{"id":4606,"date":"2021-05-25T10:08:42","date_gmt":"2021-05-25T08:08:42","guid":{"rendered":"https:\/\/www.arcadsoftware.com\/dot\/?p=4606"},"modified":"2024-02-19T17:21:23","modified_gmt":"2024-02-19T16:21:23","slug":"quest-ce-que-le-data-masking","status":"publish","type":"post","link":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quest-ce-que-le-data-masking\/","title":{"rendered":"Qu&#8217;est-ce que le data masking ?"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:20px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"940\" height=\"350\" alt=\"Banner article DOT Data Masking\" title=\"Banner article DOT Data Masking\" src=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking.png\" data-orig-src=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking.png\" class=\"lazyload img-responsive wp-image-6245\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking-200x74.png 200w, https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking-400x149.png 400w, https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking-600x223.png 600w, https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking-800x298.png 800w, https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking.png 940w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 640px) 100vw, 800px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:20px;--awb-padding-left:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-content-alignment:left;\"><p>Le volume de donn\u00e9es produites chaque jour dans le monde ne cesse d\u2019augmenter. \u00c0 titre de comparaison, en 2010, le monde avait produit environ deux zettaoctets de donn\u00e9es (un zettaoctet \u00e9quivaut \u00e0 un milliard de t\u00e9raoctets, soit mille milliards de gigaoctets). En 2020, ce chiffre a \u00e9t\u00e9 multipli\u00e9 par presque 25. Et cette croissance exponentielle devrait continuer. \u00c0 l\u2019horizon 2035, une \u00e9tude command\u00e9e par Statista estime que le monde aura produit 2142 zettaoctets de donn\u00e9es. Cette hausse s\u2019explique en partie par l\u2019arriv\u00e9e de l\u2019Internet des Objets (IOT) et de nouvelles technologies telles que la 5G, qui permettent d\u2019entrevoir de nouveaux horizons pour la data. Cependant, cette arriv\u00e9e massive de data entra\u00eene une exposition accrue des donn\u00e9es personnelles et la vie priv\u00e9e des utilisateurs peut rapidement \u00eatre mise en danger. Pour solutionner ce probl\u00e8me, il est imp\u00e9ratif d\u2019anonymiser les donn\u00e9es et mettre en place des solutions, comme le Data Masking\u2026<\/p>\n<\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">1. Le Data Masking : une solution de premi\u00e8re importance pour toutes les entreprises<\/h2><\/div><div class=\"fusion-text fusion-text-2\" style=\"--awb-content-alignment:left;\"><p>Par d\u00e9finition, le Data Masking est une technologie visant \u00e0 \u00ab\u00a0<em>pr\u00e9venir la manipulation de donn\u00e9es personnelles ou identifiantes en donnant aux utilisateurs des donn\u00e9es fictives (mais r\u00e9alistes) au lieu de donn\u00e9es r\u00e9elles<\/em>\u00a0\u00bb. Cette technique garantit la confidentialit\u00e9, la disponibilit\u00e9 mais aussi l\u2019int\u00e9grit\u00e9 des donn\u00e9es pour les utilisateurs et pour les entreprises. Cette m\u00e9thode de traitement des donn\u00e9es permet donc \u00e0 une entreprise de conserver un set de donn\u00e9es exploitable mais qui ne contient plus aucune donn\u00e9e \u00ab\u00a0exacte\u00a0\u00bb, afin de prot\u00e9ger la vie priv\u00e9e des utilisateurs.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:25px;--awb-padding-left:40px;--awb-bg-color:rgba(232,232,232,0.38);--awb-bg-color-hover:rgba(232,232,232,0.38);--awb-bg-size:cover;--awb-border-color:rgb(234, 80, 80);--awb-border-left:7px;--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:45px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:45px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3\"><p><strong>Donn\u00e9es personnelles et Anonymisation : 5 conseils pour mener \u00e0 bien son projet d\u2019anonymisation<\/strong><\/p>\n<\/div><div style=\"text-align:right;\"><a class=\"fusion-button button-flat button-xlarge button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:#ea5050;--button_border_color:#ffffff;--button_accent_hover_color:#356897;--button_border_hover_color:#105378;--button_gradient_top_color:rgba(255,255,255,0);--button_gradient_bottom_color:rgba(255,255,255,0);--button_gradient_top_color_hover:rgba(255,255,255,0);--button_gradient_bottom_color_hover:rgba(255,255,255,0);\" target=\"_self\" href=\"\/dot\/ressources\/guides\/5-conseils-pour-mener-a-bien-son-projet-d-anonymisation\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">T\u00e9l\u00e9charger le guide<\/span><i class=\"fa-arrow-right fas awb-button__icon awb-button__icon--default button-icon-right\" aria-hidden=\"true\"><\/i><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:20px;--awb-padding-left:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">2. La \u00ab Data Substitution \u00bb, un exemple de proc\u00e9d\u00e9 pour anonymiser les donn\u00e9es<\/h2><\/div><div class=\"fusion-text fusion-text-4\" style=\"--awb-content-alignment:left;\"><p>Pour expliquer cela de mani\u00e8re simple, le Data Masking permet de conserver des donn\u00e9es en supprimant le caract\u00e8re personnel de chaque entr\u00e9e. Par exemple, dans un sondage visant \u00e0 conna\u00eetre la couleur pr\u00e9f\u00e9r\u00e9e d\u2019un groupe de personne en fonction de leur \u00e2ge, nous aurions les informations suivantes : le pr\u00e9nom, l\u2019\u00e2ge et la couleur pr\u00e9f\u00e9r\u00e9e. Pour cet exemple, la mise en place d\u2019un \u00ab Data Masking \u00bb sur ce jeu de donn\u00e9es permettrait de changer le pr\u00e9nom par un pr\u00e9nom fictif. Ce proc\u00e9d\u00e9, connu sous le nom de \u00ab Data Substitution \u00bb, donne la possibilit\u00e9 de conserver la couleur pr\u00e9f\u00e9r\u00e9e en fonction de l\u2019\u00e2ge de la personne tout en supprimant toute possibilit\u00e9 d\u2019identification. La donn\u00e9e du pr\u00e9nom n\u2019est plus exacte, certes, mais ce changement permet d\u2019anonymiser totalement l\u2019\u00e9tude et de faire en sorte qu\u2019elle r\u00e9ponde aux crit\u00e8res de protection des donn\u00e9es personnelles. Comme l\u2019explique la d\u00e9finition du Data Masking, cette technique permet de cr\u00e9er des \u00ab <em>donn\u00e9es fictives (mais r\u00e9alistes) au lieu de donn\u00e9es r\u00e9elles<\/em>\u00a0\u00bb.<\/p>\n<p>En somme, \u00e0 l\u2019\u00e9chelle d\u2019un jeu de donn\u00e9es contenant plusieurs centaines d\u2019entr\u00e9es, les donn\u00e9es fictives cr\u00e9\u00e9es par cette m\u00e9thode de Data Masking rendraient compte d\u2019un r\u00e9sultat repr\u00e9sentatif du jeu de donn\u00e9es initial, tout en rendant l\u2019identification d\u2019un individu au sein du groupe \u00e9tudi\u00e9 totalement impossible. Un proc\u00e9d\u00e9 simple, mais fonctionnel, permettant de r\u00e9pondre aux normes RGPD tout en conservant des donn\u00e9es de qualit\u00e9\u2026<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-video fusion-youtube\" style=\"--awb-max-width:560px;--awb-max-height:315px;--awb-align-self:center;--awb-width:100%;\"><div class=\"video-shortcode\"><lite-youtube videoid=\"jzZ3r5gY9Nw\" class=\"landscape\" params=\"wmode=transparent&autoplay=1rel=0&amp;enablejsapi=1\" title=\"YouTube video player 1\" data-button-label=\"Play Video\" width=\"560\" height=\"315\" data-thumbnail-size=\"auto\" data-no-cookie=\"on\"><\/lite-youtube><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le Data Masking garantit la confidentialit\u00e9, la disponibilit\u00e9 mais aussi l\u2019int\u00e9grit\u00e9 des donn\u00e9es pour les utilisateurs et pour les entreprises<\/p>\n","protected":false},"author":5,"featured_media":6245,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[71],"tags":[],"class_list":["post-4606","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Qu&#039;est-ce que le data masking ?<\/title>\n<meta name=\"description\" content=\"Le Data Masking garantit la confidentialit\u00e9, la disponibilit\u00e9 mais aussi l\u2019int\u00e9grit\u00e9 des donn\u00e9es.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quest-ce-que-le-data-masking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Qu&#039;est-ce que le data masking ?\" \/>\n<meta property=\"og:description\" content=\"Le Data Masking garantit la confidentialit\u00e9, la disponibilit\u00e9 mais aussi l\u2019int\u00e9grit\u00e9 des donn\u00e9es.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quest-ce-que-le-data-masking\/\" \/>\n<meta property=\"og:site_name\" content=\"DOT - Data Oriented Testing\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-25T08:08:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-19T16:21:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking.png\" \/>\n\t<meta property=\"og:image:width\" content=\"940\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Myriam Goutte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Myriam Goutte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quest-ce-que-le-data-masking\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quest-ce-que-le-data-masking\/\"},\"author\":{\"name\":\"Myriam Goutte\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\"},\"headline\":\"Qu&#8217;est-ce que le data masking ?\",\"datePublished\":\"2021-05-25T08:08:42+00:00\",\"dateModified\":\"2024-02-19T16:21:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quest-ce-que-le-data-masking\/\"},\"wordCount\":3308,\"image\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quest-ce-que-le-data-masking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking.png\",\"articleSection\":[\"Articles de blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quest-ce-que-le-data-masking\/\",\"url\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quest-ce-que-le-data-masking\/\",\"name\":\"Qu'est-ce que le data masking ?\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quest-ce-que-le-data-masking\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quest-ce-que-le-data-masking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking.png\",\"datePublished\":\"2021-05-25T08:08:42+00:00\",\"dateModified\":\"2024-02-19T16:21:23+00:00\",\"author\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\"},\"description\":\"Le Data Masking garantit la confidentialit\u00e9, la disponibilit\u00e9 mais aussi l\u2019int\u00e9grit\u00e9 des donn\u00e9es.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quest-ce-que-le-data-masking\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quest-ce-que-le-data-masking\/#primaryimage\",\"url\":\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking.png\",\"contentUrl\":\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking.png\",\"width\":940,\"height\":350,\"caption\":\"Banner article DOT Data Masking\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/\",\"name\":\"DOT - Data Oriented Testing\",\"description\":\"Confidential Data Testing Automation\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\",\"name\":\"Myriam Goutte\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Qu'est-ce que le data masking ?","description":"Le Data Masking garantit la confidentialit\u00e9, la disponibilit\u00e9 mais aussi l\u2019int\u00e9grit\u00e9 des donn\u00e9es.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quest-ce-que-le-data-masking\/","og_locale":"en_US","og_type":"article","og_title":"Qu'est-ce que le data masking ?","og_description":"Le Data Masking garantit la confidentialit\u00e9, la disponibilit\u00e9 mais aussi l\u2019int\u00e9grit\u00e9 des donn\u00e9es.","og_url":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quest-ce-que-le-data-masking\/","og_site_name":"DOT - Data Oriented Testing","article_published_time":"2021-05-25T08:08:42+00:00","article_modified_time":"2024-02-19T16:21:23+00:00","og_image":[{"width":940,"height":350,"url":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking.png","type":"image\/png"}],"author":"Myriam Goutte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Myriam Goutte","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quest-ce-que-le-data-masking\/#article","isPartOf":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quest-ce-que-le-data-masking\/"},"author":{"name":"Myriam Goutte","@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2"},"headline":"Qu&#8217;est-ce que le data masking ?","datePublished":"2021-05-25T08:08:42+00:00","dateModified":"2024-02-19T16:21:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quest-ce-que-le-data-masking\/"},"wordCount":3308,"image":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quest-ce-que-le-data-masking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking.png","articleSection":["Articles de blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quest-ce-que-le-data-masking\/","url":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quest-ce-que-le-data-masking\/","name":"Qu'est-ce que le data masking ?","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quest-ce-que-le-data-masking\/#primaryimage"},"image":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quest-ce-que-le-data-masking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking.png","datePublished":"2021-05-25T08:08:42+00:00","dateModified":"2024-02-19T16:21:23+00:00","author":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2"},"description":"Le Data Masking garantit la confidentialit\u00e9, la disponibilit\u00e9 mais aussi l\u2019int\u00e9grit\u00e9 des donn\u00e9es.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quest-ce-que-le-data-masking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/quest-ce-que-le-data-masking\/#primaryimage","url":"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking.png","contentUrl":"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2021\/05\/Banner-article-DOT-Data-Masking.png","width":940,"height":350,"caption":"Banner article DOT Data Masking"},{"@type":"WebSite","@id":"https:\/\/www.arcadsoftware.com\/dot\/#website","url":"https:\/\/www.arcadsoftware.com\/dot\/","name":"DOT - Data Oriented Testing","description":"Confidential Data Testing Automation","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2","name":"Myriam Goutte"}]}},"_links":{"self":[{"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/posts\/4606","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/comments?post=4606"}],"version-history":[{"count":4,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/posts\/4606\/revisions"}],"predecessor-version":[{"id":8461,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/posts\/4606\/revisions\/8461"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/media\/6245"}],"wp:attachment":[{"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/media?parent=4606"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/categories?post=4606"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/tags?post=4606"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}