{"id":6675,"date":"2022-03-09T16:38:39","date_gmt":"2022-03-09T15:38:39","guid":{"rendered":"https:\/\/www.dot-anonymizer.com\/?p=6675"},"modified":"2025-04-25T10:00:52","modified_gmt":"2025-04-25T08:00:52","slug":"anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse","status":"publish","type":"post","link":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/guides\/anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse\/","title":{"rendered":"Anonymisation de donn\u00e9es : les cl\u00e9s de r\u00e9ussite d\u2019un projet transverse"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:25px;--awb-padding-bottom:25px;--awb-background-color:var(--awb-color6);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:20px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-top:0px;--awb-margin-bottom:0px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;--awb-font-size:45px;\"><h1 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:45;line-height:1.12;\">Anonymisation de donn\u00e9es : les cl\u00e9s de r\u00e9ussite d\u2019un projet transverse<\/h1><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:45px;--awb-padding-right:20px;--awb-padding-left:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:40px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"545\" height=\"258\" alt=\"Mock up Guide Anonymisation de donn\u00e9es les cl\u00e9s de r\u00e9ussite d&#039;un projet transverse\" title=\"Mock up Guide Anonymisation de donn\u00e9es les cl\u00e9s de r\u00e9ussite d&#8217;un projet transverse\" src=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2022\/02\/guide-anonymisatin-cle-de-reussite.png\" data-orig-src=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2022\/02\/guide-anonymisatin-cle-de-reussite.png\" class=\"lazyload img-responsive wp-image-6597\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27545%27%20height%3D%27258%27%20viewBox%3D%270%200%20545%20258%27%3E%3Crect%20width%3D%27545%27%20height%3D%27258%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2022\/02\/guide-anonymisatin-cle-de-reussite-200x95.png 200w, https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2022\/02\/guide-anonymisatin-cle-de-reussite-400x189.png 400w, https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2022\/02\/guide-anonymisatin-cle-de-reussite.png 545w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 640px) 100vw, 545px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-1\" style=\"--awb-content-alignment:left;--awb-font-size:18px;\"><p>L'anonymisation des donn\u00e9es personnelles permet de faciliter la mise en conformit\u00e9 avec les exigences du RGPD et r\u00e9pond \u00e0 des enjeux de s\u00e9curit\u00e9 des jeux de donn\u00e9es extraits des syst\u00e8mes informatiques.<\/p>\n<\/div><div class=\"fusion-text fusion-text-2\" style=\"--awb-content-alignment:left;--awb-font-size:18px;\"><p>Dans ce guide pratique, vous d\u00e9couvrirez : <\/p>\n<\/div><ul style=\"--awb-size:18px;--awb-iconcolor:#f86011;--awb-line-height:30.6px;--awb-icon-width:30.6px;--awb-icon-height:30.6px;--awb-icon-margin:12.6px;--awb-content-margin:43.2px;\" class=\"fusion-checklist fusion-checklist-1 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon icon-mkb-plus\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Les principaux cas d\u2019usages de l\u2019anonymisation de donn\u00e9es personnelles.<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon icon-mkb-plus\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Un rappel des diff\u00e9rentes techniques d\u2019anonymisation des donn\u00e9es, du data masking \u00e0 la randomisation ou la g\u00e9n\u00e9ralisation de donn\u00e9es, chacune d\u2019entre elles r\u00e9pondant \u00e0 des cas d\u2019usages diff\u00e9rents.<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon icon-mkb-plus\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Les bonnes pratiques et \u00e9tapes \u00e0 respecter pour r\u00e9ussir votre projet d\u2019anonymisation.<\/p>\n<\/div><\/li><\/ul><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_2_5 2_5 fusion-flex-column\" style=\"--awb-padding-top:35px;--awb-padding-right:35px;--awb-padding-bottom:35px;--awb-padding-left:35px;--awb-padding-right-small:20px;--awb-padding-left-small:20px;--awb-overflow:hidden;--awb-bg-size:cover;--awb-box-shadow:0px 24px 32px -6px rgba(0,0,0,0.1);;--awb-border-radius:12px 12px 12px 12px;--awb-width-large:40%;--awb-margin-top-large:0px;--awb-spacing-right-large:4.8%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:4.8%;--awb-width-medium:40%;--awb-order-medium:0;--awb-spacing-right-medium:4.8%;--awb-spacing-left-medium:4.8%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:20px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;--awb-font-size:30px;\"><h2 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:30;line-height:1.14;\">T\u00e9l\u00e9chargez le guide<\/h2><\/div><!--[if lte IE 8]>\n<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/v2-legacy.js\"><\/script>\n<![endif]-->\n<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/v2.js\"><\/script>\n<script>\n  hbspt.forms.create({\n\tregion: \"na1\",\n\tportalId: \"4514828\",\n\tformId: \"1e94f64f-082f-4d83-8a94-2f57cc26c344\",\n\tcss: \"\",\n        blockedDomains: [\"freschelegacy.com\",\"freschesolutions.com\",\"rocketsoftware.com\",\"softlanding.com\",\"mkssoftware.com\",\"midrangedynamics.com\",\"remainsoftware.com\",\"taskforce-it.de\",\"origsoft.com\",\"itheis.com\",\"idinfo-conseil.com\",\"broadcom.com\",\"rs.com\",\"idinfo.eu\",\"looksoftware.com\",\"proximity.co.uk\",\"bigblue.it\",\"xhypm.com\",\"seagullsoftware.com\",\"seagullsoftware.com\",\"xcase.com\",\"comsid.de\",\"genebag.com\",\"mailo.com\",\"neuf.fr\",\"pks.de\",\"armonie.group\",\"pascalpolverini.com\",\"polverinipartners.com\",\"systnaps.com\",\"sarus.tech\",\"microfocus.com\",\"opentext.com\",\"md-na.com\",\"redbourn.co.uk\",\"omninet.be\",\"cdinvest.be\",\"cdinvest.eu\",\"ptc.com\",\"alvinecapital.co.uk\",\"katchou.eu\",\"talend.com\",\"bartech.es\"],\n        translations: {\n           fr: {\n             required: \"Ce champs est requis.\",\n             missingSelect: \"Ce champs est requis.\",\n             forbiddenEmailDomain: \"Veuillez saisir une adresse professionnelle\",\n             manuallyBlockedEmailDomain: \"Veuillez saisir une adresse professionnelle\", \n             submitText: \"T\u00c9L\u00c9CHARGER LE GUIDE\"\n           }\n       }\n});\n<\/script><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ce guide sur l&#8217;anonymisation des donn\u00e9es vous permet de d\u00e9couvrir les cl\u00e9s de r\u00e9ussite d&#8217;un projet transverse.<\/p>\n","protected":false},"author":5,"featured_media":6597,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[92],"tags":[],"class_list":["post-6675","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guides"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Anonymisation de donn\u00e9es : les cl\u00e9s de r\u00e9ussite d\u2019un projet transverse | Guide<\/title>\n<meta name=\"description\" content=\"Ce guide sur l&#039;anonymisation des donn\u00e9es vous permet de d\u00e9couvrir les cl\u00e9s de r\u00e9ussite d&#039;un projet transverse.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/guides\/anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Anonymisation de donn\u00e9es : les cl\u00e9s de r\u00e9ussite d\u2019un projet transverse | Guide\" \/>\n<meta property=\"og:description\" content=\"Ce guide sur l&#039;anonymisation des donn\u00e9es vous permet de d\u00e9couvrir les cl\u00e9s de r\u00e9ussite d&#039;un projet transverse.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/guides\/anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse\/\" \/>\n<meta property=\"og:site_name\" content=\"DOT - Data Oriented Testing\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-09T15:38:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-25T08:00:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2022\/02\/guide-anonymisatin-cle-de-reussite.png\" \/>\n\t<meta property=\"og:image:width\" content=\"545\" \/>\n\t<meta property=\"og:image:height\" content=\"258\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Myriam Goutte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Myriam Goutte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/guides\/anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/guides\/anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse\/\"},\"author\":{\"name\":\"Myriam Goutte\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\"},\"headline\":\"Anonymisation de donn\u00e9es : les cl\u00e9s de r\u00e9ussite d\u2019un projet transverse\",\"datePublished\":\"2022-03-09T15:38:39+00:00\",\"dateModified\":\"2025-04-25T08:00:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/guides\/anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse\/\"},\"wordCount\":1792,\"image\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/guides\/anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2022\/02\/guide-anonymisatin-cle-de-reussite.png\",\"articleSection\":[\"Guides\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/guides\/anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse\/\",\"url\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/guides\/anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse\/\",\"name\":\"Anonymisation de donn\u00e9es : les cl\u00e9s de r\u00e9ussite d\u2019un projet transverse | Guide\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/guides\/anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/guides\/anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2022\/02\/guide-anonymisatin-cle-de-reussite.png\",\"datePublished\":\"2022-03-09T15:38:39+00:00\",\"dateModified\":\"2025-04-25T08:00:52+00:00\",\"author\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\"},\"description\":\"Ce guide sur l'anonymisation des donn\u00e9es vous permet de d\u00e9couvrir les cl\u00e9s de r\u00e9ussite d'un projet transverse.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/guides\/anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/guides\/anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse\/#primaryimage\",\"url\":\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2022\/02\/guide-anonymisatin-cle-de-reussite.png\",\"contentUrl\":\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2022\/02\/guide-anonymisatin-cle-de-reussite.png\",\"width\":545,\"height\":258,\"caption\":\"Mock up Guide Anonymisation de donn\u00e9es les cl\u00e9s de r\u00e9ussite d'un projet transverse\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/\",\"name\":\"DOT - Data Oriented Testing\",\"description\":\"Confidential Data Testing Automation\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\",\"name\":\"Myriam Goutte\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Anonymisation de donn\u00e9es : les cl\u00e9s de r\u00e9ussite d\u2019un projet transverse | Guide","description":"Ce guide sur l'anonymisation des donn\u00e9es vous permet de d\u00e9couvrir les cl\u00e9s de r\u00e9ussite d'un projet transverse.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/guides\/anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse\/","og_locale":"en_US","og_type":"article","og_title":"Anonymisation de donn\u00e9es : les cl\u00e9s de r\u00e9ussite d\u2019un projet transverse | Guide","og_description":"Ce guide sur l'anonymisation des donn\u00e9es vous permet de d\u00e9couvrir les cl\u00e9s de r\u00e9ussite d'un projet transverse.","og_url":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/guides\/anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse\/","og_site_name":"DOT - Data Oriented Testing","article_published_time":"2022-03-09T15:38:39+00:00","article_modified_time":"2025-04-25T08:00:52+00:00","og_image":[{"width":545,"height":258,"url":"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2022\/02\/guide-anonymisatin-cle-de-reussite.png","type":"image\/png"}],"author":"Myriam Goutte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Myriam Goutte","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/guides\/anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse\/#article","isPartOf":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/guides\/anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse\/"},"author":{"name":"Myriam Goutte","@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2"},"headline":"Anonymisation de donn\u00e9es : les cl\u00e9s de r\u00e9ussite d\u2019un projet transverse","datePublished":"2022-03-09T15:38:39+00:00","dateModified":"2025-04-25T08:00:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/guides\/anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse\/"},"wordCount":1792,"image":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/guides\/anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2022\/02\/guide-anonymisatin-cle-de-reussite.png","articleSection":["Guides"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/guides\/anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse\/","url":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/guides\/anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse\/","name":"Anonymisation de donn\u00e9es : les cl\u00e9s de r\u00e9ussite d\u2019un projet transverse | Guide","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/guides\/anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse\/#primaryimage"},"image":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/guides\/anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2022\/02\/guide-anonymisatin-cle-de-reussite.png","datePublished":"2022-03-09T15:38:39+00:00","dateModified":"2025-04-25T08:00:52+00:00","author":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2"},"description":"Ce guide sur l'anonymisation des donn\u00e9es vous permet de d\u00e9couvrir les cl\u00e9s de r\u00e9ussite d'un projet transverse.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arcadsoftware.fr\/dot\/ressources\/guides\/anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/guides\/anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse\/#primaryimage","url":"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2022\/02\/guide-anonymisatin-cle-de-reussite.png","contentUrl":"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2022\/02\/guide-anonymisatin-cle-de-reussite.png","width":545,"height":258,"caption":"Mock up Guide Anonymisation de donn\u00e9es les cl\u00e9s de r\u00e9ussite d'un projet transverse"},{"@type":"WebSite","@id":"https:\/\/www.arcadsoftware.com\/dot\/#website","url":"https:\/\/www.arcadsoftware.com\/dot\/","name":"DOT - Data Oriented Testing","description":"Confidential Data Testing Automation","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2","name":"Myriam Goutte"}]}},"_links":{"self":[{"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/posts\/6675","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/comments?post=6675"}],"version-history":[{"count":4,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/posts\/6675\/revisions"}],"predecessor-version":[{"id":11838,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/posts\/6675\/revisions\/11838"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/media\/6597"}],"wp:attachment":[{"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/media?parent=6675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/categories?post=6675"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/tags?post=6675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}