{"id":97380,"date":"2021-05-04T14:05:00","date_gmt":"2021-05-04T13:05:00","guid":{"rendered":"https:\/\/metacomp.wpenginepowered.com\/info-hub\/non-categorise\/why-is-a-data-security-breach-a-boardroom-issue\/"},"modified":"2025-07-24T08:23:32","modified_gmt":"2025-07-24T07:23:32","slug":"pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration","status":"publish","type":"post","link":"https:\/\/www.metacompliance.com\/fr\/blog\/data-breach\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration","title":{"rendered":"Pourquoi une violation de la s\u00e9curit\u00e9 des donn\u00e9es est-elle un probl\u00e8me pour le conseil d&rsquo;administration ?"},"content":{"rendered":"<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les atteintes \u00e0 la s\u00e9curit\u00e9 des donn\u00e9es ont depuis longtemps quitt\u00e9 le domaine du service informatique pour s&rsquo;installer solidement \u00e0 la table du conseil d&rsquo;administration. Dans le contexte actuel d&rsquo;\u00e9volution des menaces, les membres du conseil d&rsquo;administration doivent \u00eatre conscients des cons\u00e9quences d&rsquo;une violation de la s\u00e9curit\u00e9 et \u00eatre pr\u00eats \u00e0 prendre des mesures positives. <\/p>\n","protected":false},"author":1,"featured_media":34400,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"categories":[144],"class_list":["post-97380","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-breaches"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pourquoi une violation de la s\u00e9curit\u00e9 des donn\u00e9es est-elle un probl\u00e8me pour le conseil d&#039;administration ? - MetaCompliance<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.metacompliance.com\/fr\/blog\/data-breach\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pourquoi une violation de la s\u00e9curit\u00e9 des donn\u00e9es est-elle un probl\u00e8me pour le conseil d&#039;administration ? - MetaCompliance\" \/>\n<meta property=\"og:description\" content=\"Les atteintes \u00e0 la s\u00e9curit\u00e9 des donn\u00e9es ont depuis longtemps quitt\u00e9 le domaine du service informatique pour s&#039;installer solidement \u00e0 la table du conseil d&#039;administration. Dans le contexte actuel d&#039;\u00e9volution des menaces, les membres du conseil d&#039;administration doivent \u00eatre conscients des cons\u00e9quences d&#039;une violation de la s\u00e9curit\u00e9 et \u00eatre pr\u00eats \u00e0 prendre des mesures positives.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.metacompliance.com\/fr\/blog\/data-breach\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration\" \/>\n<meta property=\"og:site_name\" content=\"MetaCompliance\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-04T13:05:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-24T07:23:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.metacompliance.com\/wp-content\/uploads\/2025\/06\/s-o-c-i-a-l-c-u-t-1RT4txDDAbM-unsplash-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1704\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rouge\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rouge\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.metacompliance.com\\\/fr\\\/blog\\\/data-breach\\\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.metacompliance.com\\\/fr\\\/blog\\\/data-breach\\\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration\"},\"author\":{\"name\":\"Rouge\",\"@id\":\"https:\\\/\\\/www.metacompliance.com\\\/fr#\\\/schema\\\/person\\\/fe1b1dd873af281510fb0ad5f3fb5b38\"},\"headline\":\"Pourquoi une violation de la s\u00e9curit\u00e9 des donn\u00e9es est-elle un probl\u00e8me pour le conseil d&rsquo;administration ?\",\"datePublished\":\"2021-05-04T13:05:00+00:00\",\"dateModified\":\"2025-07-24T07:23:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.metacompliance.com\\\/fr\\\/blog\\\/data-breach\\\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration\"},\"wordCount\":20,\"image\":{\"@id\":\"https:\\\/\\\/www.metacompliance.com\\\/fr\\\/blog\\\/data-breach\\\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.metacompliance.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/s-o-c-i-a-l-c-u-t-1RT4txDDAbM-unsplash-scaled.jpg\",\"articleSection\":[\"Data Breaches\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.metacompliance.com\\\/fr\\\/blog\\\/data-breach\\\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration\",\"url\":\"https:\\\/\\\/www.metacompliance.com\\\/fr\\\/blog\\\/data-breach\\\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration\",\"name\":\"Pourquoi une violation de la s\u00e9curit\u00e9 des donn\u00e9es est-elle un probl\u00e8me pour le conseil d'administration ? - MetaCompliance\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.metacompliance.com\\\/fr#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.metacompliance.com\\\/fr\\\/blog\\\/data-breach\\\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.metacompliance.com\\\/fr\\\/blog\\\/data-breach\\\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.metacompliance.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/s-o-c-i-a-l-c-u-t-1RT4txDDAbM-unsplash-scaled.jpg\",\"datePublished\":\"2021-05-04T13:05:00+00:00\",\"dateModified\":\"2025-07-24T07:23:32+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.metacompliance.com\\\/fr#\\\/schema\\\/person\\\/fe1b1dd873af281510fb0ad5f3fb5b38\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.metacompliance.com\\\/fr\\\/blog\\\/data-breach\\\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.metacompliance.com\\\/fr\\\/blog\\\/data-breach\\\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.metacompliance.com\\\/fr\\\/blog\\\/data-breach\\\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration#primaryimage\",\"url\":\"https:\\\/\\\/www.metacompliance.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/s-o-c-i-a-l-c-u-t-1RT4txDDAbM-unsplash-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.metacompliance.com\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/s-o-c-i-a-l-c-u-t-1RT4txDDAbM-unsplash-scaled.jpg\",\"width\":2560,\"height\":1704,\"caption\":\"Violation de la s\u00e9curit\u00e9 des donn\u00e9es\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.metacompliance.com\\\/fr\\\/blog\\\/data-breach\\\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.metacompliance.com\\\/fr\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pourquoi une violation de la s\u00e9curit\u00e9 des donn\u00e9es est-elle un probl\u00e8me pour le conseil d&#8217;administration ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.metacompliance.com\\\/fr#website\",\"url\":\"https:\\\/\\\/www.metacompliance.com\\\/fr\",\"name\":\"MetaCompliance\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.metacompliance.com\\\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.metacompliance.com\\\/fr#\\\/schema\\\/person\\\/fe1b1dd873af281510fb0ad5f3fb5b38\",\"name\":\"Rouge\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/979d60cad2f4c478c3d73fbd41f1d4f30ab6a193ea6f9e91917d90c552707d6a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/979d60cad2f4c478c3d73fbd41f1d4f30ab6a193ea6f9e91917d90c552707d6a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/979d60cad2f4c478c3d73fbd41f1d4f30ab6a193ea6f9e91917d90c552707d6a?s=96&d=mm&r=g\",\"caption\":\"Rouge\"},\"sameAs\":[\"https:\\\/\\\/www.metacompliance.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pourquoi une violation de la s\u00e9curit\u00e9 des donn\u00e9es est-elle un probl\u00e8me pour le conseil d'administration ? - MetaCompliance","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.metacompliance.com\/fr\/blog\/data-breach\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration","og_locale":"fr_FR","og_type":"article","og_title":"Pourquoi une violation de la s\u00e9curit\u00e9 des donn\u00e9es est-elle un probl\u00e8me pour le conseil d'administration ? - MetaCompliance","og_description":"Les atteintes \u00e0 la s\u00e9curit\u00e9 des donn\u00e9es ont depuis longtemps quitt\u00e9 le domaine du service informatique pour s'installer solidement \u00e0 la table du conseil d'administration. Dans le contexte actuel d'\u00e9volution des menaces, les membres du conseil d'administration doivent \u00eatre conscients des cons\u00e9quences d'une violation de la s\u00e9curit\u00e9 et \u00eatre pr\u00eats \u00e0 prendre des mesures positives.","og_url":"https:\/\/www.metacompliance.com\/fr\/blog\/data-breach\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration","og_site_name":"MetaCompliance","article_published_time":"2021-05-04T13:05:00+00:00","article_modified_time":"2025-07-24T07:23:32+00:00","og_image":[{"width":2560,"height":1704,"url":"https:\/\/www.metacompliance.com\/wp-content\/uploads\/2025\/06\/s-o-c-i-a-l-c-u-t-1RT4txDDAbM-unsplash-scaled.jpg","type":"image\/jpeg"}],"author":"Rouge","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rouge"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.metacompliance.com\/fr\/blog\/data-breach\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration#article","isPartOf":{"@id":"https:\/\/www.metacompliance.com\/fr\/blog\/data-breach\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration"},"author":{"name":"Rouge","@id":"https:\/\/www.metacompliance.com\/fr#\/schema\/person\/fe1b1dd873af281510fb0ad5f3fb5b38"},"headline":"Pourquoi une violation de la s\u00e9curit\u00e9 des donn\u00e9es est-elle un probl\u00e8me pour le conseil d&rsquo;administration ?","datePublished":"2021-05-04T13:05:00+00:00","dateModified":"2025-07-24T07:23:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.metacompliance.com\/fr\/blog\/data-breach\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration"},"wordCount":20,"image":{"@id":"https:\/\/www.metacompliance.com\/fr\/blog\/data-breach\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration#primaryimage"},"thumbnailUrl":"https:\/\/www.metacompliance.com\/wp-content\/uploads\/2025\/06\/s-o-c-i-a-l-c-u-t-1RT4txDDAbM-unsplash-scaled.jpg","articleSection":["Data Breaches"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.metacompliance.com\/fr\/blog\/data-breach\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration","url":"https:\/\/www.metacompliance.com\/fr\/blog\/data-breach\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration","name":"Pourquoi une violation de la s\u00e9curit\u00e9 des donn\u00e9es est-elle un probl\u00e8me pour le conseil d'administration ? - MetaCompliance","isPartOf":{"@id":"https:\/\/www.metacompliance.com\/fr#website"},"primaryImageOfPage":{"@id":"https:\/\/www.metacompliance.com\/fr\/blog\/data-breach\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration#primaryimage"},"image":{"@id":"https:\/\/www.metacompliance.com\/fr\/blog\/data-breach\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration#primaryimage"},"thumbnailUrl":"https:\/\/www.metacompliance.com\/wp-content\/uploads\/2025\/06\/s-o-c-i-a-l-c-u-t-1RT4txDDAbM-unsplash-scaled.jpg","datePublished":"2021-05-04T13:05:00+00:00","dateModified":"2025-07-24T07:23:32+00:00","author":{"@id":"https:\/\/www.metacompliance.com\/fr#\/schema\/person\/fe1b1dd873af281510fb0ad5f3fb5b38"},"breadcrumb":{"@id":"https:\/\/www.metacompliance.com\/fr\/blog\/data-breach\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.metacompliance.com\/fr\/blog\/data-breach\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.metacompliance.com\/fr\/blog\/data-breach\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration#primaryimage","url":"https:\/\/www.metacompliance.com\/wp-content\/uploads\/2025\/06\/s-o-c-i-a-l-c-u-t-1RT4txDDAbM-unsplash-scaled.jpg","contentUrl":"https:\/\/www.metacompliance.com\/wp-content\/uploads\/2025\/06\/s-o-c-i-a-l-c-u-t-1RT4txDDAbM-unsplash-scaled.jpg","width":2560,"height":1704,"caption":"Violation de la s\u00e9curit\u00e9 des donn\u00e9es"},{"@type":"BreadcrumbList","@id":"https:\/\/www.metacompliance.com\/fr\/blog\/data-breach\/pourquoi-une-violation-de-la-securite-des-donnees-est-elle-un-probleme-pour-le-conseil-dadministration#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.metacompliance.com\/fr"},{"@type":"ListItem","position":2,"name":"Pourquoi une violation de la s\u00e9curit\u00e9 des donn\u00e9es est-elle un probl\u00e8me pour le conseil d&#8217;administration ?"}]},{"@type":"WebSite","@id":"https:\/\/www.metacompliance.com\/fr#website","url":"https:\/\/www.metacompliance.com\/fr","name":"MetaCompliance","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.metacompliance.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.metacompliance.com\/fr#\/schema\/person\/fe1b1dd873af281510fb0ad5f3fb5b38","name":"Rouge","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/979d60cad2f4c478c3d73fbd41f1d4f30ab6a193ea6f9e91917d90c552707d6a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/979d60cad2f4c478c3d73fbd41f1d4f30ab6a193ea6f9e91917d90c552707d6a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/979d60cad2f4c478c3d73fbd41f1d4f30ab6a193ea6f9e91917d90c552707d6a?s=96&d=mm&r=g","caption":"Rouge"},"sameAs":["https:\/\/www.metacompliance.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.metacompliance.com\/fr\/wp-json\/wp\/v2\/posts\/97380","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.metacompliance.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.metacompliance.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.metacompliance.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.metacompliance.com\/fr\/wp-json\/wp\/v2\/comments?post=97380"}],"version-history":[{"count":0,"href":"https:\/\/www.metacompliance.com\/fr\/wp-json\/wp\/v2\/posts\/97380\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.metacompliance.com\/fr\/wp-json\/wp\/v2\/media\/34400"}],"wp:attachment":[{"href":"https:\/\/www.metacompliance.com\/fr\/wp-json\/wp\/v2\/media?parent=97380"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.metacompliance.com\/fr\/wp-json\/wp\/v2\/categories?post=97380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}