[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fS_w2Sc1UYY_70G5QFh_Kiku_wINOlVrWh-z5Fjrg5Ew":3},{"sections":4,"resultAnalysis":890,"id":891,"version":892,"newVersion":22,"label":893,"isPinned":22,"isShared":59,"sharingToken":894,"isRevision":22,"isBlockAnalysisShared":22,"nbReferences":895,"referenceId":9,"nbResponses":11,"parentId":9,"revisionDescription":9,"logoUrl":896,"description":897,"scheduleIntervalDays":9,"versionNumber":30,"dateCreation":898,"dateUpdate":899,"dateArchived":9,"archived":22,"type":900,"typeIndex":48,"typeColor":9,"typeIcon":9,"typeText":901,"creator":902,"objectType":910,"objectTypeIndex":11,"objectTypeColor":57,"objectTypeIcon":911,"objectTypeText":912,"defaultOwners":913,"tags":922,"privacyHubs":9,"nbQuestions":936,"nbQuestionsRequired":937,"nbDatas":11,"deadLineDays":9},[5,247,297,391,455,611,725,778],{"id":6,"slug":7,"label":8,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":13,"questions":14,"sections":246},"9f06b73e-1556-4c3a-9814-8a96922b5b5b","politique-de-conformite-au-rgpd","Politique de conformité au RGPD",null,"Default",0,"SectionType_Default","\u003Cp>Section relative à la politique de conformité au RGPD du sous-traitant.\u003C/p>",[15,60,84,99,116,128,143,157,172,183,199,211,227],{"id":16,"slug":17,"label":18,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":23,"displayConditions":9,"answers":24,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"9f4649a8-0ef3-4828-ad8a-453b8016e08a","les-relations-entre-le-responsable-de-traitement-et-le-sous-traitant-font-elles-lobjet-dun-contrat-","Les relations entre le Responsable de traitement et le sous-traitant font-elles l'objet d'un contrat ?","Radio",7,"Liste de cases à cocher (une seule réponse)",false,[],[25,42],{"id":26,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":34},"67abf9e1-6ab0-4d24-9394-272874170eff","Oui",2,"VeryLow",1,"var(--bs-success)","Négligable","Improbable",[35],{"id":36,"label":37,"userId":9,"color":9,"description":38,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"f70e3126-4748-47d8-ad38-cb1926b9a01d","Ajouter le contrat sur la plateforme","","Medium","#ffc107","Moyen",{"id":43,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":45,"impactIndex":28,"impactColor":46,"impactIcon":9,"impactText":47,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":51},"d96c60d1-9843-486e-9f3f-13211add2ef0","Non","Low","var(--bs-info)","Faible",3,"var(--bs-warning)","Possible",[52],{"id":53,"label":54,"userId":9,"color":9,"description":55,"priority":56,"priorityIndex":30,"priorityColor":57,"priorityIcon":9,"priorityText":58},"623c3975-59b4-46bb-9880-7ea5ecf72005","Demander au sous-traitant un contrat conforme au RGPD","\u003Cp>Le contrat doit comporter les clauses conformes au RGPD précisant la relation et les responsabilités RT/ST\u003C/p>","High","#DC3545","Élevé",true,{"id":61,"slug":62,"label":63,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":64,"displayConditions":65,"answers":73,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"dd2e9c31-71a7-4318-8c3b-1028c30a961e","le-contrat-contient-il-les-clauses-definissant-les-responsabilites-du-sous-traitant-conformes-au-rgpd-","Le contrat contient-il les clauses, définissant les responsabilités du sous-traitant, conformes au RGPD ?",[],{"id":66,"separator":67,"field":9,"operator":68,"value":9,"rules":69},"73d77d35-b81f-4bee-b25b-70ab0fad184b","And","equal",[70],{"id":71,"separator":9,"field":16,"operator":68,"value":26,"rules":72},"810b14a7-2bf6-400a-b590-99365c999e43",[],[74,77],{"id":75,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":76},"ba222d5d-5961-4922-b8d2-fa37e1c22290",[],{"id":78,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":39,"impactIndex":48,"impactColor":49,"impactIcon":9,"impactText":41,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":79},"fddc2c1a-c47b-40fa-9407-15f3379bb518",[80],{"id":81,"label":82,"userId":9,"color":9,"description":83,"priority":56,"priorityIndex":30,"priorityColor":57,"priorityIcon":9,"priorityText":58},"079f5991-23e6-4c36-b6e6-b357ccbf24d8","Demander au sous-traitant de rédiger un avenant","\u003Cp>L'avenant doit comporter les clauses conformes au RGPD précisant la relation et les responsabilités  RT/ST\u003C/p>",{"id":85,"slug":86,"label":87,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":48,"regex":9,"unit":9,"type":88,"typeIndex":89,"typeColor":9,"typeIcon":9,"typeText":90,"dynamicSelectType":9,"editableOptions":22,"complianceRules":91,"displayConditions":92,"answers":98,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"7b7d2310-92e3-4239-a387-995d4254d0a9","merci-de-telecharger-le-contrat-et-ou-lavenant","Merci de télécharger le contrat et/ou l'avenant","Attachments",12,"Pièces jointes (fichiers attachés)",[],{"id":93,"separator":67,"field":9,"operator":68,"value":9,"rules":94},"ae265289-1645-4332-af07-0b566c51c4d0",[95],{"id":96,"separator":9,"field":16,"operator":68,"value":26,"rules":97},"3cc0b508-10cd-4594-bfb4-92300442a28a",[],[],{"id":100,"slug":101,"label":102,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":103,"displayConditions":9,"answers":104,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"387b2181-d74c-4ec2-b0f5-ec268dbf17b9","le-sous-traitant-a-t-il-formalise-une-politique-de-protection-des-donnees-personnelles-","Le sous-traitant a-t-il formalisé  une Politique de Protection des Données Personnelles ?",[],[105,108],{"id":106,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":107},"767f5b49-8876-4bf5-b63c-f2490771c902",[],{"id":109,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":39,"impactIndex":48,"impactColor":49,"impactIcon":9,"impactText":41,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":110},"a35cec2f-826a-4f58-8112-2fbe14d16244",[111],{"id":112,"label":113,"userId":9,"color":9,"description":38,"priority":45,"priorityIndex":48,"priorityColor":114,"priorityIcon":9,"priorityText":115},"043f14a3-2d64-4490-8823-7ade6a1e4990","Inciter le sous-traitant à rédiger sa politique de confidentialité","#1E8EE1","Bas",{"id":117,"slug":118,"label":119,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":88,"typeIndex":89,"typeColor":9,"typeIcon":9,"typeText":90,"dynamicSelectType":9,"editableOptions":22,"complianceRules":120,"displayConditions":121,"answers":127,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"a7f6aeab-db16-41ba-b2fc-8d1721c6a1d7","merci-de-telecharger-la-politique-de-confidentialite","Merci de télécharger la politique de confidentialité",[],{"id":122,"separator":67,"field":9,"operator":68,"value":9,"rules":123},"7b199124-2a3e-479b-be4e-32200d2f275b",[124],{"id":125,"separator":9,"field":100,"operator":68,"value":106,"rules":126},"329f8808-e8ca-46d4-b9a3-4dbcb589e851",[],[],{"id":129,"slug":130,"label":131,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":132,"displayConditions":9,"answers":133,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"d3fa2b62-7887-4f79-ab8a-85c8c6f6f104","le-sous-traitant-a-t-il-designe-un-dpo-","Le sous-traitant a-t-il désigné un DPO ?",[],[134,137],{"id":135,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":136},"46279a7c-6a17-4902-86bf-4a2a4dd92f2e",[],{"id":138,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":39,"impactIndex":48,"impactColor":49,"impactIcon":9,"impactText":41,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":139},"db1bc681-49e9-4113-8e5a-e01f72203ead",[140],{"id":141,"label":142,"userId":9,"color":9,"description":38,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"3002ff0a-6372-49d1-a373-26215c6e8977","Recommander la désignation d'un DPO",{"id":144,"slug":145,"label":146,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":11,"max":9,"regex":9,"unit":9,"type":147,"typeIndex":30,"typeColor":9,"typeIcon":9,"typeText":148,"dynamicSelectType":9,"editableOptions":22,"complianceRules":149,"displayConditions":150,"answers":156,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"614edd6e-c8cf-437f-be82-c770c4e05e35","merci-dindiquer-ses-coordonnees-nom-prenom-telephone-adresse-emaildfgdf","Merci d'indiquer ses coordonnées (Nom, Prénom, téléphone, adresse email)","LongText","Texte long",[],{"id":151,"separator":67,"field":9,"operator":68,"value":9,"rules":152},"546fb1ea-7bff-4cd6-b894-f39867631a18",[153],{"id":154,"separator":9,"field":129,"operator":68,"value":135,"rules":155},"2c267c30-c826-4b55-b1db-b468628608b6",[],[],{"id":158,"slug":159,"label":160,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":161,"displayConditions":9,"answers":162,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"b1eda752-207d-466b-a5c8-fe6f854b7696","le-sous-traitant-a-t-il-nomme-un-responsable-de-la-securite-des-systemes-dinformation-rssi-","Le sous-traitant a-t-il nommé un Responsable de la Sécurité des Systèmes d'information (RSSI) ?",[],[163,166],{"id":164,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":165},"82632490-6ecf-4269-9ceb-7ca6fc52feb0",[],{"id":167,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":39,"impactIndex":48,"impactColor":49,"impactIcon":9,"impactText":41,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":168},"ed9a66e3-958a-4915-8b19-80b0393a3b38",[169],{"id":170,"label":171,"userId":9,"color":9,"description":38,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"cf773347-d298-4f5c-b4d2-cbc5b0614170","Recommander la désignation d'un RSSI",{"id":173,"slug":174,"label":146,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":147,"typeIndex":30,"typeColor":9,"typeIcon":9,"typeText":148,"dynamicSelectType":9,"editableOptions":22,"complianceRules":175,"displayConditions":176,"answers":182,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"dae495b5-6a9a-4530-b6e1-9a971d0e7ea5","merci-dindiquer-ses-coordonnees-nom-prenom-telephone-adresse-email",[],{"id":177,"separator":67,"field":9,"operator":68,"value":9,"rules":178},"5ac26f06-869c-4cfb-8323-b3aa5c796aa2",[179],{"id":180,"separator":9,"field":158,"operator":68,"value":164,"rules":181},"a2cdbe23-db31-4d07-ad23-e59e065599f3",[],[],{"id":184,"slug":185,"label":186,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":187,"displayConditions":9,"answers":188,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"807b7a35-6883-47f6-8a6c-f82679a42e70","le-sous-traitant-tient-il-un-registre-des-traitements-pour-les-prestations-confiees-par-le-responsable-de-traitement-","Le sous-traitant tient-il un registre des traitements pour les prestations confiées par le responsable de traitement ?",[],[189,192],{"id":190,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":191},"53b6b1a3-b695-4277-813a-21eacbff99cb",[],{"id":193,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":39,"impactIndex":48,"impactColor":49,"impactIcon":9,"impactText":41,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":194},"6be4bcf1-8938-48a2-b0a1-d076d080d3f2",[195],{"id":196,"label":197,"userId":9,"color":9,"description":198,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"569d70b5-f727-4c6d-af57-15b0ec6a7323","Exiger que le sous-traitant tienne à jour son registre","\u003Cp>La tenue du registre de traitement est une obligation pour un sous-traitant\u003C/p>",{"id":200,"slug":201,"label":202,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":203,"displayConditions":9,"answers":204,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"c33563dc-8445-4b52-966d-6f52daeff679","le-sous-traitant-a-t-il-deja-procede-a-un-audit-de-conformite-relatif-aux-donnees-personnelles-exploitees-dans-le-cadre-des-prestations-confiees-par-le-responsable-de-traitement-","Le sous-traitant a-t-il déjà procédé à un audit de conformité relatif aux données personnelles exploitées dans le cadre des prestations confiées par le responsable de traitement ?",[],[205,208],{"id":206,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":207},"c0a1e1ca-3f07-4bf3-b7aa-3f2553857831",[],{"id":209,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":39,"impactIndex":48,"impactColor":49,"impactIcon":9,"impactText":41,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":210},"8ff21edd-3700-48a1-9e4d-82241a85db5e",[],{"id":212,"slug":213,"label":214,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":215,"displayConditions":9,"answers":216,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"0500d9f6-5122-4245-8f80-0e91ca9a7bba","une-analyse-de-risque-analyse-dimpact-definie-dans-le-rgpd-a-t-elle-ete-realisee-sur-les-prestations-confiees-du-point-de-vue-de-la-protection-des-dcp-","Une analyse de risque (Analyse d'impact définie dans le RGPD) a-t-elle été réalisée sur les prestations confiées du point de vue de la protection des DCP ?",[],[217,224],{"id":218,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":219},"df794dd2-7aa5-4fd4-912a-c35fdb46648c",[220],{"id":221,"label":222,"userId":9,"color":9,"description":223,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"8086f64a-5861-4f7f-a86c-5ef35f05d824","Demander au sous-traitant les résultats","\u003Cp>En particulier les mesures de sécurité mises en place\u003C/p>",{"id":225,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":39,"impactIndex":48,"impactColor":49,"impactIcon":9,"impactText":41,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":226},"27a44815-8baf-4357-a53a-0a06742bd2f2",[],{"id":228,"slug":229,"label":230,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":231,"displayConditions":9,"answers":232,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"b8dc7940-c297-4188-a2cc-2cf1b42640db","le-sous-traitant-a-t-il-defini-et-formalise-les-procedures-de-protection-des-donnees-exercice-du-droit-des-personnes-violation-de-donnees-privacy-by-design-default-","Le sous-traitant a-t-il défini et formalisé les procédures de protection des données (Exercice du droit des personnes, violation de données, privacy by design / default, ...) ?",[],[233,239],{"id":234,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":235},"81fd91fd-9930-492e-8245-6bdc3987c9ea",[236],{"id":237,"label":238,"userId":9,"color":9,"description":38,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"963a8c1f-6e9e-40de-b5a9-fd9199f8c5d3","Collecter les procédures",{"id":240,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":39,"impactIndex":48,"impactColor":49,"impactIcon":9,"impactText":41,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":241},"92103379-a759-44a1-b63f-959cbfa39729",[242],{"id":243,"label":244,"userId":9,"color":9,"description":245,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"6b6062da-f0b7-4f98-9603-9aeca480336e","Demander au sous-traitants de rédiger ces procédures","\u003Cp>La rédaction de ses procédures va permettre de vérifier comment le sous-traitant va pouvoir répondre à ses obligations en cas de violation de données ou d'exercice des droits\u003C/p>",[],{"id":248,"slug":249,"label":250,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":251,"questions":252,"sections":296},"ee06b7f8-fc04-49c9-a4fc-05d5d33fb3ec","ressources-humaines","Ressources humaines","\u003Cp>Section relative aux mesures liées aux ressources humaines\u003C/p>",[253,269,284],{"id":254,"slug":255,"label":256,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":257,"displayConditions":9,"answers":258,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"c47d9df5-7407-4001-8688-ce24edc9c754","le-sous-traitant-a-t-il-defini-et-mis-en-uvre-un-plan-de-sensibilisation-des-collaborateurs-a-la-reglementation-rgpd-","Le sous-traitant a-t-il défini et mis en œuvre un plan de sensibilisation des collaborateurs à la règlementation RGPD ?",[],[259,262],{"id":260,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":261},"f5a5d42f-dd45-4f45-b2d3-5d53b5d322bb",[],{"id":263,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":39,"impactIndex":48,"impactColor":49,"impactIcon":9,"impactText":41,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":264},"b77bc76e-9833-49ce-a622-337f87bd9372",[265],{"id":266,"label":267,"userId":9,"color":9,"description":268,"priority":56,"priorityIndex":30,"priorityColor":57,"priorityIcon":9,"priorityText":58},"a490df77-c188-414f-8c59-d7d27c80e078","Exiger que le sous-traitant sensibilise ses collaborateurs","\u003Cp>Obligation du sous-traitant\u003C/p>",{"id":270,"slug":271,"label":272,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":273,"displayConditions":9,"answers":274,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"350bb280-02ba-48b3-9cb0-f8b4db0ac0eb","le-sous-traitant-a-t-il-fait-signer-un-engagement-de-confidentialite-eventuellement-dans-le-contrat-de-travail-a-ses-collaborateurs-ayant-acces-aux-donnees-confiees-par-ses-clients-","Le sous-traitant a-t-il fait signer un engagement de confidentialité, éventuellement dans le contrat de travail, à ses collaborateurs ayant accès aux données confiées par ses clients ?",[],[275,278],{"id":276,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":277},"2a6a6289-b958-4d8d-ba9a-2cc792c30c6b",[],{"id":279,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":39,"impactIndex":48,"impactColor":49,"impactIcon":9,"impactText":41,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":280},"d577db8a-c930-4cd5-83d1-3746a03198f5",[281],{"id":282,"label":283,"userId":9,"color":9,"description":38,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"c847deda-e1d2-4ce6-a826-5986d6983848","Exiger la signature d'un engagement de confidentialité",{"id":285,"slug":286,"label":287,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":288,"displayConditions":9,"answers":289,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"752593bc-6c3c-4f0f-83c3-43e0988319ef","le-sous-traitant-a-t-il-mis-en-place-une-charte-dutilisation-des-ressources-informatiques-","Le sous-traitant a-t-il mis en place une charte d'utilisation des ressources informatiques ?",[],[290,293],{"id":291,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":292},"e22a966a-cda9-4090-9042-ed23242a0a58",[],{"id":294,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":39,"impactIndex":48,"impactColor":49,"impactIcon":9,"impactText":41,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":295},"60f0fade-e6e8-4c7c-9846-51d15d40d210",[],[],{"id":298,"slug":299,"label":300,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":301,"questions":302,"sections":390},"f78db345-6876-43b0-becb-a1d7fed07af1","controle-dacces-physique-aux-locaux","Contrôle d'accès physique aux locaux","\u003Cp>Section relative à l'accès aux locaux, aux installations et aux systèmes informatiques du sous-traitant.\u003C/p>",[303,323,358,370],{"id":304,"slug":305,"label":306,"tooltipHtml":307,"descriptionHtml":308,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":309,"displayConditions":9,"answers":310,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"08756d39-8dfa-480e-bae6-8e814f42c6d3","le-sous-traitant-a-t-il-pris-les-mesures-techniques-et-organisationnelles-appropriees-conformes-a-letat-de-lart-permettant-de-controler-lacces-a-ses-locaux-","Le sous-traitant a-t-il pris les mesures techniques et organisationnelles appropriées, conformes à l'état de l'art permettant de contrôler l'accès à ses locaux ?","\u003Cp>\u003Cstrong>\u003Cem>Exemple : \u003C/em>\u003C/strong>\u003Cem>système de contrôle d'accès (lecteur identifiant, carte magnétique, carte à puce), (Remise) de clés, Verrouillage des portes (ouverture électrique des portes, etc.), Personnel de sécurité, vigiles, Installations de surveillance (système d'alarme, vidéo / CCTV), Connexion d'accès au centre de données, Revue régulière des autorisations permanentes d'accès\u003C/em>\u003C/p>","\u003Cp>\u003C/p>",[],[311,314],{"id":312,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":313},"0820a6b8-19ba-40d4-b06b-bec049e056ea",[],{"id":315,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":56,"impactIndex":316,"impactColor":317,"impactIcon":9,"impactText":318,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":319},"68cdc688-d984-4ea8-9416-65e8a40d2068",4,"var(--bs-primary)","Elevé",[320],{"id":321,"label":322,"userId":9,"color":9,"description":38,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"bf24e47d-2d04-44dd-ab56-136a0723df9d","Obliger le sous-traitant à mettre en place des dispositions",{"id":324,"slug":325,"label":326,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":327,"typeIndex":328,"typeColor":9,"typeIcon":9,"typeText":329,"dynamicSelectType":9,"editableOptions":22,"complianceRules":330,"displayConditions":9,"answers":331,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"547753ad-88d7-4cb4-871e-c7e65f00317e","selectionnez-les-mesures-prises-pour-controler-lacces-aux-locaux","Sélectionnez les mesures prises pour contrôler l'accès aux locaux","Checkbox",8,"Liste de cases à cocher (plusieurs réponses possibles)",[],[332,339,346,350,354],{"id":333,"color":9,"rangeValue":9,"label":334,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":45,"impactIndex":28,"impactColor":46,"impactIcon":9,"impactText":47,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":335},"eb80d0bb-a45e-4061-a5a5-5807e30621a8","Portes fermées à toutes les entrées (par exemple, fermetures électroniques ; fermetures physiques ; etc.) ",[336],{"id":337,"label":338,"userId":9,"color":9,"description":38,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"d02137e8-87e9-48f6-b8a8-e65b02bbb46a","Mettre en place un contrôle des accès avec vérouillage",{"id":340,"color":9,"rangeValue":9,"label":341,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":342},"67491518-7985-4c4d-b600-583915788b87","Présence d’un Personnel de sécurité (par exemple, sécurité au bureau d’entrée)",[343],{"id":344,"label":345,"userId":9,"color":9,"description":38,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"2f272b86-4e1b-4a12-9543-69984aadac7e","Mettre en place un système de contrôle des visiteurs",{"id":347,"color":9,"rangeValue":9,"label":348,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":349},"d84d74e2-a8bd-4565-b6eb-60a5bd3286e7","Systèmes de contrôle d’accès (par exemple, sécurité biométrique ; cartes d’accès sécurisées ; etc.)",[],{"id":351,"color":9,"rangeValue":9,"label":352,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":353},"9b8a1244-794c-4122-9156-00750d013b54","Systèmes CCTV (Vidéosurveillance)",[],{"id":355,"color":9,"rangeValue":9,"label":356,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":357},"0d9938f7-48ee-4577-9e58-16c5eddf1c1b","Systèmes d’alarme de sécurité",[],{"id":359,"slug":360,"label":361,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":362,"displayConditions":9,"answers":363,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"e18fe4ed-2a43-4b82-92e5-5ccffd76aa45","le-sous-traitant-a-t-il-pris-les-mesures-techniques-et-organisationnelles-appropriees-conformes-a-letat-de-lart-permettant-de-controler-lacces-aux-installations-ou-les-donnees-a-caractere-personnelles-sont-traitees-notamment-pour-verifier-lautorisation-","Le sous-traitant a-t-il pris les mesures techniques et organisationnelles appropriées, conformes à l'état de l'art permettant de contrôler l'accès aux installations où les données à caractère personnelles sont traitées, notamment pour vérifier l'autorisation ?",[],[364,367],{"id":365,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":366},"8dac5c3d-a23f-4736-962c-b9880989256a",[],{"id":368,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":39,"impactIndex":48,"impactColor":49,"impactIcon":9,"impactText":41,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":369},"5e650d5f-6984-46ff-8d73-083118ac81a9",[],{"id":371,"slug":372,"label":373,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":327,"typeIndex":328,"typeColor":9,"typeIcon":9,"typeText":329,"dynamicSelectType":9,"editableOptions":22,"complianceRules":374,"displayConditions":9,"answers":375,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"b5bf7705-eb7b-4b54-b367-6a8d2cf825a8","selectionnez-les-mesures-prises-pour-controler-lacces-aux-installations-ou-les-donnees-a-caractere-personnelles-sont-traitees-notamment-pour-verifier-lautorisation","Sélectionnez les mesures prises pour contrôler l'accès aux installations où les données à caractère personnelles sont traitées, notamment pour vérifier l'autorisation",[],[376,379,383,386],{"id":377,"color":9,"rangeValue":9,"label":334,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":378},"d4b0f3d5-efa6-4970-bb38-31459582f4d8",[],{"id":380,"color":9,"rangeValue":9,"label":381,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":382},"a518e92f-a0a2-408a-90c8-a30eb05de63b","Systèmes de contrôle d’accès (par exemple : cartes d’accès sécurisées ; digicode ; cahier d'enregistrement des intervenants ; etc.)",[],{"id":384,"color":9,"rangeValue":9,"label":352,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":385},"2d20a236-9baf-44bf-81e4-af762befee11",[],{"id":387,"color":9,"rangeValue":9,"label":388,"slug":9,"description":9,"score":28,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":389},"f6f60aba-305b-4713-bff5-57b3f7cf5365","Présence systématique d'un membre de la direction informatique lors d'une intervention dans les locaux informatiques",[],[],{"id":392,"slug":393,"label":394,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":395,"questions":396,"sections":454},"ddd36f02-a417-4ec3-b1a9-dd730f7300f3","controle-dacces-logique","Contrôle d'accès logique aux systèmes informatique","\u003Cp>Section relative à la sécurité logique des systèmes informatiques\u003C/p>",[397,412],{"id":398,"slug":399,"label":400,"tooltipHtml":401,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":402,"displayConditions":9,"answers":403,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"8825bafe-3622-4a62-99fe-d1c3376ca78e","le-sous-traitant-a-t-il-pris-les-mesures-techniques-et-organisationnelles-didentification-et-dauthentification-de-lutilisateur-pour-limiter-lacces-aux-systemes-informatiques-aux-seules-personnes-concernees-par-lexploitation-des-donnees-personnelles-pour-la-prestation-confiee-","Le sous-traitant a-t-il pris les mesures techniques et organisationnelles d'identification et d'authentification de l'utilisateur pour limiter l'accès aux systèmes informatiques aux seules personnes concernées par l'exploitation  des données personnelles pour la prestation confiée ?","\u003Cp>\u003Cstrong>\u003Cem>Exemples : \u003C/em>\u003C/strong>\u003Cem>procédures de mot de passe (y compris les caractères spéciaux, la longueur minimale, le changement régulier de mot de passe), blocage automatique (par ex. mot de passe ou arrêt), création d'un dossier maître par utilisateur, cryptage des supports de données\u003C/em>\u003C/p>",[],[404,407],{"id":405,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":406},"d99eae5b-f0ae-4807-baf0-5025bff850b2",[],{"id":408,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":56,"impactIndex":316,"impactColor":317,"impactIcon":9,"impactText":318,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":409},"b56d586f-be02-41ee-ba30-29e37038b4f9",[410],{"id":411,"label":322,"userId":9,"color":9,"description":38,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"cfde12b9-d6d4-4796-b28f-bf9501136e19",{"id":413,"slug":414,"label":415,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":327,"typeIndex":328,"typeColor":9,"typeIcon":9,"typeText":329,"dynamicSelectType":9,"editableOptions":22,"complianceRules":416,"displayConditions":9,"answers":417,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"d45c72e7-3264-478d-899e-3764d48265a1","selectionnez-les-mesures-didentification-et-dauthentification","Sélectionnez les mesures d'identification et d'authentification",[],[418,422,426,430,434,438,442,446,450],{"id":419,"color":9,"rangeValue":9,"label":420,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":421},"e91fba4e-f4d6-47e4-883d-44b4f6819c02","Systèmes de sécurité informatique exigeant que les utilisateurs individuels se connectent avec un nom d’utilisateur unique",[],{"id":423,"color":9,"rangeValue":9,"label":424,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":425},"61cfa531-47ec-4cc6-9832-e565c241c22f","Systèmes de sécurité informatique exigeant l’utilisation de mots de passe contraignants (Par exemple : minimum 8 caractères avec utilisation de 3 des 4 types de caractères)",[],{"id":427,"color":9,"rangeValue":9,"label":428,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":429},"89931fec-eb95-4576-b146-7cb20d4fa63b","Systèmes de sécurité informatique exigeant l’utilisation de l’authentification multifactorielle",[],{"id":431,"color":9,"rangeValue":9,"label":432,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":433},"ef3f1356-e61a-4013-98cb-af8d19eda022","Changement de mot de passe obligatoire à intervalle fixe (par exemple, tous les six (6) mois)",[],{"id":435,"color":9,"rangeValue":9,"label":436,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":437},"799575fe-311f-4fb3-ae0e-a26933fe156d","Verrouillage automatique des terminaux et appareils informatiques après une période de non-utilisation, avec un mot de passe requis pour « rallumer » le terminal ou l’appareil ",[],{"id":439,"color":9,"rangeValue":9,"label":440,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":441},"20dd76f2-0ae2-4c59-a49d-0e1f8a2e8123","Puissant chiffrement/hachage des bases de données de mots de passe (Par exemple : Utilisation de Keepass sur tous les postes)",[],{"id":443,"color":9,"rangeValue":9,"label":444,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":445},"453f9ccb-b359-4229-a276-136321733559","Utilisation de mots de passe très contraignants pour les comptes à privilège (Par exemple : Minimum de 12 caractères avec utilisation de 3 des 4 types de caractères)",[],{"id":447,"color":9,"rangeValue":9,"label":448,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":449},"b67f40f0-dfc9-4e2e-9c40-fce512c27a4f","Mise en place de profils utilisateurs avec principe du moindre privilège gérés dans l'Active Directory",[],{"id":451,"color":9,"rangeValue":9,"label":452,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":453},"1b0c7e98-ea25-44d5-a42d-aee02bc154f2","Gestion des droits et des profils dans les logiciels externes",[],[],{"id":456,"slug":457,"label":458,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":459,"questions":460,"sections":610},"ba5a8366-77f4-42a0-8846-0bc6eb6ba456","hebergement-et-stockage-des-donnees-personnelles","Hébergement et stockage des données personnelles","\u003Cp>Section relative à l'hébergement et le stockage par le sous-traitant des données personnelles.\u003C/p>",[461,475,487,505,521,533,547,565,592],{"id":462,"slug":463,"label":464,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":465,"displayConditions":9,"answers":466,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"37e7a7bd-c05d-4aeb-a772-ddea327d59a6","ou-sont-hebergees-les-donnees-confiees-par-le-responsable-de-traitement-","Où sont hébergées les données confiées par le responsable de traitement ?",[],[467,471],{"id":468,"color":9,"rangeValue":9,"label":469,"slug":9,"description":9,"score":9,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":470},"3ad18ddd-3110-4a32-acca-3c3fc3efed1b","Sur des serveurs internes",[],{"id":472,"color":9,"rangeValue":9,"label":473,"slug":9,"description":9,"score":9,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":474},"dcf84fa8-40bb-4fa2-8323-16d37c931475","Chez un hébergeur",[],{"id":476,"slug":477,"label":478,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":147,"typeIndex":30,"typeColor":9,"typeIcon":9,"typeText":148,"dynamicSelectType":9,"editableOptions":22,"complianceRules":479,"displayConditions":480,"answers":486,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"2e39cca7-4a41-4099-8db4-9104323c3312","identifiez-les-hebergeurs-chez-qui-les-donnees-confiees-par-le-responsable-de-traitement-sont-stockees","Identifiez le(s) hébergeur(s) chez qui les données confiées par le responsable de traitement sont stockées",[],{"id":481,"separator":67,"field":9,"operator":68,"value":9,"rules":482},"87fda68d-4db6-411f-a6f8-36d43136161f",[483],{"id":484,"separator":9,"field":462,"operator":68,"value":472,"rules":485},"d93a0795-df35-40ff-8cb2-d9870942390b",[],[],{"id":488,"slug":489,"label":490,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":491,"displayConditions":492,"answers":498,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"d2cf80e5-4745-4682-9403-35ceaad84e41","les-hebergeurs-sont-ils-iso-27001-","Le(s) hébergeur(s) sont-ils certifié(s) ISO 27001 ?",[],{"id":493,"separator":67,"field":9,"operator":68,"value":9,"rules":494},"05a92d45-4b29-46fa-97a4-3084b1748598",[495],{"id":496,"separator":9,"field":462,"operator":68,"value":472,"rules":497},"0e775213-fc21-41d4-888f-5f8a107c3e8d",[],[499,502],{"id":500,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":501},"981e6ffb-34f4-411a-b6c0-55b548d28f73",[],{"id":503,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":39,"impactIndex":48,"impactColor":49,"impactIcon":9,"impactText":41,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":504},"899821fa-b199-455f-94c5-a0095a3df4cc",[],{"id":506,"slug":507,"label":508,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":509,"displayConditions":9,"answers":510,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"7dda791a-60f6-443b-ab9c-98d33259a93b","le-sous-traitant-est-il-iso-27001-","Le sous-traitant est il certifié ISO 27001 ?",[],[511,514,517],{"id":512,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":513},"0d3ddfb5-846d-4376-a501-f69897a9f9ae",[],{"id":515,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":39,"impactIndex":48,"impactColor":49,"impactIcon":9,"impactText":41,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":516},"99c2ef29-68d9-472b-9a7e-d6811336884c",[],{"id":518,"color":9,"rangeValue":9,"label":519,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":520},"75fecf41-c2c5-44c7-b280-ca3d64a23466","En cours",[],{"id":522,"slug":523,"label":524,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":525,"displayConditions":9,"answers":526,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"88199549-2993-47a1-8d69-4d73ab2b8b5b","le-sous-traitant-a-t-il-defini-et-mis-en-place-une-politique-interne-de-conservation-des-donnees-conforme-aux-exigences-du-rgpd-","Le sous-traitant a-t-il  défini et mis en place une politique interne de conservation des données conforme aux exigences du RGPD ?",[],[527,530],{"id":528,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":529},"700420e0-4871-45c6-81fc-cbd47bb51c3e",[],{"id":531,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":532},"5e6ac164-fd76-4814-9633-43d8c5a44984",[],{"id":534,"slug":535,"label":536,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":537,"displayConditions":9,"answers":538,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"0776d7ee-d54e-4875-9cde-916e32990e39","le-sous-traitant-procede-t-il-a-la-suppression-ou-a-la-restitution-des-donnees-a-caractere-personnel-conformement-aux-instructions-documentees-recues-du-client-","Le sous-traitant procède-t-il à la suppression ou à la restitution des données à caractère personnel conformément aux instructions documentées reçues du Client  ?",[],[539,542],{"id":540,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":541},"e11706f3-c1a4-48e0-bb74-ca8f91e97d09",[],{"id":543,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":56,"impactIndex":316,"impactColor":317,"impactIcon":9,"impactText":318,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":544},"5b6a5c71-474a-4aae-bdcb-4c2645c7bddd",[545],{"id":546,"label":322,"userId":9,"color":9,"description":38,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"83d42b47-8ba2-459c-8a00-667c7dff3b27",{"id":548,"slug":549,"label":550,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":551,"displayConditions":9,"answers":552,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"47d082ca-efeb-4928-8ac0-c156b25ffeff","sauf-autorisation-expresse-prevue-au-contrat-les-donnees-confiees-pour-traitement-par-le-client-au-sous-traitant-sont-elles-hebergees-et-exploitees-au-sein-de-lue-ou-dans-un-pays-adequat-","Sauf autorisation expresse prévue au contrat, les données confiées pour traitement par le Client au sous-traitant sont-elles hébergées et exploitées au sein de l'UE/EEE ou dans un pays adéquat ?",[],[553,559],{"id":554,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":555},"98190edd-4822-4473-a28f-20a022c4a37f",[556],{"id":557,"label":558,"userId":9,"color":9,"description":38,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"6147397c-3d4e-4fdd-8de4-3341d7dd1015","Identifier ll'hébergeur",{"id":560,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":56,"impactIndex":316,"impactColor":317,"impactIcon":9,"impactText":318,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":561},"21dae29a-f798-4411-a475-f1e4cc46ad31",[562],{"id":563,"label":564,"userId":9,"color":9,"description":38,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"7561ef84-4f02-4590-accf-0f312b15cabf","Interdire le transfert hors UE",{"id":566,"slug":567,"label":568,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":569,"displayConditions":570,"answers":576,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"4d49bd6a-99cd-4220-8c99-c7b62cf1fb3b","comment-sont-encadres-les-transferts-de-donnees-hors-ue-ou-vers-un-pays-non-adequat-","Comment sont encadrés les transferts de données hors UE/EEE ou vers un pays non adéquat ?",[],{"id":571,"separator":67,"field":9,"operator":68,"value":9,"rules":572},"bf7e583f-8742-4301-a3fa-5c6dbb232a67",[573],{"id":574,"separator":9,"field":548,"operator":68,"value":560,"rules":575},"e62de3ed-8f13-487d-ab5a-e306124ece24",[],[577,581,585],{"id":578,"color":9,"rangeValue":9,"label":579,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":580},"2761d035-1108-41f2-9bc6-da1abef274df","Des clauses contractuelles type (CCT)",[],{"id":582,"color":9,"rangeValue":9,"label":583,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":584},"0ab31604-91e5-494c-bef5-2fd6adaa115b","Des règles d'entreprise contraignantes (BCR) ",[],{"id":586,"color":9,"rangeValue":9,"label":587,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":39,"impactIndex":48,"impactColor":49,"impactIcon":9,"impactText":41,"probability":56,"probabilityIndex":316,"probabilityColor":317,"probabilityIcon":9,"probabilityText":588,"taskSuggestions":589},"ed2ce034-2d5f-49f7-b78a-12c738f0e42e","Aucun encadrement","Probable",[590],{"id":591,"label":322,"userId":9,"color":9,"description":38,"priority":56,"priorityIndex":30,"priorityColor":57,"priorityIcon":9,"priorityText":58},"4431d647-fb3b-4767-8f2c-dd1c38f0bf3a",{"id":593,"slug":594,"label":595,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":327,"typeIndex":328,"typeColor":9,"typeIcon":9,"typeText":329,"dynamicSelectType":9,"editableOptions":22,"complianceRules":596,"displayConditions":9,"answers":597,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"0c2e0241-338f-464b-a9e4-98233b377243","quelles-sont-les-mesures-de-protection-des-infrastructures-informatiques-","Quelles sont les mesures de protection des infrastructures informatiques ?",[],[598,602,606],{"id":599,"color":9,"rangeValue":9,"label":600,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":601},"4fae62fd-35b7-4189-9294-4397e4dce333","Équipements réseaux redondés",[],{"id":603,"color":9,"rangeValue":9,"label":604,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":605},"3dbd5631-78bd-4a50-98d8-83013c9eba01","Pare-feu redondés",[],{"id":607,"color":9,"rangeValue":9,"label":608,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":609},"e2776a59-4527-4b48-afae-93eff8a6a0fb","SOC externalisé",[],[],{"id":612,"slug":613,"label":614,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":615,"questions":616,"sections":724},"0c069194-24a5-4d5d-894f-d4a92e4aa1e0","securite-des-donnees","Sécurité des données","\u003Cp>Section relative à la sécurité des données\u003C/p>",[617,633,652,686,700,712],{"id":618,"slug":619,"label":620,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":621,"displayConditions":9,"answers":622,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"cd985b6a-590d-4fb0-95ad-9245d8241f78","le-sous-traitant-a-t-il-mis-en-place-une-procedure-de-gestion-des-incidents-de-securite-","Le sous-traitant a-t-il mis en place une procédure de gestion des incidents de sécurité ?",[],[623,628],{"id":624,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":625},"d2876c52-d9b5-44b7-8dab-7ee030f81913",[626],{"id":627,"label":238,"userId":9,"color":9,"description":38,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"61e71d47-ee89-44c6-b75a-aa7bc733b5f1",{"id":629,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":56,"impactIndex":316,"impactColor":317,"impactIcon":9,"impactText":318,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":630},"11a4ddf3-99dc-4d93-a9f8-ea68c583c239",[631],{"id":632,"label":322,"userId":9,"color":9,"description":38,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"1a017c48-3802-4499-81aa-8b2ce2fb7533",{"id":634,"slug":635,"label":636,"tooltipHtml":637,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":638,"displayConditions":9,"answers":639,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"60de4d78-3b2d-4cf5-8050-2117fff26a07","le-sous-traitant-prend-il-des-mesures-pour-empecher-la-perte-lalteration-ou-la-divulgation-non-autorisee-lors-du-transfert-electronique-du-transport-de-donnees-du-controle-de-transmission-de-communication-ou-de-stockage-des-donnees-sur-les-supports-de-donnees-manuels-ou-electroniques-etc-et-ainsi-maitriser-les-risques-de-divulgation-non-autorises-","Le sous-traitant prend-il des mesures pour empêcher la perte, l'altération ou la divulgation non autorisée lors du transfert électronique, du transport de données, du contrôle de transmission, de communication ou de stockage des données sur les supports de données (manuels ou électroniques), etc, et ainsi maîtriser les risques de divulgation non autorisés ?","\u003Cp>\u003Cstrong>\u003Cem>Exemples :\u003C/em>\u003C/strong>\u003Cem> Chiffrement /canalisation (VPN=Virtual Private Network), Signature électronique, Connexion, Sécurité du transport\u003C/em>\u003C/p>",[],[640,646],{"id":641,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":642},"2f5785d9-3207-4a86-9c74-0112600a1418",[643],{"id":644,"label":645,"userId":9,"color":9,"description":38,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"957d85cb-3130-4003-b329-c3d19c4d449c","Collecte des mesures de sécurité",{"id":647,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":56,"impactIndex":316,"impactColor":317,"impactIcon":9,"impactText":318,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":648},"86cb4b42-f39c-4a31-a519-b218c74869fb",[649],{"id":650,"label":651,"userId":9,"color":9,"description":38,"priority":56,"priorityIndex":30,"priorityColor":57,"priorityIcon":9,"priorityText":58},"03e458e6-2100-408a-9a0f-6ca88ab799c2"," Imposer une description des mesires de sécurité prises par le sous-traitant",{"id":653,"slug":654,"label":655,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":327,"typeIndex":328,"typeColor":9,"typeIcon":9,"typeText":329,"dynamicSelectType":9,"editableOptions":22,"complianceRules":656,"displayConditions":9,"answers":657,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"2429ae8f-6baf-4b43-aeaa-a5509e864725","decrire-les-mesures-en-place","Décrire les mesures en place",[],[658,662,666,670,674,678,682],{"id":659,"color":9,"rangeValue":9,"label":660,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":661},"895fa868-86ba-49c2-bb87-5ab3e172c832","Mise en place de systèmes d’évaluation des vulnérabilités, de technologies de protection contre les menaces, de gestion des mises à jour, et de procédures de surveillance conçues pour identifier, évaluer, atténuer et protéger contre les menaces identifiées sur la sécurité, les virus et autres codes malveillants",[],{"id":663,"color":9,"rangeValue":9,"label":664,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":665},"9c97c589-b27e-4dfd-8d37-995693fe6878","Chiffrement des flux (SSL/TLS)",[],{"id":667,"color":9,"rangeValue":9,"label":668,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":669},"15466a73-f595-4330-a820-7c3205e8b35b","Chiffrement des postes de travail (Par exemple avec Bitlocker)",[],{"id":671,"color":9,"rangeValue":9,"label":672,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":673},"8b52bdcc-9052-46c2-999d-7b580cce981e","Chiffrement des supports amovibles (Par exemple avec Bitlocker)",[],{"id":675,"color":9,"rangeValue":9,"label":676,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":677},"5df812f8-b698-4d11-af60-5e6898cc063c","Chiffrement possible des contenus mails (Par exemple avec 7-Zip)",[],{"id":679,"color":9,"rangeValue":9,"label":680,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":681},"9addc457-adee-4bc3-b0be-cc9911d29c24","Limitation des échanges par messagerie au profit d'espaces sécurisés (Par exemple OODrive, Sharepoint )",[],{"id":683,"color":9,"rangeValue":9,"label":684,"slug":9,"description":9,"score":9,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":9,"probability":9,"taskSuggestions":685},"00ecaa8c-10cd-48ba-8dad-9c32ff3e3b09","Réseau de données sécurisé (Par exemple VPN)",[],{"id":687,"slug":688,"label":689,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":690,"displayConditions":9,"answers":691,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"4d36f988-b8bd-413f-8b73-cfc7e4b1fdad","le-sous-traitant-fait-il-une-evaluation-reguliere-des-mesures-techniques-et-organisationnelles-destinees-a-controler-lacces-aux-donnees-a-caractere-personnelles-par-exemple-test-de-penetration-","Le sous-traitant fait-il une évaluation régulière des mesures techniques et organisationnelles destinées à contrôler l'accès aux données à caractère personnelles (par exemple test de pénétration) ?",[],[692,695],{"id":693,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":694},"f3d3e07e-8a51-4d95-8460-7ef348ae5cea",[],{"id":696,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":39,"impactIndex":48,"impactColor":49,"impactIcon":9,"impactText":41,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":697},"64c23fc7-9ede-474e-b070-4e1da5411794",[698],{"id":699,"label":322,"userId":9,"color":9,"description":38,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"163a5225-56ba-4245-b9f3-23b2cc817500",{"id":701,"slug":702,"label":703,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":704,"displayConditions":9,"answers":705,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"2eb80fea-0a4a-429a-88ce-5e7af7259bc2","le-sous-traitant-a-t-il-un-plan-de-continuite-dactivite-pca-avec-replication-des-donnees-sur-un-site-de-secours-","Le sous-traitant a-t-il un plan de continuité d'activité (PCA) avec réplication des données sur un site de secours ?",[],[706,709],{"id":707,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":708},"677f23dc-985a-4cdf-89ef-4b0e83f00173",[],{"id":710,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":39,"impactIndex":48,"impactColor":49,"impactIcon":9,"impactText":41,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":711},"6b438fc6-720c-4dcf-b99f-2e5e8ce8e8b3",[],{"id":713,"slug":714,"label":715,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":716,"displayConditions":9,"answers":717,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"69ef92b2-468d-4c97-8780-e9e3b1228cb5","le-sous-traitant-a-t-il-mis-en-place-un-plan-de-sauvegarde-","Le sous-traitant a-t-il mis en place un plan de sauvegarde ?",[],[718,721],{"id":719,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":720},"96db6a90-5b6c-4376-bb20-993fefd302e0",[],{"id":722,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":39,"impactIndex":48,"impactColor":49,"impactIcon":9,"impactText":41,"probability":56,"probabilityIndex":316,"probabilityColor":317,"probabilityIcon":9,"probabilityText":588,"taskSuggestions":723},"085b7dd3-0ccd-42c9-b05a-252ad802e012",[],[],{"id":726,"slug":727,"label":728,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":729,"questions":730,"sections":777},"a0876b61-e4cc-40c4-9ff6-522361dd1c55","conformite-de-mise-en-oeuvre-des-activites-de-traitement","Conformité de mise en oeuvre des activités de traitement","\u003Cp>Section relative à la conformité de mise en oeuvre des activités de traitement du sous-traitant.\u003C/p>",[731,745,759],{"id":732,"slug":733,"label":734,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":735,"displayConditions":9,"answers":736,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"df63318d-25fa-492c-a9e6-37c0569798fb","le-sous-traitant-a-t-il-mis-en-place-des-mesures-de-verification-ulterieure-de-la-saisie-de-la-modification-ou-de-la-suppression-des-donnees-et-de-la-personne-y-ayant-procede-journalisation-des-acces-et-des-reporting-","Le sous-traitant a-t-il mis en place des mesures de vérification ultérieure de la saisie, de la modification ou de la suppression des données, et de la personne y ayant procédé (journalisation des accès et des reporting) ?",[],[737,740],{"id":738,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":739},"cd0bbc1c-a981-4a5f-838a-a1ffdbf74b9d",[],{"id":741,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":56,"impactIndex":316,"impactColor":317,"impactIcon":9,"impactText":318,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":742},"48f27438-5c98-4600-94c2-e1201875b6c7",[743],{"id":744,"label":322,"userId":9,"color":9,"description":38,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"1e0eb885-8bb1-4164-b8a8-261ff0a7126a",{"id":746,"slug":747,"label":748,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":749,"displayConditions":9,"answers":750,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"f11429b6-d223-4d90-af00-5162e2b03c2a","le-sous-traitant-informe-t-il-regulierement-son-client-de-la-bonne-execution-du-contrat-pour-les-prestations-qui-lui-sont-confiees-conformite-aux-instructions-documentees-","Le sous-traitant informe-t-il régulièrement son Client de la bonne exécution du Contrat pour les prestations qui lui sont confiées (conformité aux instructions documentées) ?",[],[751,754],{"id":752,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":753},"2d2f8fe8-563c-45b1-b2c4-f616bb95dba6",[],{"id":755,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":39,"impactIndex":48,"impactColor":49,"impactIcon":9,"impactText":41,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":756},"5a107061-fed5-469d-bac1-1477ad3bef05",[757],{"id":758,"label":322,"userId":9,"color":9,"description":38,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"507f00f5-ccb8-4f86-8625-f0229fe57199",{"id":760,"slug":761,"label":762,"tooltipHtml":763,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":764,"displayConditions":9,"answers":765,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"121a3d3e-e121-496c-908c-f5414c3bb29f","le-sous-traitant-respecte-t-il-les-principes-disolation-des-traitements-pour-des-finalites-differentes-et-a-mis-en-place-les-dispositions-appropriees-","Le sous-traitant respecte-t-il les principes d'isolation des traitements pour des finalités différentes et a mis en place les dispositions appropriées ?","\u003Cp>\u003Cstrong>\u003Cem>Exemple :\u003C/em>\u003C/strong>\u003Cem> bacs à sable pour les activités de développement, séparation des activités dans l'organisation des droits, ...\u003C/em>\u003C/p>",[],[766,772],{"id":767,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":768},"38ce39cf-01db-4772-9883-390109721ccc",[769],{"id":770,"label":771,"userId":9,"color":9,"description":38,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"cc802fd7-6937-415f-a475-21a65dbee988","Collecter les dispositions mises en place",{"id":773,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":56,"impactIndex":316,"impactColor":317,"impactIcon":9,"impactText":318,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":774},"c39357c7-69f2-4489-943b-d132e905188c",[775],{"id":776,"label":322,"userId":9,"color":9,"description":38,"priority":56,"priorityIndex":30,"priorityColor":57,"priorityIcon":9,"priorityText":58},"280c83b1-059c-4e2e-ae35-0b8a31dcfff7",[],{"id":779,"slug":780,"label":781,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":782,"questions":783,"sections":889},"011ed9eb-4620-4e69-ba5f-28bc997c51eb","sous-traitance-ulterieure","Sous-traitance ultérieure","\u003Cp>Section relative à la sous-traitance ultérieure du sous-traitant.\u003C/p>",[784,799,821,841,861,875],{"id":785,"slug":786,"label":787,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":788,"displayConditions":9,"answers":789,"listQuestions":9,"required":59,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"32b41ddf-19b5-4728-8b5a-a0eb8282d2e4","le-recours-a-la-sous-traitance-ulterieure-fait-elle-partie-du-contrat-avec-le-sous-traitant-","Le recours à la sous-traitance ultérieure fait-elle partie du contrat avec le sous-traitant ?",[],[790,793],{"id":791,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":9,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":792},"d069c0c3-bce1-42df-84ad-6d4de941b0b6",[],{"id":794,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":56,"impactIndex":316,"impactColor":317,"impactIcon":9,"impactText":318,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":795},"113ec8b8-79d0-47d3-9fec-59f17969c8b4",[796],{"id":797,"label":798,"userId":9,"color":9,"description":38,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"1cced602-fc49-483d-8006-1e8e757ae2ee","Interdire le recours à une sous-traitance ultérieure",{"id":800,"slug":801,"label":802,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":803,"displayConditions":804,"answers":810,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"917a9bac-2109-4339-85c4-3bff8b3b9fbc","le-contrat-prevoit-il-que-le-responsable-de-traitement-valide-le-choix-des-sous-traitants-ulterieurs-","Le contrat prévoit-il  que le responsable de traitement valide le choix des sous-traitants ultérieurs ?",[],{"id":805,"separator":67,"field":9,"operator":68,"value":9,"rules":806},"fff76e8b-3af4-4a2a-8c86-ee9ecbab6035",[807],{"id":808,"separator":9,"field":785,"operator":68,"value":791,"rules":809},"34cc0b72-436e-4e6a-9e0b-c4298a2a5302",[],[811,814],{"id":812,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":9,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":813},"119086cf-333e-4ad9-bdc4-c14d230be764",[],{"id":815,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":9,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":56,"impactIndex":316,"impactColor":317,"impactIcon":9,"impactText":318,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":816},"c75dcfbc-6927-42fc-9dab-82772b00221a",[817],{"id":818,"label":819,"userId":9,"color":9,"description":820,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"1b22b32f-f5e0-42cf-89ce-390042f4aac9","Modifier le contrat","\u003Cp>Soit le responsable du traitement valide les sous-traitants,\u003C/p>\u003Cp>soit le sous-traitant identifie clairement ses sous-traitants dans le contrat et informe/demande l'autorisation de choisir de nouveaux sous-traitants.\u003C/p>",{"id":822,"slug":823,"label":824,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":825,"displayConditions":9,"answers":826,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"89d2ab80-1423-4272-a4a5-b191a2bf822d","les-relations-avec-les-sous-traitants-ulterieurs-font-elles-lobjet-dun-contrat-avec-le-sous-traitant-","Les relations avec les sous-traitants ultérieurs font-elles l'objet d'un contrat avec le sous-traitant ?",[],[827,830,835],{"id":828,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":829},"6b04d39a-bbd9-4388-99d5-ccb8a6153be1",[],{"id":831,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":39,"impactIndex":48,"impactColor":49,"impactIcon":9,"impactText":41,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":832},"df8c1a5c-d77e-4a4c-bc71-dfa15212c2e9",[833],{"id":834,"label":322,"userId":9,"color":9,"description":38,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"33c70b12-8b67-4a92-85de-dc96e73f0e87",{"id":836,"color":9,"rangeValue":9,"label":519,"slug":9,"description":9,"score":30,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":39,"impactIndex":48,"impactColor":49,"impactIcon":9,"impactText":41,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":837},"3a5872e1-93cf-4f1c-8315-70afadf2be5a",[838],{"id":839,"label":840,"userId":9,"color":9,"description":38,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"b0b58001-6440-4f91-b4f4-1489d024f5e5","Obtenir un engagement de date de réalisation",{"id":842,"slug":843,"label":844,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":845,"displayConditions":846,"answers":852,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"e9dba852-0b9e-46a3-9307-82cc18947ae9","ces-contrats-prennent-ils-en-compte-les-exigences-rgpd-","Ces contrats prennent-ils en compte les exigences RGPD ?",[],{"id":847,"separator":67,"field":9,"operator":68,"value":9,"rules":848},"5397ba84-ba6c-422a-9c17-ffb0ba40d08b",[849],{"id":850,"separator":9,"field":822,"operator":68,"value":828,"rules":851},"55721af2-798a-4ddd-baa7-cec6ac2f3ab3",[],[853,856],{"id":854,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":855},"2242b7ce-de16-4d22-b2f3-ef0a78018d25",[],{"id":857,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":39,"impactIndex":48,"impactColor":49,"impactIcon":9,"impactText":41,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":858},"0209b120-b8e6-43ec-8ae4-58b91d67b485",[859],{"id":860,"label":322,"userId":9,"color":9,"description":38,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"721b0e7c-f737-4a08-9fa9-48a8050fc116",{"id":862,"slug":863,"label":864,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":865,"displayConditions":9,"answers":866,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"2ed0f049-580b-4e66-9a35-e84763ae26a4","les-transferts-eventuels-de-donnees-hors-ue-par-les-sous-traitants-ulterieurs-sont-ils-encadres-par-des-clauses-type-ou-autres-dispositions-prevues-par-lautorite-de-controle-","Les transferts éventuels de données hors UE par les sous-traitants ultérieurs sont-ils encadrés par des clauses-type ou autres dispositions prévues par l'autorité de contrôle ?",[],[867,870],{"id":868,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":869},"320ec324-14df-4736-89d1-e3b9b2c0c6e0",[],{"id":871,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":56,"impactIndex":316,"impactColor":317,"impactIcon":9,"impactText":318,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":872},"c0fa6866-a122-41c8-8d71-07209d757e49",[873],{"id":874,"label":322,"userId":9,"color":9,"description":38,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"2d5f9639-908c-4954-ae23-45592a4eccdb",{"id":876,"slug":877,"label":878,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"dynamicSelectType":9,"editableOptions":22,"complianceRules":879,"displayConditions":9,"answers":880,"listQuestions":9,"required":22,"requiredJustification":22,"suggestTask":22,"riskEnabled":59,"native":22},"2f3d2f08-af13-4920-8d63-1b28dbf99d1c","le-sous-traitant-sest-il-assure-que-les-sous-traitants-ulterieurs-ont-pris-les-mesures-organisationnelles-et-techniques-permettant-dassurer-des-garanties-suffisantes-pour-la-protection-des-donnees-a-caractere-personnel-","Le sous-traitant s'est-il assuré que les sous-traitants ultérieurs ont pris les mesures organisationnelles et techniques permettant d'assurer des garanties suffisantes pour la protection des données à caractère personnel ?",[],[881,884],{"id":882,"color":9,"rangeValue":9,"label":27,"slug":9,"description":9,"score":28,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":29,"impactIndex":30,"impactColor":31,"impactIcon":9,"impactText":32,"probability":29,"probabilityIndex":30,"probabilityColor":31,"probabilityIcon":9,"probabilityText":33,"taskSuggestions":883},"9aa8d5a4-34e6-42f4-a5c0-00fbcc7796e7",[],{"id":885,"color":9,"rangeValue":9,"label":44,"slug":9,"description":9,"score":11,"nonApplicable":22,"tooltip":9,"goodAnswer":22,"redFlag":22,"impact":56,"impactIndex":316,"impactColor":317,"impactIcon":9,"impactText":318,"probability":39,"probabilityIndex":48,"probabilityColor":49,"probabilityIcon":9,"probabilityText":50,"taskSuggestions":886},"b8c5ed79-5511-4558-b184-37fac1928b3a",[887],{"id":888,"label":322,"userId":9,"color":9,"description":38,"priority":39,"priorityIndex":28,"priorityColor":40,"priorityIcon":9,"priorityText":41},"dbeb1d84-e423-4757-a773-42742cf82047",[],[],"32c4926a-dbd2-4a8a-84a5-53dd7defbf34","1.0","Sous-traitant RGPD (avancé)","XsU8kl4DvqjruNuAmEGr4BFERXkUL5sbsI5YlG46YGkZxkfZdfy5RKCdBpXF",83,"https://static.dastra.eu/tenant-3/audit/086b91cf-548c-498e-a8b5-bcabc6517457/icon-audit500x-a08834515a-150.png","Evaluation des mesures mise en œuvre pour répondre aux exigences RGPD en tant que sous-traitant.\n\nVersion 1.0\n","2021-04-20T14:19:28.4616109","2024-08-30T13:54:19.2852634","Vendor","Audit sous-traitant",{"id":903,"displayName":904,"familyName":905,"givenName":906,"email":907,"active":59,"color":908,"avatarUrl":909,"tenantId":11},69,"Dastro Naute","Naute","Dastro","contact@dastra.eu","#784000","https://static.dastra.eu/tenant-3/avatar/69/assistant-150.png","Actor","ds-icon-actor","Acteurs",[914],{"id":915,"displayName":916,"familyName":917,"givenName":918,"email":919,"active":59,"color":920,"avatarUrl":921,"tenantId":11},31,"Jérôme de Mercey","de Mercey","Jérôme","jerome.demercey@dastra.eu","#99C691","https://static.dastra.eu/tenant-10/avatar/31/Zuh7XFZe5EnnTo/design-sans-titre-2-150.png",[923,932],{"id":924,"label":925,"type":926,"typeIndex":927,"typeColor":928,"typeIcon":929,"typeText":930,"color":931},"cb79e346-9a2a-4e6f-ae8f-cb9bc9e1c9e1","Sous-traitant","AuditTemplate",9,"#83d162","ds-icon-audit","Modèle de questionnaire","#22e292",{"id":933,"label":934,"type":926,"typeIndex":927,"typeColor":928,"typeIcon":929,"typeText":930,"color":935},"87b8e0f8-3e5f-435a-806f-f6011b1fa576","RGPD","#6610f2",46,30]