{"id":222739,"date":"2024-05-23T11:00:13","date_gmt":"2024-05-23T09:00:13","guid":{"rendered":"https:\/\/nextcloud.com\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/"},"modified":"2025-05-28T09:46:28","modified_gmt":"2025-05-28T07:46:28","slug":"confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche","status":"publish","type":"post","link":"https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/","title":{"rendered":"Confidentialit\u00e9 et protection des donn\u00e9es dans les instituts de recherche"},"content":{"rendered":"\n<p>Les instituts de recherche produisent parmi les donn\u00e9es les plus pr\u00e9cieuses au monde : recherche sur les \u00eatres humains, la vie animale et v\u00e9g\u00e9tale, les soci\u00e9t\u00e9s et les cultures, et bien d&rsquo;autres choses encore. Ces donn\u00e9es collect\u00e9es font partie int\u00e9grante des progr\u00e8s futurs de notre soci\u00e9t\u00e9, mais nous devons nous demander comment elles sont prot\u00e9g\u00e9es aujourd&rsquo;hui. Dans un souci de confidentialit\u00e9 et de respect de la vie priv\u00e9e, comment prot\u00e9ger les donn\u00e9es fondamentales de la recherche ?<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/research-institutes.png\"><img decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/research-institutes-1024x576.png\" alt=\"\" class=\"wp-image-208710\" srcset=\"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/research-institutes-1024x576.png 1024w, https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/research-institutes-300x169.png 300w, https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/research-institutes-768x432.png 768w, https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/research-institutes-1536x864.png 1536w, https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/research-institutes.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p>Les instituts de recherche sont responsables de la gestion, du stockage, de l&rsquo;analyse, de l&rsquo;utilisation et, enfin, du partage des donn\u00e9es de recherche. Avant le d\u00e9but de la recherche, des protocoles de protection des donn\u00e9es doivent \u00eatre mis en place pour \u00e9viter la perte, la manipulation ou le vol de donn\u00e9es. Lisez la suite pour d\u00e9couvrir comment les instituts de recherche peuvent pr\u00e9venir activement les violations de donn\u00e9es et prot\u00e9ger leurs donn\u00e9es avec Nextcloud comme plateforme.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Comment les donn\u00e9es des instituts de recherche peuvent-elles \u00eatre prot\u00e9g\u00e9es avec Nextcloud ?<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1. <strong>Les contr\u00f4les d&rsquo;acc\u00e8s<\/strong><\/h3>\n\n\n\n<p>L&rsquo;un des meilleurs moyens de prot\u00e9ger les donn\u00e9es de recherche est d&rsquo;en limiter l&rsquo;acc\u00e8s. Seule une minorit\u00e9 de personnes aura besoin d&rsquo;ouvrir les dossiers de recherche et les administrateurs syst\u00e8me peuvent contr\u00f4ler ce processus parfaitement.<\/p>\n\n\n\n<p>Dans Nextcloud Files, les permissions avanc\u00e9es qui limitent et\/ou restreignent l&rsquo;acc\u00e8s sont \u00e0 la pointe de la technologie et b\u00e9n\u00e9ficient de la confiance de nos clients et de notre communaut\u00e9.<\/p>\n\n\n\n<p>Quelques exemples d&rsquo;autorisations avanc\u00e9es :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>D\u00e9finition des autorisations sur un fichier partag\u00e9 : lecture, cr\u00e9ation, modification et\/ou t\u00e9l\u00e9chargement.<\/li>\n\n\n\n<li>Le filigrane des documents confidentiels rendant plus difficile le vol de donn\u00e9es.<\/li>\n\n\n\n<li>Activation d&rsquo;une protection par mot de passe ou d&rsquo;une date d&rsquo;expiration sur un fichier ou un dossier public.<\/li>\n\n\n\n<li>Bloquer les t\u00e9l\u00e9chargements afin que l&rsquo;utilisateur puisse visualiser et m\u00eame modifier le(s) fichier(s) partag\u00e9(s), mais pas le(s) t\u00e9l\u00e9charger.<\/li>\n<\/ul>\n\n\n<section class=\"promo-section promo_webinar  \" id=\"\" style=\"\">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-12\">\r\n\t\t\t\t<div class=\"text-block \">\r\n\t\t\t\t\t<h2>Regardez l&rsquo;enregistrement du webinaire !<\/h2><p>En savoir plus sur la fa\u00e7on dont votre organisation peut collaborer sur les donn\u00e9es de recherche avec Nextcloud<\/p>\n<a class=\"c-btn btn-white\" href=\"https:\/\/nextcloud.com\/blog\/webinar\/collaborate-on-research-data-with-nextcloud\/\" target=\"_blank\">Regarder l&#039;enregistrement<\/a>\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\r\n\n\n\n<h3 class=\"wp-block-heading\">2. <strong>L&rsquo;antivirus <\/strong><\/h3>\n\n\n\n<p>Chaque jour, des contacts externes envoient des fichiers et des documents par courrier \u00e9lectronique ou par d&rsquo;autres canaux, qui doivent \u00eatre analys\u00e9s pour d\u00e9tecter des menaces telles que des virus. L&rsquo;application Nextcloud Antivirus (AV) effectue des analyses antivirus automatiques. Chaque fois qu&rsquo;un fichier est t\u00e9l\u00e9charg\u00e9, il est d&rsquo;abord transf\u00e9r\u00e9 \u00e0 l&rsquo;application AV.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/nextcloud.com\/blog\/nextcloud-introduces-data-loss-prevention-dlp-capabilities-with-icap-support\/\" target=\"_blank\" rel=\"noreferrer noopener\">En savoir plus<\/a><\/div>\n<\/div>\n\n\n\n<h3 class=\"wp-block-heading\">3. <strong>Le cryptage<\/strong><\/h3>\n\n\n\n<p>Nextcloud offre une s\u00e9curit\u00e9 optimale pour les donn\u00e9es et les communications de la recherche gr\u00e2ce au cryptage et au renforcement.<\/p>\n\n\n\n<p>Nous proposons trois types de cryptage :<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Transfert de donn\u00e9es crypt\u00e9es avec la norme industrielle TLS (Transport Layer Security)<\/li>\n\n\n\n<li>Cryptage c\u00f4t\u00e9 serveur\n<ol class=\"wp-block-list\">\n<li>Permet aux chercheurs de stocker des fichiers localement et en toute s\u00e9curit\u00e9 avec des cl\u00e9s de cryptage et des algorithmes de chiffrement.<\/li>\n<\/ol>\n<\/li>\n\n\n\n<li>Cryptage de bout en bout\n<ol class=\"wp-block-list\">\n<li>Partage de fichiers E2EE : Permet aux chercheurs de partager des fichiers confidentiels avec d&rsquo;autres utilisateurs et peut \u00eatre synchronis\u00e9 entre les appareils.<\/li>\n\n\n\n<li>D\u00e9p\u00f4t de fichiers E2EE : Permet aux chercheurs de recevoir des fichiers d&rsquo;utilisateurs externes en partageant un lien de partage s\u00e9curis\u00e9. L&rsquo;utilisateur externe n&rsquo;a que la possibilit\u00e9 de t\u00e9l\u00e9charger un fichier dans le dossier crypt\u00e9 de bout en bout.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n\n\n\n<h3 class=\"wp-block-heading\">4. <strong>Le logiciel de d\u00e9tection d&rsquo;intrusion<\/strong><\/h3>\n\n\n\n<p>Gr\u00e2ce \u00e0 la d\u00e9tection des connexions suspectes bas\u00e9e sur l&rsquo;apprentissage automatique, les instituts de recherche peuvent am\u00e9liorer la s\u00e9curit\u00e9 et la productivit\u00e9 au-del\u00e0 de notre protection contre la force brute et de l&rsquo;authentification \u00e0 deux facteurs.<\/p>\n\n\n\n<p>La d\u00e9tection des connexions suspectes utilise un r\u00e9seau neuronal form\u00e9 localement pour d\u00e9tecter les tentatives de connexion par des acteurs malveillants.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/nextcloud.com\/blog\/5-unique-security-features-by-nextcloud\/\" target=\"_blank\" rel=\"noreferrer noopener\">D\u00e9couvrez d&rsquo;autres caract\u00e9ristiques de s\u00e9curit\u00e9<\/a><\/div>\n<\/div>\n\n\n<section class=\"promo-section   has_custom_bg_image  full-width \" id=\"\" style=\"background-image: url(https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/books-5937823_1280.jpg);\" data-expiration=\"\">\n\t<div class=\"container\">\n\t\t<div class=\"row\">\n\t\t\t<div class=\"col-12\">\n\t\t\t\t<div class=\"text-block\">\n\t\t\t\t\t<h2>\u00cates-vous un institut de recherche ou une universit\u00e9 ?<\/h2><p>Essayez Nextcloud d\u00e8s aujourd&rsquo;hui pour prot\u00e9ger les donn\u00e9es de recherche, la communication et la confidentialit\u00e9 des personnes et des objets.<\/p>\n<a class=\"c-btn btn-white\" href=\"https:\/\/nextcloud.com\/instant-trial\/\" target=\"_blank\">Commencez votre essai maintenant<\/a>\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Les instituts de recherche produisent parmi les donn\u00e9es les plus pr\u00e9cieuses au monde. Comment s&rsquo;assurer qu&rsquo;elles sont s\u00e9curis\u00e9es et prot\u00e9g\u00e9es ?<\/p>\n","protected":false},"author":9,"featured_media":208724,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"publish_to_discourse":"","publish_post_category":"","wpdc_auto_publish_overridden":"1","wpdc_topic_tags":"","wpdc_pin_topic":"","wpdc_pin_until":"","discourse_post_id":"","discourse_permalink":"","wpdc_publishing_response":"","wpdc_publishing_error":"","footnotes":""},"categories":[281,349,294],"tags":[],"class_list":["post-222739","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-fr","category-protection-de-la-vie-privee","category-securite"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Confidentialit\u00e9 et protection des donn\u00e9es dans les instituts de recherche - Nextcloud<\/title>\n<meta name=\"description\" content=\"Les instituts de recherche produisent parmi les donn\u00e9es les plus pr\u00e9cieuses au monde. Comment s&#039;assurer qu&#039;elles sont s\u00e9curis\u00e9es et prot\u00e9g\u00e9es ?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Confidentialit\u00e9 et protection des donn\u00e9es dans les instituts de recherche - Nextcloud\" \/>\n<meta property=\"og:description\" content=\"Les instituts de recherche produisent parmi les donn\u00e9es les plus pr\u00e9cieuses au monde. Comment s&#039;assurer qu&#039;elles sont s\u00e9curis\u00e9es et prot\u00e9g\u00e9es ?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/\" \/>\n<meta property=\"og:site_name\" content=\"Nextcloud\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Nextclouders\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-23T09:00:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-28T07:46:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/research-institutes.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mikaela Schneider\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@nextclouders\" \/>\n<meta name=\"twitter:site\" content=\"@nextclouders\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mikaela Schneider\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/\"},\"author\":{\"name\":\"Mikaela Schneider\",\"@id\":\"https:\/\/nextcloud.com\/fr\/#\/schema\/person\/ea95df24e6e3adc5f63c79555fa599f5\"},\"headline\":\"Confidentialit\u00e9 et protection des donn\u00e9es dans les instituts de recherche\",\"datePublished\":\"2024-05-23T09:00:13+00:00\",\"dateModified\":\"2025-05-28T07:46:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/\"},\"wordCount\":672,\"publisher\":{\"@id\":\"https:\/\/nextcloud.com\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/research-institutes.png\",\"articleSection\":[\"G\u00e9n\u00e9ral\",\"Protection de la vie priv\u00e9e\",\"s\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/\",\"url\":\"https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/\",\"name\":\"Confidentialit\u00e9 et protection des donn\u00e9es dans les instituts de recherche - Nextcloud\",\"isPartOf\":{\"@id\":\"https:\/\/nextcloud.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/research-institutes.png\",\"datePublished\":\"2024-05-23T09:00:13+00:00\",\"dateModified\":\"2025-05-28T07:46:28+00:00\",\"description\":\"Les instituts de recherche produisent parmi les donn\u00e9es les plus pr\u00e9cieuses au monde. Comment s'assurer qu'elles sont s\u00e9curis\u00e9es et prot\u00e9g\u00e9es ?\",\"breadcrumb\":{\"@id\":\"https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/#primaryimage\",\"url\":\"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/research-institutes.png\",\"contentUrl\":\"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/research-institutes.png\",\"width\":1920,\"height\":1080,\"caption\":\"Research institutes\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/nextcloud.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Confidentialit\u00e9 et protection des donn\u00e9es dans les instituts de recherche\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nextcloud.com\/fr\/#website\",\"url\":\"https:\/\/nextcloud.com\/fr\/\",\"name\":\"Nextcloud\",\"description\":\"Regain control over your data\",\"publisher\":{\"@id\":\"https:\/\/nextcloud.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nextcloud.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/nextcloud.com\/fr\/#organization\",\"name\":\"Nextcloud\",\"url\":\"https:\/\/nextcloud.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/nextcloud.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/nextcloud.com\/c\/uploads\/2022\/10\/nextcloud-logo-blue-transparent.svg\",\"contentUrl\":\"https:\/\/nextcloud.com\/c\/uploads\/2022\/10\/nextcloud-logo-blue-transparent.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"Nextcloud\"},\"image\":{\"@id\":\"https:\/\/nextcloud.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Nextclouders\/\",\"https:\/\/x.com\/nextclouders\",\"https:\/\/www.linkedin.com\/company\/10827569\/\",\"https:\/\/youtube.com\/nextcloud\",\"https:\/\/www.instagram.com\/nextclouders\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/nextcloud.com\/fr\/#\/schema\/person\/ea95df24e6e3adc5f63c79555fa599f5\",\"name\":\"Mikaela Schneider\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/nextcloud.com\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9b0e9ca5948ab0ab4c0732dd1e79442d7b531e574a27757a9fbc4fad5f732b0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9b0e9ca5948ab0ab4c0732dd1e79442d7b531e574a27757a9fbc4fad5f732b0f?s=96&d=mm&r=g\",\"caption\":\"Mikaela Schneider\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Confidentialit\u00e9 et protection des donn\u00e9es dans les instituts de recherche - Nextcloud","description":"Les instituts de recherche produisent parmi les donn\u00e9es les plus pr\u00e9cieuses au monde. Comment s'assurer qu'elles sont s\u00e9curis\u00e9es et prot\u00e9g\u00e9es ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/","og_locale":"fr_FR","og_type":"article","og_title":"Confidentialit\u00e9 et protection des donn\u00e9es dans les instituts de recherche - Nextcloud","og_description":"Les instituts de recherche produisent parmi les donn\u00e9es les plus pr\u00e9cieuses au monde. Comment s'assurer qu'elles sont s\u00e9curis\u00e9es et prot\u00e9g\u00e9es ?","og_url":"https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/","og_site_name":"Nextcloud","article_publisher":"https:\/\/www.facebook.com\/Nextclouders\/","article_published_time":"2024-05-23T09:00:13+00:00","article_modified_time":"2025-05-28T07:46:28+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/research-institutes.png","type":"image\/png"}],"author":"Mikaela Schneider","twitter_card":"summary_large_image","twitter_creator":"@nextclouders","twitter_site":"@nextclouders","twitter_misc":{"\u00c9crit par":"Mikaela Schneider","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/#article","isPartOf":{"@id":"https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/"},"author":{"name":"Mikaela Schneider","@id":"https:\/\/nextcloud.com\/fr\/#\/schema\/person\/ea95df24e6e3adc5f63c79555fa599f5"},"headline":"Confidentialit\u00e9 et protection des donn\u00e9es dans les instituts de recherche","datePublished":"2024-05-23T09:00:13+00:00","dateModified":"2025-05-28T07:46:28+00:00","mainEntityOfPage":{"@id":"https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/"},"wordCount":672,"publisher":{"@id":"https:\/\/nextcloud.com\/fr\/#organization"},"image":{"@id":"https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/#primaryimage"},"thumbnailUrl":"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/research-institutes.png","articleSection":["G\u00e9n\u00e9ral","Protection de la vie priv\u00e9e","s\u00e9curit\u00e9"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/","url":"https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/","name":"Confidentialit\u00e9 et protection des donn\u00e9es dans les instituts de recherche - Nextcloud","isPartOf":{"@id":"https:\/\/nextcloud.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/#primaryimage"},"image":{"@id":"https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/#primaryimage"},"thumbnailUrl":"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/research-institutes.png","datePublished":"2024-05-23T09:00:13+00:00","dateModified":"2025-05-28T07:46:28+00:00","description":"Les instituts de recherche produisent parmi les donn\u00e9es les plus pr\u00e9cieuses au monde. Comment s'assurer qu'elles sont s\u00e9curis\u00e9es et prot\u00e9g\u00e9es ?","breadcrumb":{"@id":"https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/#primaryimage","url":"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/research-institutes.png","contentUrl":"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/research-institutes.png","width":1920,"height":1080,"caption":"Research institutes"},{"@type":"BreadcrumbList","@id":"https:\/\/nextcloud.com\/fr\/blog\/confidentialite-et-protection-des-donnees-dans-les-instituts-de-recherche\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nextcloud.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Confidentialit\u00e9 et protection des donn\u00e9es dans les instituts de recherche"}]},{"@type":"WebSite","@id":"https:\/\/nextcloud.com\/fr\/#website","url":"https:\/\/nextcloud.com\/fr\/","name":"Nextcloud","description":"Regain control over your data","publisher":{"@id":"https:\/\/nextcloud.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nextcloud.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/nextcloud.com\/fr\/#organization","name":"Nextcloud","url":"https:\/\/nextcloud.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/nextcloud.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/nextcloud.com\/c\/uploads\/2022\/10\/nextcloud-logo-blue-transparent.svg","contentUrl":"https:\/\/nextcloud.com\/c\/uploads\/2022\/10\/nextcloud-logo-blue-transparent.svg","width":"1024","height":"1024","caption":"Nextcloud"},"image":{"@id":"https:\/\/nextcloud.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Nextclouders\/","https:\/\/x.com\/nextclouders","https:\/\/www.linkedin.com\/company\/10827569\/","https:\/\/youtube.com\/nextcloud","https:\/\/www.instagram.com\/nextclouders\/"]},{"@type":"Person","@id":"https:\/\/nextcloud.com\/fr\/#\/schema\/person\/ea95df24e6e3adc5f63c79555fa599f5","name":"Mikaela Schneider","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/nextcloud.com\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9b0e9ca5948ab0ab4c0732dd1e79442d7b531e574a27757a9fbc4fad5f732b0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9b0e9ca5948ab0ab4c0732dd1e79442d7b531e574a27757a9fbc4fad5f732b0f?s=96&d=mm&r=g","caption":"Mikaela Schneider"}}]}},"featured_media_url":"https:\/\/nextcloud.com\/c\/uploads\/2024\/04\/research-institutes.png","_links":{"self":[{"href":"https:\/\/nextcloud.com\/fr\/wp-json\/wp\/v2\/posts\/222739","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nextcloud.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nextcloud.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nextcloud.com\/fr\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/nextcloud.com\/fr\/wp-json\/wp\/v2\/comments?post=222739"}],"version-history":[{"count":4,"href":"https:\/\/nextcloud.com\/fr\/wp-json\/wp\/v2\/posts\/222739\/revisions"}],"predecessor-version":[{"id":314516,"href":"https:\/\/nextcloud.com\/fr\/wp-json\/wp\/v2\/posts\/222739\/revisions\/314516"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nextcloud.com\/fr\/wp-json\/wp\/v2\/media\/208724"}],"wp:attachment":[{"href":"https:\/\/nextcloud.com\/fr\/wp-json\/wp\/v2\/media?parent=222739"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nextcloud.com\/fr\/wp-json\/wp\/v2\/categories?post=222739"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nextcloud.com\/fr\/wp-json\/wp\/v2\/tags?post=222739"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}