{"id":359,"date":"2020-06-10T18:57:45","date_gmt":"2020-06-10T18:57:45","guid":{"rendered":"https:\/\/regdatadev.affinities.ch\/?page_id=359"},"modified":"2022-01-28T17:17:10","modified_gmt":"2022-01-28T17:17:10","slug":"data-protection","status":"publish","type":"page","link":"https:\/\/www.regdata.ch\/fr\/produit_regdata_solution_logiciel_anonymisation_dynamique_donnees_rgdp\/protection_donnees_conformite_cycle_vie_information_valorisation\/data-protection\/","title":{"rendered":"Data Protection"},"content":{"rendered":"<h1><a href=\"\/fr\/produit\/type-de-services#s01\"><img decoding=\"async\"  class=\"alignnone\" src=\"\/wp-content\/uploads\/2020\/09\/fleche_retour.png\" alt=\"\" style=\"width:25px;\"  \/> <span style=\"font-size:0.7em;padding-left:5px\">retour<\/span><\/a><\/h1>\n<h1>Data Protection<\/h1>\n<div>\n<ul>\n<li>&gt; 120 techniques de protection de donn\u00e9es<\/li>\n<\/ul>\n<\/div>\n<div>\n<ul>\n<li>Intr\u00e9gration de l&rsquo;ensemble de vos contextes de protection de donn\u00e9es<\/li>\n<\/ul>\n<\/div>\n<div>\n<ul>\n<li>Logique et conditions m\u00e9tiers pr\u00e9serv\u00e9es<\/li>\n<\/ul>\n<\/div>\n<div>\n<ul>\n<li>Ev\u00e9nements illimit\u00e9s d\u00e9clenchant la protection<\/li>\n<\/ul>\n<\/div>\n<div>\n<ul>\n<li>Surco\u00fbt de performance identifi\u00e9 et tr\u00e8s faible<\/li>\n<\/ul>\n<\/div>\n<div>\n<ul>\n<li>Traitements des donn\u00e9es par les utilisateurs garantis<\/li>\n<\/ul>\n<\/div>\n<hr>\n<div>\n<p style=\"text-align: justify;\">Il s\u2019agit de prot\u00e9ger de mani\u00e8re statique et-ou dynamique les donn\u00e9es confidentielles clients, via l\u2019ensemble de nos librairies de protection: anonymization, pseudonymization, encryption, tokenization:<\/p>\n<\/div>\n<div>Pour des applications legacy internes-HybridCloud-Pure Cloud.<\/div>\n<div>\n<ul>\n<li>Qu\u2019elles soient structur\u00e9es, semi-structur\u00e9es ou non structur\u00e9es.<\/li>\n<li>Pour des environnements de production, pr\u00e9 production, Tests-developpement, de qualit\u00e9, d\u2019archivage, de destruction, de support \u00e9diteur.<\/li>\n<\/ul>\n<\/div>\n<div>Cette protection prends en compte les diff\u00e9rents contextes de protection des donn\u00e9es du client de mani\u00e8re holistique:<\/div>\n<div>\n<ul>\n<li>Business contextes: Utilisateurs Business au bureau, en mobilit\u00e9, en Europe, aux US.<\/li>\n<li>IT contextes: Administrateur de base de donn\u00e9es, Administrateur de syst\u00e8mes avec des droits \u00e9tendus, Testeurs-developpeurs d\u2019applications.<\/li>\n<li>Compliance contextes: Audit Externe, R\u00e9gulateurs, DPO interne, Audit interne.<\/li>\n<li>Support contextes: Editeurs de logiciels externes.<\/li>\n<\/ul>\n<p>Elle int\u00e8gre les diff\u00e9rentes r\u00e8gles m\u00e9tiers des clients contenus dans leurs applications et qui impliquent des champs et-ou des fichiers \u00e0 prot\u00e9ger:<\/p>\n<\/div>\n<div>Cette protection permet \u00e9galement de preserver l\u2019ensemble des traitements de donn\u00e9es par les diff\u00e9rents utilisateurs Business, IT, Compliance, Audit:<\/div>\n<div>\n<ul>\n<li>Lecture, cr\u00e9ation, changement des donn\u00e9es: <em>Protected read, insert, change<\/em><\/li>\n<li>Recherche, organisation des donn\u00e9es: <em>Searchable protection<\/em>\u00a0<\/li>\n<li>Transmission des donn\u00e9es: <em>Secured data sharing<\/em><\/li>\n<li>Calcul de donn\u00e9es: <em>Privacy-Confidentiality preserving analytics<\/em><\/li>\n<li>Requ\u00eates de donn\u00e9es: <em>Advanced order preserving protection<\/em><\/li>\n<li>Filtres, rapports de donn\u00e9es: <em>Secured data filtering and reporting <\/em><\/li>\n<li>Archivage, reprise des donn\u00e9es archives: <em>Secured data archiving and retrieval<\/em><\/li>\n<li>Destruction des donn\u00e9es: <em>Secured data erasure<\/em><\/li>\n<\/ul>\n<\/div>\n<div>\n<p><strong>Enfin, cette protection n\u2019alt\u00e8re pas les performances des applications prot\u00e9g\u00e9es par notre solution. Notre module de monitoring de performance et de disponibilit\u00e9 d\u00e9montre de mani\u00e8re tr\u00e8s precise et en temps reel le \u201csurco\u00fbt\u201d et la latence g\u00e9n\u00e9r\u00e9e sur l\u2019utilisation des applications.<\/strong><\/p>\n<\/div>\n<div>\n<p><div class=\"eds-animate  \" data-eds-entry-animation=\"pop\" data-eds-entry-delay=\"0\" data-eds-entry-duration=\"0.3\" data-eds-entry-timing=\"linear\" data-eds-exit-animation=\"\" data-eds-exit-delay=\"\" data-eds-exit-duration=\"\" data-eds-exit-timing=\"\" data-eds-repeat-count=\"1\" data-eds-keep=\"no\" data-eds-animate-on=\"hover\" data-eds-scroll-offset=\"\"><a href=\"\/fr\/solutions\/mode\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-312\" src=\"\/wp-content\/uploads\/2020\/06\/mode-promise-270x300.png\" alt=\"\" width=\"270\" height=\"300\" srcset=\"https:\/\/www.regdata.ch\/wp-content\/uploads\/2020\/06\/mode-promise-270x300.png 270w, https:\/\/www.regdata.ch\/wp-content\/uploads\/2020\/06\/mode-promise-768x854.png 768w, https:\/\/www.regdata.ch\/wp-content\/uploads\/2020\/06\/mode-promise.png 849w\" sizes=\"auto, (max-width: 270px) 100vw, 270px\" \/><\/a> <\/div><\/p>\n<\/div>\n<div>\n<p><div class=\"eds-animate  \" data-eds-entry-animation=\"pop\" data-eds-entry-delay=\"0\" data-eds-entry-duration=\"0.3\" data-eds-entry-timing=\"linear\" data-eds-exit-animation=\"\" data-eds-exit-delay=\"\" data-eds-exit-duration=\"\" data-eds-exit-timing=\"\" data-eds-repeat-count=\"1\" data-eds-keep=\"no\" data-eds-animate-on=\"hover\" data-eds-scroll-offset=\"\"><a href=\"\/fr\/solutions\/mode\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-312\" src=\"\/wp-content\/uploads\/2020\/06\/mode-saas-270x300.png\" alt=\"\" width=\"270\" height=\"300\" \/><\/a> <\/div><\/p>\n<\/div>\n<p><!-- {\"type\":\"layout\",\"children\":[{\"type\":\"section\",\"props\":{\"style\":\"default\",\"width\":\"\",\"vertical_align\":\"\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"title_breakpoint\":\"xl\",\"image_position\":\"top-right\",\"width_expand\":\"right\",\"animation\":\"slide-left-small\",\"image\":\"wp-content\\\/uploads\\\/2020\\\/09\\\/HEXAGONE_005.png\",\"padding_remove_bottom\":true,\"animation_delay\":true,\"image_width\":\"700\",\"header_transparent_noplaceholder\":false,\"css\":\".el-section img {\\nwidth:60%;}\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"large,expand\",\"width\":\"default\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"media_overlay_gradient\":\"\",\"width_large\":\"2xlarge\"},\"children\":[{\"type\":\"headline\",\"props\":{\"title_element\":\"h1\",\"title_style\":\"heading-small\",\"title_color\":\"primary\",\"margin\":\"medium\",\"content\":\"<img  class=\\\"alignnone\\\" src=\\\"\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/fleche_retour.png\\\" alt=\\\"\\\" style=\\\"width:25px;\\\"  \\\/> <span style=\\\"font-size:0.7em;padding-left:5px\\\">retour<\\\/span>\",\"link\":\"fr\\\/produit\\\/type-de-services#s01\"}},{\"type\":\"headline\",\"props\":{\"title_element\":\"h1\",\"title_style\":\"heading-large\",\"content\":\"Data Protection\",\"margin_remove_top\":true}},{\"type\":\"headline\",\"props\":{\"title_element\":\"div\",\"title_style\":\"heading-small\",\"title_color\":\"primary\",\"margin\":\"remove-vertical\",\"content\":\"\n\n<ul>\\n\n\n<li>&gt; 120 techniques de protection de donn\\u00e9es<\\\/li>\\n<\\\/ul>\"}},{\"type\":\"headline\",\"props\":{\"title_element\":\"div\",\"title_style\":\"heading-small\",\"title_color\":\"primary\",\"margin\":\"small\",\"content\":\"\n\n<ul>\\n\n\n<li>Intr\\u00e9gration de l'ensemble de vos contextes de protection de donn\\u00e9es<\\\/li>\\n<\\\/ul>\",\"margin_remove_top\":false,\"margin_remove_bottom\":false}},{\"type\":\"headline\",\"props\":{\"title_element\":\"div\",\"title_style\":\"heading-small\",\"title_color\":\"primary\",\"margin\":\"small\",\"content\":\"\n\n<ul>\\n\n\n<li>Logique et conditions m\\u00e9tiers pr\\u00e9serv\\u00e9es<\\\/li>\\n<\\\/ul>\"}},{\"type\":\"headline\",\"props\":{\"title_element\":\"div\",\"title_style\":\"heading-small\",\"title_color\":\"primary\",\"margin\":\"small\",\"content\":\"\n\n<ul>\\n\n\n<li>Ev\\u00e9nements illimit\\u00e9s d\\u00e9clenchant la protection<\\\/li>\\n<\\\/ul>\"}},{\"type\":\"headline\",\"props\":{\"title_element\":\"div\",\"title_style\":\"heading-small\",\"title_color\":\"primary\",\"margin\":\"small\",\"content\":\"\n\n<ul>\\n\n\n<li>Surco\\u00fbt de performance identifi\\u00e9 et tr\\u00e8s faible<\\\/li>\\n<\\\/ul>\"}},{\"type\":\"headline\",\"props\":{\"title_element\":\"div\",\"title_style\":\"heading-small\",\"title_color\":\"primary\",\"margin\":\"small\",\"content\":\"\n\n<ul>\\n\n\n<li>Traitements des donn\\u00e9es par les utilisateurs garantis<\\\/li>\\n<\\\/ul>\"}},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"divider_style\":\"\",\"divider_align\":\"\",\"divider_align_breakpoint\":\"\",\"divider_align_fallback\":\"\"}},{\"type\":\"text\",\"props\":{\"margin\":\"default\",\"column_breakpoint\":\"m\",\"text_style\":\"lead\",\"text_size\":\"large\",\"maxwidth\":\"xlarge\",\"content\":\"\n\n<p style=\\\"text-align: justify;\\\">Il s\\u2019agit de prot\\u00e9ger de mani\\u00e8re statique et-ou dynamique les donn\\u00e9es confidentielles clients, via l\\u2019ensemble de nos librairies de protection: anonymization, pseudonymization, encryption, tokenization:<\\\/p>\"}},{\"type\":\"text\",\"props\":{\"margin\":\"default\",\"column_breakpoint\":\"m\",\"content\":\"\"}},{\"type\":\"headline\",\"props\":{\"title_element\":\"div\",\"title_style\":\"heading-small\",\"title_color\":\"primary\",\"content\":\"Pour des applications legacy internes-HybridCloud-Pure Cloud.\"}},{\"type\":\"text\",\"props\":{\"margin\":\"default\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<ul>\\n\n\n<li>Qu\\u2019elles soient structur\\u00e9es, semi-structur\\u00e9es ou non structur\\u00e9es.<\\\/li>\\n\n\n<li>Pour des environnements de production, pr\\u00e9 production, Tests-developpement, de qualit\\u00e9, d\\u2019archivage, de destruction, de support \\u00e9diteur.<\\\/li>\\n<\\\/ul>\"}},{\"type\":\"headline\",\"props\":{\"title_element\":\"div\",\"title_style\":\"heading-small\",\"title_color\":\"primary\",\"content\":\"Cette protection prends en compte les diff\\u00e9rents contextes de protection des donn\\u00e9es du client de mani\\u00e8re holistique:\"}},{\"type\":\"text\",\"props\":{\"margin\":\"default\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<ul>\\n\n\n<li>Business contextes: Utilisateurs Business au bureau, en mobilit\\u00e9, en Europe, aux US.<\\\/li>\\n\n\n<li>IT contextes: Administrateur de base de donn\\u00e9es, Administrateur de syst\\u00e8mes avec des droits \\u00e9tendus, Testeurs-developpeurs d\\u2019applications.<\\\/li>\\n\n\n<li>Compliance contextes: Audit Externe, R\\u00e9gulateurs, DPO interne, Audit interne.<\\\/li>\\n\n\n<li>Support contextes: Editeurs de logiciels externes.<\\\/li>\\n<\\\/ul>\\n\n\n<p>Elle int\\u00e8gre les diff\\u00e9rentes r\\u00e8gles m\\u00e9tiers des clients contenus dans leurs applications et qui impliquent des champs et-ou des fichiers \\u00e0 prot\\u00e9ger:<\\\/p>\"}},{\"type\":\"headline\",\"props\":{\"title_element\":\"div\",\"title_style\":\"heading-small\",\"title_color\":\"primary\",\"content\":\"Cette protection permet \\u00e9galement de preserver l\\u2019ensemble des traitements de donn\\u00e9es par les diff\\u00e9rents utilisateurs Business, IT, Compliance, Audit:\"}},{\"type\":\"text\",\"props\":{\"margin\":\"default\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<ul>\\n\n\n<li>Lecture, cr\\u00e9ation, changement des donn\\u00e9es: <em>Protected read, insert, change<\\\/em><\\\/li>\\n\n\n<li>Recherche, organisation des donn\\u00e9es: <em>Searchable protection<\\\/em>\\u00a0<\\\/li>\\n\n\n<li>Transmission des donn\\u00e9es: <em>Secured data sharing<\\\/em><\\\/li>\\n\n\n<li>Calcul de donn\\u00e9es: <em>Privacy-Confidentiality preserving analytics<\\\/em><\\\/li>\\n\n\n<li>Requ\\u00eates de donn\\u00e9es: <em>Advanced order preserving protection<\\\/em><\\\/li>\\n\n\n<li>Filtres, rapports de donn\\u00e9es: <em>Secured data filtering and reporting <\\\/em><\\\/li>\\n\n\n<li>Archivage, reprise des donn\\u00e9es archives: <em>Secured data archiving and retrieval<\\\/em><\\\/li>\\n\n\n<li>Destruction des donn\\u00e9es: <em>Secured data erasure<\\\/em><\\\/li>\\n<\\\/ul>\"}},{\"type\":\"text\",\"props\":{\"margin\":\"default\",\"column_breakpoint\":\"m\",\"text_align\":\"justify\",\"content\":\"\n\n<p><strong>Enfin, cette protection n\\u2019alt\\u00e8re pas les performances des applications prot\\u00e9g\\u00e9es par notre solution. Notre module de monitoring de performance et de disponibilit\\u00e9 d\\u00e9montre de mani\\u00e8re tr\\u00e8s precise et en temps reel le \\u201csurco\\u00fbt\\u201d et la latence g\\u00e9n\\u00e9r\\u00e9e sur l\\u2019utilisation des applications.<\\\/strong><\\\/p>\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"media_overlay_gradient\":\"\",\"width_large\":\"expand\"},\"children\":[{\"type\":\"text\",\"props\":{\"margin\":\"default\",\"column_breakpoint\":\"m\",\"text_align\":\"center\",\"content\":\"\n\n<p>[edsanimate_start entry_animation_type= \\\"pop\\\" entry_delay= \\\"0\\\" entry_duration= \\\"0.3\\\" entry_timing= \\\"linear\\\" exit_animation_type= \\\"\\\" exit_delay= \\\"\\\" exit_duration= \\\"\\\" exit_timing= \\\"\\\" animation_repeat= \\\"1\\\" keep= \\\"no\\\" animate_on= \\\"hover\\\" scroll_offset= \\\"\\\" custom_css_class= \\\"\\\"]<a href=\\\"\\\/fr\\\/solutions\\\/mode\\\/\\\"><img class=\\\"alignnone size-medium wp-image-312\\\" src=\\\"\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/mode-promise-270x300.png\\\" alt=\\\"\\\" width=\\\"270\\\" height=\\\"300\\\" \\\/><\\\/a> [edsanimate_end]<\\\/p>\"}},{\"type\":\"text\",\"props\":{\"margin\":\"default\",\"column_breakpoint\":\"m\",\"text_align\":\"center\",\"content\":\"\n\n<p>[edsanimate_start entry_animation_type= \\\"pop\\\" entry_delay= \\\"0\\\" entry_duration= \\\"0.3\\\" entry_timing= \\\"linear\\\" exit_animation_type= \\\"\\\" exit_delay= \\\"\\\" exit_duration= \\\"\\\" exit_timing= \\\"\\\" animation_repeat= \\\"1\\\" keep= \\\"no\\\" animate_on= \\\"hover\\\" scroll_offset= \\\"\\\" custom_css_class= \\\"\\\"]<a href=\\\"\\\/fr\\\/solutions\\\/mode\\\/\\\"><img class=\\\"alignnone size-medium wp-image-312\\\" src=\\\"\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/mode-saas-270x300.png\\\" alt=\\\"\\\" width=\\\"270\\\" height=\\\"300\\\" \\\/><\\\/a> [edsanimate_end]<\\\/p>\"}}]}]}],\"name\":\"Hero\"},{\"type\":\"section\",\"props\":{\"style\":\"default\",\"width\":\"default\",\"vertical_align\":\"middle\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"title_breakpoint\":\"xl\",\"image_position\":\"center-center\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"media_overlay_gradient\":\"\",\"width_medium\":\"1-1\"},\"children\":[]}]}]}],\"version\":\"2.2.5\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>retour Data Protection &gt; 120 techniques de protection de donn\u00e9es Intr\u00e9gration de l&rsquo;ensemble de vos contextes de protection de donn\u00e9es Logique et conditions m\u00e9tiers pr\u00e9serv\u00e9es Ev\u00e9nements illimit\u00e9s d\u00e9clenchant la protection Surco\u00fbt de performance identifi\u00e9 et tr\u00e8s faible Traitements des donn\u00e9es par les utilisateurs garantis Il s\u2019agit de prot\u00e9ger de mani\u00e8re statique et-ou dynamique les donn\u00e9es [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":184,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-359","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data Protection - REGDATA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.regdata.ch\/fr\/produit_regdata_solution_logiciel_anonymisation_dynamique_donnees_rgdp\/protection_donnees_conformite_cycle_vie_information_valorisation\/data-protection\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Protection - REGDATA\" \/>\n<meta property=\"og:description\" content=\"retour Data Protection &gt; 120 techniques de protection de donn\u00e9es Intr\u00e9gration de l&rsquo;ensemble de vos contextes de protection de donn\u00e9es Logique et conditions m\u00e9tiers pr\u00e9serv\u00e9es Ev\u00e9nements illimit\u00e9s d\u00e9clenchant la protection Surco\u00fbt de performance identifi\u00e9 et tr\u00e8s faible Traitements des donn\u00e9es par les utilisateurs garantis Il s\u2019agit de prot\u00e9ger de mani\u00e8re statique et-ou dynamique les donn\u00e9es [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.regdata.ch\/fr\/produit_regdata_solution_logiciel_anonymisation_dynamique_donnees_rgdp\/protection_donnees_conformite_cycle_vie_information_valorisation\/data-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"REGDATA\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-28T17:17:10+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.regdata.ch\/fr\/produit_regdata_solution_logiciel_anonymisation_dynamique_donnees_rgdp\/protection_donnees_conformite_cycle_vie_information_valorisation\/data-protection\/\",\"url\":\"https:\/\/www.regdata.ch\/fr\/produit_regdata_solution_logiciel_anonymisation_dynamique_donnees_rgdp\/protection_donnees_conformite_cycle_vie_information_valorisation\/data-protection\/\",\"name\":\"Data Protection - REGDATA\",\"isPartOf\":{\"@id\":\"https:\/\/www.regdata.ch\/fr\/#website\"},\"datePublished\":\"2020-06-10T18:57:45+00:00\",\"dateModified\":\"2022-01-28T17:17:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.regdata.ch\/fr\/produit_regdata_solution_logiciel_anonymisation_dynamique_donnees_rgdp\/protection_donnees_conformite_cycle_vie_information_valorisation\/data-protection\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.regdata.ch\/fr\/produit_regdata_solution_logiciel_anonymisation_dynamique_donnees_rgdp\/protection_donnees_conformite_cycle_vie_information_valorisation\/data-protection\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.regdata.ch\/fr\/produit_regdata_solution_logiciel_anonymisation_dynamique_donnees_rgdp\/protection_donnees_conformite_cycle_vie_information_valorisation\/data-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.regdata.ch\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Produit\",\"item\":\"https:\/\/www.regdata.ch\/fr\/produit_regdata_solution_logiciel_anonymisation_dynamique_donnees_rgdp\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Type de services\",\"item\":\"https:\/\/www.regdata.ch\/fr\/produit_regdata_solution_logiciel_anonymisation_dynamique_donnees_rgdp\/protection_donnees_conformite_cycle_vie_information_valorisation\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Data Protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.regdata.ch\/fr\/#website\",\"url\":\"https:\/\/www.regdata.ch\/fr\/\",\"name\":\"REGDATA\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.regdata.ch\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.regdata.ch\/fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.regdata.ch\/fr\/#organization\",\"name\":\"REGDATA SA\",\"url\":\"https:\/\/www.regdata.ch\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.regdata.ch\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.regdata.ch\/wp-content\/uploads\/2020\/06\/favicon.png\",\"contentUrl\":\"https:\/\/www.regdata.ch\/wp-content\/uploads\/2020\/06\/favicon.png\",\"width\":71,\"height\":71,\"caption\":\"REGDATA SA\"},\"image\":{\"@id\":\"https:\/\/www.regdata.ch\/fr\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Protection - REGDATA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.regdata.ch\/fr\/produit_regdata_solution_logiciel_anonymisation_dynamique_donnees_rgdp\/protection_donnees_conformite_cycle_vie_information_valorisation\/data-protection\/","og_locale":"fr_FR","og_type":"article","og_title":"Data Protection - REGDATA","og_description":"retour Data Protection &gt; 120 techniques de protection de donn\u00e9es Intr\u00e9gration de l&rsquo;ensemble de vos contextes de protection de donn\u00e9es Logique et conditions m\u00e9tiers pr\u00e9serv\u00e9es Ev\u00e9nements illimit\u00e9s d\u00e9clenchant la protection Surco\u00fbt de performance identifi\u00e9 et tr\u00e8s faible Traitements des donn\u00e9es par les utilisateurs garantis Il s\u2019agit de prot\u00e9ger de mani\u00e8re statique et-ou dynamique les donn\u00e9es [&hellip;]","og_url":"https:\/\/www.regdata.ch\/fr\/produit_regdata_solution_logiciel_anonymisation_dynamique_donnees_rgdp\/protection_donnees_conformite_cycle_vie_information_valorisation\/data-protection\/","og_site_name":"REGDATA","article_modified_time":"2022-01-28T17:17:10+00:00","twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.regdata.ch\/fr\/produit_regdata_solution_logiciel_anonymisation_dynamique_donnees_rgdp\/protection_donnees_conformite_cycle_vie_information_valorisation\/data-protection\/","url":"https:\/\/www.regdata.ch\/fr\/produit_regdata_solution_logiciel_anonymisation_dynamique_donnees_rgdp\/protection_donnees_conformite_cycle_vie_information_valorisation\/data-protection\/","name":"Data Protection - REGDATA","isPartOf":{"@id":"https:\/\/www.regdata.ch\/fr\/#website"},"datePublished":"2020-06-10T18:57:45+00:00","dateModified":"2022-01-28T17:17:10+00:00","breadcrumb":{"@id":"https:\/\/www.regdata.ch\/fr\/produit_regdata_solution_logiciel_anonymisation_dynamique_donnees_rgdp\/protection_donnees_conformite_cycle_vie_information_valorisation\/data-protection\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.regdata.ch\/fr\/produit_regdata_solution_logiciel_anonymisation_dynamique_donnees_rgdp\/protection_donnees_conformite_cycle_vie_information_valorisation\/data-protection\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.regdata.ch\/fr\/produit_regdata_solution_logiciel_anonymisation_dynamique_donnees_rgdp\/protection_donnees_conformite_cycle_vie_information_valorisation\/data-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.regdata.ch\/fr\/"},{"@type":"ListItem","position":2,"name":"Produit","item":"https:\/\/www.regdata.ch\/fr\/produit_regdata_solution_logiciel_anonymisation_dynamique_donnees_rgdp\/"},{"@type":"ListItem","position":3,"name":"Type de services","item":"https:\/\/www.regdata.ch\/fr\/produit_regdata_solution_logiciel_anonymisation_dynamique_donnees_rgdp\/protection_donnees_conformite_cycle_vie_information_valorisation\/"},{"@type":"ListItem","position":4,"name":"Data Protection"}]},{"@type":"WebSite","@id":"https:\/\/www.regdata.ch\/fr\/#website","url":"https:\/\/www.regdata.ch\/fr\/","name":"REGDATA","description":"","publisher":{"@id":"https:\/\/www.regdata.ch\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.regdata.ch\/fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.regdata.ch\/fr\/#organization","name":"REGDATA SA","url":"https:\/\/www.regdata.ch\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.regdata.ch\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.regdata.ch\/wp-content\/uploads\/2020\/06\/favicon.png","contentUrl":"https:\/\/www.regdata.ch\/wp-content\/uploads\/2020\/06\/favicon.png","width":71,"height":71,"caption":"REGDATA SA"},"image":{"@id":"https:\/\/www.regdata.ch\/fr\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.regdata.ch\/fr\/wp-json\/wp\/v2\/pages\/359","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.regdata.ch\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.regdata.ch\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.regdata.ch\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.regdata.ch\/fr\/wp-json\/wp\/v2\/comments?post=359"}],"version-history":[{"count":63,"href":"https:\/\/www.regdata.ch\/fr\/wp-json\/wp\/v2\/pages\/359\/revisions"}],"predecessor-version":[{"id":2539,"href":"https:\/\/www.regdata.ch\/fr\/wp-json\/wp\/v2\/pages\/359\/revisions\/2539"}],"up":[{"embeddable":true,"href":"https:\/\/www.regdata.ch\/fr\/wp-json\/wp\/v2\/pages\/184"}],"wp:attachment":[{"href":"https:\/\/www.regdata.ch\/fr\/wp-json\/wp\/v2\/media?parent=359"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}