{"id":7895,"date":"2023-03-08T14:00:37","date_gmt":"2023-03-08T13:00:37","guid":{"rendered":"https:\/\/www.dot-anonymizer.com\/?p=7895"},"modified":"2025-04-24T15:38:11","modified_gmt":"2025-04-24T13:38:11","slug":"anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee","status":"publish","type":"post","link":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee\/","title":{"rendered":"Anonymisation des donn\u00e9es : commencez petit, pensez grand !"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:20px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"940\" height=\"350\" alt=\"Banniere blog article anonymisation des donnees perimetre restreint\" title=\"Banniere blog article anonymisation des donnees perimetre restreint\" src=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2023\/03\/Banniere-blog-article-anonymisation-des-donnees-perimetre-restreint.png\" data-orig-src=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2023\/03\/Banniere-blog-article-anonymisation-des-donnees-perimetre-restreint.png\" class=\"lazyload img-responsive wp-image-7897\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2023\/03\/Banniere-blog-article-anonymisation-des-donnees-perimetre-restreint-200x74.png 200w, https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2023\/03\/Banniere-blog-article-anonymisation-des-donnees-perimetre-restreint-400x149.png 400w, https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2023\/03\/Banniere-blog-article-anonymisation-des-donnees-perimetre-restreint-600x223.png 600w, https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2023\/03\/Banniere-blog-article-anonymisation-des-donnees-perimetre-restreint-800x298.png 800w, https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2023\/03\/Banniere-blog-article-anonymisation-des-donnees-perimetre-restreint.png 940w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 640px) 100vw, 800px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:20px;--awb-padding-left:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p style=\"text-align: center;\">C\u00e9cile MASSON<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2\" style=\"--awb-content-alignment:left;\"><p>Pour toute entreprise, les donn\u00e9es repr\u00e9sentent aujourd\u2019hui une ressource pr\u00e9cieuse et strat\u00e9gique pour conserver son avantage concurrentiel. Il est donc primordial de les prot\u00e9ger. L\u2019anonymisation est une des techniques les plus r\u00e9pandues pour \u00e9viter les risques de violation de donn\u00e9es et se conformer par la m\u00eame aux r\u00e9glementations en vigueur telles que le RGPD.<\/p>\n<p>Mais comment mettre en place un projet d\u2019anonymisation ? Dans cet article, nous vous expliquerons pourquoi d\u00e9buter par un p\u00e9rim\u00e8tre restreint garantit le succ\u00e8s et l\u2019adoption de l\u2019anonymisation en entreprise.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">Les risques d\u2019un projet \u00ab\u00a0Big Bang\u00a0\u00bb<\/h2><\/div><div class=\"fusion-text fusion-text-3\" style=\"--awb-content-alignment:left;\"><p>Avoir une visibilit\u00e9 et une compr\u00e9hension large des besoins en anonymisation est certes strat\u00e9gique pour bien d\u00e9finir quels profils constitueront l\u2019\u00e9quipe et les moyens \u00e0 mettre en place pour couvrir tous les cas d\u2019usage. N\u00e9anmoins, vouloir \u00e9quiper tous les usagers de donn\u00e9es anonymis\u00e9es peut complexifier le projet. Avec de nombreux applicatifs et processus d'entreprise \u00e0 prendre en compte, il peut \u00eatre difficile de garder tout le monde sur la m\u00eame longueur d'onde. De plus, les nombreux acteurs impliqu\u00e9s (d\u00e9cideurs, m\u00e9tiers impact\u00e9s etc.) peuvent \u00eatre difficiles \u00e0 mobiliser en m\u00eame temps, ce qui peut entra\u00eener une lenteur dans l'avancement du projet.<\/p>\n<p>En outre, l'imbrication des logiciels peut \u00eatre intimidant et ajouter une complexit\u00e9 inutile. Lorsque vous travaillez sur un applicatif, vous devez prendre en compte tous les impacts, y compris ceux sur les autres applicatifs utilis\u00e9s par les diff\u00e9rents m\u00e9tiers de l'entreprise. Si vous ne tenez pas compte de ces impacts, cela peut entra\u00eener des dysfonctionnements pour les m\u00e9tiers qui utilisent les donn\u00e9es transform\u00e9es et des retards inutiles.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:25px;--awb-padding-left:40px;--awb-bg-color:rgba(232,232,232,0.38);--awb-bg-color-hover:rgba(232,232,232,0.38);--awb-bg-size:cover;--awb-border-color:rgb(234, 80, 80);--awb-border-left:7px;--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:45px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:45px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-text fusion-text-4\"><p><strong>Guide pratique : Anonymisation de donn\u00e9es : les cl\u00e9s de r\u00e9ussite d\u2019un projet transverse<\/strong><\/p>\n<\/div><div style=\"text-align:right;\"><a class=\"fusion-button button-flat button-xlarge button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:#ea5050;--button_border_color:#ffffff;--button_accent_hover_color:#356897;--button_border_hover_color:#356897;--button_gradient_top_color:rgba(255,255,255,0);--button_gradient_bottom_color:rgba(255,255,255,0);--button_gradient_top_color_hover:rgba(255,255,255,0);--button_gradient_bottom_color_hover:rgba(255,255,255,0);\" target=\"_self\" href=\"\/dot\/ressources\/guides\/anonymisation-de-donnees-les-cles-de-reussite-d-un-projet-transverse\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">T\u00e9l\u00e9charger le guide<\/span><i class=\"fa-arrow-right fas awb-button__icon awb-button__icon--default button-icon-right\" aria-hidden=\"true\"><\/i><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:20px;--awb-padding-left:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">D\u00e9buter sur un p\u00e9rim\u00e8tre restreint<\/h2><\/div><div class=\"fusion-text fusion-text-5\" style=\"--awb-content-alignment:left;\"><p>Il est essentiel de commencer par le <strong>p\u00e9rim\u00e8tre le plus expos\u00e9<\/strong>, qui peut inclure les applications les plus utilis\u00e9es ou les donn\u00e9es les plus identifiantes. Id\u00e9alement, il faut d\u00e9buter avec des donn\u00e9es de premier niveau (nom, pr\u00e9nom, num\u00e9ro de s\u00e9curit\u00e9 sociale, adresse par exemple), puis dans un second temps augmenter la complexit\u00e9 d\u2019anonymisation en se concentrant sur des zones qui, recoup\u00e9es, peuvent conduire \u00e0 l\u2019identification d\u2019un individu.<\/p>\n<p>Il est \u00e9galement important d'impliquer tous les acteurs concern\u00e9s, tels que les d\u00e9cideurs, les m\u00e9tiers impact\u00e9s et les prestataires externes.<\/p>\n<p>Il est conseill\u00e9 de disposer de diagrammes de flux applicatifs pour identifier les interactions entre applicatifs et ainsi savoir o\u00f9 commencer.<\/p>\n<p>En r\u00e9sum\u00e9, ce premier p\u00e9rim\u00e8tre doit \u00eatre d\u00e9fini en fonction des besoins des entreprises et des utilisations applicatives.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">Les b\u00e9n\u00e9fices d'un premier p\u00e9rim\u00e8tre restreint<\/h2><\/div><div class=\"fusion-text fusion-text-6\" style=\"--awb-content-alignment:left;\"><p>D\u00e9buter par un p\u00e9rim\u00e8tre restreint offre de nombreux avantages\u00a0:<\/p>\n<h3>Rassurer les utilisateurs<\/h3>\n<p>Cela permet de d\u00e9mystifier le projet au sein des collaborateurs. En effet, certains utilisateurs ont l\u2019habitude de travailler avec des donn\u00e9es pr\u00e9cises. La mise en place d\u2019un projet d\u2019anonymisation implique donc un changement de donn\u00e9es et d\u2019habitudes. Lorsque ces utilisateurs s\u2019apercevront que les changements sont minimes voire inexistants, ils pourront l\u2019expliquer aux utilisateurs des prochains projets et ainsi lever les craintes \u00e9ventuelles.<\/p>\n<h3>Chiffrer le projet global<\/h3>\n<p>Ce premier p\u00e9rim\u00e8tre permet de quantifier les co\u00fbts du projet dans son ensemble. Par exemple, on peut estimer que la couverture d\u2019un p\u00e9rim\u00e8tre de donn\u00e9es n\u00e9cessite x temps, x personnes, la mobilisation de tel et tel profil dans l\u2019entreprise, ce qui au final repr\u00e9sente x jours\/homme.<\/p>\n<p>Cela permet donc d\u2019avoir une base pr\u00e9cise pour pr\u00e9parer et anticiper la suite du projet.<\/p>\n<h3>Localiser les donn\u00e9es identifiantes<\/h3>\n<p>Dans tout projet d\u2019anonymisation, et pour initier la cr\u00e9ation d\u2019un registre des activit\u00e9s de traitement (impos\u00e9 par l\u2019<a href=\"https:\/\/www.cnil.fr\/fr\/reglement-europeen-protection-donnees\/chapitre4#Article30\" target=\"_blank\" rel=\"noopener\">article 30 du RGPD<\/a>), il est indispensable de disposer de mod\u00e8les de donn\u00e9es \u00e0 cartographier.<\/p>\n<p>Le support de la recherche des donn\u00e9es identifiantes reste \u00e0 ce titre un incontournable des fonctionnalit\u00e9s \u00e0 s\u00e9lectionner dans le cadre de l\u2019outillage du projet.<\/p>\n<p>L\u2019incr\u00e9mentalit\u00e9 de cette d\u00e9tection, d\u2019un lot \u00e0 un autre, permettra de capitaliser et de r\u00e9utiliser ou adapter des r\u00e8gles et des projets de d\u00e9tection. Cette r\u00e9utilisation permet d\u2019all\u00e9ger le travail et les co\u00fbts de param\u00e9trage et d\u2019acc\u00e9l\u00e9rer la mise en conformit\u00e9 au RGPD.<\/p>\n<h3>Eviter le risque d\u2019amende<\/h3>\n<p>Initier un projet d\u2019anonymisation, m\u00eame sur un premier p\u00e9rim\u00e8tre restreint, permet de prouver, en cas de contr\u00f4le de la CNIL, qu\u2019un plan a \u00e9t\u00e9 mis en place, et que la mise en conformit\u00e9 a d\u00e9but\u00e9 par exemple sur le p\u00e9rim\u00e8tre le plus expos\u00e9, avec les donn\u00e9es les plus identifiantes. Il permet \u00e9galement d\u2019expliquer qu\u2019un plan a \u00e9t\u00e9 \u00e9labor\u00e9 et qu\u2019il concerne d\u2019autres p\u00e9rim\u00e8tres avec des \u00e9ch\u00e9ances pr\u00e9cises.<\/p>\n<h3>S\u00e9curiser ses donn\u00e9es<\/h3>\n<p>L\u2019anonymisation permet de prot\u00e9ger les donn\u00e9es les plus utilis\u00e9es, les plus identifiantes puisqu\u2019une donn\u00e9e anonymis\u00e9e n\u2019a plus de valeur pour ceux qui pourraient la subtiliser. En effet, la diffusion ou la r\u00e9utilisation de donn\u00e9es anonymis\u00e9es n\u2019a aucun impact sur la vie priv\u00e9e des personnes concern\u00e9es.<\/p>\n<p>Dernier avantage, et pas des moindres\u00a0: lorsque ce p\u00e9rim\u00e8tre aura \u00e9t\u00e9 trait\u00e9, il sera tout \u00e0 fait possible de dupliquer les r\u00e8gles d\u2019anonymisation, et parfois m\u00eame le projet dans son ensemble sur d\u2019autres p\u00e9rim\u00e8tres.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">Conclusion<\/h2><\/div><div class=\"fusion-text fusion-text-7\" style=\"--awb-content-alignment:left;\"><p>Il est recommand\u00e9 de d\u00e9buter par un p\u00e9rim\u00e8tre restreint pour garantir le succ\u00e8s et l'adoption de l\u2019anonymisation en entreprise. En commen\u00e7ant par les applications les plus utilis\u00e9es ou les donn\u00e9es les plus identifiantes. L\u2019entreprise doit identifier les interactions entre les applicatifs pour savoir o\u00f9 commencer. En outre, d\u00e9buter par un p\u00e9rim\u00e8tre restreint offre de nombreux avantages, notamment la s\u00e9curisation des donn\u00e9es, la d\u00e9mystification du sujet pour les prochains b\u00e9n\u00e9ficiaires, l\u2019application d\u2019une m\u00e9thode et d\u2019une trajectoire projet d\u00e9j\u00e0 \u00e9prouv\u00e9e, une budg\u00e9tisation plus \u00e9clair\u00e9e des lots suivants et pour finir la disparition du risque d\u2019amende.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_1_5 1_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:20%;--awb-margin-top-large:20px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:9.6%;--awb-width-medium:20%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:9.6%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-margin-bottom-small:0px;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element sm-text-align-left\" style=\"text-align:center;--awb-max-width:150px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"500\" height=\"500\" alt=\"Romain Alberca\" src=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2022\/11\/Photo-CMA-bleuturquoise.png\" data-orig-src=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2022\/11\/Photo-CMA-bleuturquoise.png\" class=\"lazyload img-responsive wp-image-7178\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27500%27%20height%3D%27500%27%20viewBox%3D%270%200%20500%20500%27%3E%3Crect%20width%3D%27500%27%20height%3D%27500%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2022\/11\/Photo-CMA-bleuturquoise-200x200.png 200w, https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2022\/11\/Photo-CMA-bleuturquoise-400x400.png 400w, https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2022\/11\/Photo-CMA-bleuturquoise.png 500w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 640px) 100vw, 400px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-1 fusion_builder_column_inner_4_5 4_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:80%;--awb-margin-top-large:20px;--awb-spacing-right-large:2.4%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.4%;--awb-width-medium:80%;--awb-order-medium:0;--awb-spacing-right-medium:2.4%;--awb-spacing-left-medium:2.4%;--awb-width-small:100%;--awb-order-small:0;--awb-margin-top-small:0px;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top:0px;--awb-margin-bottom:5px;--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;--awb-font-size:25px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:25;line-height:1.26;\">C\u00e9cile MASSON<\/h3><\/div><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-margin-top:0px;--awb-margin-bottom:10px;--awb-margin-top-small:5px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:20px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:20;--minFontSize:20;line-height:1.4;\">Business Development Manager, ARCAD Software<\/h4><\/div><div class=\"fusion-text fusion-text-8\" style=\"--awb-font-size:16px;\"><p>C\u00e9cile dispose de plus de 20 ans d\u2019exp\u00e9rience dans le domaine du test et de la qualit\u00e9 logicielle. Sa collaboration ces trois derni\u00e8res ann\u00e9es sur le segment DOT a permis \u00e0 C\u00e9cile de devenir une experte sur le march\u00e9 de la s\u00e9curit\u00e9 et de l\u2019anonymisation des donn\u00e9es. En effet sa mission consiste \u00e0 lancer sur le march\u00e9 la technologie DOT Anonymizer pour l\u2019anonymisation des donn\u00e9es confidentielles.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-video fusion-youtube\" style=\"--awb-max-width:560px;--awb-max-height:315px;--awb-align-self:center;--awb-width:100%;\"><div class=\"video-shortcode\"><lite-youtube videoid=\"jzZ3r5gY9Nw\" class=\"landscape\" params=\"wmode=transparent&autoplay=1rel=0&amp;enablejsapi=1\" title=\"YouTube video player 1\" data-button-label=\"Play Video\" width=\"560\" height=\"315\" data-thumbnail-size=\"auto\" data-no-cookie=\"on\"><\/lite-youtube><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Commencez l\u2019anonymisation par un p\u00e9rim\u00e8tre restreint pour s\u00e9curiser vos donn\u00e9es, impliquer vos \u00e9quipes et r\u00e9ussir votre conformit\u00e9 RGPD.<\/p>\n","protected":false},"author":5,"featured_media":7897,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[71],"tags":[],"class_list":["post-7895","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Anonymisation des donn\u00e9es : commencez petit, pensez grand !<\/title>\n<meta name=\"description\" content=\"Commencez l\u2019anonymisation par un p\u00e9rim\u00e8tre restreint pour s\u00e9curiser vos donn\u00e9es, impliquer vos \u00e9quipes et r\u00e9ussir votre conformit\u00e9 RGPD.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Anonymisation des donn\u00e9es : commencez petit, pensez grand !\" \/>\n<meta property=\"og:description\" content=\"Commencez l\u2019anonymisation par un p\u00e9rim\u00e8tre restreint pour s\u00e9curiser vos donn\u00e9es, impliquer vos \u00e9quipes et r\u00e9ussir votre conformit\u00e9 RGPD.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee\/\" \/>\n<meta property=\"og:site_name\" content=\"DOT - Data Oriented Testing\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-08T13:00:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-24T13:38:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2023\/03\/Banniere-blog-article-anonymisation-des-donnees-perimetre-restreint.png\" \/>\n\t<meta property=\"og:image:width\" content=\"940\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Myriam Goutte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Myriam Goutte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee\/\"},\"author\":{\"name\":\"Myriam Goutte\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\"},\"headline\":\"Anonymisation des donn\u00e9es : commencez petit, pensez grand !\",\"datePublished\":\"2023-03-08T13:00:37+00:00\",\"dateModified\":\"2025-04-24T13:38:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee\/\"},\"wordCount\":4529,\"image\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2023\/03\/Banniere-blog-article-anonymisation-des-donnees-perimetre-restreint.png\",\"articleSection\":[\"Articles de blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee\/\",\"url\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee\/\",\"name\":\"Anonymisation des donn\u00e9es : commencez petit, pensez grand !\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2023\/03\/Banniere-blog-article-anonymisation-des-donnees-perimetre-restreint.png\",\"datePublished\":\"2023-03-08T13:00:37+00:00\",\"dateModified\":\"2025-04-24T13:38:11+00:00\",\"author\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\"},\"description\":\"Commencez l\u2019anonymisation par un p\u00e9rim\u00e8tre restreint pour s\u00e9curiser vos donn\u00e9es, impliquer vos \u00e9quipes et r\u00e9ussir votre conformit\u00e9 RGPD.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee\/#primaryimage\",\"url\":\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2023\/03\/Banniere-blog-article-anonymisation-des-donnees-perimetre-restreint.png\",\"contentUrl\":\"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2023\/03\/Banniere-blog-article-anonymisation-des-donnees-perimetre-restreint.png\",\"width\":940,\"height\":350,\"caption\":\"Banniere blog article anonymisation des donnees perimetre restreint\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/\",\"name\":\"DOT - Data Oriented Testing\",\"description\":\"Confidential Data Testing Automation\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\",\"name\":\"Myriam Goutte\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Anonymisation des donn\u00e9es : commencez petit, pensez grand !","description":"Commencez l\u2019anonymisation par un p\u00e9rim\u00e8tre restreint pour s\u00e9curiser vos donn\u00e9es, impliquer vos \u00e9quipes et r\u00e9ussir votre conformit\u00e9 RGPD.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee\/","og_locale":"en_US","og_type":"article","og_title":"Anonymisation des donn\u00e9es : commencez petit, pensez grand !","og_description":"Commencez l\u2019anonymisation par un p\u00e9rim\u00e8tre restreint pour s\u00e9curiser vos donn\u00e9es, impliquer vos \u00e9quipes et r\u00e9ussir votre conformit\u00e9 RGPD.","og_url":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee\/","og_site_name":"DOT - Data Oriented Testing","article_published_time":"2023-03-08T13:00:37+00:00","article_modified_time":"2025-04-24T13:38:11+00:00","og_image":[{"width":940,"height":350,"url":"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2023\/03\/Banniere-blog-article-anonymisation-des-donnees-perimetre-restreint.png","type":"image\/png"}],"author":"Myriam Goutte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Myriam Goutte","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee\/#article","isPartOf":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee\/"},"author":{"name":"Myriam Goutte","@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2"},"headline":"Anonymisation des donn\u00e9es : commencez petit, pensez grand !","datePublished":"2023-03-08T13:00:37+00:00","dateModified":"2025-04-24T13:38:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee\/"},"wordCount":4529,"image":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2023\/03\/Banniere-blog-article-anonymisation-des-donnees-perimetre-restreint.png","articleSection":["Articles de blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee\/","url":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee\/","name":"Anonymisation des donn\u00e9es : commencez petit, pensez grand !","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee\/#primaryimage"},"image":{"@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2023\/03\/Banniere-blog-article-anonymisation-des-donnees-perimetre-restreint.png","datePublished":"2023-03-08T13:00:37+00:00","dateModified":"2025-04-24T13:38:11+00:00","author":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2"},"description":"Commencez l\u2019anonymisation par un p\u00e9rim\u00e8tre restreint pour s\u00e9curiser vos donn\u00e9es, impliquer vos \u00e9quipes et r\u00e9ussir votre conformit\u00e9 RGPD.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.fr\/dot\/ressources\/blog\/anonymisation-des-donnees-pourquoi-commencer-par-un-perimetre-restreint-est-une-bonne-idee\/#primaryimage","url":"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2023\/03\/Banniere-blog-article-anonymisation-des-donnees-perimetre-restreint.png","contentUrl":"https:\/\/www.arcadsoftware.fr\/dot\/wp-content\/uploads\/2023\/03\/Banniere-blog-article-anonymisation-des-donnees-perimetre-restreint.png","width":940,"height":350,"caption":"Banniere blog article anonymisation des donnees perimetre restreint"},{"@type":"WebSite","@id":"https:\/\/www.arcadsoftware.com\/dot\/#website","url":"https:\/\/www.arcadsoftware.com\/dot\/","name":"DOT - Data Oriented Testing","description":"Confidential Data Testing Automation","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2","name":"Myriam Goutte"}]}},"_links":{"self":[{"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/posts\/7895","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/comments?post=7895"}],"version-history":[{"count":5,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/posts\/7895\/revisions"}],"predecessor-version":[{"id":11748,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/posts\/7895\/revisions\/11748"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/media\/7897"}],"wp:attachment":[{"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/media?parent=7895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/categories?post=7895"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arcadsoftware.fr\/dot\/wp-json\/wp\/v2\/tags?post=7895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}