{"id":8065,"date":"2023-06-02T11:44:17","date_gmt":"2023-06-02T11:44:17","guid":{"rendered":"https:\/\/viqtor.eu\/?page_id=8065"},"modified":"2024-09-18T14:42:18","modified_gmt":"2024-09-18T14:42:18","slug":"le-guide-viqtor-de-la-donnee-personnelle","status":"publish","type":"page","link":"https:\/\/viqtor.eu\/en\/viqtors-guide-to-personal-data\/","title":{"rendered":"The Viqtor Guide to Personal Data"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"8065\" class=\"elementor elementor-8065\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-487d106 elementor-section-content-middle ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"487d106\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7cb43dc ot-column-items-center ot-flex-column-vertical\" data-id=\"7cb43dc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f174978 elementor-widget__width-initial elementor-widget elementor-widget-iheading\" data-id=\"f174978\" data-element_type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ The Viqtor\u00ae platform<\/span>\r\n\t        <h1 class=\"main-heading\">\n\nThe Viqtor\u00ae Guide to Personal Data<\/h1>\t    <\/div>\r\n\t    \t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6bfd0a4 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6bfd0a4\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9e9d643 ot-flex-column-vertical\" data-id=\"9e9d643\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4ca1c81 elementor-widget elementor-widget-text-editor\" data-id=\"4ca1c81\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"color: #3366ff;\"><strong><span style=\"text-decoration: underline;\">Foreword:<\/span> <\/strong><\/span><\/p><p><span style=\"color: #000000;\">Risk Management in Personal Data Protection: An Essential Guide for Optimal Compliance.<\/span><\/p><p><span style=\"color: #000000;\">When it comes to maintaining data security, risk management is essential. In accordance with Article 121 of the French Data Protection Act, it is essential to determine the precautions to be taken based on the nature of the data and the risks associated with processing. The General Data Protection Regulation (GDPR) emphasizes the importance of implementing appropriate technical and organizational measures to ensure an appropriate level of security.<\/span><\/p><p><span style=\"color: #000000;\">This requirement applies not only to the controller of personal data, but also to the processors involved, as set out in Article 32 of the GDPR. Adopting a risk management approach allows for objective decision-making and the implementation of measures that are strictly necessary and adapted to the specific context.<\/span><\/p><p><span style=\"color: #000000;\">However, implementing such an approach and ensuring that the requirements are met can sometimes be complex, especially for those who are not familiar with these methods.<\/span><\/p><p><span style=\"color: #000000;\">That&#039;s why our guide offers valuable support in your compliance efforts. We outline the basic precautions that should be systematically implemented. Aimed particularly at DPOs (data protection officers), CISOs (information systems security managers), and IT professionals, this guide provides useful information for legal professionals.<\/span><\/p><p><span style=\"color: #000000;\">Guide to managing risks related to the processing of personal data for optimal compliance with the GDPR.<\/span><\/p><p><span style=\"color: #000000;\">When it comes to managing risks related to personal data processing, it&#039;s essential to take a proactive approach to ensuring data security and ensuring compliance with the requirements of the General Data Protection Regulation (GDPR). As an SEO specialist, I&#039;ve provided a detailed guide below that focuses on the steps you can take to optimize your GDPR compliance, taking into account best practices for ranking on Google.<\/span><\/p><p><strong><span style=\"color: #000000;\">List the processing of personal data and the media used:<\/span><\/strong><\/p><p><span style=\"color: #000000;\">One of the first steps is to identify all personal data processing operations, whether automated or not. This includes customer files, contracts, and other data processed. It is important to list the various media used, such as servers, laptops, hard drives, software (operating systems, business software), communication channels (fiber optics, Wi-Fi, Internet, verbal exchanges, couriers), as well as paper media and physical premises (computer rooms, offices).<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35ba52a ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35ba52a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0cf7b26 ot-flex-column-vertical\" data-id=\"0cf7b26\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3593ed7 elementor-widget elementor-widget-heading\" data-id=\"3593ed7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-large\">Assessment of risks associated with each treatment:<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3a23f17 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3a23f17\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cf1b7c9 ot-flex-column-vertical\" data-id=\"cf1b7c9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3c94449 elementor-widget elementor-widget-text-editor\" data-id=\"3c94449\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><span style=\"color: #0000ff;\"><strong>a- Identify the potential impacts on the rights and freedoms of the persons concerned, focusing on three feared scenarios:<\/strong><\/span><\/p><p><span style=\"color: #000000;\"><strong>Illegitimate access to data<\/strong>\u00a0: for example, the disclosure of the pay slips of all employees of a company, resulting in identity theft.<\/span><\/p><p><span style=\"color: #000000;\"><strong>Unwanted modification of data<\/strong>\u00a0: for example, the modification of access logs which wrongly leads to an accusation of misconduct or crime against a person.<\/span><\/p><p><span style=\"color: #000000;\"><strong>Data disappearance<\/strong>\u00a0: for example, the inability to access a patient&#039;s electronic file, resulting in the non-detection of a drug interaction.<\/span><\/p><p><span style=\"color: #000000;\"><strong>Risk management helps determine the precautions to take to maintain data security<\/strong>, in accordance with Article 121 of the Data Protection Act and Article 32 of the GDPR. It is essential to understand the potential consequences of these risks on the rights and freedoms of the individuals concerned.<\/span><\/p><p><span style=\"color: #0000ff;\"><strong>b- Identify sources of risk:<\/strong><\/span><\/p><p><span style=\"color: #000000;\">For each feared scenario, the risk sources should be identified, whether human (internal or external) or non-human. This includes factors such as IT administrators, users, external attackers, competitors, but also elements such as water, epidemics, hazardous materials, and non-targeted computer viruses.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-77edb27 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"77edb27\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-72942a8 ot-flex-column-vertical\" data-id=\"72942a8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0fcf018 elementor-widget elementor-widget-text-editor\" data-id=\"0fcf018\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div><div><div><div><p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Download the complete guide for free:<\/strong><\/span><\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7f22e0c ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7f22e0c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d89bd3c ot-flex-column-vertical\" data-id=\"d89bd3c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6220207 elementor-widget elementor-widget-text-editor\" data-id=\"6220207\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p><form method=\"post\" action=\"https:\/\/viqtor.eu\/wp-admin\/admin-ajax.php?action=tnp&amp;na=s\" class=\"tnp-subscription\" style=\"\">\n<input type=\"hidden\" name=\"nlang\" value=\"\">\n <div class=\"tnp-field tnp-field-email\"><label for=\"tnp-1\">E-mail<\/label>\n<input class=\"tnp-email\" type=\"email\" name=\"ne\" id=\"tnp-1\" value=\"\" placeholder=\"\" required><\/div>\n\u00a0<label> <input name=\"AGREE_TO_TERMS\" required=\"\" type=\"checkbox\" value=\"1\" \/> I consent to the use of my personal data for the sole purpose of processing my download request. We prohibit any other use of this data.<\/label> <label> <input name=\"AGREE_TO_TERMS\" required=\"\" type=\"checkbox\" value=\"1\" \/>I agree to receive periodic information regarding Viqtor service offers.<\/label>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <div class=\"tnp-field tnp-field-button\" style=\"text-align: left\"><input class=\"tnp-submit\" type=\"submit\" value=\"Receive the guide\" style=\"\">\n<\/div>\n<\/form><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>\/\/ The Viqtor\u00ae Platform The Viqtor\u00ae Guide to Personal Data Foreword: Risk Management in Personal Data Protection: An Essential Guide for Optimal Compliance. When it comes to preserving data security, risk management is essential. In accordance with Article 121 of the French Data Protection Act, [\u2026]<\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-8065","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Le guide Viqtor de la donn\u00e9e personnelle<\/title>\n<meta name=\"description\" content=\"La gestion des risques dans la protection des donn\u00e9es personnelles : Un guide essentiel pour une conformit\u00e9 optimale.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/viqtor.eu\/en\/viqtors-guide-to-personal-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Le guide Viqtor de la donn\u00e9e personnelle\" \/>\n<meta property=\"og:description\" content=\"La gestion des risques dans la protection des donn\u00e9es personnelles : Un guide essentiel pour une conformit\u00e9 optimale.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/viqtor.eu\/en\/viqtors-guide-to-personal-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Viqtor\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-18T14:42:18+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/viqtor.eu\/le-guide-viqtor-de-la-donnee-personnelle\/\",\"url\":\"https:\/\/viqtor.eu\/le-guide-viqtor-de-la-donnee-personnelle\/\",\"name\":\"Le guide Viqtor de la donn\u00e9e personnelle\",\"isPartOf\":{\"@id\":\"https:\/\/viqtor.eu\/#website\"},\"datePublished\":\"2023-06-02T11:44:17+00:00\",\"dateModified\":\"2024-09-18T14:42:18+00:00\",\"description\":\"La gestion des risques dans la protection des donn\u00e9es personnelles : Un guide essentiel pour une conformit\u00e9 optimale.\",\"breadcrumb\":{\"@id\":\"https:\/\/viqtor.eu\/le-guide-viqtor-de-la-donnee-personnelle\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/viqtor.eu\/le-guide-viqtor-de-la-donnee-personnelle\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/viqtor.eu\/le-guide-viqtor-de-la-donnee-personnelle\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/viqtor.eu\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Le guide Viqtor de la donn\u00e9e personnelle\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/viqtor.eu\/#website\",\"url\":\"https:\/\/viqtor.eu\/\",\"name\":\"Viqtor\",\"description\":\"Faites du RGPD une opportunit\u00e9 pour votre entreprise.\",\"publisher\":{\"@id\":\"https:\/\/viqtor.eu\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/viqtor.eu\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/viqtor.eu\/#organization\",\"name\":\"viqtor.eu\",\"url\":\"https:\/\/viqtor.eu\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/viqtor.eu\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/viqtor.eu\/wp-content\/uploads\/2023\/06\/favicon-noir.svg\",\"contentUrl\":\"https:\/\/viqtor.eu\/wp-content\/uploads\/2023\/06\/favicon-noir.svg\",\"width\":108,\"height\":86,\"caption\":\"viqtor.eu\"},\"image\":{\"@id\":\"https:\/\/viqtor.eu\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Le guide Viqtor de la donn\u00e9e personnelle","description":"La gestion des risques dans la protection des donn\u00e9es personnelles : Un guide essentiel pour une conformit\u00e9 optimale.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/viqtor.eu\/en\/viqtors-guide-to-personal-data\/","og_locale":"en_US","og_type":"article","og_title":"Le guide Viqtor de la donn\u00e9e personnelle","og_description":"La gestion des risques dans la protection des donn\u00e9es personnelles : Un guide essentiel pour une conformit\u00e9 optimale.","og_url":"https:\/\/viqtor.eu\/en\/viqtors-guide-to-personal-data\/","og_site_name":"Viqtor","article_modified_time":"2024-09-18T14:42:18+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/viqtor.eu\/le-guide-viqtor-de-la-donnee-personnelle\/","url":"https:\/\/viqtor.eu\/le-guide-viqtor-de-la-donnee-personnelle\/","name":"Le guide Viqtor de la donn\u00e9e personnelle","isPartOf":{"@id":"https:\/\/viqtor.eu\/#website"},"datePublished":"2023-06-02T11:44:17+00:00","dateModified":"2024-09-18T14:42:18+00:00","description":"La gestion des risques dans la protection des donn\u00e9es personnelles : Un guide essentiel pour une conformit\u00e9 optimale.","breadcrumb":{"@id":"https:\/\/viqtor.eu\/le-guide-viqtor-de-la-donnee-personnelle\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/viqtor.eu\/le-guide-viqtor-de-la-donnee-personnelle\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/viqtor.eu\/le-guide-viqtor-de-la-donnee-personnelle\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/viqtor.eu\/"},{"@type":"ListItem","position":2,"name":"Le guide Viqtor de la donn\u00e9e personnelle"}]},{"@type":"WebSite","@id":"https:\/\/viqtor.eu\/#website","url":"https:\/\/viqtor.eu\/","name":"Viqtor","description":"Faites du RGPD une opportunit\u00e9 pour votre entreprise.","publisher":{"@id":"https:\/\/viqtor.eu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/viqtor.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/viqtor.eu\/#organization","name":"viqtor.eu","url":"https:\/\/viqtor.eu\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/viqtor.eu\/#\/schema\/logo\/image\/","url":"https:\/\/viqtor.eu\/wp-content\/uploads\/2023\/06\/favicon-noir.svg","contentUrl":"https:\/\/viqtor.eu\/wp-content\/uploads\/2023\/06\/favicon-noir.svg","width":108,"height":86,"caption":"viqtor.eu"},"image":{"@id":"https:\/\/viqtor.eu\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/pages\/8065","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/comments?post=8065"}],"version-history":[{"count":104,"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/pages\/8065\/revisions"}],"predecessor-version":[{"id":12452,"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/pages\/8065\/revisions\/12452"}],"wp:attachment":[{"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/media?parent=8065"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}