{"id":33600,"date":"2024-04-04T14:21:48","date_gmt":"2024-04-04T14:21:48","guid":{"rendered":"https:\/\/rcblogfr.wpengine.com\/fr\/fr\/blog\/?p=33600"},"modified":"2024-04-04T14:21:48","modified_gmt":"2024-04-04T14:21:48","slug":"conformite-communications","status":"publish","type":"post","link":"\/fr\/fr\/blog\/conformite-communications\/","title":{"rendered":"L\u2019importance de la conformit\u00e9 en mati\u00e8re de communications"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Avec l\u2019expansion des nouveaux modes de travail hybride, les entreprises sont de plus en plus sujettes aux cyberattaques. En effet, les employ\u00e9s travaillent d\u00e9sormais de chez eux en se connectant via des r\u00e9seaux publics non s\u00e9curis\u00e9s et utilisent parfois leurs propres terminaux qui ne sont pas soumis au m\u00eame degr\u00e9 de vigilance que ceux des entreprises.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">C\u2019est la raison pour laquelle les organisations doivent d\u00e8s \u00e0 pr\u00e9sent compter parmi leurs priorit\u00e9s la protection de leurs communications et de leurs donn\u00e9es, dans le but d\u2019investir dans un syst\u00e8me de s\u00e9curit\u00e9 fiable et efficace.<\/span><\/p>\n<div class=\"rc-post-content-cta rc-post-content-cta_orange\">\n<div class=\"rc-post-content-cta-columns\">\n<div class=\"bottom-cta-img\">\n\t\t\t\t<img decoding=\"async\" width=\"1700\" height=\"1259\" src=\"\/fr\/fr\/blog\/wp-content\/uploads\/2024\/04\/conformite-communications.png\" class=\"responsive-image\" alt=\"\" \/>\t\t\t<\/div>\n<div class=\"bottom-cta-copy\">\n<div class=\"headline-copy\" style=\"text-align:left;\"><span style=\"font-weight: 400;\">L\u2019importance de la conformit\u00e9 : quelles certifications privil\u00e9gier chez son fournisseur ?<\/span><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"rc-post-content-cta-footer\">\n<div class=\"bottom-cta-logo-container\">\n<div class=\"bottom-cta-logo\"><span aria-hidden=\"true\"><svg width=\"154\" height=\"34\" viewBox=\"0 0 154 34\" fill=\"#000\" role=\"img\" aria-labelledby=\"cta-ring-logo-1333351231\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t\t\t<title id=\"cta-ring-logo-1333351231\">Ring Central Logo<\/title>\t\n\t\t\t\t\t\t\t<path d=\"M154 3.89618H150.386V26.9657H154V3.89618Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M141.313 11.6299C137.976 11.6299 135.388 13.2501 134.95 16.5546H138.504C138.754 15.3082 139.675 14.5591 141.313 14.5591C143.214 14.5591 144.086 15.6499 144.086 17.3647V18.1444H140.438C137.078 18.1444 134.593 19.6411 134.593 22.697C134.593 25.7529 136.619 27.3411 139.55 27.3411C141.826 27.3411 143.323 26.3721 144.133 24.8145H144.288V26.9529H147.716V17.4802C147.702 13.8276 145.833 11.6299 141.313 11.6299ZM140.58 24.5675C139.177 24.5675 138.303 23.8809 138.303 22.7339C138.303 21.4233 139.238 20.7383 140.921 20.7383H144.069L144.086 20.9549C144.088 23.2232 142.777 24.5675 140.58 24.5675Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M128.187 26.9657V19.2047C128.187 16.8979 129.623 15.4317 131.896 15.4317H133.321V12.0036H131.854C130.14 12.0036 128.893 12.6581 128.114 14.1243H127.988V12.0036H124.591V26.9753L128.187 26.9657Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M122.295 23.6627V26.9657H119.833C116.371 26.9657 114.47 25.3615 114.47 21.8997V14.9729H112.008V12.0036H114.47V8.03009H118.088V12.002H122.295V14.9713H118.088V21.4794C118.088 22.851 118.898 23.6611 120.269 23.6611H122.295V23.6627Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M100.161 26.9657V18.3C100.161 16.1793 101.472 14.7917 103.589 14.7917C105.615 14.7917 106.831 15.9627 106.831 18.2535V26.9657H110.452V17.6776C110.452 13.9046 108.618 11.6299 104.872 11.6299C102.593 11.6299 100.851 12.6565 100.073 14.0586H99.9444V12.0036H96.5548V26.9753L100.161 26.9657Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M86.8688 24.3814C84.5925 24.3814 83.0638 22.8542 83.0028 20.4528H94.0699L94.0539 19.2833C94.0539 14.2655 90.8119 11.6443 86.8512 11.6443C82.5729 11.6443 79.448 14.7002 79.448 19.4999C79.448 24.2996 82.3483 27.3555 86.8512 27.3555C90.6226 27.3555 93.085 25.3599 93.802 22.4291H90.2986C89.9103 23.5536 88.9559 24.3814 86.8688 24.3814ZM86.8544 14.6377C89.2222 14.6377 90.6258 15.9787 90.7204 17.8492H82.99C83.3317 15.9483 84.4834 14.6377 86.8544 14.6377Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M68.631 27.3732C74.0243 27.3732 77.0802 24.3814 77.7973 19.9395H74.1301C73.5863 21.9655 72.1105 23.836 68.6294 23.836C65.0457 23.836 62.1759 21.3912 62.1759 16.0413C62.1759 10.6914 65.0457 8.2531 68.6294 8.2531C72.2132 8.2531 73.6505 10.1236 74.1301 12.1191H77.7973C77.2037 7.6756 74.1943 4.7865 68.631 4.7865C62.6459 4.7865 58.313 8.96375 58.313 16.0927C58.313 23.2216 62.6459 27.3988 68.631 27.3988V27.3732Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M52.437 12.0036V14.0569H52.2654C51.4553 12.6244 49.7725 11.6282 47.3759 11.6282C43.8676 11.6282 40.7057 14.4034 40.7057 19.2978C40.7057 24.1921 43.8226 26.9978 47.3759 26.9978C49.6827 26.9978 51.043 26.0593 52.0841 24.4712H52.2493V27.625C52.2493 29.3078 51.3141 30.0874 49.7869 30.0874H42.4543V33.3085H49.718C53.7396 33.3085 55.8908 31.0627 55.8908 27.3844V12.0036H52.437ZM48.3689 23.7237C45.9674 23.7237 44.4402 22.2302 44.4402 19.2994C44.4402 16.3685 45.953 14.8719 48.3689 14.8719C50.7061 14.8719 52.2654 16.3653 52.2654 19.2994C52.2654 22.2334 50.7222 23.7237 48.3689 23.7237Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.2125 26.9657V18.3C28.2125 16.1793 29.5231 14.7917 31.6438 14.7917C33.6698 14.7917 34.8858 15.9627 34.8858 18.2535V26.9657H38.5V17.6776C38.5 13.9046 36.6664 11.6299 32.9207 11.6299C30.6444 11.6299 28.8846 12.6565 28.105 14.0586H27.9799V12.0036H24.5967V26.9753L28.2125 26.9657Z\" \/>\n\t\t\t\t\t\t\t<path d=\"M21.5423 12.0036H17.9282V26.9673H21.5423V12.0036Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M11.6302 16.6477V16.5017C13.8424 15.8905 15.339 14.4051 15.339 11.0684C15.339 7.64031 12.782 5.14423 8.04169 5.14423H0V26.9657H3.73931V18.3H8.29354C10.4143 18.3 11.4746 19.3604 11.4746 21.4811V26.9817H15.2139V21.4811C15.2139 18.3946 13.9033 17.1482 11.6302 16.6477ZM7.84117 14.9329H3.73931V8.51618H7.83956C9.86562 8.51618 11.4233 9.35998 11.4233 11.7277C11.4233 14.0955 9.85119 14.9329 7.84117 14.9329Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M19.7329 9.60219C20.2077 9.60219 20.6729 9.46262 21.0676 9.19794C21.4638 8.93485 21.7718 8.55948 21.9531 8.11994C22.1359 7.68039 22.1824 7.19754 22.091 6.73233C21.998 6.26552 21.7702 5.83721 21.4333 5.50194C21.0964 5.16506 20.6697 4.93727 20.2029 4.84423C19.7361 4.75119 19.2532 4.79931 18.8153 4.98219C18.3758 5.16506 18.002 5.47306 17.7373 5.86769C17.4742 6.26231 17.333 6.72752 17.3347 7.20235C17.3298 7.67879 17.4694 8.144 17.7325 8.54023C17.9956 8.93646 18.3726 9.24446 18.8137 9.42412C19.1041 9.54604 19.4169 9.6054 19.7329 9.60219Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M16.9769 0.548269C16.101 0.914019 15.307 1.44981 14.6364 2.12196L16.332 3.81756C16.7764 3.37 17.3041 3.01548 17.8865 2.77325C18.4688 2.53102 19.0928 2.40429 19.7232 2.40269C20.3537 2.40108 20.9777 2.523 21.5616 2.76362C22.1439 3.00264 22.6749 3.35556 23.1225 3.79991L24.8181 2.10431C23.8106 1.1001 22.5289 0.415123 21.1333 0.139206C19.7377 -0.139919 18.2907 0.00285184 16.9769 0.548269Z\" \/>\n\t\t\t\t\t\t<\/svg><\/span><\/div>\n<\/p><\/div>\n<div class=\"bottom-cta-link\">\n\t\t\t\t<a href=\"https:\/\/assets.ringcentral.com\/fr\/whitepaper\/conformite-communications.pdf\" class=\"view-all view-all-brown\" data-dl-name=\"Lire l'ebook\" data-dl-element=\"button\" data-dl-additional-info=\"bottom cta banner\" data-no-auto-dl=\"true\">Lire l'ebook<span class=\"svg-icon\" aria-hidden=\"true\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" fill=\"#000\" role=\"img\" aria-labelledby=\"cta-ring-arrow-1333351231\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<title id=\"cta-ring-arrow-1333351231\">Ring Central Logo<\/title>\t\n\t\t\t\t\t<path d=\"M0 11.5C0 11.2239 0.223858 11 0.5 11H21.6797C21.9559 11 22.1797 11.2239 22.1797 11.5V12.5C22.1797 12.7761 21.9559 13 21.6797 13H0.5C0.223858 13 0 12.7761 0 12.5V11.5Z\" ><\/path>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M21.1718 12.0001L15.8086 6.63691C15.6134 6.44165 15.6134 6.12506 15.8086 5.9298L16.5157 5.22269C16.711 5.02743 17.0276 5.02743 17.2228 5.22269L23.6467 11.6465C23.8419 11.8418 23.8419 12.1584 23.6467 12.3536L17.2228 18.7775C17.0276 18.9727 16.711 18.9727 16.5157 18.7775L15.8086 18.0704C15.6134 17.8751 15.6134 17.5585 15.8086 17.3633L21.1718 12.0001Z\" ><\/path>\n\t\t\t\t<\/svg><\/span><\/a>\n\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<h2 class=\"p2\"><b>L\u2019essor du t\u00e9l\u00e9travail synonyme de risques pour la s\u00e9curit\u00e9 informatique<\/b><\/h2>\n<p class=\"p3\">Certes, le travail hybride pr\u00e9sente de nombreux avantages, tels que le maintien d\u2019un bon \u00e9quilibre entre la vie priv\u00e9e et la vie professionnelle, une meilleure flexibilit\u00e9 pour les employ\u00e9s et une r\u00e9duction des co\u00fbts pour les entreprises. Cependant, ce nouveau mode de travail s\u2019accompagne de risques cons\u00e9quents pour la s\u00e9curit\u00e9 informatique des organisations.<\/p>\n<p class=\"p3\">De fait, l\u2019utilisation par les employ\u00e9s d\u2019outils non autoris\u00e9s par l\u2019entreprise, le recours \u00e0 des r\u00e9seaux non s\u00e9curis\u00e9s et vuln\u00e9rables, une surveillance moins \u00e9troite, ou encore une exposition \u00e0 des piratages par webcam sont plusieurs exemples de risques auxquels les soci\u00e9t\u00e9s sont d\u00e9sormais confront\u00e9es.<\/p>\n<p class=\"p3\">Une question essentielle se pose donc : comment faire face \u00e0 ces nouveaux d\u00e9fis ? Pour pallier les failles de s\u00e9curit\u00e9, des fournisseurs de technologie pr\u00e9sents sur le march\u00e9 proposent aujourd\u2019hui des solutions cloud qui permettent d\u2019am\u00e9liorer la s\u00e9curit\u00e9 informatique des entreprises. N\u00e9anmoins, il est primordial de prendre le temps de s\u2019assurer que ces fournisseurs garantissent un niveau de conformit\u00e9 appropri\u00e9.<\/p>\n<h2 class=\"p2\"><b>L\u2019importance de la conformit\u00e9 pour lutter contre les cyberattaques<\/b><\/h2>\n<p class=\"p3\">Tout d\u2019abord, il convient d\u2019expliquer la signification du terme \u201cconformit\u00e9\u201d. Pr\u00e9cis\u00e9ment, il s\u2019agit du respect de normes et de r\u00e8gles mondiales qui attestent un certain niveau de s\u00e9curit\u00e9 et de confidentialit\u00e9. C\u2019est pour cela que toute entreprise, quelle que soit sa taille, ne doit pas prendre \u00e0 la l\u00e9g\u00e8re le processus de s\u00e9lection de son fournisseur cloud afin de s\u2019assurer qu\u2019il respecte ces r\u00e8gles de conformit\u00e9.<\/p>\n<p class=\"p3\">En fonction des r\u00e9gions du monde o\u00f9 une entreprise intervient ou du type de donn\u00e9es qu\u2019elle traite, certaines normes peuvent \u00eatre particuli\u00e8rement pertinentes. Voici quelques exemples de certificats qui attestent de la maturit\u00e9 des processus et programmes vis-\u00e0-vis des normes mondiales les plus strictes :<\/p>\n<ul class=\"ul1\">\n<li class=\"li3\">la certification ISO 27017 qui est d\u00e9cern\u00e9e aux fournisseurs appliquant des contr\u00f4les s\u00e9v\u00e8res pour s\u00e9curiser l\u2019acc\u00e8s \u00e0 leurs services ;<\/li>\n<li class=\"li3\">l\u2019attestation SOC 2 qui atteste que le fournisseur a \u00e9t\u00e9 soumis \u00e0 un audit strict ax\u00e9 sur les contr\u00f4les de s\u00e9curit\u00e9 et de confidentialit\u00e9 des donn\u00e9es clients ;<\/li>\n<li class=\"li3\">ou encore le r\u00e8glement g\u00e9n\u00e9ral sur la protection des donn\u00e9es (RGPD) qui prouve que le fournisseur s\u2019engage \u00e0 prot\u00e9ger toutes les donn\u00e9es personnelles de ses clients europ\u00e9ens.<\/li>\n<\/ul>\n<p class=\"p3\">La conformit\u00e9 a donc toute son importance, car elle permet de ne pas compromettre votre entreprise dans des activit\u00e9s illicites, de prot\u00e9ger votre activit\u00e9, vos collaborateurs et vos clients, et de susciter la confiance chez ces derniers.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-24976\" src=\"\/fr\/fr\/blog\/wp-content\/uploads\/2024\/04\/certifications.png\" alt=\"Certifications\" width=\"2048\" height=\"1365\" \/><\/p>\n<h2 class=\"p1\"><b>RingCentral, le fournisseur qui fait de votre s\u00e9curit\u00e9 une priorit\u00e9<\/b><\/h2>\n<p class=\"p3\">Si vous souhaitez faire face aux nombreux d\u00e9fis li\u00e9s aux nouveaux modes de travail hybride et am\u00e9liorer votre syst\u00e8me de s\u00e9curit\u00e9, RingCentral est le fournisseur qu\u2019il vous faut. Avec nous, communiquez en toute confiance et assurez la s\u00e9curit\u00e9, la transparence et la confidentialit\u00e9 de vos donn\u00e9es.<\/p>\n<p class=\"p3\">En effet, RingCentral est un partenaire de confiance pour votre solution de communications, car nous poss\u00e9dons les certifications qui attestent de notre respect des normes mondiales de conformit\u00e9 les plus importantes. De plus, nous offrons \u00e0 nos clients une plateforme cloud s\u00e9curis\u00e9e, dot\u00e9e de fonctionnalit\u00e9s de s\u00e9curit\u00e9 avanc\u00e9es et qui assure la protection des donn\u00e9es et informations personnelles. Nos clients restent \u00e9galement op\u00e9rationnels gr\u00e2ce \u00e0 un temps de fonctionnement de 99,999 % garanti par SLA et \u00e0 des connexions Internet redondantes pour rester en ligne m\u00eame en cas de panne, de catastrophe ou d&rsquo;attaque informatique.<\/p>\n<p class=\"p3\">En conclusion, il est donc temps d\u00e8s aujourd\u2019hui d\u2019examiner l\u2019int\u00e9grit\u00e9 de votre fournisseur de communications cloud et de v\u00e9rifier les garanties qu\u2019il vous offre en termes de conformit\u00e9.<\/p>\n<p class=\"p3\">D\u00e9couvrez les <a href=\"https:\/\/www.ringcentral.com\/fr\/fr\/trust-centre\/compliance.html\"><span class=\"s1\">certificats et attestations de conformit\u00e9 d\u00e9tenus par RingCentral<\/span><\/a> qui prot\u00e8ge les donn\u00e9es et communications de ses clients !<\/p>\n<div class=\"rc-post-content-cta rc-post-content-cta_orange\">\n<div class=\"rc-post-content-cta-columns\">\n<div class=\"bottom-cta-img\">\n\t\t\t\t<img decoding=\"async\" width=\"1700\" height=\"1259\" src=\"\/fr\/fr\/blog\/wp-content\/uploads\/2024\/04\/conformite-communications.png\" class=\"responsive-image\" alt=\"\" \/>\t\t\t<\/div>\n<div class=\"bottom-cta-copy\">\n<div class=\"headline-copy\" style=\"text-align:left;\"><span style=\"font-weight: 400;\">Quels certifications attestent un certain niveau de s\u00e9curit\u00e9 et de confidentialit\u00e9 chez votre fournisseur ?<\/span><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"rc-post-content-cta-footer\">\n<div class=\"bottom-cta-logo-container\">\n<div class=\"bottom-cta-logo\"><span aria-hidden=\"true\"><svg width=\"154\" height=\"34\" viewBox=\"0 0 154 34\" fill=\"#000\" role=\"img\" aria-labelledby=\"cta-ring-logo-2023153792\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t\t\t<title id=\"cta-ring-logo-2023153792\">Ring Central Logo<\/title>\t\n\t\t\t\t\t\t\t<path d=\"M154 3.89618H150.386V26.9657H154V3.89618Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M141.313 11.6299C137.976 11.6299 135.388 13.2501 134.95 16.5546H138.504C138.754 15.3082 139.675 14.5591 141.313 14.5591C143.214 14.5591 144.086 15.6499 144.086 17.3647V18.1444H140.438C137.078 18.1444 134.593 19.6411 134.593 22.697C134.593 25.7529 136.619 27.3411 139.55 27.3411C141.826 27.3411 143.323 26.3721 144.133 24.8145H144.288V26.9529H147.716V17.4802C147.702 13.8276 145.833 11.6299 141.313 11.6299ZM140.58 24.5675C139.177 24.5675 138.303 23.8809 138.303 22.7339C138.303 21.4233 139.238 20.7383 140.921 20.7383H144.069L144.086 20.9549C144.088 23.2232 142.777 24.5675 140.58 24.5675Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M128.187 26.9657V19.2047C128.187 16.8979 129.623 15.4317 131.896 15.4317H133.321V12.0036H131.854C130.14 12.0036 128.893 12.6581 128.114 14.1243H127.988V12.0036H124.591V26.9753L128.187 26.9657Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M122.295 23.6627V26.9657H119.833C116.371 26.9657 114.47 25.3615 114.47 21.8997V14.9729H112.008V12.0036H114.47V8.03009H118.088V12.002H122.295V14.9713H118.088V21.4794C118.088 22.851 118.898 23.6611 120.269 23.6611H122.295V23.6627Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M100.161 26.9657V18.3C100.161 16.1793 101.472 14.7917 103.589 14.7917C105.615 14.7917 106.831 15.9627 106.831 18.2535V26.9657H110.452V17.6776C110.452 13.9046 108.618 11.6299 104.872 11.6299C102.593 11.6299 100.851 12.6565 100.073 14.0586H99.9444V12.0036H96.5548V26.9753L100.161 26.9657Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M86.8688 24.3814C84.5925 24.3814 83.0638 22.8542 83.0028 20.4528H94.0699L94.0539 19.2833C94.0539 14.2655 90.8119 11.6443 86.8512 11.6443C82.5729 11.6443 79.448 14.7002 79.448 19.4999C79.448 24.2996 82.3483 27.3555 86.8512 27.3555C90.6226 27.3555 93.085 25.3599 93.802 22.4291H90.2986C89.9103 23.5536 88.9559 24.3814 86.8688 24.3814ZM86.8544 14.6377C89.2222 14.6377 90.6258 15.9787 90.7204 17.8492H82.99C83.3317 15.9483 84.4834 14.6377 86.8544 14.6377Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M68.631 27.3732C74.0243 27.3732 77.0802 24.3814 77.7973 19.9395H74.1301C73.5863 21.9655 72.1105 23.836 68.6294 23.836C65.0457 23.836 62.1759 21.3912 62.1759 16.0413C62.1759 10.6914 65.0457 8.2531 68.6294 8.2531C72.2132 8.2531 73.6505 10.1236 74.1301 12.1191H77.7973C77.2037 7.6756 74.1943 4.7865 68.631 4.7865C62.6459 4.7865 58.313 8.96375 58.313 16.0927C58.313 23.2216 62.6459 27.3988 68.631 27.3988V27.3732Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M52.437 12.0036V14.0569H52.2654C51.4553 12.6244 49.7725 11.6282 47.3759 11.6282C43.8676 11.6282 40.7057 14.4034 40.7057 19.2978C40.7057 24.1921 43.8226 26.9978 47.3759 26.9978C49.6827 26.9978 51.043 26.0593 52.0841 24.4712H52.2493V27.625C52.2493 29.3078 51.3141 30.0874 49.7869 30.0874H42.4543V33.3085H49.718C53.7396 33.3085 55.8908 31.0627 55.8908 27.3844V12.0036H52.437ZM48.3689 23.7237C45.9674 23.7237 44.4402 22.2302 44.4402 19.2994C44.4402 16.3685 45.953 14.8719 48.3689 14.8719C50.7061 14.8719 52.2654 16.3653 52.2654 19.2994C52.2654 22.2334 50.7222 23.7237 48.3689 23.7237Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M28.2125 26.9657V18.3C28.2125 16.1793 29.5231 14.7917 31.6438 14.7917C33.6698 14.7917 34.8858 15.9627 34.8858 18.2535V26.9657H38.5V17.6776C38.5 13.9046 36.6664 11.6299 32.9207 11.6299C30.6444 11.6299 28.8846 12.6565 28.105 14.0586H27.9799V12.0036H24.5967V26.9753L28.2125 26.9657Z\" \/>\n\t\t\t\t\t\t\t<path d=\"M21.5423 12.0036H17.9282V26.9673H21.5423V12.0036Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M11.6302 16.6477V16.5017C13.8424 15.8905 15.339 14.4051 15.339 11.0684C15.339 7.64031 12.782 5.14423 8.04169 5.14423H0V26.9657H3.73931V18.3H8.29354C10.4143 18.3 11.4746 19.3604 11.4746 21.4811V26.9817H15.2139V21.4811C15.2139 18.3946 13.9033 17.1482 11.6302 16.6477ZM7.84117 14.9329H3.73931V8.51618H7.83956C9.86562 8.51618 11.4233 9.35998 11.4233 11.7277C11.4233 14.0955 9.85119 14.9329 7.84117 14.9329Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M19.7329 9.60219C20.2077 9.60219 20.6729 9.46262 21.0676 9.19794C21.4638 8.93485 21.7718 8.55948 21.9531 8.11994C22.1359 7.68039 22.1824 7.19754 22.091 6.73233C21.998 6.26552 21.7702 5.83721 21.4333 5.50194C21.0964 5.16506 20.6697 4.93727 20.2029 4.84423C19.7361 4.75119 19.2532 4.79931 18.8153 4.98219C18.3758 5.16506 18.002 5.47306 17.7373 5.86769C17.4742 6.26231 17.333 6.72752 17.3347 7.20235C17.3298 7.67879 17.4694 8.144 17.7325 8.54023C17.9956 8.93646 18.3726 9.24446 18.8137 9.42412C19.1041 9.54604 19.4169 9.6054 19.7329 9.60219Z\" \/>\n\t\t\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M16.9769 0.548269C16.101 0.914019 15.307 1.44981 14.6364 2.12196L16.332 3.81756C16.7764 3.37 17.3041 3.01548 17.8865 2.77325C18.4688 2.53102 19.0928 2.40429 19.7232 2.40269C20.3537 2.40108 20.9777 2.523 21.5616 2.76362C22.1439 3.00264 22.6749 3.35556 23.1225 3.79991L24.8181 2.10431C23.8106 1.1001 22.5289 0.415123 21.1333 0.139206C19.7377 -0.139919 18.2907 0.00285184 16.9769 0.548269Z\" \/>\n\t\t\t\t\t\t<\/svg><\/span><\/div>\n<\/p><\/div>\n<div class=\"bottom-cta-link\">\n\t\t\t\t<a href=\"https:\/\/assets.ringcentral.com\/fr\/whitepaper\/conformite-communications.pdf\" class=\"view-all view-all-brown\" data-dl-name=\"Lire l'ebook\" data-dl-element=\"button\" data-dl-additional-info=\"bottom cta banner\" data-no-auto-dl=\"true\">Lire l'ebook<span class=\"svg-icon\" aria-hidden=\"true\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" fill=\"#000\" role=\"img\" aria-labelledby=\"cta-ring-arrow-2023153792\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t<title id=\"cta-ring-arrow-2023153792\">Ring Central Logo<\/title>\t\n\t\t\t\t\t<path d=\"M0 11.5C0 11.2239 0.223858 11 0.5 11H21.6797C21.9559 11 22.1797 11.2239 22.1797 11.5V12.5C22.1797 12.7761 21.9559 13 21.6797 13H0.5C0.223858 13 0 12.7761 0 12.5V11.5Z\" ><\/path>\n\t\t\t\t\t<path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M21.1718 12.0001L15.8086 6.63691C15.6134 6.44165 15.6134 6.12506 15.8086 5.9298L16.5157 5.22269C16.711 5.02743 17.0276 5.02743 17.2228 5.22269L23.6467 11.6465C23.8419 11.8418 23.8419 12.1584 23.6467 12.3536L17.2228 18.7775C17.0276 18.9727 16.711 18.9727 16.5157 18.7775L15.8086 18.0704C15.6134 17.8751 15.6134 17.5585 15.8086 17.3633L21.1718 12.0001Z\" ><\/path>\n\t\t\t\t<\/svg><\/span><\/a>\n\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Avec l\u2019expansion des nouveaux modes de travail hybride, les entreprises sont de plus en plus sujettes aux cyberattaques. En effet, les employ\u00e9s travaillent d\u00e9sormais de chez eux en se connectant via des r\u00e9seaux publics non s\u00e9curis\u00e9s et utilisent parfois leurs propres terminaux qui ne sont pas soumis au m\u00eame degr\u00e9 de vigilance que ceux des &#8230;<\/p>\n","protected":false},"author":72,"featured_media":33604,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>L\u2019importance de la conformit\u00e9 en mati\u00e8re de communications | RingCentral FR Blog<\/title>\n<meta name=\"description\" content=\"Comment v\u00e9rifier que votre fournisseur de communications est s\u00e9curis\u00e9 ? D\u00e9couvrez les certifications essentielles pour prot\u00e9ger vos donn\u00e9es.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ringcentral.com\/fr\/fr\/blog\/conformite-communications\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"L\u2019importance de la conformit\u00e9 en mati\u00e8re de communications | RingCentral FR Blog\" \/>\n<meta property=\"og:description\" content=\"Comment v\u00e9rifier que votre fournisseur de communications est s\u00e9curis\u00e9 ? D\u00e9couvrez les certifications essentielles pour prot\u00e9ger vos donn\u00e9es.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ringcentral.com\/fr\/fr\/blog\/conformite-communications\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog RingCentral\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-04T14:21:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ringcentral.com\/fr\/fr\/blog\/wp-content\/uploads\/2024\/04\/conformite-communications-hero.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2121\" \/>\n\t<meta property=\"og:image:height\" content=\"1414\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lucie Saunois\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@RingCentralFR\" \/>\n<meta name=\"twitter:site\" content=\"@RingCentralFR\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lucie Saunois\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"L\u2019importance de la conformit\u00e9 en mati\u00e8re de communications | RingCentral FR Blog","description":"Comment v\u00e9rifier que votre fournisseur de communications est s\u00e9curis\u00e9 ? D\u00e9couvrez les certifications essentielles pour prot\u00e9ger vos donn\u00e9es.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ringcentral.com\/fr\/fr\/blog\/conformite-communications\/","og_locale":"fr_FR","og_type":"article","og_title":"L\u2019importance de la conformit\u00e9 en mati\u00e8re de communications | RingCentral FR Blog","og_description":"Comment v\u00e9rifier que votre fournisseur de communications est s\u00e9curis\u00e9 ? D\u00e9couvrez les certifications essentielles pour prot\u00e9ger vos donn\u00e9es.","og_url":"https:\/\/www.ringcentral.com\/fr\/fr\/blog\/conformite-communications\/","og_site_name":"Blog RingCentral","article_published_time":"2024-04-04T14:21:48+00:00","og_image":[{"width":2121,"height":1414,"url":"https:\/\/www.ringcentral.com\/fr\/fr\/blog\/wp-content\/uploads\/2024\/04\/conformite-communications-hero.jpg","type":"image\/jpeg"}],"author":"Lucie Saunois","twitter_card":"summary_large_image","twitter_creator":"@RingCentralFR","twitter_site":"@RingCentralFR","twitter_misc":{"\u00c9crit par":"Lucie Saunois","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/rcblogfr.wpengine.com\/fr\/fr\/blog\/conformite-communications\/","url":"https:\/\/rcblogfr.wpengine.com\/fr\/fr\/blog\/conformite-communications\/","name":"L\u2019importance de la conformit\u00e9 en mati\u00e8re de communications | RingCentral FR Blog","isPartOf":{"@id":"https:\/\/rcblogfr.wpengine.com\/fr\/fr\/blog\/#website"},"datePublished":"2024-04-04T14:21:48+00:00","dateModified":"2024-04-04T14:21:48+00:00","author":{"@id":"https:\/\/rcblogfr.wpengine.com\/fr\/fr\/blog\/#\/schema\/person\/0e1f922d34e0b223e5fa094b8c77cc49"},"description":"Comment v\u00e9rifier que votre fournisseur de communications est s\u00e9curis\u00e9 ? D\u00e9couvrez les certifications essentielles pour prot\u00e9ger vos donn\u00e9es.","breadcrumb":{"@id":"https:\/\/rcblogfr.wpengine.com\/fr\/fr\/blog\/conformite-communications\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rcblogfr.wpengine.com\/fr\/fr\/blog\/conformite-communications\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/rcblogfr.wpengine.com\/fr\/fr\/blog\/conformite-communications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"RingCentral Blog","item":"https:\/\/rcblogfr.wpengine.com\/fr\/fr\/blog\/"},{"@type":"ListItem","position":2,"name":"Communications Unifi\u00e9es","item":"\/fr\/fr\/blog\/ucaas\/"},{"@type":"ListItem","position":3,"name":"L\u2019importance de la conformit\u00e9 en mati\u00e8re de communications"}]},{"@type":"WebSite","@id":"https:\/\/rcblogfr.wpengine.com\/fr\/fr\/blog\/#website","url":"https:\/\/rcblogfr.wpengine.com\/fr\/fr\/blog\/","name":"Blog RingCentral","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rcblogfr.wpengine.com\/fr\/fr\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/rcblogfr.wpengine.com\/fr\/fr\/blog\/#\/schema\/person\/0e1f922d34e0b223e5fa094b8c77cc49","name":"Lucie Saunois","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/rcblogfr.wpengine.com\/fr\/fr\/blog\/#\/schema\/person\/image\/","url":"\/fr\/fr\/blog\/wp-content\/uploads\/2022\/05\/Lucie-Saunois-96x96.png","contentUrl":"\/fr\/fr\/blog\/wp-content\/uploads\/2022\/05\/Lucie-Saunois-96x96.png","caption":"Lucie Saunois"},"description":"Lucie Saunois est Sr. Audience Manager France chez RingCentral. Sensible aux enjeux de l'exp\u00e9rience client et aux nouveaux modes d'organisation du travail, elle produit des contenus destin\u00e9s \u00e0 accompagner les entreprises dans leur \u00e9volution vers l'excellence.","url":"\/fr\/fr\/blog\/author\/lucie-saunois\/"}]}},"rc_img_url":"\/fr\/fr\/blog\/wp-content\/uploads\/2024\/04\/conformite-communications-hero.jpg","rcblog_by_author":"<a href=\"\/fr\/fr\/blog\/author\/lucie-saunois\/amp\" data-dl-events-click=\"true\" data-dl-element=\"link\"><span class=\"image\"><img src=\"\/fr\/fr\/blog\/wp-content\/uploads\/2022\/05\/Lucie-Saunois-96x96.png\" alt=\"\" width=\"30\" height=\"30\" layout=\"fixed\"><\/img><\/span><span class=\"by-author-name\">Lucie Saunois<\/span><\/a>","rc_author_full_name":"Lucie Saunois","rc_author_avatar":"\/fr\/fr\/blog\/wp-content\/uploads\/2022\/05\/Lucie-Saunois.png","rc_author_link":"\/fr\/fr\/blog\/author\/lucie-saunois\/amp","rc_post_categories":"<a href=\"\/fr\/fr\/blog\/ucaas\/amp\">Communications Unifi\u00e9es<\/a>","amp_link":"\/fr\/fr\/blog\/conformite-communications\/amp","excerpt_title":"L\u2019importance de la conformit\u00e9 en mati\u00e8re de communications","_links":{"self":[{"href":"https:\/\/rcblogfr.wpengine.com\/fr\/fr\/blog\/wp-json\/wp\/v2\/posts\/33600"}],"collection":[{"href":"https:\/\/rcblogfr.wpengine.com\/fr\/fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rcblogfr.wpengine.com\/fr\/fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rcblogfr.wpengine.com\/fr\/fr\/blog\/wp-json\/wp\/v2\/users\/72"}],"replies":[{"embeddable":true,"href":"https:\/\/rcblogfr.wpengine.com\/fr\/fr\/blog\/wp-json\/wp\/v2\/comments?post=33600"}],"version-history":[{"count":0,"href":"https:\/\/rcblogfr.wpengine.com\/fr\/fr\/blog\/wp-json\/wp\/v2\/posts\/33600\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rcblogfr.wpengine.com\/fr\/fr\/blog\/wp-json\/wp\/v2\/media\/33604"}],"wp:attachment":[{"href":"https:\/\/rcblogfr.wpengine.com\/fr\/fr\/blog\/wp-json\/wp\/v2\/media?parent=33600"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rcblogfr.wpengine.com\/fr\/fr\/blog\/wp-json\/wp\/v2\/categories?post=33600"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rcblogfr.wpengine.com\/fr\/fr\/blog\/wp-json\/wp\/v2\/tags?post=33600"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}