{"id":10347,"date":"2023-08-31T13:47:00","date_gmt":"2023-08-31T17:47:00","guid":{"rendered":"https:\/\/nventive.com\/?p=10347"},"modified":"2025-01-25T01:27:04","modified_gmt":"2025-01-25T06:27:04","slug":"loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite","status":"publish","type":"post","link":"https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/","title":{"rendered":"Loi 25\u202f: Conformit\u00e9 et optimisation de nos pratiques en cybers\u00e9curit\u00e9"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"10347\" class=\"elementor elementor-10347\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-320daf43 e-flex e-con-boxed e-con e-parent\" data-id=\"320daf43\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4cc4d59e elementor-widget elementor-widget-text-editor\" data-id=\"4cc4d59e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dans l\u2019histoire r\u00e9cente, nous avons \u00e9t\u00e9 t\u00e9moins de nombreux scandales sur la vie priv\u00e9e qui ont caus\u00e9 bien des maux de t\u00eate. En r\u00e9ponse \u00e0 cela, le gouvernement du Qu\u00e9bec a choisi de prendre de nouvelles dispositions pour prot\u00e9ger la vie priv\u00e9e des Qu\u00e9b\u00e9cois sous la forme de la Loi 25. Adopt\u00e9es et mises en place progressivement depuis septembre 2022, ces nouvelles dispositions entreront en vigueur compl\u00e8te d\u2019ici septembre 2024. Voici comment nventive s\u2019y pr\u00e9pare et comment nos experts renforcent nos mesures de cybers\u00e9curit\u00e9 d\u00e9j\u00e0 en place.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1d694504 e-flex e-con-boxed e-con e-parent\" data-id=\"1d694504\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-51b2528c elementor-widget elementor-widget-text-editor\" data-id=\"51b2528c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Les incidents comme la fuite de donn\u00e9es chez Desjardins, Equifax ou Cambridge Analytica ont engendr\u00e9 un sentiment g\u00e9n\u00e9ral de manque de transparence dans l\u2019exploitation des donn\u00e9es r\u00e9colt\u00e9es en ligne, d\u00fb \u00e0 des lacunes dans les pratiques en entreprise et \u00e0 des pratiques commerciales parfois trompeuses. Il devenait essentiel de garantir une exp\u00e9rience en ligne plus s\u00e9curitaire pour l&rsquo;ensemble des utilisateurs.<\/p><p>L\u2019Europe a d\u2019abord ouvert la voie en mai 2018 avec le R\u00e8glement g\u00e9n\u00e9ral sur la protection des donn\u00e9es (RGPD), puis le Qu\u00e9bec a embo\u00eet\u00e9 le pas avec la Loi 25 visant \u00e0 moderniser notamment la\u00a0<em>Loi sur la protection des renseignements personnels dans le secteur priv\u00e9<\/em>\u00a0datant de 1994. Ces nouvelles obligations s\u2019appliquent \u00e0 toutes les organisations traitant des donn\u00e9es personnelles de leurs utilisateurs. \u00ab\u202f<em>Elles renforcent la protection des renseignements personnels et responsabilisent les entreprises, offrant \u00e0 chaque citoyen un contr\u00f4le plus accru sur l&rsquo;utilisation de ses donn\u00e9es personnelles, sous peine de sanctions financi\u00e8res<\/em>\u202f\u00bb, souligne\u00a0<strong>Christelle Lopez<\/strong>, Product Owner et membre du comit\u00e9 sur la conformit\u00e9 chez nventive.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7d22150 e-flex e-con-boxed e-con e-parent\" data-id=\"7d22150\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d6f8e1a elementor-widget elementor-widget-heading\" data-id=\"d6f8e1a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Qu\u2019est-ce que \u00e7a repr\u00e9sente pour une entreprise de services comme nventive?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20390b1 elementor-widget elementor-widget-text-editor\" data-id=\"20390b1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nos experts travaillent activement sur un vaste \u00e9ventail de projets aupr\u00e8s de nombreux clients en Am\u00e9rique du Nord. \u00c9tant une entreprise qui offre des services de d\u00e9veloppement de solutions num\u00e9riques, les produits qui en d\u00e9coulent sont exploit\u00e9s par nos clients et leurs utilisateurs. Nous nous assurons alors que les donn\u00e9es de chaque projet soient stock\u00e9es de mani\u00e8re s\u00e9curitaire directement chez eux, puisqu\u2019ils en sont les uniques propri\u00e9taires une fois la solution num\u00e9rique lanc\u00e9e.<\/p><p>Nous restreignons l&rsquo;acc\u00e8s aux donn\u00e9es de chaque projet (backlog, requis m\u00e9tiers, code&#8230;) aux personnes ayant un r\u00f4le autoris\u00e9. Si elles sont stock\u00e9es dans le Cloud, comme c\u2019est souvent le cas, nous faisons en sorte que les donn\u00e9es demeurent dans des r\u00e9gions g\u00e9ographiques en accord avec les r\u00e9glementations en vigueur. \u00c0 tout moment, le client conserve le plein contr\u00f4le, et nous prenons toutes les mesures n\u00e9cessaires afin de r\u00e9voquer les acc\u00e8s superflus \u00e0 la fin du projet, assurant ainsi une conformit\u00e9 totale.<\/p><p>Il nous est tenu de bien conna\u00eetre les nouvelles r\u00e8gles de la Loi 25 afin de conformer nos propres pratiques internes, mais notre r\u00f4le aupr\u00e8s de nos clients est plut\u00f4t de les accompagner dans l\u2019adoption de ces nouvelles mesures.\u00a0<strong>Nous ne sommes pas les garants de cette nouvelle loi. Nous les renvoyons plut\u00f4t vers les services juridiques appropri\u00e9s pour que chaque client \u00e9tablisse son propre cadre en r\u00e9ponse \u00e0 ces nouvelles obligations.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-171475c e-flex e-con-boxed e-con e-parent\" data-id=\"171475c\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-134bbf92 elementor-widget elementor-widget-image\" data-id=\"134bbf92\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1149\" height=\"766\" src=\"https:\/\/nventive.com\/app\/uploads\/accompagnement-nouvelles-mesures-loi-25.webp\" class=\"attachment-full size-full wp-image-10343\" alt=\"Accompagnement sur les nouvelles mesures de la loi 25\" srcset=\"https:\/\/nventive.com\/app\/uploads\/accompagnement-nouvelles-mesures-loi-25.webp 1149w, https:\/\/nventive.com\/app\/uploads\/accompagnement-nouvelles-mesures-loi-25-300x200.webp 300w, https:\/\/nventive.com\/app\/uploads\/accompagnement-nouvelles-mesures-loi-25-1024x683.webp 1024w, https:\/\/nventive.com\/app\/uploads\/accompagnement-nouvelles-mesures-loi-25-768x512.webp 768w\" sizes=\"(max-width: 1149px) 100vw, 1149px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7da6448a e-flex e-con-boxed e-con e-parent\" data-id=\"7da6448a\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39e3afdd elementor-widget elementor-widget-heading\" data-id=\"39e3afdd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Mise au point des pratiques internes<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71b8ec85 elementor-widget elementor-widget-text-editor\" data-id=\"71b8ec85\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>S\u2019il s\u2019agit de votre premi\u00e8re visite sur notre site, en naviguant sur cet article, vous avez peut-\u00eatre \u00e9t\u00e9 sond\u00e9s d\u2019un \u00ab\u202fpop-up\u202f\u00bb pour divulguer notre utilisation de t\u00e9moins de navigation (\u00ab\u202fcookies\u202f\u00bb) et vous demander votre autorisation de les utiliser. Effectivement, comme toute entreprise \u0153uvrant sur le web pour renforcer ses canaux de communications, notre \u00e9quipe marketing r\u00e9colte et analyse le trafic et les actions pos\u00e9es sur les diff\u00e9rentes pages du site afin d\u2019offrir une meilleure exp\u00e9rience de navigation et pr\u00e9senter du contenu personnalis\u00e9 et cibl\u00e9.<\/p>\n<p>Avec votre consentement, ces donn\u00e9es sont d\u2019abord anonymis\u00e9es puis stock\u00e9es chez nous, le tout d\u00e9taill\u00e9 explicitement dans notre politique de confidentialit\u00e9. Elle r\u00e9git \u00e9galement le stockage d\u2019une panoplie de donn\u00e9es internes qui se doivent d\u2019\u00eatre conserv\u00e9es s\u00e9curitairement sur nos serveurs (ressources humaines, finances, prospects de vente, etc.)<\/p>\n<p>Notre politique d\u2019entreprise s\u2019est donc aussi value une modernisation n\u00e9cessaire suite \u00e0 la mise en place de la Loi 25. Heureusement, nos processus d\u00e9j\u00e0 tr\u00e8s rigoureux \u00e9tablis par nos experts en cybers\u00e9curit\u00e9 n\u2019ont n\u00e9cessit\u00e9 qu\u2019une simple mise au point pour mieux s\u2019y conformer.<\/p>\n<p>Parmi les nouveaux \u00e9l\u00e9ments essentiels pr\u00e9vus par la loi, nous avions d\u00e9j\u00e0 mis en place un registre des incidents contenant de nombreux d\u00e9tails au fil des ann\u00e9es, ainsi qu\u2019un plan de r\u00e9ponse \u00e9prouv\u00e9. En plus des&nbsp;<a style=\"text-decoration: underline;\" href=\"\/fr\/articles\/les-10-controles-indispensables-de-la-cybersecurite\">contr\u00f4les indispensables de cybers\u00e9curit\u00e9<\/a>&nbsp;\u00e9labor\u00e9s par nos experts, la demande de consentement aux t\u00e9moins de navigation \u00e9tait d\u00e9j\u00e0 active, comprenant les d\u00e9tails clairs sur leur utilisation, et notre responsable de la protection des renseignements personnels avait \u00e9t\u00e9 d\u00e9sign\u00e9 depuis longtemps afin d\u2019encadrer la gouvernance des donn\u00e9es.<\/p>\n<p>Pour s\u2019y conformer davantage, nos experts en cybers\u00e9curit\u00e9 se sont assur\u00e9s de documenter et de veiller \u00e0 la transparence de nos politiques, notamment sur le processus de collecte, la conservation, la destruction et l\u2019anonymisation des donn\u00e9es personnelles. \u00ab\u202fIl fallait entre autres s\u2019interroger sur les fournisseurs de services avec qui nous faisons affaire pour d\u00e9terminer o\u00f9 sont stock\u00e9es nos donn\u00e9es externes et ce qu\u2019ils font avec, s\u2019assurer que les informations sur le site web soient facilement accessibles, veiller \u00e0 ce que seulement certains r\u00f4les puissent avoir un acc\u00e8s privil\u00e9gi\u00e9 \u00e0 certaines donn\u00e9es \u00e0 l\u2019interne, tout \u00e7a en agr\u00e9mentant nos politiques au maximum\u202f\u00bb, explique Francis Venne, responsable de la s\u00e9curit\u00e9 informatique chez nventive.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3b190ab4 e-flex e-con-boxed e-con e-parent\" data-id=\"3b190ab4\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1ac6140 elementor-widget elementor-widget-image\" data-id=\"1ac6140\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1482\" height=\"988\" src=\"https:\/\/nventive.com\/app\/uploads\/developpeurs-travaillant-sur-mise-en-place-bonnes-pratiques.webp\" class=\"attachment-full size-full wp-image-10345\" alt=\"D\u00e9veloppeurs travaillant sur la mise en place de bonnes pratiques\" srcset=\"https:\/\/nventive.com\/app\/uploads\/developpeurs-travaillant-sur-mise-en-place-bonnes-pratiques.webp 1482w, https:\/\/nventive.com\/app\/uploads\/developpeurs-travaillant-sur-mise-en-place-bonnes-pratiques-300x200.webp 300w, https:\/\/nventive.com\/app\/uploads\/developpeurs-travaillant-sur-mise-en-place-bonnes-pratiques-1024x683.webp 1024w, https:\/\/nventive.com\/app\/uploads\/developpeurs-travaillant-sur-mise-en-place-bonnes-pratiques-768x512.webp 768w\" sizes=\"(max-width: 1482px) 100vw, 1482px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-44e581c6 e-flex e-con-boxed e-con e-parent\" data-id=\"44e581c6\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7a3264cf elementor-widget elementor-widget-heading\" data-id=\"7a3264cf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ce qu\u2019il faut retenir<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10b334f6 elementor-widget elementor-widget-text-editor\" data-id=\"10b334f6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La premi\u00e8re chose \u00e0 faire, peu importe o\u00f9 vous en \u00eates dans vos d\u00e9marches, c\u2019est de s\u2019assurer d\u2019obtenir les meilleurs conseils l\u00e9gaux afin que toutes les mesures soient mises en place et correspondent \u00e0 votre utilisation des donn\u00e9es personnelles de vos utilisateurs. Aucune compagnie n\u2019est identique, et les conseils que nventive a re\u00e7us sont uniques \u00e0 nos pratiques d\u2019entreprise. Mal se conformer ou omettre de le faire peut mener \u00e0 des amendes tr\u00e8s sal\u00e9es.<\/p><p>En suivant de bons conseils juridiques, veillez \u00e0 comprendre le parcours des donn\u00e9es de vos clients une fois le consentement re\u00e7u, r\u00e9visez vos mesures de cybers\u00e9curit\u00e9 et maintenez-les \u00e0 jour. Prot\u00e9ger ses utilisateurs et leur garantir une navigation s\u00e9curitaire fait partie d\u2019un processus continu.<\/p><p><strong>Choisir de faire affaire avec nventive, c\u2019est s\u2019assurer d\u2019\u00eatre du bon c\u00f4t\u00e9 de la loi. Notre \u00e9quipe en conna\u00eet bien les tenants et aboutissants et, en collaboration avec votre \u00e9quipe l\u00e9gale, nous veillons \u00e0 ce que votre solution comporte les fonctionnalit\u00e9s essentielles pour assurer sa conformit\u00e9.<\/strong><\/p><p><em>Les renseignements affich\u00e9s sur le site Web de nventive sont g\u00e9n\u00e9raux et fournis \u00e0 titre informatif seulement. Rien de ce qui y figure n\u2019est un conseil ou un avis juridique. Vous devez consulter un avocat avant de vous fier \u00e0 toute information affich\u00e9e par nventive.<\/em><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7095802 e-con-full e-flex e-con e-parent\" data-id=\"7095802\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5804479 elementor-widget elementor-widget-template\" data-id=\"5804479\" data-element_type=\"widget\" data-widget_type=\"template.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-template\">\n\t\t\t\t\t<div data-elementor-type=\"container\" data-elementor-id=\"12184\" class=\"elementor elementor-12184\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t<div class=\"elementor-element elementor-element-40d5957e e-flex e-con-boxed e-con e-parent\" data-id=\"40d5957e\" data-element_type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-1b78efbf e-con-full e-flex e-con e-child\" data-id=\"1b78efbf\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7e14a4ef elementor-widget elementor-widget-heading\" data-id=\"7e14a4ef\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Articles en vedette<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2902db16 elementor-widget elementor-widget-nv-button\" data-id=\"2902db16\" data-element_type=\"widget\" data-widget_type=\"nv-button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n                <a\n            class=\"nv-button  nv-button--style--desktop--outline-icon nv-button--style--laptop--outline-icon nv-button--style--tablet--outline-icon nv-button--style--mobile--outline-icon nv-button--theme--desktop--dark nv-button--theme--laptop--dark nv-button--theme--tablet--dark nv-button--theme--mobile--dark\" href=\"https:\/\/nventive.com\/fr\/blogue\/\" aria-label=\"Voir tous les articles\"        >\n            <span class=\"nv-button__text\">Voir tous les articles<\/span>\n            <span class=\"nv-button__icon\">\n                <i aria-hidden=\"true\" class=\"myemoji-icon my-emoji-iconarrow_right_alt\"><\/i>            <\/span>\n        <\/a>\n            \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2e3d033e elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-widget elementor-widget-loop-grid\" data-id=\"2e3d033e\" data-element_type=\"widget\" data-settings=\"{&quot;template_id&quot;:5334,&quot;_skin&quot;:&quot;post&quot;,&quot;columns&quot;:&quot;3&quot;,&quot;columns_tablet&quot;:&quot;2&quot;,&quot;columns_mobile&quot;:&quot;1&quot;,&quot;edit_handle_selector&quot;:&quot;[data-elementor-type=\\&quot;loop-item\\&quot;]&quot;,&quot;row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_laptop&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"loop-grid.post\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-loop-nothing-found-message\">\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Dans l\u2019histoire r\u00e9cente, nous avons \u00e9t\u00e9 t\u00e9moins de nombreux scandales sur la vie priv\u00e9e qui ont caus\u00e9 bien des maux de t\u00eate.<\/p>\n","protected":false},"author":3,"featured_media":11236,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[53],"main_article":[],"class_list":["post-10347","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualites","tag-cybersecurite"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Loi 25\u202f: Conformit\u00e9 et optimisation de nos pratiques en cybers\u00e9curit\u00e9 | nventive<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez les implications de la Loi 25 et comment elle pousse \u00e0 repenser les strat\u00e9gies de cybers\u00e9curit\u00e9 pour renforcer la protection des informations sensibles.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Loi 25\u202f: Conformit\u00e9 et optimisation de nos pratiques en cybers\u00e9curit\u00e9 | nventive\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez les implications de la Loi 25 et comment elle pousse \u00e0 repenser les strat\u00e9gies de cybers\u00e9curit\u00e9 pour renforcer la protection des informations sensibles.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/\" \/>\n<meta property=\"og:site_name\" content=\"nventive\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-31T17:47:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-25T06:27:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nventive.com\/app\/uploads\/loi-25-conformite-et-optimisation-des-pratiques-en-cybersecurite.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"nventive\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"nventive\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/\"},\"author\":{\"name\":\"nventive\",\"@id\":\"https:\/\/nventive.com\/fr\/#\/schema\/person\/4669a628d5e8b86da71213be631ee379\"},\"headline\":\"Loi 25\u202f: Conformit\u00e9 et optimisation de nos pratiques en cybers\u00e9curit\u00e9\",\"datePublished\":\"2023-08-31T17:47:00+00:00\",\"dateModified\":\"2025-01-25T06:27:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/\"},\"wordCount\":1241,\"publisher\":{\"@id\":\"https:\/\/nventive.com\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nventive.com\/app\/uploads\/loi-25-conformite-et-optimisation-des-pratiques-en-cybersecurite.webp\",\"keywords\":[\"Cybers\u00e9curit\u00e9\"],\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/\",\"url\":\"https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/\",\"name\":\"Loi 25\u202f: Conformit\u00e9 et optimisation de nos pratiques en cybers\u00e9curit\u00e9 | nventive\",\"isPartOf\":{\"@id\":\"https:\/\/nventive.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nventive.com\/app\/uploads\/loi-25-conformite-et-optimisation-des-pratiques-en-cybersecurite.webp\",\"datePublished\":\"2023-08-31T17:47:00+00:00\",\"dateModified\":\"2025-01-25T06:27:04+00:00\",\"description\":\"D\u00e9couvrez les implications de la Loi 25 et comment elle pousse \u00e0 repenser les strat\u00e9gies de cybers\u00e9curit\u00e9 pour renforcer la protection des informations sensibles.\",\"breadcrumb\":{\"@id\":\"https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/#primaryimage\",\"url\":\"https:\/\/nventive.com\/app\/uploads\/loi-25-conformite-et-optimisation-des-pratiques-en-cybersecurite.webp\",\"contentUrl\":\"https:\/\/nventive.com\/app\/uploads\/loi-25-conformite-et-optimisation-des-pratiques-en-cybersecurite.webp\",\"width\":1920,\"height\":1280},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/nventive.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Loi 25\u202f: Conformit\u00e9 et optimisation de nos pratiques en cybers\u00e9curit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nventive.com\/fr\/#website\",\"url\":\"https:\/\/nventive.com\/fr\/\",\"name\":\"nventive\",\"description\":\"D\u00e9veloppement mobile et logiciel \u00e0 Montr\u00e9al\",\"publisher\":{\"@id\":\"https:\/\/nventive.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nventive.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/nventive.com\/fr\/#organization\",\"name\":\"nventive\",\"url\":\"https:\/\/nventive.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/nventive.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"nventive\"},\"image\":{\"@id\":\"https:\/\/nventive.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/nventive\/\",\"https:\/\/www.instagram.com\/hellonventive\/\",\"https:\/\/www.youtube.com\/channel\/UCFQyvGEKMO10hEyvCqprp5w\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/nventive.com\/fr\/#\/schema\/person\/4669a628d5e8b86da71213be631ee379\",\"name\":\"nventive\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/nventive.com\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/36dfee0d60b70674aca73f8dc387c367c60e0c101e04254f979ad77fe5b42d52?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/36dfee0d60b70674aca73f8dc387c367c60e0c101e04254f979ad77fe5b42d52?s=96&d=mm&r=g\",\"caption\":\"nventive\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Loi 25\u202f: Conformit\u00e9 et optimisation de nos pratiques en cybers\u00e9curit\u00e9 | nventive","description":"D\u00e9couvrez les implications de la Loi 25 et comment elle pousse \u00e0 repenser les strat\u00e9gies de cybers\u00e9curit\u00e9 pour renforcer la protection des informations sensibles.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/","og_locale":"fr_FR","og_type":"article","og_title":"Loi 25\u202f: Conformit\u00e9 et optimisation de nos pratiques en cybers\u00e9curit\u00e9 | nventive","og_description":"D\u00e9couvrez les implications de la Loi 25 et comment elle pousse \u00e0 repenser les strat\u00e9gies de cybers\u00e9curit\u00e9 pour renforcer la protection des informations sensibles.","og_url":"https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/","og_site_name":"nventive","article_published_time":"2023-08-31T17:47:00+00:00","article_modified_time":"2025-01-25T06:27:04+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/nventive.com\/app\/uploads\/loi-25-conformite-et-optimisation-des-pratiques-en-cybersecurite.webp","type":"image\/webp"}],"author":"nventive","twitter_card":"summary_large_image","twitter_misc":{"Written by":"nventive","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/#article","isPartOf":{"@id":"https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/"},"author":{"name":"nventive","@id":"https:\/\/nventive.com\/fr\/#\/schema\/person\/4669a628d5e8b86da71213be631ee379"},"headline":"Loi 25\u202f: Conformit\u00e9 et optimisation de nos pratiques en cybers\u00e9curit\u00e9","datePublished":"2023-08-31T17:47:00+00:00","dateModified":"2025-01-25T06:27:04+00:00","mainEntityOfPage":{"@id":"https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/"},"wordCount":1241,"publisher":{"@id":"https:\/\/nventive.com\/fr\/#organization"},"image":{"@id":"https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/nventive.com\/app\/uploads\/loi-25-conformite-et-optimisation-des-pratiques-en-cybersecurite.webp","keywords":["Cybers\u00e9curit\u00e9"],"articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/","url":"https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/","name":"Loi 25\u202f: Conformit\u00e9 et optimisation de nos pratiques en cybers\u00e9curit\u00e9 | nventive","isPartOf":{"@id":"https:\/\/nventive.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/#primaryimage"},"image":{"@id":"https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/#primaryimage"},"thumbnailUrl":"https:\/\/nventive.com\/app\/uploads\/loi-25-conformite-et-optimisation-des-pratiques-en-cybersecurite.webp","datePublished":"2023-08-31T17:47:00+00:00","dateModified":"2025-01-25T06:27:04+00:00","description":"D\u00e9couvrez les implications de la Loi 25 et comment elle pousse \u00e0 repenser les strat\u00e9gies de cybers\u00e9curit\u00e9 pour renforcer la protection des informations sensibles.","breadcrumb":{"@id":"https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/#primaryimage","url":"https:\/\/nventive.com\/app\/uploads\/loi-25-conformite-et-optimisation-des-pratiques-en-cybersecurite.webp","contentUrl":"https:\/\/nventive.com\/app\/uploads\/loi-25-conformite-et-optimisation-des-pratiques-en-cybersecurite.webp","width":1920,"height":1280},{"@type":"BreadcrumbList","@id":"https:\/\/nventive.com\/fr\/articles\/loi-25-conformite-optimisation-de-nos-pratiques-en-cybersecurite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/nventive.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Loi 25\u202f: Conformit\u00e9 et optimisation de nos pratiques en cybers\u00e9curit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/nventive.com\/fr\/#website","url":"https:\/\/nventive.com\/fr\/","name":"nventive","description":"D\u00e9veloppement mobile et logiciel \u00e0 Montr\u00e9al","publisher":{"@id":"https:\/\/nventive.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nventive.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/nventive.com\/fr\/#organization","name":"nventive","url":"https:\/\/nventive.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/nventive.com\/fr\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"nventive"},"image":{"@id":"https:\/\/nventive.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/nventive\/","https:\/\/www.instagram.com\/hellonventive\/","https:\/\/www.youtube.com\/channel\/UCFQyvGEKMO10hEyvCqprp5w"]},{"@type":"Person","@id":"https:\/\/nventive.com\/fr\/#\/schema\/person\/4669a628d5e8b86da71213be631ee379","name":"nventive","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/nventive.com\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/36dfee0d60b70674aca73f8dc387c367c60e0c101e04254f979ad77fe5b42d52?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/36dfee0d60b70674aca73f8dc387c367c60e0c101e04254f979ad77fe5b42d52?s=96&d=mm&r=g","caption":"nventive"}}]}},"jetpack_featured_media_url":"https:\/\/nventive.com\/app\/uploads\/loi-25-conformite-et-optimisation-des-pratiques-en-cybersecurite.webp","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/posts\/10347","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/comments?post=10347"}],"version-history":[{"count":0,"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/posts\/10347\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/media\/11236"}],"wp:attachment":[{"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/media?parent=10347"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/categories?post=10347"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/tags?post=10347"},{"taxonomy":"main_article","embeddable":true,"href":"https:\/\/nventive.com\/fr\/wp-json\/wp\/v2\/main_article?post=10347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}