{"id":3303,"date":"2022-03-17T12:54:46","date_gmt":"2022-03-17T18:54:46","guid":{"rendered":"https:\/\/idsinc.com\/?p=3303"},"modified":"2026-03-09T15:13:54","modified_gmt":"2026-03-09T21:13:54","slug":"principe-fc5","status":"publish","type":"post","link":"https:\/\/idsinc.com\/fr\/fc-principle5\/","title":{"rendered":"Fact Crashing\u2122 : Principe 5"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-3303\" data-postid=\"3303\" class=\"themify_builder_content themify_builder_content-3303 themify_builder tf_clear\">\n    <\/div>\n<!--\/themify_builder_content-->\n\n\n<h1 class=\"wp-block-heading\" id=\"h-data-is-subjective-to-preservation-and-protection-obligations\">Les donn\u00e9es sont soumises \u00e0 des obligations de conservation et de protection<\/h1>\n\n\n\n<p class=\"wp-block-paragraph\">Ceci est le septi\u00e8me volet d&#039;une s\u00e9rie de blogs sur <a href=\"https:\/\/idsinc.com\/fr\/fait-secraser\/\">Fact Crashing\u2122<\/a>, l&#039;acc\u00e9l\u00e9ration de la prise en compte des donn\u00e9es ACTION (Ambient, Contextual, Transactional, IoT, Operational, Navigational) au profit de la r\u00e9solution des litiges.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Il y a 9 principes de <a href=\"https:\/\/idsinc.com\/fr\/fait-secraser\/\">Crash de faits<\/a>\u2122. Les blogs pr\u00e9c\u00e9dents couvraient\u00a0:&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/idsinc.com\/fr\/effondrement-des-faits-partie-2\/\"><strong>Principe 1 : Les donn\u00e9es sont des preuves et sont d\u00e9tectables<\/strong><\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/idsinc.com\/fr\/principe-2-de-la-partie-iii-de-lecrasement-des-faits\/\"><strong>Principe 2 : Les donn\u00e9es doivent \u00eatre trait\u00e9es t\u00f4t<\/strong><\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/idsinc.com\/fr\/donnees-daction-et-donnees-verbales\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Principe 2 : Analyse approfondie<\/strong><\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/idsinc.com\/fr\/traiter-les-problemes-de-cas-comme-des-requetes-centrees-sur-les-donnees\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Principe\u00a03\u00a0: D\u00e9finir les probl\u00e8mes de cas comme des requ\u00eates centr\u00e9es sur les donn\u00e9es<\/strong><\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><a href=\"https:\/\/idsinc.com\/fr\/principe-fc4\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Principe 4 : Identifier, qualifier et hi\u00e9rarchiser les sources de donn\u00e9es<\/strong><\/a><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Maintenant, regardons le cinqui\u00e8me principe.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-background is-style-wide\" style=\"background-color:#e1e1e1;color:#e1e1e1\"\/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><em>Pr\u00e9servation des donn\u00e9es<\/em><\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Les donn\u00e9es des bases de donn\u00e9es sont stock\u00e9es et organis\u00e9es diff\u00e9remment des e-mails, de la messagerie et des documents utilisateur. Mais la r\u00e9activit\u00e9 ne d\u00e9pend pas du format des donn\u00e9es. La r\u00e9activit\u00e9 est d\u00e9termin\u00e9e par le contenu et l&#039;application au litige ou \u00e0 l&#039;enqu\u00eate en cours. En tant que telles, les donn\u00e9es r\u00e9actives, y compris les champs et le contenu de la base de donn\u00e9es, sont sujettes \u00e0 d\u00e9couverte. Par extension, ils sont \u00e9galement soumis \u00e0 des obligations de conservation des donn\u00e9es.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">D&#039;apr\u00e8s notre exp\u00e9rience, dans la mesure o\u00f9 les enregistrements de base de donn\u00e9es font partie d&#039;un syst\u00e8me d&#039;entreprise intentionnel, bon nombre de ces syst\u00e8mes enregistrent les donn\u00e9es ind\u00e9finiment. Il s&#039;agit souvent de syst\u00e8mes d&#039;enregistrement pour des \u00e9l\u00e9ments tels que le temps et les pr\u00e9sences, la r\u00e9mun\u00e9ration, la facturation, l&#039;inventaire, etc. Cela est d\u00fb, en partie, au fait que de nombreux enregistrements transactionnels sont relativement petits par rapport aux documents et e-mails de forme libre et ont une grande valeur intrins\u00e8que en raison de leur organisation et de leur r\u00e9cup\u00e9ration structur\u00e9e.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">De m\u00eame, les syst\u00e8mes non intentionnels ou auxiliaires, en particulier l&#039;internet des objets, sont plus susceptibles de g\u00e9n\u00e9rer de gros volumes de donn\u00e9es avec seulement un profil de valeur \u00e0 court terme. Ces syst\u00e8mes sont plus susceptibles d&#039;avoir une suppression automatique bas\u00e9e sur le temps (par exemple, une conservation de 30 jours) ou le volume (par exemple, des limites de fichier journal de 100 Go).<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Lorsque vous commencez \u00e0 utiliser <a href=\"https:\/\/idsinc.com\/fr\/fait-secraser\/\" target=\"_blank\" rel=\"noreferrer noopener\">Fact Crashing\u2122<\/a> pour l&#039;identification, la qualification et la hi\u00e9rarchisation des sources de donn\u00e9es, gardez \u00e0 l&#039;esprit que la conservation des donn\u00e9es par d\u00e9faut variera et que vous devrez peut-\u00eatre exercer une certaine forme de conservation des donn\u00e9es.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><em>Protection des donn\u00e9es<\/em><\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Nous connaissons un pic mondial de probl\u00e8mes de protection et de confidentialit\u00e9 des donn\u00e9es. Certains affirment que cela se fait attendre depuis longtemps et que nous avons \u00e9t\u00e9 trop indiff\u00e9rents \u00e0 la fa\u00e7on dont nous avons trait\u00e9 les donn\u00e9es financi\u00e8res, de sant\u00e9, personnelles ou sensibles dans le pass\u00e9. Peu importe comment nous sommes arriv\u00e9s l\u00e0 o\u00f9 nous sommes, nous sommes ici maintenant. La protection des donn\u00e9es ne signifie pas que les donn\u00e9es sont exemptes de d\u00e9couverte. Au lieu de cela, cela signifie que des mesures suppl\u00e9mentaires ou explicites doivent \u00eatre prises pour g\u00e9rer la divulgation, l&#039;utilisation et la diffusion de ces donn\u00e9es. Comme indiqu\u00e9 en Europe, nous devrions minimiser la quantit\u00e9 et l&#039;\u00e9tendue de la divulgation au strict minimum n\u00e9cessaire \u00e0 la circonstance.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Un livre entier pourrait \u00eatre \u00e9crit sur la protection des donn\u00e9es. Plut\u00f4t que de presser ce livre dans ce blog, je vais simplement reconna\u00eetre que la protection des donn\u00e9es est essentielle et identifier quelques techniques bien utilis\u00e9es pour cela dans les litiges.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong><em>Les techniques standard de protection des donn\u00e9es comprennent\u00a0:<\/em><\/strong><\/h5>\n\n\n\n<ul class=\"wp-block-list\"><li><em>Ordonnance de protection<\/em><\/li><li><em>Nomination d&#039;un Data Neutral<\/em><\/li><li><em>Minimisation des donn\u00e9es<\/em><\/li><li><em>Chiffrement en transit<\/em><\/li><li><em>Chiffrement au repos<\/em><\/li><li><em>Utiliser le contr\u00f4le d&#039;acc\u00e8s<\/em><\/li><li><em>Contr\u00f4le d&#039;acc\u00e8s bas\u00e9 sur le rouleau<\/em><\/li><li><em>Anonymisation<\/em><\/li><\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Dans la rubrique de l&#039;anonymisation se trouvent une vari\u00e9t\u00e9 de sous-techniques. Certains d&#039;entre eux, r\u00e9pertori\u00e9s par <a href=\"https:\/\/www.dataversity.net\/the-fundamentals-of-data-anonymization-and-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">David Baladan chez DataVersity<\/a>, sont:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><em>Agr\u00e9gation<\/em><\/li><li><em>Chiffrement<\/em><\/li><li><em>G\u00e9n\u00e9ralisation<\/em><\/li><li><em>Hachage<\/em><\/li><li><em>Pseudonymisation<\/em><\/li><li><em>Perturbation<\/em><\/li><li><em>Randomisation et suppression<\/em><\/li><\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Dans l&#039;ensemble, les tribunaux am\u00e9ricains ont tendance \u00e0 pencher en faveur de la d\u00e9couverte. Cela remonte \u00e0 la premi\u00e8re promulgation des r\u00e8gles f\u00e9d\u00e9rales de proc\u00e9dure civile en 1938 et aux r\u00e8gles relatives \u00e0 la d\u00e9couverte, principalement r\u00e9dig\u00e9es par le professeur Edson Sunderland avec son soutien passionn\u00e9 \u00e0 la divulgation et au jugement sommaire.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Aujourd&#039;hui, les tribunaux favorisent toujours la divulgation de donn\u00e9es pertinentes, proportionn\u00e9es et r\u00e9actives. Officiellement, la confidentialit\u00e9 des donn\u00e9es ne fait pas exception. Ce n&#039;est pas un privil\u00e8ge ou une limitation. Officieusement, il est gouverneur sur de nombreuses productions. \u00c9tant donn\u00e9 que les r\u00e8gles et les tribunaux favorisent les productions, mais que la soci\u00e9t\u00e9 favorise la discr\u00e9tion, il est appropri\u00e9 de trouver des moyens de renforcer les protections entourant l&#039;\u00e9change de donn\u00e9es. Il est encore plus adapt\u00e9 aux donn\u00e9es structur\u00e9es exceptionnellement bien organis\u00e9es, facilement accessibles et rapidement analys\u00e9es.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong><em>Conclusion<\/em><\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">Au fur et \u00e0 mesure que vous travaillez <a href=\"https:\/\/idsinc.com\/fr\/fait-secraser\/\" target=\"_blank\" rel=\"noreferrer noopener\">Fact Crashing\u2122<\/a>, consid\u00e9rez la pr\u00e9servation et la protection des donn\u00e9es d\u00e8s le d\u00e9part. Cela peut \u00e9conomiser beaucoup d&#039;angoisse et d&#039;angoisse \u00e0 l&#039;arri\u00e8re.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-background is-style-wide\" style=\"background-color:#e1e1e1;color:#e1e1e1\"\/>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em>iDS fournit des solutions de donn\u00e9es consultatives aux entreprises et aux cabinets d&#039;avocats du monde entier, leur donnant un avantage d\u00e9cisif - \u00e0 la fois dans et hors de la salle d&#039;audience. Nos experts en la mati\u00e8re et nos strat\u00e8ges de donn\u00e9es se sp\u00e9cialisent dans la recherche de solutions aux probl\u00e8mes de donn\u00e9es complexes, garantissant que les donn\u00e9es peuvent \u00eatre exploit\u00e9es comme un atout et non comme un handicap.<\/em><\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>Data is Subjective to Preservation and Protection Obligations This is the seventh installment in a blog series on Fact Crashing\u2122, the acceleration of the consideration of ACTION data (Ambient, Contextual, Transactional, IoT, Operational, Navigational) to the benefit of resolving disputes. There are 9 Principles of Fact Crashing\u2122. Earlier blogs covered:&nbsp; Principle 1: Data is Evidence [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":3401,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,38],"tags":[16],"class_list":["post-3303","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-methodologies","tag-fact-crashing","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Principle 5. Data Subjective to Preservation &amp; Protection - Fact Crashing\u2122<\/title>\n<meta name=\"description\" content=\"In the seventh installment of Fact Crashing, iDiscovery Solutions discusses Data Privacy, Data Preservation and data Protection Obligations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/fr\/principe-fc5\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fact Crashing\u2122: Principle 5\" \/>\n<meta property=\"og:description\" content=\"In the seventh installment of Fact Crashing, iDiscovery Solutions discusses Data Privacy, Data Preservation and data Protection Obligations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/fr\/principe-fc5\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-17T18:54:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-09T21:13:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/03\/iDS-Fact-Crashing-BlogImages7.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"iDiscovery Solutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"iDiscovery Solutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/fc-principle5\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/fc-principle5\\\/\"},\"author\":{\"name\":\"iDiscovery Solutions\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\"},\"headline\":\"Fact Crashing\u2122: Principle 5\",\"datePublished\":\"2022-03-17T18:54:46+00:00\",\"dateModified\":\"2026-03-09T21:13:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/fc-principle5\\\/\"},\"wordCount\":720,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/fc-principle5\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/iDS-Fact-Crashing-BlogImages7.jpg\",\"keywords\":[\"fact crashing\"],\"articleSection\":[\"Blog\",\"Frameworks + Methodologies\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/fc-principle5\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/fc-principle5\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/fc-principle5\\\/\",\"name\":\"Principle 5. Data Subjective to Preservation & Protection - Fact Crashing\u2122\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/fc-principle5\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/fc-principle5\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/iDS-Fact-Crashing-BlogImages7.jpg\",\"datePublished\":\"2022-03-17T18:54:46+00:00\",\"dateModified\":\"2026-03-09T21:13:54+00:00\",\"description\":\"In the seventh installment of Fact Crashing, iDiscovery Solutions discusses Data Privacy, Data Preservation and data Protection Obligations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/fc-principle5\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/fc-principle5\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/fc-principle5\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/iDS-Fact-Crashing-BlogImages7.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/iDS-Fact-Crashing-BlogImages7.jpg\",\"width\":2500,\"height\":1250,\"caption\":\"In the seventh installment of Fact Crashing, iDiscovery Solutions discusses Data Privacy, Data Preservation and data Protection Obligations.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/fc-principle5\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Fact Crashing\u2122: Principle 5\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\",\"name\":\"iDiscovery Solutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"caption\":\"iDiscovery Solutions\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/fr\\\/author\\\/idiscovery\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Principe 5. Donn\u00e9es soumises \u00e0 la pr\u00e9servation et \u00e0 la protection - Fact Crashing\u2122","description":"Dans le septi\u00e8me volet de Fact Crashing, iDiscovery Solutions discute des obligations en mati\u00e8re de confidentialit\u00e9, de pr\u00e9servation et de protection des donn\u00e9es.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/fr\/principe-fc5\/","og_locale":"fr_FR","og_type":"article","og_title":"Fact Crashing\u2122: Principle 5","og_description":"In the seventh installment of Fact Crashing, iDiscovery Solutions discusses Data Privacy, Data Preservation and data Protection Obligations.","og_url":"https:\/\/idsinc.com\/fr\/principe-fc5\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2022-03-17T18:54:46+00:00","article_modified_time":"2026-03-09T21:13:54+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/03\/iDS-Fact-Crashing-BlogImages7.jpg","type":"image\/jpeg"}],"author":"iDiscovery Solutions","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"iDiscovery Solutions","Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/fc-principle5\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/fc-principle5\/"},"author":{"name":"iDiscovery Solutions","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736"},"headline":"Fact Crashing\u2122: Principle 5","datePublished":"2022-03-17T18:54:46+00:00","dateModified":"2026-03-09T21:13:54+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/fc-principle5\/"},"wordCount":720,"commentCount":0,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/fc-principle5\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/03\/iDS-Fact-Crashing-BlogImages7.jpg","keywords":["fact crashing"],"articleSection":["Blog","Frameworks + Methodologies"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idsinc.com\/fc-principle5\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/fc-principle5\/","url":"https:\/\/idsinc.com\/fc-principle5\/","name":"Principe 5. Donn\u00e9es soumises \u00e0 la pr\u00e9servation et \u00e0 la protection - Fact Crashing\u2122","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/fc-principle5\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/fc-principle5\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/03\/iDS-Fact-Crashing-BlogImages7.jpg","datePublished":"2022-03-17T18:54:46+00:00","dateModified":"2026-03-09T21:13:54+00:00","description":"Dans le septi\u00e8me volet de Fact Crashing, iDiscovery Solutions discute des obligations en mati\u00e8re de confidentialit\u00e9, de pr\u00e9servation et de protection des donn\u00e9es.","breadcrumb":{"@id":"https:\/\/idsinc.com\/fc-principle5\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/fc-principle5\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/fc-principle5\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/03\/iDS-Fact-Crashing-BlogImages7.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/03\/iDS-Fact-Crashing-BlogImages7.jpg","width":2500,"height":1250,"caption":"In the seventh installment of Fact Crashing, iDiscovery Solutions discusses Data Privacy, Data Preservation and data Protection Obligations."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/fc-principle5\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Fact Crashing\u2122: Principle 5"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Solutions d&#039;iD\u00e9couverte","description":"Utilisez les donn\u00e9es \u00e0 votre avantage dans la salle d\u2019audience","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Solutions d&#039;iD\u00e9couverte","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS fournit des solutions de donn\u00e9es consultatives aux entreprises et aux cabinets d&#039;avocats du monde entier, leur donnant un avantage d\u00e9cisif, tant \u00e0 l&#039;int\u00e9rieur qu&#039;\u00e0 l&#039;ext\u00e9rieur de la salle d&#039;audience. Les experts en la mati\u00e8re et les strat\u00e8ges en donn\u00e9es d&#039;iDS se sp\u00e9cialisent dans la recherche de solutions \u00e0 des probl\u00e8mes de donn\u00e9es complexes, garantissant que les donn\u00e9es peuvent \u00eatre exploit\u00e9es comme un atout et non comme un passif.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736","name":"Solutions d&#039;iD\u00e9couverte","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","caption":"iDiscovery Solutions"},"url":"https:\/\/idsinc.com\/fr\/author\/idiscovery\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts\/3303","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/comments?post=3303"}],"version-history":[{"count":1,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts\/3303\/revisions"}],"predecessor-version":[{"id":9490,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts\/3303\/revisions\/9490"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media\/3401"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media?parent=3303"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/categories?post=3303"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/tags?post=3303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}