{"id":1559,"date":"2025-10-14T09:33:58","date_gmt":"2025-10-14T09:33:58","guid":{"rendered":"https:\/\/preprod.novatice.com\/?p=1559"},"modified":"2025-11-25T14:56:12","modified_gmt":"2025-11-25T14:56:12","slug":"cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees","status":"publish","type":"post","link":"https:\/\/www.novatice.com\/index.php\/2025\/10\/14\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\/","title":{"rendered":"Cybers\u00e9curit\u00e9 des collectivit\u00e9s : Comment assurer conformit\u00e9 et protection des donn\u00e9es?"},"content":{"rendered":"\n<div class=\"wp-block-uagb-image uagb-block-1b4adbd1 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none\"><figure class=\"wp-block-uagb-image__figure\"><img loading=\"lazy\" decoding=\"async\" srcset=\"https:\/\/preprod.novatice.com\/wp-content\/uploads\/2025\/10\/zfldaeppgvslhbv3xsl4_13_11zon.jpg ,https:\/\/preprod.novatice.com\/wp-content\/uploads\/2025\/10\/zfldaeppgvslhbv3xsl4_13_11zon.jpg 780w, https:\/\/preprod.novatice.com\/wp-content\/uploads\/2025\/10\/zfldaeppgvslhbv3xsl4_13_11zon.jpg 360w\" sizes=\"auto, (max-width: 480px) 150px\" src=\"https:\/\/preprod.novatice.com\/wp-content\/uploads\/2025\/10\/zfldaeppgvslhbv3xsl4_13_11zon.jpg\" alt=\"cybers\u00e9curit\u00e9 collectivit\u00e9s\" class=\"uag-image-2037\" width=\"800\" height=\"481\" title=\"cybers\u00e9curit\u00e9 collectivit\u00e9s\" loading=\"lazy\" role=\"img\"\/><\/figure><\/div>\n\n\n\n<p>La CNIL a d\u00e9clar\u00e9 le 21 mars 2025 que la cybers\u00e9curit\u00e9 des collectivit\u00e9s territoriales serait l\u2019un des axes majeurs de ses contr\u00f4les pour l\u2019ann\u00e9e 2025. En effet, tout au long de cette ann\u00e9e, la&nbsp;<strong>Commission nationale de l&rsquo;informatique et des libert\u00e9s (CNIL)<\/strong>&nbsp;va intensifier ses contr\u00f4les sur la cybers\u00e9curit\u00e9 des collectivit\u00e9s territoriales. Face \u00e0 l\u2019augmentation des cyberattaques, ces collectivit\u00e9s doivent s\u00e9curiser leurs syst\u00e8mes d&rsquo;information. Elles doivent aussi respecter les nouvelles r\u00e9glementations li\u00e9es \u00e0 la directive&nbsp;<strong>NIS 2<\/strong>. D\u00e9couvrez comment&nbsp;<strong>Novatice NEOS<\/strong>&nbsp;peut vous aider \u00e0 faire face \u00e0 ces d\u00e9fis.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Pourquoi la CNIL renforce ses contr\u00f4les en 2025 ?<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>La mont\u00e9e des cyberattaques et la protection des donn\u00e9es personnelles<\/strong><\/h3>\n\n\n\n<p><a href=\"https:\/\/www.cnil.fr\/fr\/violations-massives-de-donnees-en-2024-quels-sont-les-principaux-enseignements-mesures-a-prendre\" target=\"_blank\" rel=\"noreferrer noopener\"><u>Les violations de donn\u00e9es signal\u00e9es \u00e0 la CNIL ont augment\u00e9 de&nbsp;<\/u><\/a><strong><a href=\"https:\/\/www.cnil.fr\/fr\/violations-massives-de-donnees-en-2024-quels-sont-les-principaux-enseignements-mesures-a-prendre\" target=\"_blank\" rel=\"noreferrer noopener\"><u>20 % en 2024<\/u><\/a><\/strong>&nbsp;par rapport \u00e0 2023. La cybers\u00e9curit\u00e9 devient essentielle. Les collectivit\u00e9s traitent des donn\u00e9es sensibles comme l\u2019\u00e9tat civil, les prestations sociales et les paiements en ligne. Elles sont donc des cibles privil\u00e9gi\u00e9es pour les cyberattaques.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Les nouvelles obligations li\u00e9es \u00e0 la directive NIS 2<\/strong><\/h3>\n\n\n\n<p>La directive&nbsp;<strong>NIS 2<\/strong>&nbsp;impose de nouvelles exigences en mati\u00e8re de cybers\u00e9curit\u00e9. Elle concerne la protection des infrastructures critiques et la gestion des risques. Les collectivit\u00e9s doivent se pr\u00e9parer \u00e0 ces nouvelles obligations. Elles devront les appliquer dans un avenir proche.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Les priorit\u00e9s du plan strat\u00e9gique 2025-2028 de la CNIL<\/strong><\/h2>\n\n\n\n<p>La cybers\u00e9curit\u00e9 des collectivit\u00e9s est une&nbsp;<strong>priorit\u00e9 majeure<\/strong>&nbsp;dans le&nbsp;<strong><a href=\"https:\/\/www.cnil.fr\/sites\/cnil\/files\/2025-01\/plan_strategique_cnil_2025-2028.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><u>plan strat\u00e9gique 2025-2028<\/u><\/a><\/strong><a href=\"https:\/\/www.cnil.fr\/sites\/cnil\/files\/2025-01\/plan_strategique_cnil_2025-2028.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><u>&nbsp;de la CNIL<\/u><\/a>. Ce plan vise \u00e0&nbsp;<a href=\"https:\/\/www.cnil.fr\/fr\/les-controles-de-la-cnil-en-2025\" target=\"_blank\" rel=\"noreferrer noopener\"><u>renforcer la protection des donn\u00e9es personnelles<\/u><\/a>. L\u2019objectif est de s\u00e9curiser l\u2019avenir num\u00e9rique des citoyens. Le plan inclut \u00e9galement un accompagnement renforc\u00e9 des collectivit\u00e9s pour les aider \u00e0 respecter les exigences l\u00e9gales en mati\u00e8re de cybers\u00e9curit\u00e9.<\/p>\n\n\n\n<p>Les axes prioritaires de ce plan sont :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Pr\u00e9paration \u00e0 la directive NIS 2<\/strong>&nbsp;: Le plan pr\u00e9voit un accompagnement des collectivit\u00e9s pour appliquer les mesures de cybers\u00e9curit\u00e9.<\/li>\n\n\n\n<li><strong>Renforcement des contr\u00f4les<\/strong>&nbsp;: La CNIL proc\u00e9dera \u00e0 des contr\u00f4les stricts pour v\u00e9rifier que les collectivit\u00e9s respectent les r\u00e8gles de cybers\u00e9curit\u00e9.<\/li>\n\n\n\n<li><strong>Sensibilisation<\/strong>&nbsp;: Des actions seront men\u00e9es pour aider les collectivit\u00e9s \u00e0 g\u00e9rer les risques et \u00e0 s\u00e9curiser leurs syst\u00e8mes.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Les types de contr\u00f4les effectu\u00e9s par la CNIL<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Contr\u00f4le sur place<\/strong><\/h3>\n\n\n\n<p>Les inspecteurs de la CNIL se rendent directement dans les collectivit\u00e9s. Ils v\u00e9rifient les infrastructures et les processus pour s\u2019assurer qu\u2019ils respectent les r\u00e8gles de protection des donn\u00e9es.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Contr\u00f4le en ligne et sur pi\u00e8ces<\/strong><\/h3>\n\n\n\n<p>La CNIL peut aussi effectuer des contr\u00f4les \u00e0 distance. Elle peut analyser des documents fournis par les collectivit\u00e9s pour v\u00e9rifier leur conformit\u00e9.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Audition sur convocation<\/strong><\/h3>\n\n\n\n<p>Les responsables des collectivit\u00e9s peuvent \u00eatre convoqu\u00e9s pour des entretiens. Ils doivent expliquer les pratiques de cybers\u00e9curit\u00e9 en place.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Novatice NEOS : La solution pour garantir conformit\u00e9 et s\u00e9curit\u00e9<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Conformit\u00e9 l\u00e9gale et r\u00e9glementaire<\/strong><\/h3>\n\n\n\n<p>Avec Novatice NEOS, les collectivit\u00e9s respectent les lois sur l\u2019identification des usagers, la tra\u00e7abilit\u00e9 des actions et la conservation des logs de connexion. Elles assurent ainsi leur conformit\u00e9 avec le&nbsp;<strong>RGPD<\/strong>, les recommandations de la&nbsp;<strong>CNIL<\/strong>et de l&rsquo;<strong>ANSSI<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>S\u00e9curisation des donn\u00e9es personnelles et des syst\u00e8mes<\/strong><\/h3>\n\n\n\n<p>Novatice NEOS prot\u00e8ge les donn\u00e9es des usagers avec des technologies avanc\u00e9es. La solution filtre le contenu, prot\u00e8ge contre les cyberattaques et sauvegarde les donn\u00e9es. Cela garantit un\u00a0environnement num\u00e9rique s\u00e9curis\u00e9.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Les avantages cl\u00e9s de Novatice NEOS pour les collectivit\u00e9s<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Conformit\u00e9 l\u00e9gale assur\u00e9e<\/strong><\/h3>\n\n\n\n<p>Novatice NEOS garantit la conformit\u00e9 des collectivit\u00e9s avec les l\u00e9gislations en vigueur. Cela inclut le RGPD et les recommandations de la CNIL.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Protection renforc\u00e9e des donn\u00e9es personnelles<\/strong><\/h3>\n\n\n\n<p>Les donn\u00e9es des usagers sont prot\u00e9g\u00e9es. Novatice NEOS minimise les risques de violations de donn\u00e9es et de cyberattaques.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Tranquillit\u00e9 d\u2019esprit pour les gestionnaires et les usagers<\/strong><\/h3>\n\n\n\n<p>Les gestionnaires peuvent garantir la continuit\u00e9 des services num\u00e9riques. Ils assurent \u00e9galement la s\u00e9curit\u00e9 des donn\u00e9es personnelles des usagers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Anticiper les contr\u00f4les de la CNIL : Pourquoi agir maintenant ?<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>\u00c9viter les sanctions<\/strong><\/h3>\n\n\n\n<p>En s\u00e9curisant leurs infrastructures et en respectant les r\u00e9gulations, les collectivit\u00e9s \u00e9vitent les sanctions. Elles peuvent ainsi \u00e9viter les amendes lors des contr\u00f4les de la CNIL.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Pr\u00e9parer l\u2019avenir num\u00e9rique<\/strong><\/h3>\n\n\n\n<p>Les collectivit\u00e9s doivent anticiper les d\u00e9fis de cybers\u00e9curit\u00e9 \u00e0 long terme. L\u2019adoption de solutions comme&nbsp;<strong>Novatice NEOS<\/strong>&nbsp;leur permet de se pr\u00e9parer pour l&rsquo;avenir tout en garantissant la s\u00e9curit\u00e9 de leurs syst\u00e8mes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Novatice NEOS, la solution pour une s\u00e9curit\u00e9 num\u00e9rique renforc\u00e9e<\/strong><\/h2>\n\n\n\n<p>Face \u00e0 l\u2019augmentation des cybermenaces et aux nouvelles exigences de la CNIL, les collectivit\u00e9s doivent s\u00e9curiser leurs syst\u00e8mes d&rsquo;information. Novatice NEOS offre une solution pour garantir la conformit\u00e9 et la cybers\u00e9curit\u00e9 des collectivit\u00e9s.<\/p>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-036885fb\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap \">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-109e3fa8 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/www.novatice.com\/index.php\/contact-demo-novatice-neos\/\" rel=\"follow noopener\" target=\"_self\" role=\"button\"><div class=\"uagb-button__link\">Contacter nos experts<\/div><\/a><\/div><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>La CNIL a d\u00e9clar\u00e9 le 21 mars 2025 que la cybers\u00e9curit\u00e9 des collectivit\u00e9s territoriales serait l\u2019un des axes majeurs de [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2037,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[19,21],"tags":[15,16,70,18,77],"class_list":["post-1559","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-collectivites","tag-collectivites","tag-epn","tag-espaces-publics-numeriques","tag-numerique","tag-securite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybers\u00e9curit\u00e9 des collectivit\u00e9s : conformit\u00e9 &amp; protection<\/title>\n<meta name=\"description\" content=\"Collectivit\u00e9s : assurez la conformit\u00e9 et prot\u00e9gez les donn\u00e9es avec des solutions adapt\u00e9es \u00e0 la mont\u00e9e des cyber-risques.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.novatice.com\/index.php\/2025\/10\/14\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybers\u00e9curit\u00e9 des collectivit\u00e9s : conformit\u00e9 &amp; protection\" \/>\n<meta property=\"og:description\" content=\"Collectivit\u00e9s : assurez la conformit\u00e9 et prot\u00e9gez les donn\u00e9es avec des solutions adapt\u00e9es \u00e0 la mont\u00e9e des cyber-risques.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.novatice.com\/index.php\/2025\/10\/14\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/p\/Novatice-Technologies-61576737892959\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-14T09:33:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-25T14:56:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.novatice.com\/wp-content\/uploads\/2025\/10\/zfldaeppgvslhbv3xsl4_13_11zon.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin2008\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin2008\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.novatice.com\\\/index.php\\\/2025\\\/10\\\/14\\\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.novatice.com\\\/index.php\\\/2025\\\/10\\\/14\\\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\\\/\"},\"author\":{\"name\":\"admin2008\",\"@id\":\"https:\\\/\\\/www.novatice.com\\\/#\\\/schema\\\/person\\\/9ccc0cd3f16cba42dac6d88771daf473\"},\"headline\":\"Cybers\u00e9curit\u00e9 des collectivit\u00e9s : Comment assurer conformit\u00e9 et protection des donn\u00e9es?\",\"datePublished\":\"2025-10-14T09:33:58+00:00\",\"dateModified\":\"2025-11-25T14:56:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.novatice.com\\\/index.php\\\/2025\\\/10\\\/14\\\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\\\/\"},\"wordCount\":858,\"publisher\":{\"@id\":\"https:\\\/\\\/www.novatice.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.novatice.com\\\/index.php\\\/2025\\\/10\\\/14\\\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.novatice.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/zfldaeppgvslhbv3xsl4_13_11zon.jpg\",\"keywords\":[\"collectivit\u00e9s\",\"EPN\",\"espaces publics num\u00e9riques\",\"num\u00e9rique\",\"s\u00e9curit\u00e9\"],\"articleSection\":[\"Blog\",\"Collectivit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.novatice.com\\\/index.php\\\/2025\\\/10\\\/14\\\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\\\/\",\"url\":\"https:\\\/\\\/www.novatice.com\\\/index.php\\\/2025\\\/10\\\/14\\\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\\\/\",\"name\":\"Cybers\u00e9curit\u00e9 des collectivit\u00e9s : conformit\u00e9 & protection\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.novatice.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.novatice.com\\\/index.php\\\/2025\\\/10\\\/14\\\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.novatice.com\\\/index.php\\\/2025\\\/10\\\/14\\\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.novatice.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/zfldaeppgvslhbv3xsl4_13_11zon.jpg\",\"datePublished\":\"2025-10-14T09:33:58+00:00\",\"dateModified\":\"2025-11-25T14:56:12+00:00\",\"description\":\"Collectivit\u00e9s : assurez la conformit\u00e9 et prot\u00e9gez les donn\u00e9es avec des solutions adapt\u00e9es \u00e0 la mont\u00e9e des cyber-risques.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.novatice.com\\\/index.php\\\/2025\\\/10\\\/14\\\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.novatice.com\\\/index.php\\\/2025\\\/10\\\/14\\\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.novatice.com\\\/index.php\\\/2025\\\/10\\\/14\\\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.novatice.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/zfldaeppgvslhbv3xsl4_13_11zon.jpg\",\"contentUrl\":\"https:\\\/\\\/www.novatice.com\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/zfldaeppgvslhbv3xsl4_13_11zon.jpg\",\"width\":800,\"height\":481,\"caption\":\"cybers\u00e9curit\u00e9 collectivit\u00e9s\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.novatice.com\\\/index.php\\\/2025\\\/10\\\/14\\\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.novatice.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybers\u00e9curit\u00e9 des collectivit\u00e9s : Comment assurer conformit\u00e9 et protection des donn\u00e9es?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.novatice.com\\\/#website\",\"url\":\"https:\\\/\\\/www.novatice.com\\\/\",\"name\":\"Novatice Technologies\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.novatice.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.novatice.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.novatice.com\\\/#organization\",\"name\":\"Novatice Technologies\",\"url\":\"https:\\\/\\\/www.novatice.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.novatice.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.novatice.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/cropped-ql23cg50jsojeppjktvm.webp\",\"contentUrl\":\"https:\\\/\\\/www.novatice.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/cropped-ql23cg50jsojeppjktvm.webp\",\"width\":805,\"height\":263,\"caption\":\"Novatice Technologies\"},\"image\":{\"@id\":\"https:\\\/\\\/www.novatice.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/p\\\/Novatice-Technologies-61576737892959\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/authwall?trk=bf&trkInfo=AQGCN4eUDKjo1gAAAZnnhI3Ae7PAPStEyWBTtwu62FgytWDmpUnGa7lctUgjEbpLb4ON8I1NDFKKKUDQ5wih2Hriu4bADVrlCotkGuAwq3Q9_OZq_5Z8g708twdCADH2HOVLAH8=&original_referer&sessionRedirect=httpswww.linkedin.comcompanynovaticeoriginalSubdomainfr\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.novatice.com\\\/#\\\/schema\\\/person\\\/9ccc0cd3f16cba42dac6d88771daf473\",\"name\":\"admin2008\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5d706e5985c75587530c524426f22b5270b9bf5fb40eea7e704ee6395494c57?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5d706e5985c75587530c524426f22b5270b9bf5fb40eea7e704ee6395494c57?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d5d706e5985c75587530c524426f22b5270b9bf5fb40eea7e704ee6395494c57?s=96&d=mm&r=g\",\"caption\":\"admin2008\"},\"sameAs\":[\"http:\\\/\\\/preprod.novatice.com\"],\"url\":\"https:\\\/\\\/www.novatice.com\\\/index.php\\\/author\\\/admin2008\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybers\u00e9curit\u00e9 des collectivit\u00e9s : conformit\u00e9 & protection","description":"Collectivit\u00e9s : assurez la conformit\u00e9 et prot\u00e9gez les donn\u00e9es avec des solutions adapt\u00e9es \u00e0 la mont\u00e9e des cyber-risques.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.novatice.com\/index.php\/2025\/10\/14\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\/","og_locale":"fr_FR","og_type":"article","og_title":"Cybers\u00e9curit\u00e9 des collectivit\u00e9s : conformit\u00e9 & protection","og_description":"Collectivit\u00e9s : assurez la conformit\u00e9 et prot\u00e9gez les donn\u00e9es avec des solutions adapt\u00e9es \u00e0 la mont\u00e9e des cyber-risques.","og_url":"https:\/\/www.novatice.com\/index.php\/2025\/10\/14\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\/","article_publisher":"https:\/\/www.facebook.com\/p\/Novatice-Technologies-61576737892959\/","article_published_time":"2025-10-14T09:33:58+00:00","article_modified_time":"2025-11-25T14:56:12+00:00","og_image":[{"width":800,"height":481,"url":"https:\/\/www.novatice.com\/wp-content\/uploads\/2025\/10\/zfldaeppgvslhbv3xsl4_13_11zon.jpg","type":"image\/jpeg"}],"author":"admin2008","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"admin2008","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.novatice.com\/index.php\/2025\/10\/14\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\/#article","isPartOf":{"@id":"https:\/\/www.novatice.com\/index.php\/2025\/10\/14\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\/"},"author":{"name":"admin2008","@id":"https:\/\/www.novatice.com\/#\/schema\/person\/9ccc0cd3f16cba42dac6d88771daf473"},"headline":"Cybers\u00e9curit\u00e9 des collectivit\u00e9s : Comment assurer conformit\u00e9 et protection des donn\u00e9es?","datePublished":"2025-10-14T09:33:58+00:00","dateModified":"2025-11-25T14:56:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.novatice.com\/index.php\/2025\/10\/14\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\/"},"wordCount":858,"publisher":{"@id":"https:\/\/www.novatice.com\/#organization"},"image":{"@id":"https:\/\/www.novatice.com\/index.php\/2025\/10\/14\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\/#primaryimage"},"thumbnailUrl":"https:\/\/www.novatice.com\/wp-content\/uploads\/2025\/10\/zfldaeppgvslhbv3xsl4_13_11zon.jpg","keywords":["collectivit\u00e9s","EPN","espaces publics num\u00e9riques","num\u00e9rique","s\u00e9curit\u00e9"],"articleSection":["Blog","Collectivit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.novatice.com\/index.php\/2025\/10\/14\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\/","url":"https:\/\/www.novatice.com\/index.php\/2025\/10\/14\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\/","name":"Cybers\u00e9curit\u00e9 des collectivit\u00e9s : conformit\u00e9 & protection","isPartOf":{"@id":"https:\/\/www.novatice.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.novatice.com\/index.php\/2025\/10\/14\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\/#primaryimage"},"image":{"@id":"https:\/\/www.novatice.com\/index.php\/2025\/10\/14\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\/#primaryimage"},"thumbnailUrl":"https:\/\/www.novatice.com\/wp-content\/uploads\/2025\/10\/zfldaeppgvslhbv3xsl4_13_11zon.jpg","datePublished":"2025-10-14T09:33:58+00:00","dateModified":"2025-11-25T14:56:12+00:00","description":"Collectivit\u00e9s : assurez la conformit\u00e9 et prot\u00e9gez les donn\u00e9es avec des solutions adapt\u00e9es \u00e0 la mont\u00e9e des cyber-risques.","breadcrumb":{"@id":"https:\/\/www.novatice.com\/index.php\/2025\/10\/14\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.novatice.com\/index.php\/2025\/10\/14\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.novatice.com\/index.php\/2025\/10\/14\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\/#primaryimage","url":"https:\/\/www.novatice.com\/wp-content\/uploads\/2025\/10\/zfldaeppgvslhbv3xsl4_13_11zon.jpg","contentUrl":"https:\/\/www.novatice.com\/wp-content\/uploads\/2025\/10\/zfldaeppgvslhbv3xsl4_13_11zon.jpg","width":800,"height":481,"caption":"cybers\u00e9curit\u00e9 collectivit\u00e9s"},{"@type":"BreadcrumbList","@id":"https:\/\/www.novatice.com\/index.php\/2025\/10\/14\/cybersecurite-des-collectivites-comment-assurer-conformite-et-protection-des-donnees\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.novatice.com\/"},{"@type":"ListItem","position":2,"name":"Cybers\u00e9curit\u00e9 des collectivit\u00e9s : Comment assurer conformit\u00e9 et protection des donn\u00e9es?"}]},{"@type":"WebSite","@id":"https:\/\/www.novatice.com\/#website","url":"https:\/\/www.novatice.com\/","name":"Novatice Technologies","description":"","publisher":{"@id":"https:\/\/www.novatice.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.novatice.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.novatice.com\/#organization","name":"Novatice Technologies","url":"https:\/\/www.novatice.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.novatice.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.novatice.com\/wp-content\/uploads\/2025\/11\/cropped-ql23cg50jsojeppjktvm.webp","contentUrl":"https:\/\/www.novatice.com\/wp-content\/uploads\/2025\/11\/cropped-ql23cg50jsojeppjktvm.webp","width":805,"height":263,"caption":"Novatice Technologies"},"image":{"@id":"https:\/\/www.novatice.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/p\/Novatice-Technologies-61576737892959\/","https:\/\/www.linkedin.com\/authwall?trk=bf&trkInfo=AQGCN4eUDKjo1gAAAZnnhI3Ae7PAPStEyWBTtwu62FgytWDmpUnGa7lctUgjEbpLb4ON8I1NDFKKKUDQ5wih2Hriu4bADVrlCotkGuAwq3Q9_OZq_5Z8g708twdCADH2HOVLAH8=&original_referer&sessionRedirect=httpswww.linkedin.comcompanynovaticeoriginalSubdomainfr"]},{"@type":"Person","@id":"https:\/\/www.novatice.com\/#\/schema\/person\/9ccc0cd3f16cba42dac6d88771daf473","name":"admin2008","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/d5d706e5985c75587530c524426f22b5270b9bf5fb40eea7e704ee6395494c57?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5d706e5985c75587530c524426f22b5270b9bf5fb40eea7e704ee6395494c57?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5d706e5985c75587530c524426f22b5270b9bf5fb40eea7e704ee6395494c57?s=96&d=mm&r=g","caption":"admin2008"},"sameAs":["http:\/\/preprod.novatice.com"],"url":"https:\/\/www.novatice.com\/index.php\/author\/admin2008\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/www.novatice.com\/wp-content\/uploads\/2025\/10\/zfldaeppgvslhbv3xsl4_13_11zon.jpg",800,481,false],"thumbnail":["https:\/\/www.novatice.com\/wp-content\/uploads\/2025\/10\/zfldaeppgvslhbv3xsl4_13_11zon-150x150.jpg",150,150,true],"medium":["https:\/\/www.novatice.com\/wp-content\/uploads\/2025\/10\/zfldaeppgvslhbv3xsl4_13_11zon-300x180.jpg",300,180,true],"medium_large":["https:\/\/www.novatice.com\/wp-content\/uploads\/2025\/10\/zfldaeppgvslhbv3xsl4_13_11zon-768x462.jpg",768,462,true],"large":["https:\/\/www.novatice.com\/wp-content\/uploads\/2025\/10\/zfldaeppgvslhbv3xsl4_13_11zon.jpg",800,481,false],"1536x1536":["https:\/\/www.novatice.com\/wp-content\/uploads\/2025\/10\/zfldaeppgvslhbv3xsl4_13_11zon.jpg",800,481,false],"2048x2048":["https:\/\/www.novatice.com\/wp-content\/uploads\/2025\/10\/zfldaeppgvslhbv3xsl4_13_11zon.jpg",800,481,false]},"uagb_author_info":{"display_name":"admin2008","author_link":"https:\/\/www.novatice.com\/index.php\/author\/admin2008\/"},"uagb_comment_info":0,"uagb_excerpt":"La CNIL a d\u00e9clar\u00e9 le 21 mars 2025 que la cybers\u00e9curit\u00e9 des collectivit\u00e9s territoriales serait l\u2019un des axes majeurs de [&hellip;]","_links":{"self":[{"href":"https:\/\/www.novatice.com\/index.php\/wp-json\/wp\/v2\/posts\/1559","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.novatice.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.novatice.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.novatice.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.novatice.com\/index.php\/wp-json\/wp\/v2\/comments?post=1559"}],"version-history":[{"count":2,"href":"https:\/\/www.novatice.com\/index.php\/wp-json\/wp\/v2\/posts\/1559\/revisions"}],"predecessor-version":[{"id":3332,"href":"https:\/\/www.novatice.com\/index.php\/wp-json\/wp\/v2\/posts\/1559\/revisions\/3332"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.novatice.com\/index.php\/wp-json\/wp\/v2\/media\/2037"}],"wp:attachment":[{"href":"https:\/\/www.novatice.com\/index.php\/wp-json\/wp\/v2\/media?parent=1559"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.novatice.com\/index.php\/wp-json\/wp\/v2\/categories?post=1559"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.novatice.com\/index.php\/wp-json\/wp\/v2\/tags?post=1559"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}