<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Security Archives - Ice Development</title>
	<atom:link href="https://www.ice-dev.com/en/security/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ice-dev.com/en/security/</link>
	<description>agence web Lyon</description>
	<lastBuildDate>Thu, 28 Mar 2024 08:03:15 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>The importance of Symfony version upgrades</title>
		<link>https://www.ice-dev.com/en/development-php/the-importance-of-symfony-version-upgrades/</link>
		
		<dc:creator><![CDATA[wwwice]]></dc:creator>
		<pubDate>Wed, 22 Mar 2023 09:00:27 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Development PHP]]></category>
		<guid isPermaLink="false">https://www.ice-dev.com/?p=2898</guid>

					<description><![CDATA[<p>A website is a living project. Going live does not mean that it will no longer be developed. It is therefore essential to update the various components of the site (Symfony, PHP, server operating system, etc.) for the reasons we will explain here. Security Cybercriminals are constantly finding new ways to exploit software vulnerabilities, and [&#8230;]</p>
<p>L’article <a href="https://www.ice-dev.com/en/development-php/the-importance-of-symfony-version-upgrades/">The importance of Symfony version upgrades</a> est apparu en premier sur <a href="https://www.ice-dev.com/en/">Ice Development</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A website is a living project. Going live does not mean that it will no longer be developed. It is therefore <strong>essential to update the various components</strong> of the site (Symfony, PHP, server operating system, etc.) for the reasons we will explain here.</p>

<h2 class="wp-block-heading">Security</h2>

<p>Cybercriminals are constantly finding new ways to exploit software vulnerabilities, and a website and its various components are no exception. It is important to bear in mind that <strong>cyber attacks are constantly</strong> being attempted on all sites connected to the Internet, without exception. Depending on the seriousness of these vulnerabilities, a successful attack can have <strong>catastrophic consequences</strong> for your business and your image, with, for example, the installation of ransomware (software that locks your data and makes it unavailable until a ransom has been paid) or <strong>the theft of your customers&#8217; data.</strong>.  </p>

<p>&gt; By updating your software regularly, you can ensure that you have the latest security features and patches.</p>

<figure class="wp-block-image size-full is-resized"><a href="https://www.ice-dev.com/wp-content/uploads/2023/03/ice-goldorak.jpg"><img fetchpriority="high" decoding="async" src="https://www.ice-dev.com/wp-content/uploads/2023/03/ice-goldorak.jpg" alt="" class="wp-image-1694" width="844" height="617" srcset="https://www.ice-dev.com/wp-content/uploads/2023/03/ice-goldorak.jpg 844w, https://www.ice-dev.com/wp-content/uploads/2023/03/ice-goldorak-300x219.jpg 300w, https://www.ice-dev.com/wp-content/uploads/2023/03/ice-goldorak-768x561.jpg 768w" sizes="(max-width: 844px) 100vw, 844px" /></a></figure>

<h2 class="wp-block-heading">Performance</h2>

<p>These updates can help to <strong>improve the speed and overall performance</strong> of your website, which translates into a better user experience for your visitors. The speed at which your site&#8217;s pages load is also an important factor that can influence a number of things, for example <strong>your natural ranking</strong> with the various search engines such as Google or Bing, or your conversion rate in the case of an e-commerce site.</p>

<h2 class="wp-block-heading">Compatibility</h2>

<p>Your website needs to be compatible with the latest versions of web browsers, devices and software. <strong>Updating your website ensures</strong> that it works correctly on all devices and browsers, providing a seamless experience for your visitors. Compatibility issues can have a negative impact on the user experience and lead to a loss of visitors, which can be detrimental to the success of your website.</p>

<h2 class="wp-block-heading">Features</h2>

<p>Updates to the components of your website regularly include <strong>improvements to existing functions</strong> as well as new features. Access to these new features facilitates new developments, <strong>reduce their cost</strong> and also <strong>provides the best possible user experience</strong> for your visitors.</p>

<figure class="wp-block-image size-large"><a href="https://www.ice-dev.com/wp-content/uploads/2023/03/ice-hellowBoy-1024x551.jpg"><img decoding="async" width="1024" height="551" src="https://www.ice-dev.com/wp-content/uploads/2023/03/ice-hellowBoy-1024x551.jpg" alt="" class="wp-image-1696" srcset="https://www.ice-dev.com/wp-content/uploads/2023/03/ice-hellowBoy-1024x551.jpg 1024w, https://www.ice-dev.com/wp-content/uploads/2023/03/ice-hellowBoy-300x161.jpg 300w, https://www.ice-dev.com/wp-content/uploads/2023/03/ice-hellowBoy-768x413.jpg 768w, https://www.ice-dev.com/wp-content/uploads/2023/03/ice-hellowBoy.jpg 1117w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>

<p>At <strong>Ice Development</strong>, nous développons uniquement sur des versions dites <strong>LTS </strong>&#8220;Long Term Support&#8221; versions, according to <a href="https://symfony.com/releases" target="_blank" rel="noreferrer noopener"><strong>Sensio</strong></a>. <br/>Whatever technology you use (WordPress, Magento, etc.), it&#8217;s essential to keep your environment up to date!</p>

<p>Do you have a Symfony project to update?</p>

<p>  <a class="button" href="https://www.ice-dev.com/en/contact/">Contact us</a></p>

<p></p>
<p>L’article <a href="https://www.ice-dev.com/en/development-php/the-importance-of-symfony-version-upgrades/">The importance of Symfony version upgrades</a> est apparu en premier sur <a href="https://www.ice-dev.com/en/">Ice Development</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why you absolutely must secure your site with HTTPS ?</title>
		<link>https://www.ice-dev.com/en/security/why-you-absolutely-must-secure-your-site-with-https/</link>
		
		<dc:creator><![CDATA[Benjamin Navaron]]></dc:creator>
		<pubDate>Fri, 08 Jun 2018 08:49:03 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.ice-dev.com/non-classifiee/why-you-absolutely-must-secure-your-site-with-https/</guid>

					<description><![CDATA[<p>In 2012, with the advent of responsive, Google strongly encouraged sites to become &#8220;responsive&#8221;, i.e. to be adapted to mobile devices. Google recommends a new development for all the sites it indexes. Now it&#8217;s time to secure your site with HTTPS ! &#8220;You take the blue pill, the story ends there, you wake up in [&#8230;]</p>
<p>L’article <a href="https://www.ice-dev.com/en/security/why-you-absolutely-must-secure-your-site-with-https/">Why you absolutely must secure your site with HTTPS ?</a> est apparu en premier sur <a href="https://www.ice-dev.com/en/">Ice Development</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In 2012, with the advent of responsive, Google strongly encouraged sites to become &#8220;responsive&#8221;, i.e. to be adapted to mobile devices.<br />
Google recommends a new development for all the sites it indexes. Now it&#8217;s time to secure your site with <strong>HTTPS</strong> !</p>
<figure style="text-align: center;"><img decoding="async" class="alignnone size-full wp-image-1270" src="https://www.ice-dev.com/wp-content/uploads/2018/06/https-pillule-rouge-ou-pillule-bleue.jpg" alt="" width="792" height="350" srcset="https://www.ice-dev.com/wp-content/uploads/2018/06/https-pillule-rouge-ou-pillule-bleue.jpg 792w, https://www.ice-dev.com/wp-content/uploads/2018/06/https-pillule-rouge-ou-pillule-bleue-300x133.jpg 300w, https://www.ice-dev.com/wp-content/uploads/2018/06/https-pillule-rouge-ou-pillule-bleue-768x339.jpg 768w" sizes="(max-width: 792px) 100vw, 792px" /><figcaption>&#8220;You take the blue pill, the story ends there, you wake up in your bed, and you believe what you want. You take the red pill, you stay in Wonderland and I&#8217;ll show you how far down the rabbit hole it goes.&#8221; Morpheus, The Matrix</figcaption></figure>
<h2>&#8220;S&#8221; for security, the difference between HTTP and HTTPS</h2>
<p>HTTP (Hyper Text Transfer Protocol<em>)</em> is a protocol that designates the exchange that takes place between an Internet user and the server with which they are connected when browsing the Internet. More specifically, it enables Internet users to access data stored on a server.</p>
<p>Adding an SSL (Secure Socket Layer) certificate to the HTTP protocol ensures that exchanges on your site are secure. This ensures data confidentiality and makes it impossible to fake any information exchanged. In fact, the entire communication between your site and the visitor will be encrypted thanks to the SSL certificate.</p>
<h2>Why switch to HTTPS ?</h2>
<h3>Improve your ranking on Google</h3>
<p>Since January 2017, Google has taken a stand in favour of secure sites.<br />
<strong>The impact on referencing has been noted on many sites.</strong></p>
<h3>Reassure your visitors</h3>
<p>Google Chrome now displays a green padlock next to the URL in question as a token of &#8220;Google certification&#8221; of the security of the site and exchanges with Internet users. This will reassure your visitors and give them confidence, which is essential on an e-commerce site, for example.</p>
<figure style="text-align: center;"><a class="image-modal" href="/wp-content/uploads/2018/06/https-interfimo.jpg" target="_blank" rel="noopener"><br />
<img decoding="async" class="alignnone wp-image-234 size-full" src="/wp-content/uploads/2018/06/https-interfimo-vignette.jpg" alt="https site"><br />
</a><figcaption>Secure https site</figcaption></figure>
<p><span style="text-align: center;">However, Google also indicates &#8220;not secure&#8221; for sites that do not have SSL certification. E-commerce sites are naturally affected by this, as the number of bank frauds on the Internet is increasing, and this will have a negative psychological impact on your visitors.</span></p>
<figure style="text-align: center;"><a class="image-modal" href="/wp-content/uploads/2018/06/http-alter-ego.jpg" target="_blank" rel="noopener"><br />
<img decoding="async" class="alignnone wp-image-234 size-full" src="/wp-content/uploads/2018/06/http-alter-ego-vignette.jpg" alt=""><br />
</a><figcaption>Site not secured in http</figcaption></figure>
<h3>Increase the speed of your site</h3>
<p>The speed at which your site loads on your computer will also be accelerated with HTTPS, as the protocol is much more recent than HTTP, which dates back to 1999.</p>
<h2>How can you switch your HTTP site to HTTPS?</h2>
<p>Contact us now to receive a quote for securing your site by switching to https.</p>
<p><a class="button" href="https://www.ice-dev.com/en/contact/#js-page-title-second">Contact us to switch to HTTPS.</a></p>
<div id="sconnect-is-installed" style="display: none;">2.5.0.0</div>
<div id="sconnect-is-installed" style="display: none;">2.5.0.0</div>
<p>L’article <a href="https://www.ice-dev.com/en/security/why-you-absolutely-must-secure-your-site-with-https/">Why you absolutely must secure your site with HTTPS ?</a> est apparu en premier sur <a href="https://www.ice-dev.com/en/">Ice Development</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>General Data Protection Regulation, are you ready ?</title>
		<link>https://www.ice-dev.com/en/security/general-data-protection-regulation-are-you-ready/</link>
		
		<dc:creator><![CDATA[Benjamin Navaron]]></dc:creator>
		<pubDate>Wed, 18 Apr 2018 13:56:29 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.ice-dev.com/non-classifiee/general-data-protection-regulation-are-you-ready/</guid>

					<description><![CDATA[<p>If you have a contact form or customer registration form on your site, for example, you are collecting personal data. Without specific action on your part, you will be illegal on 25 May. Are you ready for the General Data Protection Regulation? The General Data Protection Regulation (GDPR) comes into force on 25 May 2018. [&#8230;]</p>
<p>L’article <a href="https://www.ice-dev.com/en/security/general-data-protection-regulation-are-you-ready/">General Data Protection Regulation, are you ready ?</a> est apparu en premier sur <a href="https://www.ice-dev.com/en/">Ice Development</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you have a contact form or customer registration form on your site, for example, you are collecting personal data. Without specific action on your part, you will be illegal on 25 May.</p>
<figure style="text-align: center;"><a class="image-modal" href="https://www.ice-dev.com/wp-content/uploads/2018/04/balance-de-la-justice.jpg" rel="noopener"><img loading="lazy" decoding="async" class="size-medium wp-image-1162 aligncenter" src="https://www.ice-dev.com/wp-content/uploads/2018/04/balance-de-la-justice.jpg" alt="The balance of justice regarding the RGPD" width="300" height="265"></a><figcaption>Are you ready for the General Data Protection Regulation?</figcaption></figure>
<p>The General Data Protection Regulation (GDPR) comes into force on 25 May 2018. It&#8217;s a bit technical, but ICE DEVELOPMENT explains everything: your responsibilities, the risks and above all what you absolutely must do between now and the 25th.</p>
<h2>Why is the European Commission introducing the RGPD ?</h2>
<h3>To strengthen the rights of Internet users</h3>
<p>From 25 May, Internet users will be able to exercise the following 4 fundamental rights :</p>
<ul>
<li>The right to inspect : They must be informed of the nature of the data collected and how it is used.</li>
<li>The right to object : They may request the total deletion of their data at any time.</li>
<li>The right to recover this data and pass it on to a third party.</li>
<li>The right of access: They can have access to their data whenever they wish.</li>
</ul>
<h3>Co-responsibility :</h3>
<p>You are a customer of Ice Development and we store your customers&#8217; data on our servers. You are therefore a data controller and we are not only your partner but also your processor.</p>
<p>The RGPD makes the data controller and its processor jointly responsible. The latter will have as many responsibilities and obligations as the company responsible for data processing. Transparency and trust will be the cornerstones of this relationship.</p>
<h3>Who does the GDPR apply to ?</h3>
<p>The RGPD applies to all organisations, private or public, that process data, provided that :</p>
<ul>
<li>The organisation is established in Europe</li>
<li>The organisation processes the data of European citizens</li>
</ul>
<h2><strong>What are your obligations in terms of information ?</strong></h2>
<h3>Mandatory information</h3>
<figure style="text-align: center;"><a class="image-modal" href="https://www.ice-dev.com/wp-content/uploads/2018/04/mentions-legales-de-collecte-de-donnees-300x265.png" rel="noopener"><img loading="lazy" decoding="async" class="size-medium wp-image-1162 aligncenter" src="https://www.ice-dev.com/wp-content/uploads/2018/04/mentions-legales-de-collecte-de-donnees-300x265.png" alt="The form proposed by the CNIL containing all the information that must be made available to customers so that they are fully aware of their rights and of the players involved in the recovery and processing of their data." width="300" height="265" srcset="https://www.ice-dev.com/wp-content/uploads/2018/04/mentions-legales-de-collecte-de-donnees-300x265.png 300w, https://www.ice-dev.com/wp-content/uploads/2018/04/mentions-legales-de-collecte-de-donnees.png 599w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a><figcaption> </figcaption></figure>
<p style="text-align: center;"><a href="https://www.cnil.fr/fr/modele/mention/formulaire-de-collecte-de-donnees-personnelles#node-23434" target="_blank" rel="noopener">To generate your mandatory information, you can use the CNIL generator by clicking here.</a></p>
<h3>Cookies</h3>
<p>When a web page is opened, it is no longer permitted to force users to accept cookies. &#8220;Accept&#8221; or &#8220;refuse&#8221; buttons must be visible and the related message must be understandable to a child. A link to the legal notice explaining why and how cookies are used is recommended.</p>
<figure style="text-align: center;"><a class="image-modal" href="https://www.ice-dev.com/wp-content/uploads/2018/04/affichage-cookies-pas-aux-normes.jpg" rel="noopener"><br />
<img loading="lazy" decoding="async" class="aligncenter" src="https://www.ice-dev.com/wp-content/uploads/2018/04/affichage-cookies-pas-aux-normes.jpg" alt="Displaying a cookie banner that does not comply with standards" width="300" height="257"><br />
</a><figcaption>Affichage d&#8217;une bannière de cookies non conforme aux normes</figcaption></figure>
<figure style="text-align: center;"><a class="image-modal" href="https://www.ice-dev.com/wp-content/uploads/2018/04/affichage-cookie-aux-normes-300x257.jpg" rel="noopener"><img loading="lazy" decoding="async" class="size-medium wp-image-1159 aligncenter" src="https://www.ice-dev.com/wp-content/uploads/2018/04/affichage-cookie-aux-normes-300x257.jpg" alt="The display of a banner concerning cookies that complies with standards" width="300" height="257" srcset="https://www.ice-dev.com/wp-content/uploads/2018/04/affichage-cookie-aux-normes-300x257.jpg 300w, https://www.ice-dev.com/wp-content/uploads/2018/04/affichage-cookie-aux-normes-768x658.jpg 768w, https://www.ice-dev.com/wp-content/uploads/2018/04/affichage-cookie-aux-normes-1024x878.jpg 1024w, https://www.ice-dev.com/wp-content/uploads/2018/04/affichage-cookie-aux-normes.jpg 1175w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a><figcaption>Displaying a cookie banner that complies with standards</figcaption></figure>
<h3>Forms</h3>
<p>For each item of personal data collected, you must define a clear and precise purpose and set a time limit for storing the data. These objectives and storage limits must be displayed on the site and the terms used must be understandable to children.</p>
<figure style="text-align: center;"><a class="image-modal" href="https://www.ice-dev.com/wp-content/uploads/2018/04/formulaire-d-inscription-ancienne-version-293x300.png" target="_blank" rel="noopener"><br />
<img loading="lazy" decoding="async" width="293" height="300" class="size-medium wp-image-1166 aligncenter" src="https://www.ice-dev.com/wp-content/uploads/2018/04/formulaire-d-inscription-ancienne-version-293x300.png" alt="A contact form that does not comply with the RGPD without the required information and without links to the privacy policy." srcset="https://www.ice-dev.com/wp-content/uploads/2018/04/formulaire-d-inscription-ancienne-version-293x300.png 293w, https://www.ice-dev.com/wp-content/uploads/2018/04/formulaire-d-inscription-ancienne-version-768x786.png 768w, https://www.ice-dev.com/wp-content/uploads/2018/04/formulaire-d-inscription-ancienne-version-1000x1024.png 1000w, https://www.ice-dev.com/wp-content/uploads/2018/04/formulaire-d-inscription-ancienne-version.png 1263w" sizes="auto, (max-width: 293px) 100vw, 293px" /></a><figcaption>The same RGPD-compliant contact form with legal information and access to the privacy policy pages.</figcaption></figure>
<figure style="text-align: center;"><a class="image-modal" href="https://www.ice-dev.com/wp-content/uploads/2018/04/www.w-tech.fr-formulaire-contact-produit-rgpd-compatible.jpg" rel="noopener"><br />
<img decoding="async" class="aligncenter" src="https://www.ice-dev.com/wp-content/uploads/2018/04/www.w-tech.fr-formulaire-contact-produit-rgpd-compatible.jpg" alt="An RGPD-compliant contact form with legal information and access to privacy policy pages"></a><figcaption>The same RGPD-compliant contact form with legal information and access to the privacy policy pages.</figcaption></figure>
<h3>The data protection officer</h3>
<p>The appointment of a data protection officer is compulsory if your organisation :</p>
<ul>
<li>Is a public entity.</li>
<li>Carries out regular and systematic monitoring of individuals on a large scale.</li>
<li>Carries out sensitive processing or processing related to criminal convictions and offences.</li>
</ul>
<p>It is nevertheless advisable to appoint a data protection officer whom your customers or employees can contact at any time to assert their rights.</p>
<p>The Data Protection Officer can be :</p>
<ul>
<li>An employee.</li>
<li>A contractual service provider.</li>
<li>A specialist company.</li>
</ul>
<h2>Your responsibilities and obligations</h2>
<h3>Prioritising your actions</h3>
<p>A company that processes data must be organised to comply with the law. To do this, the organisation must list and prioritise all the data processing actions it undertakes. This list is then made available in the site&#8217;s legal notices.</p>
<h3>List the events that may occur</h3>
<p>Like the fire alert protocol, you must always anticipate the worst. A structure that recovers or processes data must be alert to any potential fault. Listing the events that may occur is one way of putting in place action protocols and dealing with problems quickly and in an organised manner.</p>
<h3>The two mandatory documents in the event of an inspection</h3>
<h3>1. Contract between your company and a subcontractor</h3>
<p>The contract must include mandatory clauses :</p>
<ul>
<li>The purpose of the processing</li>
<li>The nature and purpose of the processing</li>
<li>The type of personal data and the categories of data subjects</li>
<li>The obligations and rights of the data controller</li>
<li>At the end of the service, all data must be deleted or returned to your customer</li>
<li>At the end of the service, it is necessary to destroy all existing copies unless there is a legal obligation to retain them (if the country concerned has made this a law).</li>
</ul>
<h3>2. Traceability register</h3>
<p>The traceability register is mandatory. It must include all information relating to the recovery and processing of data. You must list all the activities in your company that require data to be processed (training, payroll management, canvassing, etc.).<br />
For each data processing activity, you must define :</p>
<ul>
<li>The objective</li>
<li>List the data collected by category</li>
<li>Who has access to the data</li>
<li>How long the data is kept</li>
</ul>
<p><a href="https://www.cnil.fr/sites/default/files/atoms/files/registre-reglement-publie.xlsx">Download the model register proposed by the CNIL.</a></p>
<h2>Processing risky data</h2>
<p>Processing sensitive data is considered to be risky data processing, since it may have a direct impact on the privacy of the individuals concerned.</p>
<h3>Sensitive data</h3>
<p>Data is said to be sensitive when it :</p>
<ul>
<li>relates to sexual orientation</li>
<li>relates to political, religious or trade union membership</li>
<li>concerns biometric or genetic data</li>
<li>reveals racial or ethnic origin</li>
</ul>
<h3>Processing risky data</h3>
<p>Data processing has effects that may be considered risky when the processing :</p>
<ul>
<li>Leads to the rating of a person.</li>
<li>Involves a large-scale database.</li>
<li>Excludes a person from a right, benefit or service.</li>
<li>Enables innovation or the application of new technologies (e.g. connected objects).</li>
<li>Targets vulnerable individuals (e.g. minors).</li>
<li>Implements automated decision-making.</li>
<li>Applies to a personal surveillance service.</li>
<li>Falls within the field of health.</li>
</ul>
<p>These types of processing require you to draw up a document analysing the impact of your data processing.</p>
<h3>Analysing the impact of your data processing</h3>
<p>It is your responsibility to draw up this document, and it is our duty to support you throughout the process and do everything we can to provide you with the necessary information.</p>
<p>This document must include :</p>
<ul>
<li>A description of all the processing operations envisaged and their purposes.</li>
<li>An assessment and ranking of the risks to the rights and freedoms of data subjects.</li>
<li>The measures envisaged to address the risks, by means of security measures and mechanisms designed to ensure the protection of personal data.</li>
</ul>
<h2>Subcontracting</h2>
<h3>Who are the subcontractors?</h3>
<ul>
<li>IT service providers (hosting, maintenance, etc.), software integrators, IT security companies and digital services companies that have access to data.</li>
<li>Marketing or communications agencies that process personal data on behalf of customers.</li>
<li>Any organisation offering a service involving the processing of personal data on behalf of another organisation.</li>
<li>A public body or an association may also receive such a qualification.</li>
</ul>
<h3>The obligations of the subcontractor</h3>
<p>A duty of transparency and traceability:</p>
<ul>
<li>The processing must only be carried out on documented instructions from the data controller</li>
<li>Make available to the data controller all the information necessary to demonstrate compliance with obligations</li>
<li>Create a traceability register of exchanges and actions carried out, in case of control by the authorities.</li>
</ul>
<p>Guarantee compliance with legal requirements :</p>
<ul>
<li>Ensure that persons authorized to process the data are subject to confidentiality standards</li>
<li>Guarantee that only the data processed are necessary with regard to the quantity and extent of their processing and the duration of retention and the number of people who will have access to it.</li>
</ul>
<p>Ensure the security of stored data :</p>
<ul>
<li>Notification to the data controller of any breach is mandatory</li>
<li>Take all necessary measures to ensure a level of security appropriate to the risk</li>
</ul>
<p>A duty of assistance, alert, and advice :</p>
<ul>
<li>Assistance: When an individual wishes to exercise their rights regarding data, the subcontractor must do everything possible to assist the data controller in responding to this request</li>
<li>Alert : If the data controller&#8217;s request constitutes a violation, the subcontractor must immediately inform them</li>
<li>Advice : The duty to assist the data controller in ensuring compliance with obligations regarding the security of processing.</li>
</ul>
<p><a href="https://www.cnil.fr/sites/default/files/atoms/files/rgpd-guide_sous-traitant-cnil.pdf" target="_blank" rel="noopener">Check the subcontractor&#8217;s guide on the CNIL website.</a></p>
<h2>The penalties</h2>
<p>2 types of penalties applicable depending on your turnover, noting that the larger of the two amounts will be applied :</p>
<ul>
<li>In case of failure to comply with the basic principles, the fine can reach 10 million Euros or 2% of your global turnover.</li>
<li>In the case of non-compliance with users&#8217; rights, the fine can reach 20 million Euros or 4% of your global turnover.</li>
</ul>
<h2>Are you ready for the GDPR ?</h2>
<ol>
<li>Have you appointed a person responsible for the governance of your organization&#8217;s data ?<br />
<form class="block-grid align-center">
<div class="large-2"><input id="checkbox1" class="radio" name="checkbox1" type="radio"><label for="checkbox1">Yes</label></div>
<div class="large-2"><input id="checkbox2" class="radio" name="checkbox1" type="radio"><label for="checkbox2">No</label></div>
</form>
</li>
<li>Have you implemented a traceability register of all actions related to data processing ?<br />
<form class="block-grid align-center">
<div class="large-2"><input id="checkbox3" class="radio" name="checkbox2" type="radio"><label for="checkbox3">Yes</label></div>
<div class="large-2"><input id="checkbox4" class="radio" name="checkbox2" type="radio"><label for="checkbox4">No</label></div>
</form>
</li>
<li>If so, have you included in the traceability register a list of the actions taken and prioritized them regarding the processing of your customers&#8217; data ?<br />
<form class="block-grid align-center">
<div class="large-2"><input id="checkbox5" class="radio" name="checkbox5" type="radio"><label for="checkbox5">Yes</label></div>
<div class="large-2"><input id="checkbox6" class="radio" name="checkbox5" type="radio"><label for="checkbox6">No</label></div>
</form>
</li>
<li>Have you written the impact assessment of your data processing in case of &#8220;risky&#8221; data processing ?<br />
<form class="block-grid align-center">
<div class="large-2"><input id="checkbox7" class="radio" name="checkbox7" type="radio"><label for="checkbox7">Yes</label></div>
<div class="large-2"><input id="checkbox8" class="radio" name="checkbox7" type="radio"><label for="checkbox8">No</label></div>
</form>
</li>
<li>If so, have you identified and taken into account all the events that can occur during processing ? (security breaches, changes in the collected data, changes in service providers&#8230;)<br />
<form class="block-grid align-center">
<div class="large-2"><input id="checkbox9" class="radio" name="checkbox9" type="radio"><label for="checkbox9">Yes</label></div>
<div class="large-2"><input id="checkbox10" class="radio" name="checkbox9" type="radio"><label for="checkbox10">No</label></div>
</form>
</li>
<li>If so, have you identified the high risks associated with your data processing?<br />
<form class="block-grid align-center">
<div class="large-2"><input id="checkbox11" class="radio" name="checkbox11" type="radio"><label for="checkbox11">Yes</label></div>
<div class="large-2"><input id="checkbox12" class="radio" name="checkbox11" type="radio"><label for="checkbox12">No</label></div>
</form>
</li>
</ol>
<p>If you haven&#8217;t answered &#8220;yes&#8221; to all the questions</p>
<p><a class="button" href="https://www.ice-dev.com/en/contact/">contact us immediately to prepare your compliance in view of May 25th</a>.</p>
<div id="sconnect-is-installed" style="display: none;">2.5.0.0</div>
<div id="sconnect-is-installed" style="display: none;">2.5.0.0</div>
<p>L’article <a href="https://www.ice-dev.com/en/security/general-data-protection-regulation-are-you-ready/">General Data Protection Regulation, are you ready ?</a> est apparu en premier sur <a href="https://www.ice-dev.com/en/">Ice Development</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
