privacy et media sociaux nov 2012
TRANSCRIPT
![Page 1: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/1.jpg)
Respect de la vie privée et
média sociaux
Jacques Folon
Partner Edge Consulting
Chargé de cours ICHEC Me. de conférences Université de
LiègeProf. invité Université de Metz
Prof. Invité ISFSC – HE F.Ferrer
OU ?
Source des images: http://fr.slideshare.net/cicronin/cesi12-digital-identity-privacy-authenticity/download
EMBA
![Page 2: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/2.jpg)
Cette présentation est sur www.slideshare.net/folon
elle est à votre disposit ion
![Page 3: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/3.jpg)
Follow me on scoop.it for the latest news on data privacy and security
http://www.scoop.it/t/management-2-entreprise-2-0
![Page 4: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/4.jpg)
THEMATIQUES ABORDEESTHEMATIQUES ABORDEES1. LES MEDIA SOCIAUX
2. LES RISQUES
3. SECURITE
4. RESPECT DE LA VIE PRIVEE
5. CONTROLE DES COLLABORATEURS
6. CONCLUSION
![Page 5: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/5.jpg)
1. LES MEDIA SOCIAUX 1. LES MEDIA SOCIAUX
SOURCE DE L’IMAGE: http://www.jeffbullas.com/2012/08/07/15-common-mistakes-in-social-media-marketing/
![Page 6: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/6.jpg)
“MySpace is a place for friends.”
“MySpace is Your Space.”
“MySpace keeps you connected.”
![Page 7: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/7.jpg)
“Giving people the power to share and make the world more open and connected.”
![Page 8: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/8.jpg)
“Twitter is a service for friends, family, and co-workers to communicate and stay connected through the exchange of quick frequent answers to one simple question:
What are you doing?”
![Page 9: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/9.jpg)
“Your professional network of trusted contacts gives you an advantage in your career, and is one of your most valuable assets. LinkedIn exists to help you make better use of your professional network and help the people you trust in return.”
![Page 10: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/10.jpg)
1010
![Page 11: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/11.jpg)
1111
![Page 12: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/12.jpg)
![Page 13: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/13.jpg)
1313http://fr.slideshare.net/socialnerdia/2h12-the-state-of-social-media-and-social-media-marketing-in-the-second-half-of-2012-13488609
![Page 14: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/14.jpg)
Qu’est-ce qu’ils ont contribué à changer ?
1414
![Page 15: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/15.jpg)
Qu’est-ce qu’ils ont contribué à
changer ?
1515Source de l’image: http://www.maniacworld.com/copy-and-paste-babies.html
![Page 16: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/16.jpg)
Qu’est-ce qu’ils ont contribué à changer ?
1616
![Page 17: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/17.jpg)
Qu’est-ce qu’ils ont contribué à changer ?
1717
![Page 18: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/18.jpg)
Qu’est-ce qu’ils ont contribué à changer ?
1818SOURCE DE L’IMAGE: http://hanane.zevillage.org/news/le-marketing-viral
![Page 19: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/19.jpg)
Qu’est-ce qu’ils ont contribué à changer ?
1919SOURCE DE L’IMAGE: http://www.lesnumeriques.com/divers/touche-pas-a-ma-e-reputation-enquete-a1548.html
![Page 20: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/20.jpg)
4
By giving people the power to share, we're making the world more transparent.
The question isn't, 'What do we want to know about people?', It's, 'What do
people want to tell about themselves?'Data privacy is outdated !
Mark Zuckerberg
If you have something that you don’t want anyone to know, maybe you
shouldn’t be doing it in the first place.
Eric Schmidt
![Page 21: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/21.jpg)
21
![Page 22: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/22.jpg)
![Page 23: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/23.jpg)
![Page 24: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/24.jpg)
![Page 25: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/25.jpg)
25
Privacy statement confusion
• 53% of consumers consider that a privacy statement means that data will never be sell or give
• 43% only have read a privacy statement
• 45% only use different email addresses
• 33% changed passwords regularly
• 71% decide not to register or purchase due to a request of unneeded information
• 41% provide fake info
2525Source: TRUSTe survey
![Page 26: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/26.jpg)
![Page 27: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/27.jpg)
Bonne question?
10
![Page 28: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/28.jpg)
Why Use Social Media?• Provides a sense of community • Seen as a forum to postulate views • Fun way to stay connected with old friends or make new
friends• Forum for communication and collaboration• Allows for self-expression and self-representation• “Democratizing innovation”• “Crowdsourcing”
Source: The Risks of Social Networking IT Security Roundtable Harvard TownsendChief Information Security Officer Kansas State University
![Page 29: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/29.jpg)
2. LES RISQUES
SOURCE DE L’IMAGE : http://www.tunisie-news.com/artpublic/auteurs/auteur_4_jaouanebrahim.html
![Page 30: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/30.jpg)
Quels risques?
Source: The Risks of Soc ial Networking IT Security Roundtable Harvard TownsendChief Information Security Officer Kansas State University
![Page 31: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/31.jpg)
Données… ennuyantes
Sources/ Luc Pooters, Triforensic, 2011
![Page 32: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/32.jpg)
Message dangereux
• Un exemple de message circulant sur Facebool
• En cliquant on croit arriver sur Fox News TV report
• Une fois qu’on a cliqué, l’application a accès à la base de donnée des ‘amis” et peut leur envoyer des
messages, accéder aux “like” des amis, capter vos informations personnelles, et poster des messages
sur votre mur,…
Source: Social Media: Manage the Security to Manage Your Experience; Ross C. Hughes, U.S. Department of Education
![Page 33: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/33.jpg)
Social Media Spam
Click on the linkand you don’t getyour Victoria Secret Card
But you do get to visitthis guy
Source: Social Media: Manage the Security to Manage Your Experience; Ross C. Hughes, U.S. Department of Education
![Page 34: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/34.jpg)
Social Media Spam
Instead of a job with Google,you may get conned out of $$
Source: Social Media: Manage the Security to Manage Your Experience; Ross C. Hughes, U.S. Department of Education
![Page 35: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/35.jpg)
Social Media Spam
Compromised Facebook account. Victim is now promoting a shady pharmaceutical
Source: Social Media: Manage the Security to Manage Your Experience; Ross C. Hughes, U.S. Department of Education
![Page 36: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/36.jpg)
Social Media Phishing
To: T V V I T T E R.com
Now they will have your username and password
Source: Social Media: Manage the Security to Manage Your Experience; Ross C. Hughes, U.S. Department of Education
![Page 37: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/37.jpg)
Social Media Phishing
Another fake site
Source: Social Media: Manage the Security to Manage Your Experience; Ross C. Hughes, U.S. Department of Education
![Page 38: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/38.jpg)
Social Media Malware
Clicking on the links takes youto sites that willinfect your computerwith malware
Source: Social Media: Manage the Security to Manage Your Experience; Ross C. Hughes, U.S. Department of Education
![Page 39: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/39.jpg)
Privacy
VS.
Publicness
![Page 40: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/40.jpg)
http://www.geekculture.com/joyoftech/joyarchives/1655.html
![Page 41: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/41.jpg)
Malware
Sources/ Luc Pooters, Triforensic, 2011
![Page 42: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/42.jpg)
Phishing
Sources/ Luc Pooters, Triforensic, 2011
![Page 43: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/43.jpg)
Vol d’identités
Possibilité de créer des comptes avec des faux noms, des pseudo ou des alias
Où commence le vol d’identité?
![Page 44: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/44.jpg)
Social engineering
Sources/ Luc Pooters, Triforensic, 2011
![Page 45: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/45.jpg)
Take my stuff, please!
Source: The Risks of Social Networking IT Security Roundtable Harvard TownsendChief Information Security Officer Kansas State University
![Page 46: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/46.jpg)
Law of Unintended Consequences
Source: The Risks of Social Networking IT Security Roundtable Harvard TownsendChief Information Security Officer Kansas State University
![Page 47: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/47.jpg)
3rd Party Applications
•Games, quizzes, cutesie stuff•Untested by Facebook – anyone can write one•No Terms and Conditions – you either allow or you don’t•Installation gives the developers rights to look at your profile and overrides your privacy settings!
Source: The Risks of Social Networking IT Security Roundtable Harvard TownsendChief Information Security Officer Kansas State University
![Page 48: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/48.jpg)
3. SECURITE
SOURCE DE L’IMAGE: http://www.techzim.co.zw/2010/05/why-organisations-should-worry-about-security-2/
![Page 50: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/50.jpg)
Everything must be transparent
![Page 51: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/51.jpg)
How many information?How many information?
6767
![Page 52: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/52.jpg)
What your boss thinks...
![Page 53: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/53.jpg)
Employees share (too) many information and also with third
parties
![Page 54: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/54.jpg)
![Page 55: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/55.jpg)
![Page 56: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/56.jpg)
Where do one steal data?
•Banks•Hospitals•Ministries•Police•Newspapers•Telecoms•...
Which devices are stolen?
•USB •Laptops•Hard disks•Papers•Binders•Cars
![Page 57: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/57.jpg)
QUE SAVENT-ILS ??
![Page 58: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/58.jpg)
Actualités
![Page 59: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/59.jpg)
![Page 60: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/60.jpg)
6060Source de l’image : http://ediscoverytimes.com/?p=46
![Page 61: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/61.jpg)
LA LOI SUR LA PROTECTION DES DONNES PERSONNELLES IMPOSE UNE SECURITE INFORMATIQUE !
![Page 62: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/62.jpg)
OBLIGATIONS LEGALES ! • § 2. Le responsable du traitement ou, le cas echeant, son representant en
Belgique, doit :
• 1° faire toute diligence pour tenir les donnees a jour, pour rectifier ou supprimer les donnees inexactes, incompletes, ou non pertinentes, (…)
• 2° veiller a ce que, pour les personnes agissant sous son autorite, l'acces aux donnees et les possibilites de traitement soient limites a ce dont ces personnes ont besoin pour l'exercice de leurs fonctions ou a ce qui est necessaire pour les necessites du service;
• 3° informer les personnes agissant sous son autorite des dispositions de la presente loi et de ses arretes d'execution, ainsi que de toute prescription pertinente, relative a la protection de la vie privee a l'egard des traitements des donnees a caractere personnel;
• 4° s'assurer de la conformite des programmes servant au traitement automatise des donnees a caractere personnel avec les termes de la declaration visee a l'article 17 ainsi que de la regularite de leur application.
6262
![Page 63: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/63.jpg)
6363
![Page 64: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/64.jpg)
![Page 65: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/65.jpg)
48
![Page 66: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/66.jpg)
4. LE RESPECT DE LA VIE PRIVEE
SOURCE DE L’IMAGE: http://archives-lepost.huffingtonpost.fr/article/2012/01/13/2678781_protection-de-la-vie-privee-sur-les-medias-sociaux.html
![Page 67: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/67.jpg)
Quelques définit ions importantesQuelques définit ions importantes
![Page 68: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/68.jpg)
Données personnelles
![Page 69: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/69.jpg)
QUELLES DONNEES ?
6969
![Page 70: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/70.jpg)
Traitement de données
![Page 71: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/71.jpg)
7171
Le responsable de traitement
![Page 72: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/72.jpg)
On ne peut pas faire n’importe quoi avec des données
personnelles !!!
7272
![Page 73: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/73.jpg)
7373
![Page 74: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/74.jpg)
7474
FINALITES
SOURCE DE L’IMAGE : http://usnavyjeep.blogspot.be/2011/03/data-mining-your-personal-info-from.html
![Page 75: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/75.jpg)
7575
![Page 76: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/76.jpg)
DONNEES SENSIBLES • Certaines données sont si délicates qu'elles ne peuvent être traitées que dans
des cas très spécifiques.
• Vos nom et adresse sont plutôt des données anodines, mais ce n'est pas le cas pour la race, la santé, les opinions politiques, les convictions philosophiques (croyant ou athée, etc.), les préférences sexuelles ou le passé judiciaire.
• En principe, il est donc interdit de collecter, d’enregistrer ou de demander à pouvoir communiquer les données sensibles déjà citées, sauf quelques exceptions. Le responsable peut traiter des données sensibles données sensibles (à l'exception des données judiciaires) :
– s'il a obtenu le consentement écrit de la personne concernée ;
– si c'est indispensable pour prodiguer les soins nécessaires à la personne concernée;
– si la législation du travail ou l'application de la sécurité sociale l'impose ;
– la personne concernée elle-même a rendu les données publiques ;
– si c'est nécessaire en vue de l'établissement, de l'exercice ou de la défense d'un droit ;
– si c'est nécessaire dans le contexte d'une recherche scientifique.
7676
![Page 77: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/77.jpg)
TRANSFERT DE DONNEESTRANSFERT DE DONNEESresponsable et sous-traitantresponsable et sous-traitant
![Page 78: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/78.jpg)
LE SOUS-TRAITANT
7878
![Page 79: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/79.jpg)
FORMATIONS INTERNES
![Page 80: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/80.jpg)
63
RESTITUTIONS
![Page 81: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/81.jpg)
SUPPRIMER LES DROITS D’ACCES !
![Page 82: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/82.jpg)
![Page 83: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/83.jpg)
CoockiesCoockies
![Page 84: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/84.jpg)
international transferinternational transfer
![Page 85: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/85.jpg)
86
La sécurité des données personnelles est une obligation légale…
![Page 86: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/86.jpg)
5. CONTRÔLE DES COLLABORATEURS
8686SOURCE DE L’IMAGE: http://blog.loadingdata.nl/2011/05/chinese-privacy-protection-to-top-american/
![Page 87: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/87.jpg)
L’EMPLOYEUR PEUT-IL TOUT CONTROLER?
![Page 88: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/88.jpg)
Contrôle
Vie privée – droit au contrôleCC-CAO 81Mêmes règles pour secteur public
et privé
![Page 89: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/89.jpg)
CONTROLE
•FINALITES (4)•proport ionalité•procedure•information•individualisation•Sanctions
![Page 90: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/90.jpg)
TELEWORKING
![Page 91: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/91.jpg)
9191
http://www.privacycommission.be/fr/brochure-information-cybersurveillance
![Page 92: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/92.jpg)
6. CONCLUSION• IL NE FAUT PAS SOMBRER DANS
LA PARANO• LES MEDIA SOCIAUX
DEMANDENT UN CONTRÔLE • LES DONNEES PERSONNELLES
DOIVENT ETRE PROTEGEES• LA SECURITE INFORMATIQUE
EST UNE OBLIGATION LEGALE• IL N’Y A PAS DE SECURITE SANS
CONTRÔLE9292
![Page 93: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/93.jpg)
CA N’EST PAS COMPLIQUE A METTRE EN PLACE !
9393
![Page 94: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/94.jpg)
SECURITE ???
![Page 95: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/95.jpg)
87
“It is not the strongest of the species that survives, nor the most intelligent that survives. It is the one that is the most adaptable to change.”
C. Darwin
![Page 96: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/96.jpg)
![Page 97: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/97.jpg)
QUESTIONS ?QUESTIONS ?
![Page 98: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/98.jpg)
www.aliaz.com/jacques-folon [email protected]
![Page 99: Privacy et media sociaux nov 2012](https://reader033.vdocuments.net/reader033/viewer/2022051710/58f1c2401a28ab495c8b45a1/html5/thumbnails/99.jpg)