{"id":394,"date":"2025-11-16T21:30:48","date_gmt":"2025-11-16T21:30:48","guid":{"rendered":"https:\/\/family-office-advisory.com\/wiki\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees\/"},"modified":"2025-11-16T22:16:16","modified_gmt":"2025-11-16T22:16:16","password":"","slug":"controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees","status":"publish","type":"docs","link":"https:\/\/family-office-advisory.com\/fr\/wiki\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees\/","title":{"rendered":"Contr\u00f4les de la cybers\u00e9curit\u00e9 et de la confidentialit\u00e9 des donn\u00e9es"},"content":{"rendered":"\n<h2 class=\"wp-block-heading highlight\" id=\"h-cybersecurity-amp-data-privacy-controls\"><span class=\"highlight\">Contr\u00f4les de la cybers\u00e9curit\u00e9 et de la confidentialit\u00e9 des donn\u00e9es<\/span><\/h2>\n\n<p>Les <span class=\"highlight\">contr\u00f4les de cybers\u00e9curit\u00e9 et de confidentialit\u00e9 des donn\u00e9es<\/span> prot\u00e8gent les familles UHNW des cybermenaces, de la criminalit\u00e9 financi\u00e8re, de l&rsquo;usurpation d&rsquo;identit\u00e9, des atteintes \u00e0 la r\u00e9putation et de la perte d&rsquo;informations confidentielles. Parce que les family offices g\u00e8rent des donn\u00e9es financi\u00e8res, personnelles et op\u00e9rationnelles sensibles, et qu&rsquo;ils op\u00e8rent souvent \u00e0 travers de multiples juridictions, appareils et environnements de voyage, une cybers\u00e9curit\u00e9 solide est essentielle pour pr\u00e9server la confiance et assurer la continuit\u00e9 op\u00e9rationnelle. <\/p>\n\n<h2 class=\"wp-block-heading highlight\" id=\"h-context-amp-importance\"><span class=\"highlight\">Contexte et importance<\/span><\/h2>\n\n<p>Les family offices sont des cibles de choix pour les cybercriminels en raison de leur richesse, de leur surveillance publique limit\u00e9e et de leur infrastructure de s\u00e9curit\u00e9 souvent sous-d\u00e9velopp\u00e9e. Les menaces comprennent le phishing, les ransomwares, le vol d&rsquo;identit\u00e9, la compromission de comptes, la fraude \u00e9lectronique, le piratage d&rsquo;appareils, l&rsquo;espionnage et les menaces internes. La mise en \u0153uvre de contr\u00f4les robustes en mati\u00e8re de cybers\u00e9curit\u00e9 et de confidentialit\u00e9 des donn\u00e9es r\u00e9duit les vuln\u00e9rabilit\u00e9s et garantit la conformit\u00e9 avec les r\u00e9glementations relatives \u00e0 la protection des donn\u00e9es.  <\/p>\n\n<h2 class=\"wp-block-heading highlight\" id=\"h-core-cybersecurity-framework\"><span class=\"highlight\">Cadre de cybers\u00e9curit\u00e9 de base<\/span><\/h2>\n\n<p>La plupart des family offices adoptent un cadre de s\u00e9curit\u00e9 multicouche align\u00e9 sur des normes telles que NIST CSF, ISO 27001 et CIS Controls.<\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong class=\"highlight\">Identifier :<\/strong> Cartographier les appareils, les syst\u00e8mes, les donn\u00e9es et les vuln\u00e9rabilit\u00e9s.<\/li>\n\n\n\n<li><strong class=\"highlight\">Prot\u00e9gez :<\/strong> Mettre en \u0153uvre des contr\u00f4les pour s\u00e9curiser les donn\u00e9es, les r\u00e9seaux et les appareils.<\/li>\n\n\n\n<li><strong class=\"highlight\">D\u00e9tecter :<\/strong> Surveillez les comportements suspects ou les attaques.<\/li>\n\n\n\n<li><strong class=\"highlight\">R\u00e9agissez :<\/strong> \u00c9tablir des proc\u00e9dures pour contenir et att\u00e9nuer les incidents.<\/li>\n\n\n\n<li><strong class=\"highlight\">R\u00e9cup\u00e9rer :<\/strong> Restaurer les syst\u00e8mes et renforcer les contr\u00f4les apr\u00e8s une attaque.<\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading highlight\" id=\"h-key-cybersecurity-controls\"><span class=\"highlight\">Principaux contr\u00f4les de cybers\u00e9curit\u00e9<\/span><\/h2>\n\n<p>Les contr\u00f4les de cybers\u00e9curit\u00e9 concernent les personnes, les processus et la technologie. Pour \u00eatre efficace, ces trois \u00e9l\u00e9ments doivent fonctionner ensemble. <\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Gestion des identit\u00e9s et des acc\u00e8s (IAM) :<\/strong> Authentification multifactorielle (MFA), contr\u00f4les d&rsquo;acc\u00e8s privil\u00e9gi\u00e9s, gestionnaires de mots de passe et authentification unique.<\/li>\n\n\n\n<li><strong>S\u00e9curit\u00e9 des points finaux :<\/strong> Antivirus, chiffrement des appareils, gestion des appareils mobiles (MDM) et configuration s\u00e9curis\u00e9e.<\/li>\n\n\n\n<li><strong>S\u00e9curit\u00e9 des r\u00e9seaux :<\/strong> Pare-feu, VPN, syst\u00e8mes de d\u00e9tection d&rsquo;intrusion et surveillance du trafic.<\/li>\n\n\n\n<li><strong>Communication s\u00e9curis\u00e9e :<\/strong> Courrier \u00e9lectronique crypt\u00e9, applications de messagerie s\u00e9curis\u00e9es et \u00e9vitement des plateformes grand public.<\/li>\n\n\n\n<li><strong>Risque li\u00e9 aux fournisseurs et aux tiers :<\/strong> Effectuez un contr\u00f4le pr\u00e9alable de la s\u00e9curit\u00e9, demandez des rapports SOC et surveillez les risques en cours.<\/li>\n\n\n\n<li><strong>Pr\u00e9vention du phishing et de la fraude :<\/strong> Formation, exercices de simulation d&rsquo;hame\u00e7onnage et proc\u00e9dures d&rsquo;escalade de la fraude.<\/li>\n\n\n\n<li><strong>Contr\u00f4les de paiement s\u00e9curis\u00e9s :<\/strong> Double autorisation, v\u00e9rification par rappel et d\u00e9tection des anomalies.<\/li>\n\n\n\n<li><strong>Pr\u00e9vention des pertes de donn\u00e9es (DLP) :<\/strong> Contr\u00f4les visant \u00e0 emp\u00eacher les transferts ou l&rsquo;acc\u00e8s non autoris\u00e9s \u00e0 des informations sensibles.<\/li>\n\n\n\n<li><strong>Sauvegarde et r\u00e9cup\u00e9ration :<\/strong> Sauvegardes crypt\u00e9es, hors ligne et redondantes avec tests de restauration r\u00e9guliers.<\/li>\n\n\n\n<li><strong>Cyberassurance :<\/strong> Protection financi\u00e8re contre les cyberincidents, les ransomwares et les violations de donn\u00e9es.<\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading highlight\" id=\"h-data-privacy-controls\"><span class=\"highlight\">Contr\u00f4les de la confidentialit\u00e9 des donn\u00e9es<\/span><\/h2>\n\n<p>La confidentialit\u00e9 des donn\u00e9es se concentre sur la protection de la confidentialit\u00e9 et de l&rsquo;int\u00e9grit\u00e9 des informations personnelles et financi\u00e8res, en veillant \u00e0 la conformit\u00e9 avec des r\u00e9glementations telles que le GDPR, le CCPA et d&rsquo;autres lois juridictionnelles.<\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Classification des donn\u00e9es :<\/strong> Classez les donn\u00e9es en fonction de leur sensibilit\u00e9 et attribuez des r\u00e8gles de traitement.<\/li>\n\n\n\n<li><strong>La minimisation des donn\u00e9es :<\/strong> Limitez la collecte et le stockage au strict n\u00e9cessaire.<\/li>\n\n\n\n<li><strong>Contr\u00f4les d&rsquo;acc\u00e8s :<\/strong> Accordez l&rsquo;acc\u00e8s strictement sur la base du besoin de savoir.<\/li>\n\n\n\n<li><strong>Stockage s\u00e9curis\u00e9 des documents :<\/strong> Syst\u00e8mes de gestion de documents crypt\u00e9s avec contr\u00f4le des versions.<\/li>\n\n\n\n<li><strong>S\u00e9curisez le partage de fichiers :<\/strong> Utilisez des plateformes de partage de fichiers crypt\u00e9es avec des journaux d&rsquo;audit.<\/li>\n\n\n\n<li><strong>Politiques de conservation :<\/strong> D\u00e9finissez les d\u00e9lais de stockage et de suppression des informations sensibles.<\/li>\n\n\n\n<li><strong>Respect de la vie priv\u00e9e d\u00e8s la conception :<\/strong> Int\u00e9grer le respect de la vie priv\u00e9e dans tous les syst\u00e8mes et processus.<\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading highlight\" id=\"h-implementation-amp-best-practices\"><span class=\"highlight\">Mise en \u0153uvre et bonnes pratiques<\/span><\/h2>\n\n<ul class=\"wp-block-list\">\n<li><strong>R\u00e9alisez un audit de cybers\u00e9curit\u00e9 :<\/strong> \u00c9valuez la maturit\u00e9 actuelle et identifiez les lacunes.<\/li>\n\n\n\n<li><strong>\u00c9laborer une politique de cybers\u00e9curit\u00e9 :<\/strong> Documentez les comportements attendus, les contr\u00f4les techniques et l&rsquo;application de la loi.<\/li>\n\n\n\n<li><strong>Faites appel \u00e0 des experts externes :<\/strong> Testeurs de p\u00e9n\u00e9tration, centres d&rsquo;op\u00e9rations de s\u00e9curit\u00e9 (SOC) et conseillers en mati\u00e8re de risques.<\/li>\n\n\n\n<li><strong>Mettez en \u0153uvre les principes du moindre privil\u00e8ge :<\/strong> Limitez l&rsquo;acc\u00e8s aux autorisations minimales n\u00e9cessaires.<\/li>\n\n\n\n<li><strong>Formez r\u00e9guli\u00e8rement les utilisateurs :<\/strong> Les membres de la famille et le personnel doivent comprendre les menaces et les comportements s\u00e9curitaires.<\/li>\n\n\n\n<li><strong>Utilisez des appareils s\u00e9curis\u00e9s :<\/strong> Fournissez aux membres de votre famille des appareils pr\u00e9configur\u00e9s et des outils de s\u00e9curit\u00e9 mobile.<\/li>\n\n\n\n<li><strong>Cryptez toutes les donn\u00e9es sensibles :<\/strong> tant en transit qu&rsquo;au repos.<\/li>\n\n\n\n<li><strong>Tester les plans d&rsquo;intervention en cas d&rsquo;incident :<\/strong> Simulez des cyberattaques pour vous assurer que vous \u00eates pr\u00eats.<\/li>\n\n\n\n<li><strong>Surveillez en permanence :<\/strong> Utilisez des services SOC et des outils de d\u00e9tection automatis\u00e9s.<\/li>\n\n\n\n<li><strong>R\u00e9vision annuelle :<\/strong> Mettez \u00e0 jour les contr\u00f4les en fonction de l&rsquo;\u00e9volution des menaces et des technologies.<\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading highlight\" id=\"h-common-challenges\"><span class=\"highlight\">D\u00e9fis communs<\/span><\/h2>\n\n<ul class=\"wp-block-list\">\n<li>Les membres de la famille qui utilisent des appareils ou des r\u00e9seaux non s\u00e9curis\u00e9s.<\/li>\n\n\n\n<li>Une formation insuffisante en mati\u00e8re de sensibilisation est \u00e0 l&rsquo;origine du succ\u00e8s de l&rsquo;hame\u00e7onnage.<\/li>\n\n\n\n<li>Shadow IT &#8211; applications ou outils non autoris\u00e9s utilis\u00e9s par le personnel ou la famille.<\/li>\n\n\n\n<li>Mauvaises pratiques en mati\u00e8re de mots de passe ou de partage d&rsquo;informations d&rsquo;identification.<\/li>\n\n\n\n<li>Des fournisseurs tiers non contr\u00f4l\u00e9s qui introduisent des vuln\u00e9rabilit\u00e9s.<\/li>\n\n\n\n<li>Absence de propri\u00e9t\u00e9 ou de documentation claire des donn\u00e9es.<\/li>\n\n\n\n<li>Complexit\u00e9 de la protection transfrontali\u00e8re des donn\u00e9es personnelles.<\/li>\n<\/ul>\n\n<h2 class=\"&lt;\/div&gt; wp-block-heading\"><\/h2>","protected":false},"excerpt":{"rendered":"<p>Contr\u00f4les de la cybers\u00e9curit\u00e9 et de la confidentialit\u00e9 des donn\u00e9es Les contr\u00f4les de cybers\u00e9curit\u00e9 et de confidentialit\u00e9 des donn\u00e9es prot\u00e8gent [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"doc_category":[63],"doc_tag":[],"class_list":["post-394","docs","type-docs","status-publish","hentry","doc_category-operations-et-infrastructures"],"year_month":"2026-04","word_count":1007,"total_views":0,"reactions":{"happy":0,"normal":0,"sad":0},"author_info":{"name":"admin","author_nicename":"email_t1xzty82","author_url":"https:\/\/family-office-advisory.com\/fr\/author\/email_t1xzty82\/"},"doc_category_info":[{"term_name":"Op\u00e9rations et infrastructures","term_url":"https:\/\/family-office-advisory.com\/fr\/wiki-category\/operations-et-infrastructures\/"}],"doc_tag_info":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Contr\u00f4les de la cybers\u00e9curit\u00e9 et de la confidentialit\u00e9 des donn\u00e9es - Family Office Advisory<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/family-office-advisory.com\/fr\/wiki\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Contr\u00f4les de la cybers\u00e9curit\u00e9 et de la confidentialit\u00e9 des donn\u00e9es\" \/>\n<meta property=\"og:description\" content=\"Contr\u00f4les de la cybers\u00e9curit\u00e9 et de la confidentialit\u00e9 des donn\u00e9es Les contr\u00f4les de cybers\u00e9curit\u00e9 et de confidentialit\u00e9 des donn\u00e9es prot\u00e8gent [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/family-office-advisory.com\/fr\/wiki\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees\/\" \/>\n<meta property=\"og:site_name\" content=\"Family Office Advisory\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-16T22:16:16+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/wiki\\\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees\\\/\",\"url\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/wiki\\\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees\\\/\",\"name\":\"Contr\u00f4les de la cybers\u00e9curit\u00e9 et de la confidentialit\u00e9 des donn\u00e9es - Family Office Advisory\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/#website\"},\"datePublished\":\"2025-11-16T21:30:48+00:00\",\"dateModified\":\"2025-11-16T22:16:16+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/wiki\\\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/wiki\\\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/wiki\\\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/accueil\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Knowledge Base\",\"item\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/wiki\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Contr\u00f4les de la cybers\u00e9curit\u00e9 et de la confidentialit\u00e9 des donn\u00e9es\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/\",\"name\":\"Family Office Advisory\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Contr\u00f4les de la cybers\u00e9curit\u00e9 et de la confidentialit\u00e9 des donn\u00e9es - Family Office Advisory","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/family-office-advisory.com\/fr\/wiki\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees\/","og_locale":"fr_FR","og_type":"article","og_title":"Contr\u00f4les de la cybers\u00e9curit\u00e9 et de la confidentialit\u00e9 des donn\u00e9es","og_description":"Contr\u00f4les de la cybers\u00e9curit\u00e9 et de la confidentialit\u00e9 des donn\u00e9es Les contr\u00f4les de cybers\u00e9curit\u00e9 et de confidentialit\u00e9 des donn\u00e9es prot\u00e8gent [&hellip;]","og_url":"https:\/\/family-office-advisory.com\/fr\/wiki\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees\/","og_site_name":"Family Office Advisory","article_modified_time":"2025-11-16T22:16:16+00:00","twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/family-office-advisory.com\/fr\/wiki\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees\/","url":"https:\/\/family-office-advisory.com\/fr\/wiki\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees\/","name":"Contr\u00f4les de la cybers\u00e9curit\u00e9 et de la confidentialit\u00e9 des donn\u00e9es - Family Office Advisory","isPartOf":{"@id":"https:\/\/family-office-advisory.com\/fr\/#website"},"datePublished":"2025-11-16T21:30:48+00:00","dateModified":"2025-11-16T22:16:16+00:00","breadcrumb":{"@id":"https:\/\/family-office-advisory.com\/fr\/wiki\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/family-office-advisory.com\/fr\/wiki\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/family-office-advisory.com\/fr\/wiki\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/family-office-advisory.com\/fr\/accueil\/"},{"@type":"ListItem","position":2,"name":"Knowledge Base","item":"https:\/\/family-office-advisory.com\/fr\/wiki\/"},{"@type":"ListItem","position":3,"name":"Contr\u00f4les de la cybers\u00e9curit\u00e9 et de la confidentialit\u00e9 des donn\u00e9es"}]},{"@type":"WebSite","@id":"https:\/\/family-office-advisory.com\/fr\/#website","url":"https:\/\/family-office-advisory.com\/fr\/","name":"Family Office Advisory","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/family-office-advisory.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"knowledge_base_info":[],"knowledge_base_slug":[],"_links":{"self":[{"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/docs\/394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/docs"}],"about":[{"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/types\/docs"}],"author":[{"embeddable":true,"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/comments?post=394"}],"version-history":[{"count":1,"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/docs\/394\/revisions"}],"predecessor-version":[{"id":395,"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/docs\/394\/revisions\/395"}],"wp:attachment":[{"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/media?parent=394"}],"wp:term":[{"taxonomy":"doc_category","embeddable":true,"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/doc_category?post=394"},{"taxonomy":"doc_tag","embeddable":true,"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/doc_tag?post=394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}