{"id":456,"date":"2025-11-15T22:02:12","date_gmt":"2025-11-15T22:02:12","guid":{"rendered":"https:\/\/family-office-advisory.com\/wiki\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees-2\/"},"modified":"2025-11-16T22:16:40","modified_gmt":"2025-11-16T22:16:40","password":"","slug":"controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees-2","status":"publish","type":"docs","link":"https:\/\/family-office-advisory.com\/fr\/wiki\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees-2\/","title":{"rendered":"Contr\u00f4les de la cybers\u00e9curit\u00e9 et de la confidentialit\u00e9 des donn\u00e9es"},"content":{"rendered":"\n<h2 class=\"wp-block-heading highlight\" id=\"h-cybersecurity-amp-data-privacy-controls\"><span class=\"highlight\">Contr\u00f4les de la cybers\u00e9curit\u00e9 et de la confidentialit\u00e9 des donn\u00e9es<\/span><\/h2>\n\n<p>La <span class=\"highlight\">cybers\u00e9curit\u00e9 et la confidentialit\u00e9 des donn\u00e9es<\/span> sont des piliers essentiels de la gestion des risques op\u00e9rationnels au sein d&rsquo;un family office. Compte tenu de la sensibilit\u00e9 des donn\u00e9es financi\u00e8res, des dossiers personnels, des structures d&rsquo;investissement et des informations relatives \u00e0 la succession, les family offices sont des cibles de choix pour les cybercriminels. La mise en \u0153uvre de cadres de s\u00e9curit\u00e9 solides prot\u00e8ge contre les violations de donn\u00e9es, l&rsquo;usurpation d&rsquo;identit\u00e9, la fraude \u00e9lectronique et les acc\u00e8s non autoris\u00e9s, tout en garantissant la conformit\u00e9 avec les r\u00e9glementations mondiales en mati\u00e8re de protection de la vie priv\u00e9e.  <\/p>\n\n<h2 class=\"wp-block-heading highlight\" id=\"h-context-amp-importance\"><span class=\"highlight\">Contexte et importance<\/span><\/h2>\n\n<p>Contrairement aux grandes institutions financi\u00e8res, les family offices fonctionnent souvent avec des \u00e9quipes r\u00e9duites, ce qui les rend vuln\u00e9rables aux attaques sophistiqu\u00e9es telles que le phishing, les ransomwares, la prise de contr\u00f4le de comptes et l&rsquo;ing\u00e9nierie sociale. Comme les family offices coordonnent des structures bancaires, d&rsquo;investissement et juridiques, une violation r\u00e9ussie peut avoir un impact sur les finances personnelles, les dossiers fiscaux, les actifs commerciaux et les affaires familiales confidentielles. Il est donc essentiel d&rsquo;adopter un mod\u00e8le de cybers\u00e9curit\u00e9 proactif et \u00e0 plusieurs niveaux.  <\/p>\n\n<h2 class=\"wp-block-heading highlight\" id=\"h-core-components-of-cybersecurity\"><span class=\"highlight\">Composantes essentielles de la cybers\u00e9curit\u00e9<\/span><\/h2>\n\n<ul class=\"wp-block-list\">\n<li><strong class=\"highlight\">Gestion des identit\u00e9s et des acc\u00e8s (IAM) :<\/strong> Authentification multifactorielle, acc\u00e8s bas\u00e9 sur les r\u00f4les et examens p\u00e9riodiques des acc\u00e8s.<\/li>\n\n\n\n<li><strong class=\"highlight\">Protection des points finaux :<\/strong> Antivirus, chiffrement des appareils, gestion s\u00e9curis\u00e9e des appareils mobiles (MDM).<\/li>\n\n\n\n<li><strong class=\"highlight\">S\u00e9curit\u00e9 du r\u00e9seau :<\/strong> Pare-feu, d\u00e9tection des intrusions, acc\u00e8s VPN uniquement et contr\u00f4les de confiance z\u00e9ro.<\/li>\n\n\n\n<li><strong class=\"highlight\">Communication s\u00e9curis\u00e9e :<\/strong> Courrier \u00e9lectronique crypt\u00e9, portails s\u00e9curis\u00e9s et outils de signature num\u00e9rique.<\/li>\n\n\n\n<li><strong class=\"highlight\">S\u00e9curit\u00e9 des fournisseurs et de l&rsquo;informatique en nuage :<\/strong> Contr\u00f4le pr\u00e9alable des fournisseurs externes, y compris la r\u00e9sidence des donn\u00e9es et les certifications de s\u00e9curit\u00e9.<\/li>\n\n\n\n<li><strong class=\"highlight\">Surveillance et d\u00e9tection :<\/strong> Analyse des journaux, d\u00e9tection des anomalies et surveillance des op\u00e9rations de s\u00e9curit\u00e9 24 heures sur 24 et 7 jours sur 7 (en interne ou externalis\u00e9e).<\/li>\n\n\n\n<li><strong class=\"highlight\">R\u00e9ponse aux incidents :<\/strong> Proc\u00e9dures d\u00e9finies pour les violations, y compris les plans de communication et les protocoles de r\u00e9cup\u00e9ration.<\/li>\n\n\n\n<li><strong class=\"highlight\">Conformit\u00e9 en mati\u00e8re de confidentialit\u00e9 des donn\u00e9es :<\/strong> Alignement sur le GDPR, le DPA suisse et d&rsquo;autres r\u00e9glementations pertinentes.<\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading highlight\" id=\"h-data-privacy-controls\"><span class=\"highlight\">Contr\u00f4les de la confidentialit\u00e9 des donn\u00e9es<\/span><\/h2>\n\n<p>La confidentialit\u00e9 des donn\u00e9es garantit un traitement l\u00e9gal et \u00e9thique des informations personnelles et financi\u00e8res. Les familles rel\u00e8vent souvent de plusieurs juridictions, ce qui rend la conformit\u00e9 complexe. Des contr\u00f4les efficaces att\u00e9nuent les risques externes et internes et favorisent la confiance entre les membres de la famille et les conseillers.  <\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>Classification des donn\u00e9es :<\/strong> \u00c9tiquetez les donn\u00e9es sensibles telles que les passeports, les actes de fiducie, les relev\u00e9s de compte et les dossiers m\u00e9dicaux.<\/li>\n\n\n\n<li><strong>Politiques de conservation et de suppression :<\/strong> Ne conservez les donn\u00e9es qu&rsquo;aussi longtemps que n\u00e9cessaire et \u00e9liminez en toute s\u00e9curit\u00e9 les dossiers p\u00e9rim\u00e9s.<\/li>\n\n\n\n<li><strong>Chiffrement :<\/strong> Cryptage de bout en bout des fichiers sensibles au repos et en transit.<\/li>\n\n\n\n<li><strong>Journaux d&rsquo;acc\u00e8s :<\/strong> Suivez qui a acc\u00e9d\u00e9 \u00e0 quelles donn\u00e9es et \u00e0 quel moment.<\/li>\n\n\n\n<li><strong>Minimisation des donn\u00e9es :<\/strong> Ne collectez et ne partagez que les informations essentielles.<\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading highlight\" id=\"h-implementation-amp-best-practices\"><span class=\"highlight\">Mise en \u0153uvre et bonnes pratiques<\/span><\/h2>\n\n<ul class=\"wp-block-list\">\n<li><strong>Adoptez un mod\u00e8le de s\u00e9curit\u00e9 \u00ab\u00a0z\u00e9ro confiance\u00a0\u00bb :<\/strong> Ne partez jamais du principe que les appareils internes ou les utilisateurs sont s\u00fbrs par d\u00e9faut.<\/li>\n\n\n\n<li><strong>Formation r\u00e9guli\u00e8re \u00e0 la s\u00e9curit\u00e9 :<\/strong> Sensibilisez le personnel et les membres de la famille \u00e0 l&rsquo;hame\u00e7onnage, \u00e0 l&rsquo;ing\u00e9nierie sociale et \u00e0 l&rsquo;hygi\u00e8ne des mots de passe.<\/li>\n\n\n\n<li><strong>Contr\u00f4le pr\u00e9alable du fournisseur :<\/strong> Examinez les rapports SOC 2, les certifications ISO 27001 et les engagements en mati\u00e8re de r\u00e9sidence des donn\u00e9es.<\/li>\n\n\n\n<li><strong>Tests de p\u00e9n\u00e9tration annuels :<\/strong> Identifiez les vuln\u00e9rabilit\u00e9s gr\u00e2ce \u00e0 des tests ind\u00e9pendants.<\/li>\n\n\n\n<li><strong>Segmentez les r\u00e9seaux :<\/strong> S\u00e9parez les r\u00e9seaux des invit\u00e9s, des bureaux et des serveurs.<\/li>\n\n\n\n<li><strong>Renforcez la s\u00e9curit\u00e9 du courrier \u00e9lectronique :<\/strong> Utilisez SPF, DKIM, DMARC et des listes blanches approuv\u00e9es.<\/li>\n\n\n\n<li><strong>S\u00e9curisez le partage des documents :<\/strong> \u00c9vitez les pi\u00e8ces jointes aux courriels ; utilisez des portails s\u00e9curis\u00e9s avec un acc\u00e8s limit\u00e9 dans le temps.<\/li>\n\n\n\n<li><strong>Plan de sauvegarde et de r\u00e9cup\u00e9ration :<\/strong> Conservez des sauvegardes crypt\u00e9es et testez r\u00e9guli\u00e8rement les proc\u00e9dures de restauration.<\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading highlight\" id=\"h-common-challenges\"><span class=\"highlight\">D\u00e9fis communs<\/span><\/h2>\n\n<ul class=\"wp-block-list\">\n<li>Absence de politique formelle en mati\u00e8re de cybers\u00e9curit\u00e9 ou d&rsquo;appropriation.<\/li>\n\n\n\n<li>Des mots de passe faibles et des pratiques d&rsquo;authentification incoh\u00e9rentes.<\/li>\n\n\n\n<li>Appareils personnels non s\u00e9curis\u00e9s utilis\u00e9s pour des communications sensibles.<\/li>\n\n\n\n<li>Insuffisance des capacit\u00e9s de contr\u00f4le ou d&rsquo;examen des journaux.<\/li>\n\n\n\n<li>Fournisseurs tiers non agr\u00e9\u00e9s ayant acc\u00e8s \u00e0 des donn\u00e9es confidentielles.<\/li>\n\n\n\n<li>Utilisation de l&rsquo;informatique fant\u00f4me (applications ou services en nuage non approuv\u00e9s).<\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading highlight\" id=\"h-see-also\"><span class=\"highlight\">Voir aussi<\/span><\/h2>\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/family-office-advisory.com\/wiki\/technology-infrastructure-for-family-offices\/\">Infrastructure technologique pour les soci\u00e9t\u00e9s de gestion de patrimoine<\/a><\/li>\n\n\n\n<li><a href=\"\/wiki\/risk-management-and-reporting\">Gestion des risques et rapports<\/a><\/li>\n\n\n\n<li><a href=\"\/wiki\/family-governance\">Gouvernance familiale<\/a><\/li>\n\n\n\n<li><a href=\"\/wiki\/data-governance-and-document-management\">Gouvernance des donn\u00e9es et gestion des documents<\/a><\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading highlight\" id=\"h-references\"><span class=\"highlight\">R\u00e9f\u00e9rences<\/span><\/h2>\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.kpmg.com\/xx\/en\/home\/services\/advisory\/technology\/cyber-security.html\" target=\"_blank\" rel=\"noopener\">KPMG &#8211; Services de cybers\u00e9curit\u00e9<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.pwc.com\/gx\/en\/services\/cybersecurity.html\" target=\"_blank\" rel=\"noopener\">PwC &#8211; Cybers\u00e9curit\u00e9<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.ey.com\/en_gl\/cybersecurity\" target=\"_blank\" rel=\"noopener\">EY &#8211; Cybers\u00e9curit\u00e9<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.deloitte.com\/global\/en\/services\/risk\/cyber.html\" target=\"_blank\" rel=\"noopener\">Deloitte &#8211; Cyber Risk Services<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.enisa.europa.eu\/\" target=\"_blank\" rel=\"noopener\">ENISA &#8211; Agence de l&rsquo;Union europ\u00e9enne pour la cybers\u00e9curit\u00e9<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/gdpr.eu\/\" target=\"_blank\" rel=\"noopener\">GDPR &#8211; R\u00e8glement g\u00e9n\u00e9ral sur la protection des donn\u00e9es &#8211; Vue d&rsquo;ensemble<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Contr\u00f4les de la cybers\u00e9curit\u00e9 et de la confidentialit\u00e9 des donn\u00e9es La cybers\u00e9curit\u00e9 et la confidentialit\u00e9 des donn\u00e9es sont des piliers [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"doc_category":[63],"doc_tag":[],"class_list":["post-456","docs","type-docs","status-publish","hentry","doc_category-operations-et-infrastructures"],"year_month":"2026-04","word_count":903,"total_views":0,"reactions":{"happy":0,"normal":0,"sad":0},"author_info":{"name":"admin","author_nicename":"email_t1xzty82","author_url":"https:\/\/family-office-advisory.com\/fr\/author\/email_t1xzty82\/"},"doc_category_info":[{"term_name":"Op\u00e9rations et infrastructures","term_url":"https:\/\/family-office-advisory.com\/fr\/wiki-category\/operations-et-infrastructures\/"}],"doc_tag_info":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Contr\u00f4les de la cybers\u00e9curit\u00e9 et de la confidentialit\u00e9 des donn\u00e9es - Family Office Advisory<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/family-office-advisory.com\/fr\/wiki\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Contr\u00f4les de la cybers\u00e9curit\u00e9 et de la confidentialit\u00e9 des donn\u00e9es\" \/>\n<meta property=\"og:description\" content=\"Contr\u00f4les de la cybers\u00e9curit\u00e9 et de la confidentialit\u00e9 des donn\u00e9es La cybers\u00e9curit\u00e9 et la confidentialit\u00e9 des donn\u00e9es sont des piliers [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/family-office-advisory.com\/fr\/wiki\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Family Office Advisory\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-16T22:16:40+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/wiki\\\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees-2\\\/\",\"url\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/wiki\\\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees-2\\\/\",\"name\":\"Contr\u00f4les de la cybers\u00e9curit\u00e9 et de la confidentialit\u00e9 des donn\u00e9es - Family Office Advisory\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/#website\"},\"datePublished\":\"2025-11-15T22:02:12+00:00\",\"dateModified\":\"2025-11-16T22:16:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/wiki\\\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees-2\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/wiki\\\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/wiki\\\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/accueil\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Knowledge Base\",\"item\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/wiki\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Contr\u00f4les de la cybers\u00e9curit\u00e9 et de la confidentialit\u00e9 des donn\u00e9es\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/\",\"name\":\"Family Office Advisory\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Contr\u00f4les de la cybers\u00e9curit\u00e9 et de la confidentialit\u00e9 des donn\u00e9es - Family Office Advisory","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/family-office-advisory.com\/fr\/wiki\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees-2\/","og_locale":"fr_FR","og_type":"article","og_title":"Contr\u00f4les de la cybers\u00e9curit\u00e9 et de la confidentialit\u00e9 des donn\u00e9es","og_description":"Contr\u00f4les de la cybers\u00e9curit\u00e9 et de la confidentialit\u00e9 des donn\u00e9es La cybers\u00e9curit\u00e9 et la confidentialit\u00e9 des donn\u00e9es sont des piliers [&hellip;]","og_url":"https:\/\/family-office-advisory.com\/fr\/wiki\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees-2\/","og_site_name":"Family Office Advisory","article_modified_time":"2025-11-16T22:16:40+00:00","twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/family-office-advisory.com\/fr\/wiki\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees-2\/","url":"https:\/\/family-office-advisory.com\/fr\/wiki\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees-2\/","name":"Contr\u00f4les de la cybers\u00e9curit\u00e9 et de la confidentialit\u00e9 des donn\u00e9es - Family Office Advisory","isPartOf":{"@id":"https:\/\/family-office-advisory.com\/fr\/#website"},"datePublished":"2025-11-15T22:02:12+00:00","dateModified":"2025-11-16T22:16:40+00:00","breadcrumb":{"@id":"https:\/\/family-office-advisory.com\/fr\/wiki\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/family-office-advisory.com\/fr\/wiki\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/family-office-advisory.com\/fr\/wiki\/controles-de-la-cybersecurite-et-de-la-confidentialite-des-donnees-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/family-office-advisory.com\/fr\/accueil\/"},{"@type":"ListItem","position":2,"name":"Knowledge Base","item":"https:\/\/family-office-advisory.com\/fr\/wiki\/"},{"@type":"ListItem","position":3,"name":"Contr\u00f4les de la cybers\u00e9curit\u00e9 et de la confidentialit\u00e9 des donn\u00e9es"}]},{"@type":"WebSite","@id":"https:\/\/family-office-advisory.com\/fr\/#website","url":"https:\/\/family-office-advisory.com\/fr\/","name":"Family Office Advisory","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/family-office-advisory.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"knowledge_base_info":[],"knowledge_base_slug":[],"_links":{"self":[{"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/docs\/456","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/docs"}],"about":[{"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/types\/docs"}],"author":[{"embeddable":true,"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/comments?post=456"}],"version-history":[{"count":1,"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/docs\/456\/revisions"}],"predecessor-version":[{"id":460,"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/docs\/456\/revisions\/460"}],"wp:attachment":[{"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/media?parent=456"}],"wp:term":[{"taxonomy":"doc_category","embeddable":true,"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/doc_category?post=456"},{"taxonomy":"doc_tag","embeddable":true,"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/doc_tag?post=456"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}