{"id":14068,"date":"2026-05-06T15:26:40","date_gmt":"2026-05-06T15:26:40","guid":{"rendered":"https:\/\/viqtor.eu\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/"},"modified":"2026-05-06T15:26:40","modified_gmt":"2026-05-06T15:26:40","slug":"violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions","status":"publish","type":"post","link":"https:\/\/viqtor.eu\/en\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/","title":{"rendered":"Data breaches: what law enforcement and what sanctions?"},"content":{"rendered":"<p><strong>Legal Watch No. 81 \u2013 March 2025.&nbsp; <\/strong><\/p>\n<h3><strong><u>Data breaches: what law enforcement and what sanctions?<\/u><\/strong><\/h3>\n<p>Who hasn&#039;t recently received an email from their telecommunications service provider, or from the NGO to which they make a monthly donation, informing them that their contact details, identifiers, and sometimes their bank details, have been compromised?<\/p>\n<p>At a time when data breaches are multiplying, the protection of IT systems is becoming a major issue for companies.<\/p>\n<p><strong>Since the entry into force of the GDPR and the NIS2 directive, the security of data processing is strictly regulated and violations are subject to high penalties for data controllers. <\/strong><\/p>\n<p>Among the obligations, we should mention the obligation to notify the CNIL and the persons concerned of the violation under certain conditions, to remedy the violation and to take any useful measures to mitigate its consequences.<\/p>\n<p>The CNIL has extensive investigative powers, and its mission is to support but also to sanction data controllers when a security breach is the cause of the data breach.<\/p>\n<p>The Commission has imposed several sanctions in recent years:<\/p>\n<ul style=\"list-style-type: square;\">\n<li>Bouygues Telecom was fined \u20ac250,000 in 2017 because of insufficient security on its B&amp;You customer site, which allowed access to the contracts of 2 million customers via a URL modification.<\/li>\n<li>In 2016, Uber was fined \u20ac400,000 for a security breach that compromised 57 million accounts, and for failing to notify the CNIL within the legal deadlines.<\/li>\n<li>More recently, Dedalus Biologie exposed the health data of 500,000 patients due to a server misconfiguration by a subcontractor and was fined 1.5 million euros by the CNIL.<\/li>\n<li>Finally, last October, Ledger, a cryptocurrency security company, was fined \u20ac750,000 for failing to adequately protect its customers&#039; data. The company had suffered \u2013 and kept silent about \u2013 several personal data breaches in 2020, affecting numerous customers and prospects.<\/li>\n<\/ul>\n<p><strong>The Commission, however, currently seems to favour support over sanctions.<\/strong>and publishes numerous recommendations for data controllers on its website.<\/p>\n<p>At the beginning of the year, it responded to the large-scale data breaches that affected millions of people in 2024, and proposed security strengthening measures to address the risks of attack.<\/p>\n<p>The CNIL insists on internal company procedures as well as precautions to be taken in case of subcontracting.<\/p>\n<p><strong>Elsewhere in Europe,<\/strong> Many companies are being fined from a few thousand to several hundred thousand euros for, for example, &quot;forgetting&quot; to remove the access rights to the computer system of former employees, botching the design of a banking application or the configuration of a website, mistakenly sending a SIM card to the wrong customer, downloading a customer file on Whatsapp or for not sufficiently controlling the practices of a subcontractor.<\/p>\n<p><strong>At the supranational level<\/strong>The Court of Justice of the European Union also provides clarifications, particularly regarding compensation for victims.<\/p>\n<p>If the person is required to prove the existence of harm caused by a data breach, that harm must not reach a certain degree of severity (Case C-300\/21, Case C-590\/22).<\/p>\n<p>Thus, the fear experienced by a person that their personal data has been disclosed to third parties may give rise to a right to compensation, provided that the person provides proof of their fear, with its negative consequences (Case C 340\/21, Case C 687\/21, Case C-590\/22).<\/p>\n<p>The CJEU also ruled that compensation for moral damage caused by the theft of personal data is not limited to cases where it is demonstrated that it actually resulted in identity theft.<\/p>\n<p>Compensable damage can therefore exist without identity theft being established. (Cases C 182\/22 and C 189\/22).<\/p>\n<p>With the development of collective actions, companies that do not take the risks of data breaches seriously expose themselves not only to sanctions from the CNIL but also to legal action from individuals.<\/p>\n<h4><strong>&nbsp;<\/strong><\/h4>\n<h4><strong><img decoding=\"async\" src=\"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/france_1773309030830.jpg\" alt=\"\" width=\"145\" height=\"97\"> &nbsp;<\/strong><\/h4>\n<p><strong>The National Assembly voted on the evening of Thursday, March 20th, to maintain the confidentiality of encrypted messaging services.<\/strong>.<\/p>\n<p>The measure provided for the possibility of requiring these messaging platforms (Signal, WhatsApp, etc.) to communicate traffickers&#039; communications to intelligence services.<\/p>\n<p>&quot;The members of parliament removed this measure, which has united many cybersecurity actors and experts against it, in the law committee last week. In their view, there is too great a risk of creating a vulnerability that would endanger the conversations of all users of these platforms.&quot;<\/p>\n<p>In order for the professionals concerned &quot;to be able to prepare for the upcoming consultations or discussions&quot;, the CNIL presented on March 27 the work program and the guidelines it wishes to adopt in 2025.<\/p>\n<p>Among the topics covered are practical guides on AI, draft reference documents concerning subcontractors, health, the banking sector, data retention periods in the fields of marketing and human resources, three draft recommendations concerning &quot;multi-device&quot; consent, pixels in emails and the senior economy; finally, the CNIL will continue its work on dashcams and political canvassing.<\/p>\n<p><strong>The CNIL&#039;s decision authorizing, subject to conditions, the European Medicines Agency to access data extracts from the SNDS within the framework of the DARWIN project<\/strong> (Data Analysis and Real-World Interrogation Network) EU, was published on L\u00e9gifrance.<\/p>\n<p>The Commission criticizes the choice of a hosting provider subject to extraterritorial law, which exposes it to a risk of communication of sensitive data to foreign powers but nevertheless authorizes the processing, for a period limited to three years for the data sample and one year after publication of the study.<\/p>\n<p><strong>In a decision dated March 28, the French competition authority fined Apple 150 million euros.<\/strong> &quot;for abuse of dominant position in the mobile application distribution sector on iOS and iPadOS devices.&quot;<\/p>\n<p>The measure specifically targets Apple&#039;s App Tracking Transparency (ATT), which allows users to easily choose whether or not they want to enable third-party tracking.<\/p>\n<p>The authority considers that the framework itself &quot;is not fundamentally problematic&quot;, but points out that the ATT makes the use of third-party applications in the iOS environment excessively complex by requiring multiple consent pop-up windows.<\/p>\n<p>The application would particularly penalize smaller publishers &quot;who depend largely on third-party data collection to finance their business.&quot;<\/p>\n<p>In a decision dated April 1st, <strong>The Council of State has ruled on the blocking of TikTok in New Caledonia during the riots last spring.<\/strong><\/p>\n<p>Although it considers that in this particular case the conditions of validity were not met, it nevertheless establishes the conditions under which such a blocking of a social network could be legal, judging that the administrative authority &quot;may (...) resort to such a [blocking] measure, in exceptional circumstances, if it is essential to meet the needs of the moment.&quot;<\/p>\n<p>The measure should be:<\/p>\n<ul style=\"list-style-type: square;\">\n<li>Indispensable for dealing with particularly serious events;<\/li>\n<li>Without any technical means allowing for the immediate implementation of alternative measures;<\/li>\n<li>And taken &quot;for a limited period necessary for the research and implementation of these alternative measures.&quot;<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>In a ruling dated March 26, the social chamber of the Court of Cassation confirmed the right of an employee to obtain a partial copy of the payslips of some of her colleagues, in order to demonstrate unfair treatment.<\/strong> in his career progression.<\/p>\n<p>The court reiterates the principle of data minimization and specifies that it is the responsibility of the trial judge &quot;to ensure that the information, which he will specify as having to remain visible, is adequate, relevant and strictly limited to what is essential for the comparison between employees, taking into account the alleged ground(s) of discrimination.&quot;<\/p>\n<h4>&nbsp;<\/h4>\n<h4><img decoding=\"async\" src=\"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/Europe_1773308996661.jpg\" alt=\"\" width=\"145\" height=\"97\"><\/h4>\n<h4><strong>European institutions and bodies <\/strong><\/h4>\n<p>Politico announced in an April 3rd article that <strong>The European Commission plans to present a proposal to simplify the GDPR in the coming weeks.<\/strong>.<\/p>\n<p>According to the publication, this is &quot;one of the priorities of the President of the EU executive, Ursula von der Leyen, who is trying to make companies in the Old Continent more competitive compared to their rivals in the United States, China and elsewhere.&quot;<\/p>\n<p>On April 1st, the Commission unveiled its roadmap for a &quot;new European internal security strategy&quot; called ProtectEU, which aims in particular to extend the powers of Europol and Frontex.<\/p>\n<p>The Commission will conduct an assessment of the impact of data retention rules at EU level and prepare a technology roadmap on encryption, &quot;in order to identify and assess technological solutions that would allow law enforcement authorities to access encrypted data legally, while safeguarding cybersecurity and fundamental rights.&quot;<\/p>\n<p>The Advocate General (AG) of the Court of Justice of the European Union (CJEU) considers in his conclusions of 27 March that WhatsApp, being directly concerned, can challenge the binding decision of the EDPB before the European Court under Article 263 of the TFEU.<\/p>\n<p>As a reminder, following this decision by the EDPB on July 28, 2021, within the framework of the GDPR consistency mechanism, the Irish Data Protection Commission adopted a decision finding the infringements, imposing corrective measures and administrative fines for a cumulative amount of 225 million euros.<\/p>\n<p>WhatsApp had challenged the EDPB&#039;s decision before the European Court and, in parallel, the final enforcement decision of the Irish APD before an Irish court.<\/p>\n<p>The General Assembly also considered, on the same day, that sending a daily newsletter constitutes &quot;direct marketing&quot; for &quot;similar products or services&quot; within the meaning of the ePrivacy Directive, and considered that where the processing of personal data is lawful on the basis of this provision, Article 6 of the GDPR is not applicable: where there is a specific provision in the ePrivacy Directive entailing obligations having the same objective as the corresponding provisions of the GDPR, it is the &quot;ePrivacy&quot; provision that must be applied.<\/p>\n<p>On March 20, the Court finally ruled that the GDPR provides data subjects with the right to an injunction in cases of unlawful processing. This preventative option of seeking an injunction does not mitigate the compensatory non-material damages resulting from such unlawful processing.<\/p>\n<p>The CJEU ruled on March 13 that Article 16 of the GDPR requires the rectification of the sex of a transgender person recorded inaccurately in a public register.<\/p>\n<p>While the competent authority may request proof of inaccuracy, requiring the person concerned to prove that they have undergone sex reassignment surgery constitutes a violation of their human rights.<\/p>\n<h4><strong>&nbsp;<\/strong><\/h4>\n<h4><strong>News from the member countries of the European Union. <\/strong><\/h4>\n<p><strong>In Germany, the Federal Court of Justice upheld the award of 500 euros in non-material damages to a plaintiff for harm to his reputation.<\/strong> pursuant to Article 82 of the GDPR.<\/p>\n<p>Furthermore, it held that a court cannot take into account either the seriousness of the GDPR violation or the issue of fault when determining the amount of damages.<\/p>\n<p><strong>The Austrian Data Protection Authority (APD) has ordered the destruction of images taken by a photographer for non-compliance with the GDPR.<\/strong>.<\/p>\n<p>The photographer had published on a public website images taken in the street of identifiable people, particularly children and women, in sensitive contexts, without a valid legal basis or sufficient guarantees (information, right to object).<\/p>\n<p><strong>The Noyb association has just suffered a setback before the Brussels Court of Appeal.<\/strong>.<\/p>\n<p>In a ruling dated March 19, the court held that...<strong>The complaints relayed by the association must demonstrate a personal interest on the part of the person concerned.<\/strong>.<\/p>\n<p>In this particular case, the Market Court indicates that it has not found any justification for such an interest from the plaintiffs regarding violations of the rules relating to cookies.<\/p>\n<p>She mentions, among other indications, that Noyb does not claim at any point in the proceedings that the plaintiffs were regular or even occasional visitors to the websites\/newspapers in question.<\/p>\n<p>In Belgium too, an erotic sauna received a warning from the litigation chamber of the APD, in particular for keeping an online guestbook which allowed the public dissemination of sensitive data concerning customers.<\/p>\n<p>The APD noted a lack of transparency in the privacy policy, the absence of a legal basis for data processing and non-compliance with obligations relating to the register of processing activities.<\/p>\n<p>In Spain, the APD fined a bank 3,500,000 euros for a serious design flaw in a banking application that allowed customers to access accounts for which they had no authorization.<\/p>\n<p>An insurance company was also fined \u20ac1,000,000 for a coding error that resulted in the sending of personal data, including sensitive data, of 3,395 people by email to 354 recipient companies.<\/p>\n<p>In Greece, the APD fined a bank 3,000 euros for failing to implement appropriate security measures following an internal data breach.<\/p>\n<p>An employee had wrongfully retained administrator rights after leaving the company and accessed the data of more than 6,000 other employees without authorization.<\/p>\n<p>A similar decision has been noted by the Italian Data Protection Authority (APD).<\/p>\n<p>In a case of SMS spam, the Greek Data Protection Authority (APD) asked the national domain name authority to suspend the domain name of the company concerned, on the grounds that this domain name was being used in bad faith or in a manner contrary to public order.<\/p>\n<p>Note <strong>that at the ICANN level, registrars have &quot;suspended 2,528 domain names and disabled 328 websites used for phishing operations&quot; <\/strong>as part of efforts to implement compliance measures.<\/p>\n<p>The Italian Data Protection Authority (APD) has fined an energy company 300,000 euros for unlawfully processing personal data for direct marketing purposes, for failing to properly implement data protection principles, and for not adequately informing job applicants about the processing of their data.<\/p>\n<p>The Luxembourg Administrative Court has upheld the \u20ac746,000,000 fine imposed on an Amazon subsidiary by the APD in 2021 for the unlawful processing of website visitor data for interest-based advertising purposes, for failing to provide transparent information and for violating several rights of data subjects.<\/p>\n<p>While Amazon is reportedly considering an appeal, the APD stated that it would not provide any details of its decision during the appeal period or any potential proceedings.<\/p>\n<p>The Polish Data Protection Authority (APD) has fined the postal service 6.3 million euros for carrying out a government data processing request concerning 30 million citizens in the context of elections held during the Covid pandemic, without verifying the legal basis of the request.&nbsp;<\/p>\n<p>La Poste should have waited until all avenues of appeal against this decision had been exhausted, which was ultimately overturned by the courts.<\/p>\n<h4>&nbsp;<\/h4>\n<h4><strong><img decoding=\"async\" src=\"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/INTERNATIO_1773308947127.jpg\" alt=\"\" width=\"150\" height=\"85\"><\/strong><\/h4>\n<p>On March 17, the UK&#039;s Online Safety Act came into force, requiring online platforms to implement a series of measures aimed at reducing risks to children and removing harmful content more generally.<\/p>\n<p>British service providers have until March 16 to conduct risk assessments of their services.<\/p>\n<p>A code of good practice and an implementation program have been developed by the UK regulatory authority (Ofcom).<\/p>\n<p>Critics of this law particularly criticize its scope to grey areas such as harassment or behavior control, and the resulting risks of censorship.<\/p>\n<p>This law comes on top of two other British regulations that could well undermine the renewal of the UK&#039;s adequacy decision in June: a note published by the European Parliament&#039;s Research Service refers to the Data Bill and an amendment to the Investigatory Powers Act, both of which aim to expand government and law enforcement access to user data.<\/p>\n<p>The Australian Information Commissioner&#039;s Office published a study on March 19th on the policies and practices of Australian public sector agencies regarding their use of messaging applications.<\/p>\n<p>The report finds that messaging applications are commonly used in the Australian public service without adequate oversight or procedures. The study presents a list of recommendations to address this.<\/p>\n<p>The Canadian Privacy Commissioner has just released a tool to assess whether a personal data breach presents a real risk of significant harm to individuals.<\/p>\n<p>In China, the &quot;National Internet Information Office&quot; published on March 13 security management measures for the application of biometric technologies, which require that facial recognition activities comply with applicable laws, adopt security measures and minimize the impact on human rights.<\/p>\n<p>The German newspaper Der Spiegel announced on March 26 that it had been able to access personal data and online contact information, and even passwords, for some of the top American security officials, including the Secretary of Defense and former Fox News host Pete Hegseth.<\/p>\n<p>The journalists used public search engines, as well as &quot;hacked customer data&quot; that had been published online.<\/p>\n<p>National security advisor Mike Waltz and director of national intelligence Tulsi Gabbard are also believed to be among those whose information was leaked online.<\/p>\n<p>In the United States as well, AI regulation is increasing significantly: in 2024, more than 600 AI-related bills were identified, of which nearly 100 have been enacted.<\/p>\n<p>However, the level of protection varies greatly from state to state.<\/p>\n<p>A tracker offered by the &quot;Multistate&quot; website allows you to visualize the state of regulations in 2025.<\/p>\n<p>Meanwhile, on March 18, President Trump fired the two Democratic members of the Federal Trade Commission (FTC), increasing the current uncertainty about the effectiveness of consumer protection and control mechanisms in the United States and further weakening the stability of the transatlantic data protection agreement.<\/p>\n<p>In Vietnam, the data protection law could be adopted in the spring.<\/p>\n<p>The government recently adopted a resolution to accelerate the legislative process and the Ministry of Public Security was tasked with submitting the bill to the National Assembly for formal adoption in May 2025.<\/p>\n<p>Advanced AI image generators have significant implications for data protection, as evidenced by an article by L. Jarosvky.<\/p>\n<ul style=\"list-style-type: square;\">\n<li>The \u201cGhibli\u201d effect, which allows the creation of images in the style of the famous Myasaki cartoons, has led thousands of people in recent days to voluntarily upload their faces and personal photos to ChatGPT, thus giving OpenAI direct and free access to several thousand new faces to train its artificial intelligence models.<\/li>\n<li>Image generators also make creating fake evidence extremely easy, cheap, and accessible. Anyone with malicious intent can thus create fake invoices, identity documents, proof of address, or even bank documents in minutes and at virtually no cost, with the resulting risks of identity theft.<\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Legal Watch No. 81 \u2013 March 2025. Data breaches: how is the law applied, and what are the penalties? Who hasn&#039;t recently received an email from their telecommunications service provider, or from the NGO to which they make a monthly donation, informing them that their contact details, login credentials, and sometimes even their bank details, have been compromised?<\/p>","protected":false},"author":1,"featured_media":14064,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[35],"tags":[],"class_list":["post-14068","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-veille-juridique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Violations de donn\u00e9es : quelle application de la loi, pour quelles sanctions ? - Viqtor<\/title>\n<meta name=\"description\" content=\"Violations de donn\u00e9es : quelle application de la loi, pour quelles sanctions ? - Viqtor\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/viqtor.eu\/en\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Violations de donn\u00e9es : quelle application de la loi, pour quelles sanctions ? - Viqtor\" \/>\n<meta property=\"og:description\" content=\"Violations de donn\u00e9es : quelle application de la loi, pour quelles sanctions ? - Viqtor\" \/>\n<meta property=\"og:url\" content=\"https:\/\/viqtor.eu\/en\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/\" \/>\n<meta property=\"og:site_name\" content=\"Viqtor\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-06T15:26:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/04\/widget-viqtor.png\" \/>\n<meta name=\"author\" content=\"Bruno\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bruno\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"18 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/viqtor.eu\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/viqtor.eu\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/\"},\"author\":{\"name\":\"Bruno\",\"@id\":\"https:\/\/viqtor.eu\/#\/schema\/person\/3dbd9cc82a28f6cf1695c92eda0099ad\"},\"headline\":\"Violations de donn\u00e9es : quelle application de la loi, pour quelles sanctions ?\",\"datePublished\":\"2026-05-06T15:26:40+00:00\",\"dateModified\":\"2026-05-06T15:26:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/viqtor.eu\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/\"},\"wordCount\":3744,\"publisher\":{\"@id\":\"https:\/\/viqtor.eu\/#organization\"},\"image\":{\"@id\":\"https:\/\/viqtor.eu\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/shutterstock_2733065965_1773309100558.jpg\",\"articleSection\":[\"Veille juridique\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/viqtor.eu\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/\",\"url\":\"https:\/\/viqtor.eu\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/\",\"name\":\"Violations de donn\u00e9es : quelle application de la loi, pour quelles sanctions ? - Viqtor\",\"isPartOf\":{\"@id\":\"https:\/\/viqtor.eu\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/viqtor.eu\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/viqtor.eu\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/shutterstock_2733065965_1773309100558.jpg\",\"datePublished\":\"2026-05-06T15:26:40+00:00\",\"dateModified\":\"2026-05-06T15:26:40+00:00\",\"description\":\"Violations de donn\u00e9es : quelle application de la loi, pour quelles sanctions ? - Viqtor\",\"breadcrumb\":{\"@id\":\"https:\/\/viqtor.eu\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/viqtor.eu\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/viqtor.eu\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/#primaryimage\",\"url\":\"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/shutterstock_2733065965_1773309100558.jpg\",\"contentUrl\":\"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/shutterstock_2733065965_1773309100558.jpg\",\"width\":800,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/viqtor.eu\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/viqtor.eu\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Violations de donn\u00e9es : quelle application de la loi, pour quelles sanctions ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/viqtor.eu\/#website\",\"url\":\"https:\/\/viqtor.eu\/\",\"name\":\"Viqtor\",\"description\":\"Faites du RGPD une opportunit\u00e9 pour votre entreprise.\",\"publisher\":{\"@id\":\"https:\/\/viqtor.eu\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/viqtor.eu\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/viqtor.eu\/#organization\",\"name\":\"viqtor.eu\",\"url\":\"https:\/\/viqtor.eu\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/viqtor.eu\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/viqtor.eu\/wp-content\/uploads\/2023\/06\/favicon-noir.svg\",\"contentUrl\":\"https:\/\/viqtor.eu\/wp-content\/uploads\/2023\/06\/favicon-noir.svg\",\"width\":108,\"height\":86,\"caption\":\"viqtor.eu\"},\"image\":{\"@id\":\"https:\/\/viqtor.eu\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/viqtor.eu\/#\/schema\/person\/3dbd9cc82a28f6cf1695c92eda0099ad\",\"name\":\"Bruno\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/viqtor.eu\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e5a596f9489de15bfe046e97fb771f63589b601ca7e81ccc2bb9a23582f441a3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e5a596f9489de15bfe046e97fb771f63589b601ca7e81ccc2bb9a23582f441a3?s=96&d=mm&r=g\",\"caption\":\"Bruno\"},\"sameAs\":[\"https:\/\/exciting-panini.13-37-234-21.plesk.page\"],\"url\":\"https:\/\/viqtor.eu\/en\/author\/mouad_zxum2ebi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Violations de donn\u00e9es : quelle application de la loi, pour quelles sanctions ? - Viqtor","description":"Violations de donn\u00e9es : quelle application de la loi, pour quelles sanctions ? - Viqtor","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/viqtor.eu\/en\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/","og_locale":"en_US","og_type":"article","og_title":"Violations de donn\u00e9es : quelle application de la loi, pour quelles sanctions ? - Viqtor","og_description":"Violations de donn\u00e9es : quelle application de la loi, pour quelles sanctions ? - Viqtor","og_url":"https:\/\/viqtor.eu\/en\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/","og_site_name":"Viqtor","article_published_time":"2026-05-06T15:26:40+00:00","og_image":[{"url":"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/04\/widget-viqtor.png"}],"author":"Bruno","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bruno","Est. reading time":"18 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/viqtor.eu\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/#article","isPartOf":{"@id":"https:\/\/viqtor.eu\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/"},"author":{"name":"Bruno","@id":"https:\/\/viqtor.eu\/#\/schema\/person\/3dbd9cc82a28f6cf1695c92eda0099ad"},"headline":"Violations de donn\u00e9es : quelle application de la loi, pour quelles sanctions ?","datePublished":"2026-05-06T15:26:40+00:00","dateModified":"2026-05-06T15:26:40+00:00","mainEntityOfPage":{"@id":"https:\/\/viqtor.eu\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/"},"wordCount":3744,"publisher":{"@id":"https:\/\/viqtor.eu\/#organization"},"image":{"@id":"https:\/\/viqtor.eu\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/#primaryimage"},"thumbnailUrl":"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/shutterstock_2733065965_1773309100558.jpg","articleSection":["Veille juridique"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/viqtor.eu\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/","url":"https:\/\/viqtor.eu\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/","name":"Violations de donn\u00e9es : quelle application de la loi, pour quelles sanctions ? - Viqtor","isPartOf":{"@id":"https:\/\/viqtor.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/viqtor.eu\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/#primaryimage"},"image":{"@id":"https:\/\/viqtor.eu\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/#primaryimage"},"thumbnailUrl":"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/shutterstock_2733065965_1773309100558.jpg","datePublished":"2026-05-06T15:26:40+00:00","dateModified":"2026-05-06T15:26:40+00:00","description":"Violations de donn\u00e9es : quelle application de la loi, pour quelles sanctions ? - Viqtor","breadcrumb":{"@id":"https:\/\/viqtor.eu\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/viqtor.eu\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/viqtor.eu\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/#primaryimage","url":"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/shutterstock_2733065965_1773309100558.jpg","contentUrl":"https:\/\/viqtor.eu\/wp-content\/uploads\/2026\/05\/shutterstock_2733065965_1773309100558.jpg","width":800,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/viqtor.eu\/violations-de-donnees-quelle-application-de-la-loi-pour-quelles-sanctions\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/viqtor.eu\/"},{"@type":"ListItem","position":2,"name":"Violations de donn\u00e9es : quelle application de la loi, pour quelles sanctions ?"}]},{"@type":"WebSite","@id":"https:\/\/viqtor.eu\/#website","url":"https:\/\/viqtor.eu\/","name":"Viqtor","description":"Faites du RGPD une opportunit\u00e9 pour votre entreprise.","publisher":{"@id":"https:\/\/viqtor.eu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/viqtor.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/viqtor.eu\/#organization","name":"viqtor.eu","url":"https:\/\/viqtor.eu\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/viqtor.eu\/#\/schema\/logo\/image\/","url":"https:\/\/viqtor.eu\/wp-content\/uploads\/2023\/06\/favicon-noir.svg","contentUrl":"https:\/\/viqtor.eu\/wp-content\/uploads\/2023\/06\/favicon-noir.svg","width":108,"height":86,"caption":"viqtor.eu"},"image":{"@id":"https:\/\/viqtor.eu\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/viqtor.eu\/#\/schema\/person\/3dbd9cc82a28f6cf1695c92eda0099ad","name":"Bruno","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/viqtor.eu\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e5a596f9489de15bfe046e97fb771f63589b601ca7e81ccc2bb9a23582f441a3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e5a596f9489de15bfe046e97fb771f63589b601ca7e81ccc2bb9a23582f441a3?s=96&d=mm&r=g","caption":"Bruno"},"sameAs":["https:\/\/exciting-panini.13-37-234-21.plesk.page"],"url":"https:\/\/viqtor.eu\/en\/author\/mouad_zxum2ebi\/"}]}},"_links":{"self":[{"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/posts\/14068","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/comments?post=14068"}],"version-history":[{"count":0,"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/posts\/14068\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/media\/14064"}],"wp:attachment":[{"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/media?parent=14068"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/categories?post=14068"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/viqtor.eu\/en\/wp-json\/wp\/v2\/tags?post=14068"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}