[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$ffk4cZzc7JcuyUG86jKt1L6aJNVHcbfL_KoiVvsBUkGc":3},{"tableOfContents":4,"markDownContent":5,"htmlContent":6,"metaTitle":7,"metaDescription":8,"wordCount":9,"readTime":10,"title":11,"nbDownloads":12,"excerpt":13,"lang":14,"url":15,"intro":16,"featured":4,"state":17,"author":18,"authorId":19,"datePublication":25,"dateCreation":26,"dateUpdate":27,"mainCategory":28,"categories":43,"metaDatas":70,"imageUrl":75,"imageThumbUrls":76,"id":84},false,"Vous souhaitez mettre en place une procédure de gestion des violations de données pour répondre aux exigences de l'article 33 du RGPD ? \r\n\r\nTéléchargez notre modèle au format word rédigé par notre fondateur ancien juriste à la CNIL. \r\n\r\n","\u003Cp>Vous souhaitez mettre en place une procédure de gestion des violations de données pour répondre aux exigences de l'article 33 du RGPD ?\u003C/p>\r\n\u003Cp>Téléchargez notre modèle au format word rédigé par notre fondateur ancien juriste à la CNIL.\u003C/p>\r\n","Procédure de gestion des violations de données - modèle","Téléchargez notre modèle de procédure de gestion des violation de données au format word rédigé par notre fondateur ancien juriste à la CNIL. ",38,2,"Procédure de gestion des violations de données (MODELE WORD)",171,null,"fr","procedure-de-gestion-des-violations-de-donnees-modele","Ce modèle de procédure vous permet d'organiser la gestion d'un incident de sécurité pour répondre aux obligations du RGPD","Published",{"id":19,"displayName":20,"avatarUrl":21,"bio":22,"blogUrl":23,"color":13,"userId":19,"creationDate":24},31,"Jérôme de Mercey","https://static.dastra.eu/tenant-10/avatar/31/Zuh7XFZe5EnnTo/design-sans-titre-2-150.png","COO/cofounder","https://www.dastra.eu","2021-11-15T12:57:57","2024-07-03T19:40:00","2024-07-03T19:40:02.6522362","2024-07-22T18:01:24.3177487",{"id":10,"name":29,"description":30,"url":31,"color":32,"parentId":13,"count":13,"imageUrl":13,"parent":13,"order":33,"translations":34},"Blog","A list of curated articles provided by the community","blog","#28449a",0,[35,37,40],{"lang":14,"name":29,"description":36},"Une liste d'articles rédigés par la communauté",{"lang":38,"name":29,"description":39},"es","Una lista de artículos escritos por la comunidad",{"lang":41,"name":29,"description":42},"de","Eine Liste von Artikeln, die von der Community verfasst wurden",[44,49],{"id":10,"name":29,"description":30,"url":31,"color":32,"parentId":13,"count":13,"imageUrl":13,"parent":13,"order":33,"translations":45},[46,47,48],{"lang":14,"name":29,"description":36},{"lang":38,"name":29,"description":39},{"lang":41,"name":29,"description":42},{"id":50,"name":51,"description":52,"url":53,"color":54,"parentId":10,"count":13,"imageUrl":13,"parent":55,"order":60,"translations":61},69,"Expertise","Gain insights from our experts on GDPR compliance, data protection, and privacy challenges. In-depth articles, professional analysis, and real-world best practices.","indepth","#000000",{"id":10,"name":29,"description":30,"url":31,"color":32,"parentId":13,"count":13,"imageUrl":13,"parent":13,"order":33,"translations":56},[57,58,59],{"lang":14,"name":29,"description":36},{"lang":38,"name":29,"description":39},{"lang":41,"name":29,"description":42},5,[62,64,67],{"lang":14,"name":51,"description":63},"Bénéficiez des conseils de nos experts sur la conformité RGPD, la protection des données et les enjeux privacy. Articles de fond, analyses et retours d’expérience métier.",{"lang":41,"name":65,"description":66},"Fachwissen","Entdecken Sie die Artikel unserer DSGVO-Experten",{"lang":38,"name":68,"description":69},"Experiencia","Descubre los artículos de nuestros expertos en Privacy",[71],{"typeMetaDataId":72,"value":73,"id":74},4,"https://static.dastra.eu/backofficefilescontainer/48dbefab-8ea8-4042-be2e-100b0a32d4ed/[Modèle_DASTRA] Gestion_des_violations_de_donnees.docx",113790,"https://static.dastra.eu/content/de23b5d7-9ed2-4652-8327-824fee5ebc1c/dans-la-jungle-les-logiciels-rgpd-10-original.png",[77,78,79,80,81,82,83],"https://static.dastra.eu/content/de23b5d7-9ed2-4652-8327-824fee5ebc1c/dans-la-jungle-les-logiciels-rgpd-10-1000.webp","https://static.dastra.eu/content/de23b5d7-9ed2-4652-8327-824fee5ebc1c/dans-la-jungle-les-logiciels-rgpd-10.webp","https://static.dastra.eu/content/de23b5d7-9ed2-4652-8327-824fee5ebc1c/dans-la-jungle-les-logiciels-rgpd-10-1500.webp","https://static.dastra.eu/content/de23b5d7-9ed2-4652-8327-824fee5ebc1c/dans-la-jungle-les-logiciels-rgpd-10-800.webp","https://static.dastra.eu/content/de23b5d7-9ed2-4652-8327-824fee5ebc1c/dans-la-jungle-les-logiciels-rgpd-10-600.webp","https://static.dastra.eu/content/de23b5d7-9ed2-4652-8327-824fee5ebc1c/dans-la-jungle-les-logiciels-rgpd-10-300.webp","https://static.dastra.eu/content/de23b5d7-9ed2-4652-8327-824fee5ebc1c/dans-la-jungle-les-logiciels-rgpd-10-100.webp",57633]