte\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Le RGPD : un enjeu de cybers\u00e9curit\u00e9 et une vraie cyberprotection","description":"En s\u00e9curisant les donn\u00e9es personnelles des utilisateurs des sites, le RGPD se r\u00e9v\u00e8le un rempart efficace en termes de cybers\u00e9curit\u00e9.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection\/","og_locale":"en_US","og_type":"article","og_title":"Le RGPD : un enjeu de cybers\u00e9curit\u00e9 et une vraie cyberprotection","og_description":"En s\u00e9curisant les donn\u00e9es personnelles des utilisateurs des sites, le RGPD se r\u00e9v\u00e8le un rempart efficace en termes de cybers\u00e9curit\u00e9.","og_url":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection\/","og_site_name":"DOT - Data Oriented Testing","article_published_time":"2021-02-10T13:04:27+00:00","article_modified_time":"2025-10-14T09:30:04+00:00","og_image":[{"width":940,"height":350,"url":"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD.png","type":"image\/png"}],"author":"Myriam Goutte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Myriam Goutte","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection\/#article","isPartOf":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection\/"},"author":{"name":"Myriam Goutte","@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2"},"headline":"RGPD : un enjeu de cybers\u00e9curit\u00e9 et une vraie cyberprotection","datePublished":"2021-02-10T13:04:27+00:00","dateModified":"2025-10-14T09:30:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection\/"},"wordCount":2344,"image":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD.png","articleSection":["Articles de blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection\/","url":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection\/","name":"Le RGPD : un enjeu de cybers\u00e9curit\u00e9 et une vraie cyberprotection","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection\/#primaryimage"},"image":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD.png","datePublished":"2021-02-10T13:04:27+00:00","dateModified":"2025-10-14T09:30:04+00:00","author":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2"},"description":"En s\u00e9curisant les donn\u00e9es personnelles des utilisateurs des sites, le RGPD se r\u00e9v\u00e8le un rempart efficace en termes de cybers\u00e9curit\u00e9.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/rgpd-un-enjeu-de-cybersecurite-et-une-vraie-cyberprotection\/#primaryimage","url":"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD.png","contentUrl":"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/02\/Banner-article-DOT-RGPD.png","width":940,"height":350,"caption":"Banner article DOT RGPD"},{"@type":"WebSite","@id":"https:\/\/www.arcadsoftware.com\/dot\/#website","url":"https:\/\/www.arcadsoftware.com\/dot\/","name":"DOT - Data Oriented Testing","description":"Confidential Data Testing Automation","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2","name":"Myriam Goutte"}]}},"_links":{"self":[{"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/posts\/4389","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/comments?post=4389"}],"version-history":[{"count":5,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/posts\/4389\/revisions"}],"predecessor-version":[{"id":12610,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/posts\/4389\/revisions\/12610"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/media\/6243"}],"wp:attachment":[{"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/media?parent=4389"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/categories?post=4389"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/tags?post=4389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}