{"id":3855,"date":"2022-07-25T09:00:00","date_gmt":"2022-07-25T15:00:00","guid":{"rendered":"https:\/\/idsinc.com\/?p=3855"},"modified":"2026-03-09T14:55:25","modified_gmt":"2026-03-09T20:55:25","slug":"perte-de-secret-commercial","status":"publish","type":"post","link":"https:\/\/idsinc.com\/fr\/trade-secret-loss\/","title":{"rendered":"Att\u00e9nuation de la perte de secrets commerciaux - La mani\u00e8re la plus simple"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-3855\" data-postid=\"3855\" class=\"themify_builder_content themify_builder_content-3855 themify_builder tf_clear\">\n    <\/div>\n<!--\/themify_builder_content-->\n\n\n<p class=\"wp-block-paragraph\">Alors que la Grande D\u00e9mission bat son plein, les employ\u00e9s partent en masse. Que signifie la Grande D\u00e9mission pour les employeurs ? Les employeurs peinent d\u00e9sormais \u00e0 se pr\u00e9munir contre les cons\u00e9quences des d\u00e9parts de salari\u00e9s. Lorsque les employ\u00e9s partent, ils emportent souvent bien plus que leur exp\u00e9rience. Un employ\u00e9 cl\u00e9 ou un groupe d&#039;employ\u00e9s peut, intentionnellement ou non, prendre et transf\u00e9rer des secrets commerciaux pr\u00e9cieux qu&#039;un concurrent peut utiliser \u00e0 son avantage. Heureusement, deux \u00e9tapes simples peuvent aider les employeurs \u00e0 pr\u00e9venir la perte de secrets commerciaux avant que cela ne devienne un probl\u00e8me.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Pendant pr\u00e8s de 15 ans, j&#039;ai men\u00e9 d&#039;innombrables enqu\u00eates impliquant souvent la perte, le vol et\/ou le d\u00e9tournement de secrets commerciaux. J&#039;ai examin\u00e9 de mani\u00e8re m\u00e9dico-l\u00e9gale des centaines d&#039;appareils et, le cas \u00e9ch\u00e9ant, men\u00e9 des dizaines d&#039;entretiens en face \u00e0 face. Mes exp\u00e9riences montrent qu&#039;il existe des mod\u00e8les clairs quant \u00e0 la fa\u00e7on dont les donn\u00e9es quittent souvent une entreprise.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Mes investigations montrent que les points d&#039;exfiltration et les m\u00e9thodes utilis\u00e9es par les employ\u00e9s pour prendre les donn\u00e9es de l&#039;entreprise n&#039;ont pas beaucoup chang\u00e9 au fil du temps. Souvent, ces m\u00e9thodes incluent la copie de donn\u00e9es sur des cl\u00e9s USB, des comptes de messagerie personnels et des plates-formes de stockage cloud personnelles. Cela pose une question\u00a0: pourquoi la perte de donn\u00e9es continue-t-elle \u00e0 se produire \u00e0 peu pr\u00e8s de la m\u00eame mani\u00e8re, maintes et maintes fois\u00a0? Les employ\u00e9s r\u00e9pondent souvent par deux affirmations\u00a0: \u00ab\u00a0Je ne savais pas comment cela m&#039;affecterait\u00a0!\u00a0\u00bb \u00bb et \u00ab Personne (ou rien) ne m&#039;a arr\u00eat\u00e9 ! Heureusement, les deux approches suivantes, l&#039;une comportementale et l&#039;autre technique, aideront les employeurs \u00e0 r\u00e9duire la perte de donn\u00e9es.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>\u00c9tape 1 : L&#039;approche comportementale<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\"><em>&quot;Je ne savais pas que \u00e7a m&#039;affecterait !&quot;<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Les employ\u00e9s suivent g\u00e9n\u00e9ralement une formation sur la conformit\u00e9 d&#039;entreprise sur la fa\u00e7on de g\u00e9rer les donn\u00e9es de l&#039;entreprise. Certaines formations sont mensuelles, tandis que d&#039;autres sont moins fr\u00e9quentes. Lors de l&#039;int\u00e9gration, les employeurs peuvent donner aux employ\u00e9s des manuels \u00e0 lire et des remerciements \u00e0 signer. Presque tous les employ\u00e9s, d&#039;apr\u00e8s mon exp\u00e9rience, ont reconnu avoir lu des mots ou regard\u00e9 des vid\u00e9os qui peuvent se r\u00e9sumer comme suit\u00a0:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>Les donn\u00e9es d&#039;entreprise sont la propri\u00e9t\u00e9 de l&#039;entreprise.<\/li><li>Les employ\u00e9s ne sont pas autoris\u00e9s \u00e0 prendre des donn\u00e9es d&#039;entreprise pour leur propre usage.<\/li><\/ol>\n\n\n\n<p class=\"wp-block-paragraph\">Cependant, cette formation est souvent banale ou r\u00e9p\u00e9titive. Certains employ\u00e9s font m\u00eame des blagues sur le fait que d&#039;autres personnes (par exemple, leurs enfants ou un animal de compagnie patient) suivent une formation pour eux. Bien que cette formation coche certaines cases de conformit\u00e9, la formation aborde rarement, voire jamais, les cons\u00e9quences de ce qui se passe lorsque les employ\u00e9s prennent des donn\u00e9es d&#039;entreprise. Apr\u00e8s d&#039;innombrables heures de formation, d&#039;\u00e9ducation, de questionnaires, de tests, de reconnaissances et d&#039;attestations, les employ\u00e9s ne connaissent toujours pas ou ne comprennent pas les cons\u00e9quences de leurs actions.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong><em>Modifications apport\u00e9es \u00e0 la formation<\/em><\/strong><\/h4>\n\n\n\n<p class=\"wp-block-paragraph\">La formation des employ\u00e9s devrait inclure des discussions sur les cons\u00e9quences personnelles et financi\u00e8res qui peuvent survenir lorsque les employ\u00e9s sont impliqu\u00e9s dans une enqu\u00eate sur un secret commercial, notamment\u00a0:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Les enqu\u00eates co\u00fbtent tr\u00e8s cher.&nbsp;<br><\/strong>Souvent, les employ\u00e9s seront invit\u00e9s \u00e0 payer une partie, sinon la majeure partie, du co\u00fbt des enqu\u00eates. Entre les frais m\u00e9dico-l\u00e9gaux et les frais juridiques, il n&#039;est pas d\u00e9raisonnable de sugg\u00e9rer qu&#039;une affaire \u00ab simple \u00bb peut co\u00fbter pr\u00e8s de $50 000.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Les enqu\u00eates sont envahissantes.&nbsp;<br><\/strong>Une fois prises, les donn\u00e9es peuvent \u00eatre copi\u00e9es ou transf\u00e9r\u00e9es vers d&#039;autres appareils ou vers un stockage en nuage. Les m\u00e9decins l\u00e9gistes peuvent \u00eatre invit\u00e9s \u00e0 examiner les ordinateurs personnels, les p\u00e9riph\u00e9riques de stockage \u00e9lectroniques, les smartphones, les comptes de messagerie et les plates-formes de stockage en nuage des anciens employ\u00e9s pour d\u00e9terminer que les donn\u00e9es n&#039;ont pas \u00e9t\u00e9 enregistr\u00e9es, utilis\u00e9es ou transmises. La vie enti\u00e8re d&#039;une personne peut \u00eatre interrompue de mani\u00e8re inopportune pour prouver son affirmation selon laquelle &quot;je n&#039;ai rien fait avec ces donn\u00e9es&quot;. \u00c0 plus d&#039;une occasion, j&#039;ai entendu l&#039;\u00e9quivalent de \u00ab Je veux juste que \u00e7a s&#039;en aille. Si j&#039;avais su \u00e0 quel point ce processus serait difficile pour moi et ma famille, je n&#039;aurais jamais pris ces donn\u00e9es.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Les enqu\u00eates peuvent m\u00eame s&#039;\u00e9tendre \u00e0 un nouvel employeur et nuire \u00e0 la r\u00e9putation des employ\u00e9s.<br><\/strong>Pire encore, ces enqu\u00eates peuvent conduire \u00e0 la r\u00e9siliation des employ\u00e9s de leurs nouveaux emplois. Les employ\u00e9s ne comprennent pas les concepts d&#039;injonctions et d&#039;ordonnances restrictives temporaires (TRO). Ces mots sont effrayants et peuvent avoir un effet dissuasif sur le comportement s&#039;ils sont connus \u00e0 l&#039;avance.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>\u00c9tape 2 : L&#039;approche technique<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\"><em>&quot;Personne (ni rien) ne m&#039;a arr\u00eat\u00e9 !&quot;<\/em><\/p>\n\n\n\n<p class=\"wp-block-paragraph\">D&#039;apr\u00e8s mon exp\u00e9rience, la plupart des pertes de secrets commerciaux se produisent d&#039;une ou plusieurs des mani\u00e8res suivantes\u00a0:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Les employ\u00e9s copient les donn\u00e9es sur un p\u00e9riph\u00e9rique USB, tel qu&#039;un disque dur ou une cl\u00e9 USB.<\/li><li>Les employ\u00e9s envoient des donn\u00e9es par e-mail \u00e0 un compte de messagerie personnel via leur messagerie d&#039;entreprise.<\/li><li>Les employ\u00e9s joignent des donn\u00e9es aux e-mails personnels auxquels ils acc\u00e8dent via un navigateur Web (Gmail, Yahoo, Hotmail, etc.).<\/li><li>Les employ\u00e9s t\u00e9l\u00e9chargent des donn\u00e9es directement sur un service de stockage personnel bas\u00e9 sur le cloud (Google Drive, Dropbox, Box, OneDrive, etc.).<\/li><li>Les employ\u00e9s synchronisent les donn\u00e9es entre les ordinateurs de l&#039;entreprise et les appareils personnels \u00e0 l&#039;aide du m\u00eame identifiant Apple personnel sur tous les appareils.<\/li><\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Heureusement, \u00e0 l&#039;exception du deuxi\u00e8me point, les m\u00e9thodes ci-dessus peuvent \u00eatre \u00e9limin\u00e9es sans un gros investissement en logiciel ou en personnel informatique. En fait, beaucoup peut \u00eatre fait en utilisant les ressources existantes pour un maximum d&#039;avantages.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong><em>Modifications techniques<\/em><\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>D\u00e9sactivez toutes les fonctionnalit\u00e9s d&#039;\u00e9criture USB par d\u00e9faut.&nbsp;<\/strong><br>Les syst\u00e8mes d&#039;exploitation modernes permettent de d\u00e9sactiver facilement l&#039;acc\u00e8s en \u00e9criture en quelques clics de souris, sans qu&#039;il soit n\u00e9cessaire d&#039;acheter un logiciel tiers. Toute exception pour la fonctionnalit\u00e9 d&#039;\u00e9criture USB doit \u00eatre examin\u00e9e et accord\u00e9e pour une p\u00e9riode de temps limit\u00e9e, puis supprim\u00e9e. Les utilisateurs peuvent toujours b\u00e9n\u00e9ficier d&#039;un acc\u00e8s en lecture seule aux cl\u00e9s USB si tel est le mod\u00e8le commercial souhait\u00e9.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Supprimez l&#039;acc\u00e8s aux services de messagerie personnels et aux plates-formes de stockage cloud non professionnelles.&nbsp;<\/strong><br>\u00c0 moins qu&#039;il n&#039;y ait une raison commerciale valable d&#039;utiliser des comptes personnels, par d\u00e9faut, les utilisateurs ayant acc\u00e8s aux donn\u00e9es de l&#039;entreprise ne devraient pas avoir acc\u00e8s \u00e0 leur messagerie personnelle et aux plates-formes de stockage bas\u00e9es sur le cloud \u00e0 partir des m\u00eames appareils. La plupart des pare-feux modernes, m\u00eame ceux \u00e0 domicile, permettent des listes noires de sites Web\/domaines\/adresses e-mail sp\u00e9cifiques non autoris\u00e9s et des listes blanches de ceux qui sont autoris\u00e9s.<\/li><\/ul>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Imposez l&#039;utilisation d&#039;un compte g\u00e9r\u00e9 par l&#039;entreprise pour tout appareil d&#039;entreprise.<\/strong><br>Tout appareil d&#039;entreprise, par exemple, exige qu&#039;un compte cr\u00e9\u00e9 et g\u00e9r\u00e9 par l&#039;entreprise - et non un compte personnel - soit utilis\u00e9 pour des services tels que l&#039;identifiant Apple, qui permet la synchronisation des donn\u00e9es.<\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-mitigating-risks-the-ids-way\"><strong>Att\u00e9nuation des risques - La m\u00e9thode iDS<\/strong><\/h3>\n\n\n\n<p class=\"wp-block-paragraph\">En r\u00e9sum\u00e9, les employeurs peuvent r\u00e9duire consid\u00e9rablement le risque de perte de donn\u00e9es d&#039;entreprise en\u00a0:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Changer le comportement des employ\u00e9s gr\u00e2ce \u00e0 une \u00e9ducation ax\u00e9e sur les cons\u00e9quences de la perte de donn\u00e9es (co\u00fbt \u00e9lev\u00e9, perte de r\u00e9putation, invasion) ainsi que sur la pr\u00e9vention.<\/li><li>\u00c9limination des voies courantes de perte de donn\u00e9es (\u00e9criture sur cl\u00e9 USB, acc\u00e8s aux services de messagerie personnels et plates-formes de stockage en nuage).<\/li><\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">Bien que ces \u00e9tapes ne soient pas exhaustives et n&#039;emp\u00eacheront pas tous les employ\u00e9s de prendre des donn\u00e9es d&#039;entreprise, ces deux m\u00e9thodes, combin\u00e9es \u00e0 des politiques de s\u00e9curit\u00e9 basiques et peu co\u00fbteuses, r\u00e9duiront consid\u00e9rablement la quantit\u00e9 de donn\u00e9es qui quittent les entreprises.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Chez iDS, nous aidons les entreprises \u00e0 d\u00e9velopper des plans strat\u00e9giques pour s\u00e9curiser, stocker et prot\u00e9ger les donn\u00e9es contre les menaces internes et externes. Notre \u00e9quipe d\u00e9di\u00e9e d&#039;experts-conseils est pr\u00eate \u00e0 maximiser la valeur de vos donn\u00e9es tout en r\u00e9duisant les risques et les co\u00fbts. iDS peut fournir une strat\u00e9gie compl\u00e8te et personnalis\u00e9e pour g\u00e9rer les syst\u00e8mes d&#039;information de votre entreprise au fil du temps, en vous aidant \u00e0 tout d\u00e9velopper, des cartes de donn\u00e9es et des politiques de conservation aux plans sp\u00e9cifiques con\u00e7us pour r\u00e9duire votre empreinte globale des donn\u00e9es.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Au cours des 15 derni\u00e8res ann\u00e9es, mes clients m&#039;ont dit que je suis devenu assez bon dans ces enqu\u00eates. En fait, plusieurs de mes clients m&#039;appellent pour cette expertise parce que je suis efficace et soucieux des co\u00fbts. Pourtant, j&#039;aspire \u00e0 un jour o\u00f9 j&#039;arr\u00eaterai de poser la question : &quot;Pourquoi est-ce que je vois la m\u00eame chose apr\u00e8s toutes ces ann\u00e9es ?&quot; En fait, pour reprendre les mots de mon coll\u00e8gue, \u00ab\u00a0J&#039;aimerais me sortir d&#039;un emploi\u00a0\u00bb. J&#039;ai entendu dire qu&#039;il y avait d&#039;excellentes \u00e9missions de t\u00e9l\u00e9vision \u00e0 regarder.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Pour en savoir plus sur la fa\u00e7on dont les experts consultatifs d&#039;iDS peuvent fournir des solutions personnalis\u00e9es pour aider \u00e0 pr\u00e9venir la perte de donn\u00e9es des employ\u00e9s, <a href=\"https:\/\/idsinc.com\/fr\/contact\/\" target=\"_blank\" rel=\"noreferrer noopener\">contactez-nous aujourd&#039;hui<\/a>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-wide\" style=\"background-color:#e1e1e1;color:#e1e1e1\"\/>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><em>iDS fournit des solutions de donn\u00e9es consultatives aux entreprises et aux cabinets d&#039;avocats du monde entier, leur donnant un avantage d\u00e9cisif - \u00e0 la fois dans et hors de la salle d&#039;audience. Nos experts en la mati\u00e8re et nos strat\u00e8ges de donn\u00e9es se sp\u00e9cialisent dans la recherche de solutions aux probl\u00e8mes de donn\u00e9es complexes, garantissant que les donn\u00e9es peuvent \u00eatre exploit\u00e9es comme un atout et non comme un handicap.<\/em><\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>With the Great Resignation in full swing, employees are leaving in droves. What does the Great Resignation mean for employers? Employers are now struggling to protect themselves against the consequences of employees\u2019 departures. When employees leave, they often take a lot more than their experience. A key employee or a group of employees may, intentionally [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":3857,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,35],"tags":[],"class_list":["post-3855","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-ip","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Mitigating Trade Secret Loss \u2013 The Easy Way | iDiscovery<\/title>\n<meta name=\"description\" content=\"Employees are leaving in droves, and often intentionally or unintentionally, take valuable trade secrets and corporate data to competitors.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/fr\/perte-de-secret-commercial\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mitigating Trade Secret Loss \u2013 The Easy Way\" \/>\n<meta property=\"og:description\" content=\"Employees are leaving in droves, and often intentionally or unintentionally, take valuable trade secrets and corporate data to competitors.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/fr\/perte-de-secret-commercial\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-25T15:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-09T20:55:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/07\/Trade-Secret-Loss-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mike Perelman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mike Perelman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/trade-secret-loss\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/trade-secret-loss\\\/\"},\"author\":{\"name\":\"Mike Perelman\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/5b7e592a3a8683cba329f3c081bb2898\"},\"headline\":\"Mitigating Trade Secret Loss \u2013 The Easy Way\",\"datePublished\":\"2022-07-25T15:00:00+00:00\",\"dateModified\":\"2026-03-09T20:55:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/trade-secret-loss\\\/\"},\"wordCount\":1311,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/trade-secret-loss\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Trade-Secret-Loss-scaled.jpg\",\"articleSection\":[\"Blog\",\"IP + Trade Secrets + Employee Risk\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/trade-secret-loss\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/trade-secret-loss\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/trade-secret-loss\\\/\",\"name\":\"Mitigating Trade Secret Loss \u2013 The Easy Way | iDiscovery\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/trade-secret-loss\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/trade-secret-loss\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Trade-Secret-Loss-scaled.jpg\",\"datePublished\":\"2022-07-25T15:00:00+00:00\",\"dateModified\":\"2026-03-09T20:55:25+00:00\",\"description\":\"Employees are leaving in droves, and often intentionally or unintentionally, take valuable trade secrets and corporate data to competitors.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/trade-secret-loss\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/trade-secret-loss\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/trade-secret-loss\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Trade-Secret-Loss-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/Trade-Secret-Loss-scaled.jpg\",\"width\":1200,\"height\":600,\"caption\":\"Employees are leaving in droves, and often intentionally or unintentionally, take valuable trade secrets and corporate data to competitors.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/trade-secret-loss\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Mitigating Trade Secret Loss \u2013 The Easy Way\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/5b7e592a3a8683cba329f3c081bb2898\",\"name\":\"Mike Perelman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a4220262c86656613d34d417960a5a09e23358dbab20d95fe5c6ff52f4b4592?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a4220262c86656613d34d417960a5a09e23358dbab20d95fe5c6ff52f4b4592?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/7a4220262c86656613d34d417960a5a09e23358dbab20d95fe5c6ff52f4b4592?s=96&d=mm&r=g\",\"caption\":\"Mike Perelman\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/fr\\\/author\\\/mike-perelman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Att\u00e9nuer la perte de secrets commerciaux \u2013 en toute simplicit\u00e9 | iD\u00e9couverte","description":"Les employ\u00e9s partent en masse et, souvent, intentionnellement ou non, transmettent de pr\u00e9cieux secrets commerciaux et donn\u00e9es d&#039;entreprise \u00e0 des concurrents.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/fr\/perte-de-secret-commercial\/","og_locale":"fr_FR","og_type":"article","og_title":"Mitigating Trade Secret Loss \u2013 The Easy Way","og_description":"Employees are leaving in droves, and often intentionally or unintentionally, take valuable trade secrets and corporate data to competitors.","og_url":"https:\/\/idsinc.com\/fr\/perte-de-secret-commercial\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2022-07-25T15:00:00+00:00","article_modified_time":"2026-03-09T20:55:25+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/07\/Trade-Secret-Loss-scaled.jpg","type":"image\/jpeg"}],"author":"Mike Perelman","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Mike Perelman","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/trade-secret-loss\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/trade-secret-loss\/"},"author":{"name":"Mike Perelman","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/5b7e592a3a8683cba329f3c081bb2898"},"headline":"Mitigating Trade Secret Loss \u2013 The Easy Way","datePublished":"2022-07-25T15:00:00+00:00","dateModified":"2026-03-09T20:55:25+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/trade-secret-loss\/"},"wordCount":1311,"commentCount":0,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/trade-secret-loss\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/07\/Trade-Secret-Loss-scaled.jpg","articleSection":["Blog","IP + Trade Secrets + Employee Risk"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idsinc.com\/trade-secret-loss\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/trade-secret-loss\/","url":"https:\/\/idsinc.com\/trade-secret-loss\/","name":"Att\u00e9nuer la perte de secrets commerciaux \u2013 en toute simplicit\u00e9 | iD\u00e9couverte","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/trade-secret-loss\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/trade-secret-loss\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/07\/Trade-Secret-Loss-scaled.jpg","datePublished":"2022-07-25T15:00:00+00:00","dateModified":"2026-03-09T20:55:25+00:00","description":"Les employ\u00e9s partent en masse et, souvent, intentionnellement ou non, transmettent de pr\u00e9cieux secrets commerciaux et donn\u00e9es d&#039;entreprise \u00e0 des concurrents.","breadcrumb":{"@id":"https:\/\/idsinc.com\/trade-secret-loss\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/trade-secret-loss\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/trade-secret-loss\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/07\/Trade-Secret-Loss-scaled.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2022\/07\/Trade-Secret-Loss-scaled.jpg","width":1200,"height":600,"caption":"Employees are leaving in droves, and often intentionally or unintentionally, take valuable trade secrets and corporate data to competitors."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/trade-secret-loss\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Mitigating Trade Secret Loss \u2013 The Easy Way"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Solutions d&#039;iD\u00e9couverte","description":"Utilisez les donn\u00e9es \u00e0 votre avantage dans la salle d\u2019audience","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Solutions d&#039;iD\u00e9couverte","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS fournit des solutions de donn\u00e9es consultatives aux entreprises et aux cabinets d&#039;avocats du monde entier, leur donnant un avantage d\u00e9cisif, tant \u00e0 l&#039;int\u00e9rieur qu&#039;\u00e0 l&#039;ext\u00e9rieur de la salle d&#039;audience. Les experts en la mati\u00e8re et les strat\u00e8ges en donn\u00e9es d&#039;iDS se sp\u00e9cialisent dans la recherche de solutions \u00e0 des probl\u00e8mes de donn\u00e9es complexes, garantissant que les donn\u00e9es peuvent \u00eatre exploit\u00e9es comme un atout et non comme un passif.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/5b7e592a3a8683cba329f3c081bb2898","name":"Mike Perelman","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/7a4220262c86656613d34d417960a5a09e23358dbab20d95fe5c6ff52f4b4592?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7a4220262c86656613d34d417960a5a09e23358dbab20d95fe5c6ff52f4b4592?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7a4220262c86656613d34d417960a5a09e23358dbab20d95fe5c6ff52f4b4592?s=96&d=mm&r=g","caption":"Mike Perelman"},"url":"https:\/\/idsinc.com\/fr\/author\/mike-perelman\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts\/3855","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/comments?post=3855"}],"version-history":[{"count":1,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts\/3855\/revisions"}],"predecessor-version":[{"id":9477,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts\/3855\/revisions\/9477"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media\/3857"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media?parent=3855"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/categories?post=3855"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/tags?post=3855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}