{"id":111989,"date":"2022-08-27T00:16:36","date_gmt":"2022-08-26T22:16:36","guid":{"rendered":"https:\/\/jalix.fr\/?page_id=111989"},"modified":"2022-12-02T03:41:39","modified_gmt":"2022-12-02T02:41:39","slug":"data-security-cybersecurity-audit-rgpd","status":"publish","type":"page","link":"https:\/\/jalix.fr\/en\/it-services\/data-security-cybersecurity-audit-rgpd\/","title":{"rendered":"Data security"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div data-parent=\"true\" class=\"vc_row has-bg need-focus style-color-483103-bg row-container with-parallax\" id=\"row-unique-0\"><div class=\"row-background background-element\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"background-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"background-inner\" style=\"background-image: url(https:\/\/jalix.fr\/wp-content\/uploads\/2022\/08\/iStock-1325214557-1-scaled.jpg);background-repeat: no-repeat;background-position: center bottom;background-size: cover;\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"block-bg-overlay style-color-105898-bg\" style=\"opacity: 0.35;\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t<\/div><div class=\"row limit-width row-parent\" data-height-ratio=\"75\"><div class=\"wpb_row row-inner\"><div class=\"wpb_column pos-middle pos-center align_center column_parent col-lg-12 half-internal-gutter\"><div class=\"uncol style-spec style-dark\"  ><div class=\"uncoltable\"><div class=\"uncell\" ><div class=\"uncont no-block-padding col-custom-width\" style=\" max-width:996px;\" ><div class=\"vc_custom_heading_wrap\"><div class=\"heading-text el-text\" ><h1 class=\"fontsize-160000 fontspace-135905 text-uppercase\" ><span>Data security Cybersecurity<\/span><\/h1><\/div><div class=\"clear\"><\/div><\/div><div class=\"vc_custom_heading_wrap\"><div class=\"heading-text el-text\" ><h2 class=\"font-339240 fontsize-338686\" ><span>Protect and secure your company's sensitive data<\/span><\/h2><\/div><div class=\"clear\"><\/div><\/div><div class=\"empty-space empty-single\" ><span class=\"empty-space-inner\"><\/span><\/div>\n<\/div><\/div><\/div><\/div><\/div><script id=\"script-row-unique-0\" data-row=\"script-row-unique-0\" type=\"text\/javascript\" class=\"vc_controls\">UNCODE.initRow(document.getElementById(\"row-unique-0\"));<\/script><\/div><\/div><\/div><div data-parent=\"true\" class=\"vc_row has-bg need-focus style-color-xsdn-bg row-container\" id=\"row-unique-1\"><div class=\"row unequal col-double-gutter quad-top-padding single-bottom-padding single-h-padding limit-width row-parent\"><div class=\"wpb_row row-inner\"><div class=\"wpb_column pos-top pos-center align_left column_parent col-lg-6 col-md-50 half-internal-gutter\"><div class=\"uncol style-light\"  ><div class=\"uncoltable\"><div class=\"uncell no-block-padding\" ><div class=\"uncont\" ><div class=\"vc_custom_heading_wrap\"><div class=\"heading-text el-text\" ><h5 class=\"font-613363 fontsize-160000 fontspace-135905 text-accent-color text-uppercase\" ><span>Data security Cybersecurity<\/span><\/h5><\/div><div class=\"clear\"><\/div><\/div><div class=\"vc_custom_heading_wrap\"><div class=\"heading-text el-text\" ><h3 class=\"font-339240 fontsize-155944\" ><span>JALIX helps you fight against everyday attacks<\/span><\/h3><\/div><div class=\"clear\"><\/div><\/div><div class=\"uncode_text_column\" ><p>In the age of digital technology, the challenges of IT security have never been greater. Cyber-attacks are becoming more and more numerous and complex, and unfortunately also more effective, even with the implementation of professional security measures.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column pos-top pos-center align_left column_parent col-lg-6 half-internal-gutter\"><div class=\"uncol style-light\"  ><div class=\"uncoltable\"><div class=\"uncell no-block-padding\" ><div class=\"uncont\" ><div class=\"empty-space empty-single\" ><span class=\"empty-space-inner\"><\/span><\/div>\n<div class=\"uncode_text_column\" ><p>Our expertise allows us to deploy increasingly secure solutions, and to further strengthen our turnkey services, JALIX has joined forces with Formind, the French leader and pure-player in consulting and integration in <strong>cybersecurity<\/strong>.<\/p>\n<p>Thanks to this partnership, Jalix and Formind take into account all the components of a company and its information system and with this 360\u00b0 vision, we ensure that we accompany our clients from the upstream phases of strategic thinking to the downstream phases of auditing and control through the operational implementation of solutions.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><script id=\"script-row-unique-1\" data-row=\"script-row-unique-1\" type=\"text\/javascript\" class=\"vc_controls\">UNCODE.initRow(document.getElementById(\"row-unique-1\"));<\/script><\/div><\/div><\/div><div data-parent=\"true\" class=\"vc_row has-bg need-focus style-color-xsdn-bg row-container\" id=\"row-unique-2\"><div class=\"row unequal col-double-gutter single-top-padding single-bottom-padding single-h-padding limit-width row-parent\"><div class=\"wpb_row row-inner\"><div class=\"wpb_column pos-top pos-center align_left column_parent col-lg-4 half-internal-gutter\"><div class=\"uncol style-light\"  ><div class=\"uncoltable\"><div class=\"uncell  vc_custom_1616073778804 vc_custom_preserve_tablet border-accent-color single-block-padding\" style=\"border-style: solid;border-left-width: 2px ;padding-top: 0px ;padding-right: 0px ;padding-bottom: 0px ;\" ><div class=\"uncont\" ><div class=\"vc_custom_heading_wrap\"><div class=\"heading-text el-text\" ><h6 class=\"fontsize-160000 fontspace-135905 text-accent-color text-uppercase\" ><span>01<\/span><\/h6><\/div><div class=\"clear\"><\/div><\/div><div class=\"vc_custom_heading_wrap\"><div class=\"heading-text el-text\" ><h4 class=\"font-136269 fontspace-781688 font-weight-400\" ><span>Data security and processing<\/span><\/h4><\/div><div class=\"clear\"><\/div><\/div><div class=\"uncode_text_column\" ><p>The security of data and processing is a global issue. It is important to ensure that the technical solutions used allow for the secure storage of data, the ability to store and retrieve the consents used, and to control access to data. It is also necessary to review all the processes involved to ensure that at each stage, the confidentiality of personal data is respected. This is not just an IT or digital approach.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column pos-top pos-center align_left column_parent col-lg-4 half-internal-gutter\"><div class=\"uncol style-light\"  ><div class=\"uncoltable\"><div class=\"uncell  vc_custom_1616073785306 vc_custom_preserve_tablet border-accent-color single-block-padding\" style=\"border-style: solid;border-left-width: 2px ;padding-top: 0px ;padding-right: 0px ;padding-bottom: 0px ;\" ><div class=\"uncont\" ><div class=\"vc_custom_heading_wrap\"><div class=\"heading-text el-text\" ><h6 class=\"fontsize-160000 fontspace-135905 text-accent-color text-uppercase\" ><span>02<\/span><\/h6><\/div><div class=\"clear\"><\/div><\/div><div class=\"vc_custom_heading_wrap\"><div class=\"heading-text el-text\" ><h4 class=\"font-136269 fontspace-781688 font-weight-400\" ><span>Prioritisation of actions to be taken to achieve compliance<\/span><\/h4><\/div><div class=\"clear\"><\/div><\/div><div class=\"uncode_text_column\" ><p>2\/3 of companies will not be ready by May 2018, but you must not delay in taking on the dimensions of this regulation, otherwise you will no longer be able to use your data while your competitors will be able to do so! You must define an action plan as soon as possible, and do not hesitate to seek support.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column pos-top pos-center align_left column_parent col-lg-4 half-internal-gutter\"><div class=\"uncol style-light\"  ><div class=\"uncoltable\"><div class=\"uncell  vc_custom_1616073798333 vc_custom_preserve_tablet border-accent-color single-block-padding\" style=\"border-style: solid;border-left-width: 2px ;padding-top: 0px ;padding-right: 0px ;padding-bottom: 0px ;\" ><div class=\"uncont\" ><div class=\"vc_custom_heading_wrap\"><div class=\"heading-text el-text\" ><h6 class=\"fontsize-160000 fontspace-135905 text-accent-color text-uppercase\" ><span>03<\/span><\/h6><\/div><div class=\"clear\"><\/div><\/div><div class=\"vc_custom_heading_wrap\"><div class=\"heading-text el-text\" ><h4 class=\"font-136269 fontspace-781688 font-weight-400\" ><span>Implementation of \"Privacy by design\" and management of the right to be forgotten<\/span><\/h4><\/div><div class=\"clear\"><\/div><\/div><div class=\"uncode_text_column\" ><p>The <a href=\"https:\/\/jalix.fr\/en\/it-services\/data-security-cybersecurity-audit-rgpd\/\">data security<\/a> will have to be integrated into the very design of the implementation of new solutions, new processes that involve the collection of personal data. From now on, the impact analysis will have to be carried out at the design stage and then, at any time, the contact will be able to demand the right to be forgotten. This management will also have to be integrated into the design phase.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><script id=\"script-row-unique-2\" data-row=\"script-row-unique-2\" type=\"text\/javascript\" class=\"vc_controls\">UNCODE.initRow(document.getElementById(\"row-unique-2\"));<\/script><\/div><\/div><\/div><div data-parent=\"true\" class=\"vc_row has-bg need-focus style-color-xsdn-bg row-container\" id=\"row-unique-3\"><div class=\"row unequal col-double-gutter single-top-padding quad-bottom-padding single-h-padding limit-width row-parent\"><div class=\"wpb_row row-inner\"><div class=\"wpb_column pos-top pos-center align_left column_parent col-lg-4 half-internal-gutter\"><div class=\"uncol style-light\"  ><div class=\"uncoltable\"><div class=\"uncell  vc_custom_1616073778804 vc_custom_preserve_tablet border-accent-color single-block-padding\" style=\"border-style: solid;border-left-width: 2px ;padding-top: 0px ;padding-right: 0px ;padding-bottom: 0px ;\" ><div class=\"uncont\" ><div class=\"vc_custom_heading_wrap\"><div class=\"heading-text el-text\" ><h6 class=\"fontsize-160000 fontspace-135905 text-accent-color text-uppercase\" ><span>04<\/span><\/h6><\/div><div class=\"clear\"><\/div><\/div><div class=\"vc_custom_heading_wrap\"><div class=\"heading-text el-text\" ><h4 class=\"font-136269 fontspace-781688 font-weight-400\" ><span>Risk management (cyber attacks, theft, etc.)<\/span><\/h4><\/div><div class=\"clear\"><\/div><\/div><div class=\"uncode_text_column\" ><p>Beyond the constraints of data collection and management, the notion of security is now paramount. It should be noted that threats have never been so high, whether it be theft (physical or computer), viruses (with new mechanisms such as ransomware), fraud or cyber attacks.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column pos-top pos-center align_left column_parent col-lg-4 half-internal-gutter\"><div class=\"uncol style-light\"  ><div class=\"uncoltable\"><div class=\"uncell  vc_custom_1616073785306 vc_custom_preserve_tablet border-accent-color single-block-padding\" style=\"border-style: solid;border-left-width: 2px ;padding-top: 0px ;padding-right: 0px ;padding-bottom: 0px ;\" ><div class=\"uncont\" ><div class=\"vc_custom_heading_wrap\"><div class=\"heading-text el-text\" ><h6 class=\"fontsize-160000 fontspace-135905 text-accent-color text-uppercase\" ><span>05<\/span><\/h6><\/div><div class=\"clear\"><\/div><\/div><div class=\"vc_custom_heading_wrap\"><div class=\"heading-text el-text\" ><h4 class=\"font-136269 fontspace-781688 font-weight-400\" ><span>Mapping of personal data processing<\/span><\/h4><\/div><div class=\"clear\"><\/div><\/div><div class=\"uncode_text_column\" ><p>In order to be able to fully ensure the security and confidentiality of personal data, it is necessary to know precisely the processes that use this type of data. However, many business processes evolve \/ drift over time and significant gaps can be identified between \"what they should be\" and \"what they actually are\". Mapping is essential.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column pos-top pos-center align_left column_parent col-lg-4 half-internal-gutter\"><div class=\"uncol style-light\"  ><div class=\"uncoltable\"><div class=\"uncell  vc_custom_1616073798333 vc_custom_preserve_tablet border-accent-color single-block-padding\" style=\"border-style: solid;border-left-width: 2px ;padding-top: 0px ;padding-right: 0px ;padding-bottom: 0px ;\" ><div class=\"uncont\" ><\/div><\/div><\/div><\/div><\/div><script id=\"script-row-unique-3\" data-row=\"script-row-unique-3\" type=\"text\/javascript\" class=\"vc_controls\">UNCODE.initRow(document.getElementById(\"row-unique-3\"));<\/script><\/div><\/div><\/div><div data-parent=\"true\" class=\"vc_row has-bg need-focus style-color-lxmt-bg row-container\" id=\"row-unique-4\"><div class=\"row unequal col-double-gutter quad-top-padding quad-bottom-padding quad-h-padding full-width row-parent\"><div class=\"wpb_row row-inner\"><div class=\"wpb_column pos-top pos-center align_left column_parent col-lg-6 single-internal-gutter\"><div class=\"uncol style-light animate_when_almost_visible left-t-right\"  data-speed=\"1000\"><div class=\"uncoltable\"><div class=\"uncell no-block-padding\" ><div class=\"uncont\" ><div class=\"uncode-single-media  text-left\" data-cursor=\"icon-accent\"><div class=\"single-wrapper\" style=\"max-width: 100%;\"><div class=\"tmb tmb-light  img-round img-round-xs tmb-img-ratio tmb-media-first tmb-media-last tmb-content-overlay tmb-no-bg\"><div class=\"t-inside\"><div class=\"t-entry-visual\"><div class=\"t-entry-visual-tc\"><div class=\"uncode-single-media-wrapper img-round img-round-xs\"><div class=\"dummy\" style=\"padding-top: 75%;\"><\/div><img decoding=\"async\" class=\"wp-image-111644\" src=\"https:\/\/jalix.fr\/wp-content\/uploads\/2022\/08\/iStock-1355163574-1-scaled-uai-1920x1440.jpg\" width=\"1920\" height=\"1440\" alt=\"\" srcset=\"https:\/\/jalix.fr\/wp-content\/uploads\/2022\/08\/iStock-1355163574-1-scaled-uai-1920x1440.jpg 1920w, https:\/\/jalix.fr\/wp-content\/uploads\/2022\/08\/iStock-1355163574-1-scaled-uai-720x540.jpg 720w, https:\/\/jalix.fr\/wp-content\/uploads\/2022\/08\/iStock-1355163574-1-scaled-uai-1032x774.jpg 1032w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column pos-middle pos-left align_left column_parent col-lg-6 half-internal-gutter z_index_2\"><div class=\"uncol style-light font-613363 animate_when_almost_visible alpha-anim\"  data-delay=\"200\" data-speed=\"1000\"><div class=\"uncoltable\"><div class=\"uncell no-block-padding\" ><div class=\"uncont\" style=\" max-width:624px;\" ><div class=\"vc_custom_heading_wrap\"><div class=\"heading-text el-text\" ><h5 class=\"font-613363 fontsize-160000 fontspace-135905 text-accent-color text-uppercase\" ><span>RGPD audit<\/span><\/h5><\/div><div class=\"clear\"><\/div><\/div><div class=\"vc_custom_heading_wrap\"><div class=\"heading-text el-text\" ><h2 class=\"font-339240 fontsize-155944\" ><span>How to protect your personal data?<\/span><\/h2><\/div><div class=\"clear\"><\/div><\/div><div class=\"uncode_text_column\" ><p>To comply with the European Data Protection Regulation (RGPD) which has been in place since 2018, the CNIL (Commission Nationale de l'Informatique et des Libert\u00e9s) recommends adopting 4 good attitudes:<\/p>\n<\/div><div class=\"uncode-wrapper uncode-list\" >\n<ul class=\"icons text-lead\">\n<li><i class=\"fa fa-check2 text-accent-color\"><\/i>Create a register of its data processing operations<\/li>\n<li><i class=\"fa fa-check2 text-accent-color\"><\/i>Keep only essential data<\/li>\n<li><i class=\"fa fa-check2 text-accent-color\"><\/i>Allow users the right to consult, rectify or delete their data<\/li>\n<li><i class=\"fa fa-check2 text-accent-color\"><\/i>Securing your data.<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><\/div><script id=\"script-row-unique-4\" data-row=\"script-row-unique-4\" type=\"text\/javascript\" class=\"vc_controls\">UNCODE.initRow(document.getElementById(\"row-unique-4\"));<\/script><\/div><\/div><\/div><div data-parent=\"true\" class=\"vc_row inverted-device-order has-bg need-focus style-color-xsdn-bg row-container\" id=\"row-unique-5\"><div class=\"row unequal col-double-gutter quad-top-padding quad-bottom-padding quad-h-padding full-width row-parent\"><div class=\"wpb_row row-inner\"><div class=\"wpb_column pos-middle pos-right align_left column_parent col-lg-6 half-internal-gutter z_index_2\"><div class=\"uncol style-light font-613363 animate_when_almost_visible alpha-anim\"  data-delay=\"200\" data-speed=\"1000\"><div class=\"uncoltable\"><div class=\"uncell no-block-padding\" ><div class=\"uncont\" style=\" max-width:624px;\" ><div class=\"vc_custom_heading_wrap\"><div class=\"heading-text el-text\" ><h2 class=\"font-339240 fontsize-155944\" ><span>JALIX accompanies you on the RGPD audit<\/span><\/h2><\/div><div class=\"clear\"><\/div><\/div><div class=\"uncode_text_column\" ><p>Compliance with the RGPD entails internal changes that must be identified and dealt with. The review of processes and their security can be an opportunity to not only deal with the technical aspect of compliance but to have a more global approach aiming at putting data management and valorisation at the heart of your strategy.<\/p>\n<p>\"Personal data must be processed in such a way as to ensure the appropriate security of personal data, including protecting them against unauthorised or unlawful processing and against accidental loss.\" - GDPR, Article 5<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><div class=\"wpb_column pos-top pos-center align_left column_parent col-lg-6 single-internal-gutter\"><div class=\"uncol style-light animate_when_almost_visible right-t-left\"  data-speed=\"1000\"><div class=\"uncoltable\"><div class=\"uncell no-block-padding\" ><div class=\"uncont\" ><div class=\"uncode-single-media  text-right\" data-cursor=\"icon-accent\"><div class=\"single-wrapper\" style=\"max-width: 100%;\"><div class=\"tmb tmb-light  img-round img-round-xs tmb-img-ratio tmb-media-first tmb-media-last tmb-content-overlay tmb-no-bg\"><div class=\"t-inside\"><div class=\"t-entry-visual\"><div class=\"t-entry-visual-tc\"><div class=\"uncode-single-media-wrapper img-round img-round-xs\"><div class=\"dummy\" style=\"padding-top: 75%;\"><\/div><img decoding=\"async\" class=\"wp-image-111642\" src=\"https:\/\/jalix.fr\/wp-content\/uploads\/2022\/08\/iStock-913017342-1-scaled-uai-1920x1440.jpg\" width=\"1920\" height=\"1440\" alt=\"\" srcset=\"https:\/\/jalix.fr\/wp-content\/uploads\/2022\/08\/iStock-913017342-1-scaled-uai-1920x1440.jpg 1920w, https:\/\/jalix.fr\/wp-content\/uploads\/2022\/08\/iStock-913017342-1-scaled-uai-720x540.jpg 720w, https:\/\/jalix.fr\/wp-content\/uploads\/2022\/08\/iStock-913017342-1-scaled-uai-1032x774.jpg 1032w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/><\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><script id=\"script-row-unique-5\" data-row=\"script-row-unique-5\" type=\"text\/javascript\" class=\"vc_controls\">UNCODE.initRow(document.getElementById(\"row-unique-5\"));<\/script><\/div><\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"Data Security CybersecurityProtect and secure your company's sensitive data Data Security CybersecurityJALIX helps you fight against the threat of cybercrime.","protected":false},"author":1,"featured_media":0,"parent":111835,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-111989","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>S\u00e9curit\u00e9 des donn\u00e9es Cybers\u00e9curit\u00e9 Audit RGPG &#187; Jalix SI PME Ile de France, Hauts de France, Rh\u00f4ne-Alpes<\/title>\n<meta name=\"description\" content=\"S\u00e9curit\u00e9 des donn\u00e9es Cybers\u00e9curit\u00e9 Audit RGPD : Notre expertise nous permet de d\u00e9ployer des solutions toujours plus s\u00e9curis\u00e9es.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jalix.fr\/en\/it-services\/data-security-cybersecurity-audit-rgpd\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e9curit\u00e9 des donn\u00e9es Cybers\u00e9curit\u00e9 Audit RGPG &#187; Jalix SI PME Ile de France, Hauts de France, Rh\u00f4ne-Alpes\" \/>\n<meta property=\"og:description\" content=\"S\u00e9curit\u00e9 des donn\u00e9es Cybers\u00e9curit\u00e9 Audit RGPD : Notre expertise nous permet de d\u00e9ployer des solutions toujours plus s\u00e9curis\u00e9es.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jalix.fr\/en\/it-services\/data-security-cybersecurity-audit-rgpd\/\" \/>\n<meta property=\"og:site_name\" content=\"Jalix SI PME Ile de France, Hauts de France, Rh\u00f4ne-Alpes\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/fr-fr.facebook.com\/JalixServices\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-02T02:41:39+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@JalixServices\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jalix.fr\/services-it\/securite-des-donnees-cybersecurite-audit-rgpd\/\",\"url\":\"https:\/\/jalix.fr\/services-it\/securite-des-donnees-cybersecurite-audit-rgpd\/\",\"name\":\"S\u00e9curit\u00e9 des donn\u00e9es Cybers\u00e9curit\u00e9 Audit RGPG &#187; Jalix SI PME Ile de France, Hauts de France, Rh\u00f4ne-Alpes\",\"isPartOf\":{\"@id\":\"https:\/\/jalix.fr\/#website\"},\"datePublished\":\"2022-08-26T22:16:36+00:00\",\"dateModified\":\"2022-12-02T02:41:39+00:00\",\"description\":\"S\u00e9curit\u00e9 des donn\u00e9es Cybers\u00e9curit\u00e9 Audit RGPD : Notre expertise nous permet de d\u00e9ployer des solutions toujours plus s\u00e9curis\u00e9es.\",\"breadcrumb\":{\"@id\":\"https:\/\/jalix.fr\/services-it\/securite-des-donnees-cybersecurite-audit-rgpd\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jalix.fr\/services-it\/securite-des-donnees-cybersecurite-audit-rgpd\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jalix.fr\/services-it\/securite-des-donnees-cybersecurite-audit-rgpd\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/jalix.fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\/\/jalix.fr\/services-it\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"S\u00e9curit\u00e9 des donn\u00e9es\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jalix.fr\/#website\",\"url\":\"https:\/\/jalix.fr\/\",\"name\":\"Jalix SI PME Ile de France, Hauts de France, Rh\u00f4ne-Alpes\",\"description\":\"Votre partenaire informatique, bureautique, cloud et logiciels\",\"publisher\":{\"@id\":\"https:\/\/jalix.fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jalix.fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jalix.fr\/#organization\",\"name\":\"Jalix SI PME Ile de France, Hauts de France, Rh\u00f4ne-Alpes\",\"url\":\"https:\/\/jalix.fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/jalix.fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jalix.fr\/wp-content\/uploads\/2022\/08\/Logo-Mono-fonce\u0301-1.png\",\"contentUrl\":\"https:\/\/jalix.fr\/wp-content\/uploads\/2022\/08\/Logo-Mono-fonce\u0301-1.png\",\"width\":150,\"height\":60,\"caption\":\"Jalix SI PME Ile de France, Hauts de France, Rh\u00f4ne-Alpes\"},\"image\":{\"@id\":\"https:\/\/jalix.fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/fr-fr.facebook.com\/JalixServices\",\"https:\/\/x.com\/JalixServices\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data security Cybersecurity RGPG audit \" Jalix SI PME Ile de France, Hauts de France, Rh\u00f4ne-Alpes","description":"Data security Cybersecurity RGPD audit: Our expertise allows us to deploy ever more secure solutions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jalix.fr\/en\/it-services\/data-security-cybersecurity-audit-rgpd\/","og_locale":"en_GB","og_type":"article","og_title":"S\u00e9curit\u00e9 des donn\u00e9es Cybers\u00e9curit\u00e9 Audit RGPG &#187; Jalix SI PME Ile de France, Hauts de France, Rh\u00f4ne-Alpes","og_description":"S\u00e9curit\u00e9 des donn\u00e9es Cybers\u00e9curit\u00e9 Audit RGPD : Notre expertise nous permet de d\u00e9ployer des solutions toujours plus s\u00e9curis\u00e9es.","og_url":"https:\/\/jalix.fr\/en\/it-services\/data-security-cybersecurity-audit-rgpd\/","og_site_name":"Jalix SI PME Ile de France, Hauts de France, Rh\u00f4ne-Alpes","article_publisher":"https:\/\/fr-fr.facebook.com\/JalixServices","article_modified_time":"2022-12-02T02:41:39+00:00","twitter_card":"summary_large_image","twitter_site":"@JalixServices","twitter_misc":{"Estimated reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/jalix.fr\/services-it\/securite-des-donnees-cybersecurite-audit-rgpd\/","url":"https:\/\/jalix.fr\/services-it\/securite-des-donnees-cybersecurite-audit-rgpd\/","name":"Data security Cybersecurity RGPG audit \" Jalix SI PME Ile de France, Hauts de France, Rh\u00f4ne-Alpes","isPartOf":{"@id":"https:\/\/jalix.fr\/#website"},"datePublished":"2022-08-26T22:16:36+00:00","dateModified":"2022-12-02T02:41:39+00:00","description":"Data security Cybersecurity RGPD audit: Our expertise allows us to deploy ever more secure solutions.","breadcrumb":{"@id":"https:\/\/jalix.fr\/services-it\/securite-des-donnees-cybersecurite-audit-rgpd\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jalix.fr\/services-it\/securite-des-donnees-cybersecurite-audit-rgpd\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/jalix.fr\/services-it\/securite-des-donnees-cybersecurite-audit-rgpd\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/jalix.fr\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/jalix.fr\/services-it\/"},{"@type":"ListItem","position":3,"name":"S\u00e9curit\u00e9 des donn\u00e9es"}]},{"@type":"WebSite","@id":"https:\/\/jalix.fr\/#website","url":"https:\/\/jalix.fr\/","name":"Jalix SI PME Ile de France, Hauts de France, Rh\u00f4ne-Alpes","description":"Your IT, office, cloud and software partner","publisher":{"@id":"https:\/\/jalix.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jalix.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/jalix.fr\/#organization","name":"Jalix SI PME Ile de France, Hauts de France, Rh\u00f4ne-Alpes","url":"https:\/\/jalix.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/jalix.fr\/#\/schema\/logo\/image\/","url":"https:\/\/jalix.fr\/wp-content\/uploads\/2022\/08\/Logo-Mono-fonce\u0301-1.png","contentUrl":"https:\/\/jalix.fr\/wp-content\/uploads\/2022\/08\/Logo-Mono-fonce\u0301-1.png","width":150,"height":60,"caption":"Jalix SI PME Ile de France, Hauts de France, Rh\u00f4ne-Alpes"},"image":{"@id":"https:\/\/jalix.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr-fr.facebook.com\/JalixServices","https:\/\/x.com\/JalixServices"]}]}},"_links":{"self":[{"href":"https:\/\/jalix.fr\/en\/wp-json\/wp\/v2\/pages\/111989","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jalix.fr\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/jalix.fr\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/jalix.fr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jalix.fr\/en\/wp-json\/wp\/v2\/comments?post=111989"}],"version-history":[{"count":5,"href":"https:\/\/jalix.fr\/en\/wp-json\/wp\/v2\/pages\/111989\/revisions"}],"predecessor-version":[{"id":113006,"href":"https:\/\/jalix.fr\/en\/wp-json\/wp\/v2\/pages\/111989\/revisions\/113006"}],"up":[{"embeddable":true,"href":"https:\/\/jalix.fr\/en\/wp-json\/wp\/v2\/pages\/111835"}],"wp:attachment":[{"href":"https:\/\/jalix.fr\/en\/wp-json\/wp\/v2\/media?parent=111989"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}