{"id":9622,"date":"2026-04-13T10:03:17","date_gmt":"2026-04-13T16:03:17","guid":{"rendered":"https:\/\/idsinc.com\/?p=9622"},"modified":"2026-04-13T10:03:20","modified_gmt":"2026-04-13T16:03:20","slug":"pris-en-flagrant-delit-de-travail","status":"publish","type":"post","link":"https:\/\/idsinc.com\/fr\/caught-on-company-time\/","title":{"rendered":"Pris en flagrant d\u00e9lit pendant les heures de travail"},"content":{"rendered":"<!-- wp:themify-builder\/canvas \/-->\n\n\n<p>De toutes les menaces internes auxquelles une organisation peut \u00eatre confront\u00e9e, l&#039;une des plus dommageables est aussi l&#039;une des plus difficiles \u00e0 d\u00e9tecter\u00a0: l&#039;employ\u00e9 qui d\u00e9veloppe activement une entreprise concurrente tout en \u00e9tant assis \u00e0 votre bureau, en percevant votre salaire et en utilisant vos ressources.<\/p>\n\n\n\n<p>Il s&#039;agit d&#039;une violation directe du devoir fiduciaire et d&#039;un abus de confiance grave. Et pourtant, en tant que membre de l&#039;\u00e9quipe iDS <a href=\"https:\/\/idsinc.com\/fr\/timothy-latulippe\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Timoth\u00e9e La Tulippe<\/strong><\/a> explique dans le troisi\u00e8me volet de <a href=\"https:\/\/idsinc.com\/fr\/donnees-sur-la-propriete-intellectuelle\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Alliances bris\u00e9es<\/em><\/a> s\u00e9rie sur <a href=\"https:\/\/www.lexology.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Lexologie<\/a>, Les entretiens RH et les \u00e9valuations de performance traditionnels font rarement appara\u00eetre les preuves n\u00e9cessaires pour agir.<\/p>\n\n\n\n<p>L&#039;enregistrement num\u00e9rique, en revanche, est beaucoup plus difficile \u00e0 dissimuler.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-concurrent-login\"><strong>La connexion simultan\u00e9e<\/strong><\/h3>\n\n\n\n<p>Le point de d\u00e9part de nombre de ces enqu\u00eates est ce que LaTulippe appelle le <strong>connexion simultan\u00e9e<\/strong> \u2014 les preuves m\u00e9dico-l\u00e9gales d&#039;un employ\u00e9 passant d&#039;un syst\u00e8me l\u00e9gitime de l&#039;entreprise \u00e0 une infrastructure parall\u00e8le cach\u00e9e, souvent au cours de la m\u00eame journ\u00e9e de travail.<\/p>\n\n\n\n<p>En analysant les traces de navigation, les donn\u00e9es des cookies et les connexions r\u00e9seau actives, les enqu\u00eateurs peuvent identifier les moments pr\u00e9cis o\u00f9 un employ\u00e9 enregistrait un nom de domaine concurrent, recherchait des locaux ou r\u00e9digeait un plan d&#039;affaires pour un concurrent \u2013 le tout pendant ses heures de travail, sur le temps de l&#039;entreprise et avec le mat\u00e9riel professionnel. Ces enregistrements num\u00e9riques \u00e9tablissent une distinction nette entre le r\u00f4le professionnel de l&#039;employ\u00e9 et ses activit\u00e9s concurrentes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-artefacts-of-execution\"><strong>Artefacts d&#039;ex\u00e9cution<\/strong><\/h3>\n\n\n\n<p>Au-del\u00e0 du vol temporel, l&#039;enqu\u00eate se tourne vers ce que LaTulippe d\u00e9crit comme <strong>artefacts d&#039;ex\u00e9cution<\/strong> \u2014 Preuves techniques que les ressources de l&#039;entreprise ont \u00e9t\u00e9 directement utilis\u00e9es pour subventionner une start-up. Il s&#039;agit notamment de mod\u00e8les propri\u00e9taires d\u00e9pourvus de toute marque de l&#039;entreprise, de syst\u00e8mes CRM internes interrog\u00e9s pour exporter des prospects clients \u00e0 fort potentiel vers une feuille de calcul personnelle, et d&#039;un sch\u00e9ma d&#039;acc\u00e8s aux donn\u00e9es qui r\u00e9v\u00e8le qu&#039;une personne s&#039;\u00e9tait d\u00e9sengag\u00e9e mentalement bien avant de recevoir sa lettre de d\u00e9mission.<\/p>\n\n\n\n<p>L\u2019objectif est une reconstitution m\u00e9dico-l\u00e9gale d\u2019une journ\u00e9e type\u00a0: un r\u00e9cit chronologique qui montre l\u2019\u00e9volution d\u2019une trahison \u2014 des pr\u00e9paratifs initiaux jusqu\u2019\u00e0 une entit\u00e9 fonctionnelle et concurrente \u2014 pr\u00e9sent\u00e9 sous une forme qui r\u00e9siste \u00e0 l\u2019examen d\u2019un juge.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-the-role-of-osint\"><strong>Le r\u00f4le de l&#039;OSINT<\/strong><\/h3>\n\n\n\n<p>Aucun concurrent occulte n&#039;op\u00e8re de la m\u00eame mani\u00e8re, mais le renseignement en sources ouvertes (OSINT) constitue un atout majeur pour toute enqu\u00eate. LaTulippe explique comment les traces laiss\u00e9es sur les r\u00e9seaux sociaux, l&#039;historique d&#039;enregistrement des noms de domaine et les versions en cache des sites web concurrents peuvent r\u00e9v\u00e9ler qu&#039;une nouvelle entreprise \u00e9tait en pr\u00e9paration des mois avant le d\u00e9part officiel d&#039;un employ\u00e9 \u2013 souvent alors m\u00eame que ce dernier \u00e9tait encore r\u00e9mun\u00e9r\u00e9 par l&#039;organisation qu&#039;il cherchait \u00e0 nuire.<\/p>\n\n\n\n<p>Lorsque les documents publics et les signaux num\u00e9riques se superposent aux conclusions des enqu\u00eates internes, les enqu\u00eateurs peuvent d\u00e9montrer que les bases d&#039;une entreprise concurrente ont \u00e9t\u00e9 pos\u00e9es en utilisant les propres outils, le temps et les donn\u00e9es clients de l&#039;employeur.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-what-s-coming-next\"><strong>Et ensuite ?<\/strong><\/h3>\n\n\n\n<p>Le quatri\u00e8me et dernier article de cette s\u00e9rie aborde ce que LaTulippe appelle la bataille des experts\u00a0: le moment o\u00f9 la recevabilit\u00e9 des preuves et la clart\u00e9 du r\u00e9cit d\u00e9terminent l\u2019issue du proc\u00e8s. Il explique comment des milliers de lignes de m\u00e9tadonn\u00e9es complexes sont transform\u00e9es en chronologies visuelles color\u00e9es, compr\u00e9hensibles intuitivement par un juge\u00a0; pourquoi un rapport d\u2019expertise bien structur\u00e9 favorise souvent un r\u00e8glement \u00e0 l\u2019amiable bien avant le proc\u00e8s\u00a0; et comment une mesure pr\u00e9ventive de conservation des preuves constitue une assurance strat\u00e9gique contre les fautes professionnelles au sein d\u2019une main-d\u2019\u0153uvre de plus en plus mobile.<\/p>\n\n\n\n<p>Chez iDS, ce travail s&#039;\u00e9tend \u00e0 l&#039;ensemble de notre <a href=\"https:\/\/idsinc.com\/fr\/ce-que-nous-faisons\/criminalistique-numerique\/\" target=\"_blank\" rel=\"noreferrer noopener\">M\u00e9decine l\u00e9gale num\u00e9rique<\/a>, <a href=\"https:\/\/idsinc.com\/fr\/ce-que-nous-faisons\/#SpecialInvestigationsUnit\" target=\"_blank\" rel=\"noreferrer noopener\">Enqu\u00eates<\/a>, et <a href=\"https:\/\/idsinc.com\/fr\/ce-que-nous-faisons\/#ediscovery\" target=\"_blank\" rel=\"noreferrer noopener\">D\u00e9couverte \u00e9lectronique et divulgation<\/a> pratiques \u2014 transformer des preuves num\u00e9riques complexes en r\u00e9cits clairs et d\u00e9fendables qui soutiennent les \u00e9quipes juridiques de l&#039;enqu\u00eate jusqu&#039;au proc\u00e8s.<a href=\"https:\/\/www.lexology.com\/library\/detail.aspx?g=7f883dc4-7bcc-4001-84f4-e2323b687d41\" type=\"link\" id=\"https:\/\/www.lexology.com\/library\/detail.aspx?g=7f883dc4-7bcc-4001-84f4-e2323b687d41\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><br><\/strong><\/a><\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\" style=\"margin-top:var(--wp--preset--spacing--20);margin-bottom:var(--wp--preset--spacing--60)\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-white-color has-text-color has-background has-link-color wp-element-button\" href=\"https:\/\/www.lexology.com\/library\/detail.aspx?g=7f883dc4-7bcc-4001-84f4-e2323b687d41\" style=\"background-color:#ee5d20\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Lisez l&#039;article complet sur Lexology<\/strong><\/a><\/div>\n<\/div>\n\n\n\n<p>Pour contacter un expert iDS concernant votre prochaine enqu\u00eate, rendez-vous sur <a href=\"https:\/\/idsinc.com\/fr\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>idsinc.com<\/strong><\/a><strong>.<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><strong><em>iDS fournit des solutions de donn\u00e9es consultatives aux entreprises et aux cabinets d&#039;avocats du monde entier, leur donnant un avantage d\u00e9cisif, tant dans la salle d&#039;audience qu&#039;en dehors. Les experts en la mati\u00e8re et les strat\u00e8ges de donn\u00e9es d&#039;iDS se sp\u00e9cialisent dans la recherche de solutions \u00e0 des probl\u00e8mes de donn\u00e9es complexes, garantissant que les donn\u00e9es peuvent \u00eatre exploit\u00e9es comme un atout et non comme un handicap. Pour en savoir plus, visitez <\/em><\/strong><a href=\"https:\/\/idsinc.com\/fr\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong><em>idsinc.com<\/em><\/strong><\/a><strong><em>.<\/em><\/strong><\/p>\n\n\n\n<p><em><br>Vous avez des difficult\u00e9s avec un terme technique utilis\u00e9 dans cet article\u00a0? Consultez notre\u2026 <\/em><a href=\"https:\/\/idsinc.com\/fr\/glossaire\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Glossaire des analystes de donn\u00e9es<\/em><\/a><em> d\u00e9crypter le code.\u00a0<\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Of all the insider threats an organization can face, one of the most damaging is also one of the hardest to detect: the employee who is actively building a competing business while still sitting at your desk, drawing your salary, and using your resources. It is a direct violation of fiduciary duty and a profound [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":9625,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,35],"tags":[],"class_list":["post-9622","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-ip","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Caught on Company Time - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"One of the most damaging insider threats an organization can face is the employee building competing business while using your resources.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/fr\/pris-en-flagrant-delit-de-travail\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Caught on Company Time\" \/>\n<meta property=\"og:description\" content=\"One of the most damaging insider threats an organization can face is the employee building competing business while using your resources.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/fr\/pris-en-flagrant-delit-de-travail\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-13T16:03:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-13T16:03:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/04\/Caught-on-Company-Time-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"iDiscovery Solutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"iDiscovery Solutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/\"},\"author\":{\"name\":\"iDiscovery Solutions\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\"},\"headline\":\"Caught on Company Time\",\"datePublished\":\"2026-04-13T16:03:17+00:00\",\"dateModified\":\"2026-04-13T16:03:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/\"},\"wordCount\":629,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Caught-on-Company-Time-scaled.jpg\",\"articleSection\":[\"Blog\",\"IP + Trade Secrets + Employee Risk\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/\",\"name\":\"Caught on Company Time - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Caught-on-Company-Time-scaled.jpg\",\"datePublished\":\"2026-04-13T16:03:17+00:00\",\"dateModified\":\"2026-04-13T16:03:20+00:00\",\"description\":\"One of the most damaging insider threats an organization can face is the employee building competing business while using your resources.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Caught-on-Company-Time-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Caught-on-Company-Time-scaled.jpg\",\"width\":1920,\"height\":960,\"caption\":\"One of the most damaging insider threats an organization can face is the employee building competing business while using your resources.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/caught-on-company-time\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/idsinc.com\\\/de\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Caught on Company Time\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/person\\\/bf7f03a502e8a54e558c44d0ff5d6736\",\"name\":\"iDiscovery Solutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g\",\"caption\":\"iDiscovery Solutions\"},\"url\":\"https:\\\/\\\/idsinc.com\\\/fr\\\/author\\\/idiscovery\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Pris en flagrant d\u00e9lit pendant les heures de travail - iDiscovery Solutions","description":"L&#039;une des menaces internes les plus dommageables auxquelles une organisation peut \u00eatre confront\u00e9e est celle d&#039;un employ\u00e9 qui cr\u00e9e une entreprise concurrente en utilisant vos ressources.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/fr\/pris-en-flagrant-delit-de-travail\/","og_locale":"fr_FR","og_type":"article","og_title":"Caught on Company Time","og_description":"One of the most damaging insider threats an organization can face is the employee building competing business while using your resources.","og_url":"https:\/\/idsinc.com\/fr\/pris-en-flagrant-delit-de-travail\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_published_time":"2026-04-13T16:03:17+00:00","article_modified_time":"2026-04-13T16:03:20+00:00","og_image":[{"width":1920,"height":960,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/04\/Caught-on-Company-Time-scaled.jpg","type":"image\/jpeg"}],"author":"iDiscovery Solutions","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"iDiscovery Solutions","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/idsinc.com\/caught-on-company-time\/#article","isPartOf":{"@id":"https:\/\/idsinc.com\/caught-on-company-time\/"},"author":{"name":"iDiscovery Solutions","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736"},"headline":"Caught on Company Time","datePublished":"2026-04-13T16:03:17+00:00","dateModified":"2026-04-13T16:03:20+00:00","mainEntityOfPage":{"@id":"https:\/\/idsinc.com\/caught-on-company-time\/"},"wordCount":629,"commentCount":0,"publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"image":{"@id":"https:\/\/idsinc.com\/caught-on-company-time\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/04\/Caught-on-Company-Time-scaled.jpg","articleSection":["Blog","IP + Trade Secrets + Employee Risk"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/idsinc.com\/caught-on-company-time\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/idsinc.com\/caught-on-company-time\/","url":"https:\/\/idsinc.com\/caught-on-company-time\/","name":"Pris en flagrant d\u00e9lit pendant les heures de travail - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/caught-on-company-time\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/caught-on-company-time\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/04\/Caught-on-Company-Time-scaled.jpg","datePublished":"2026-04-13T16:03:17+00:00","dateModified":"2026-04-13T16:03:20+00:00","description":"L&#039;une des menaces internes les plus dommageables auxquelles une organisation peut \u00eatre confront\u00e9e est celle d&#039;un employ\u00e9 qui cr\u00e9e une entreprise concurrente en utilisant vos ressources.","breadcrumb":{"@id":"https:\/\/idsinc.com\/caught-on-company-time\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/caught-on-company-time\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/caught-on-company-time\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/04\/Caught-on-Company-Time-scaled.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2026\/04\/Caught-on-Company-Time-scaled.jpg","width":1920,"height":960,"caption":"One of the most damaging insider threats an organization can face is the employee building competing business while using your resources."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/caught-on-company-time\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/idsinc.com\/de\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Caught on Company Time"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"Solutions d&#039;iD\u00e9couverte","description":"Utilisez les donn\u00e9es \u00e0 votre avantage dans la salle d\u2019audience","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"Solutions d&#039;iD\u00e9couverte","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS fournit des solutions de donn\u00e9es consultatives aux entreprises et aux cabinets d&#039;avocats du monde entier, leur donnant un avantage d\u00e9cisif, tant \u00e0 l&#039;int\u00e9rieur qu&#039;\u00e0 l&#039;ext\u00e9rieur de la salle d&#039;audience. Les experts en la mati\u00e8re et les strat\u00e8ges en donn\u00e9es d&#039;iDS se sp\u00e9cialisent dans la recherche de solutions \u00e0 des probl\u00e8mes de donn\u00e9es complexes, garantissant que les donn\u00e9es peuvent \u00eatre exploit\u00e9es comme un atout et non comme un passif.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"},{"@type":"Person","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/person\/bf7f03a502e8a54e558c44d0ff5d6736","name":"Solutions d&#039;iD\u00e9couverte","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6009d8a07526a79850b1d0045087bcee60e562f90891f19a42de7ee7f4452529?s=96&d=mm&r=g","caption":"iDiscovery Solutions"},"url":"https:\/\/idsinc.com\/fr\/author\/idiscovery\/"}]}},"builder_content":"","_links":{"self":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts\/9622","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/comments?post=9622"}],"version-history":[{"count":2,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts\/9622\/revisions"}],"predecessor-version":[{"id":9629,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/posts\/9622\/revisions\/9629"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media\/9625"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/media?parent=9622"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/categories?post=9622"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/idsinc.com\/fr\/wp-json\/wp\/v2\/tags?post=9622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}