[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$flyH_5tarssy3KYxY1UCK8ZZAemif4-4O3g4Dc175t9A":3},{"sections":4,"resultAnalysis":552,"id":553,"version":554,"newVersion":31,"label":555,"isPinned":31,"isShared":47,"sharingToken":556,"isRevision":31,"isBlockAnalysisShared":31,"nbReferences":557,"referenceId":9,"nbResponses":20,"parentId":9,"revisionDescription":9,"logoUrl":558,"description":559,"scheduleIntervalDays":9,"versionNumber":11,"dateCreation":560,"dateUpdate":561,"dateArchived":9,"archived":31,"type":562,"typeIndex":563,"typeColor":9,"typeIcon":9,"typeText":564,"creator":565,"objectType":573,"objectTypeIndex":20,"objectTypeColor":383,"objectTypeIcon":574,"objectTypeText":575,"defaultOwners":576,"tags":584,"privacyHubs":9,"nbQuestions":598,"nbQuestionsRequired":20,"nbDatas":20,"deadLineDays":9},[5,187,348],{"id":6,"slug":7,"label":8,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":9,"questions":13,"sections":14},"2c879551-1b5f-4746-b39f-a839a50ef441","generalites","Généralités",null,"Chapter",1,"SectionType_Chapter",[],[15,139],{"id":16,"slug":17,"label":18,"emoji":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"descriptionHtml":22,"questions":23,"sections":138},"9f06b73e-1556-4c3a-9814-8a96922b5b5b","politique-de-conformite-au-rgpd-1","Politique de conformité au RGPD","Default",0,"SectionType_Default","\u003Cp>Section relative à la politique de conformité au RGPD du sous-traitant.\u003C/p>",[24,48,63,78,93,108,123],{"id":25,"slug":26,"label":27,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":28,"typeIndex":29,"typeColor":9,"typeIcon":9,"typeText":30,"dynamicSelectType":9,"editableOptions":31,"complianceRules":32,"displayConditions":9,"answers":33,"listQuestions":9,"required":31,"requiredJustification":31,"suggestTask":31,"riskEnabled":47,"native":31},"387b2181-d74c-4ec2-b0f5-ec268dbf17b9","le-sous-traitant-a-formalise-une-politique-de-protection-des-donnees-personnelles","Le sous-traitant a formalisé  une Politique de Protection des Données Personnelles","Radio",7,"Liste de cases à cocher (une seule réponse)",false,[],[34,39,43],{"id":35,"color":9,"rangeValue":9,"label":36,"slug":9,"description":9,"score":37,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":38},"767f5b49-8876-4bf5-b63c-f2490771c902","Oui",2,[],{"id":40,"color":9,"rangeValue":9,"label":41,"slug":9,"description":9,"score":20,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":42},"a35cec2f-826a-4f58-8112-2fbe14d16244","Non",[],{"id":44,"color":9,"rangeValue":9,"label":45,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":46},"d466bf14-b715-4d1f-8c38-c8bd5c5aeb24","En cours",[],true,{"id":49,"slug":50,"label":51,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":28,"typeIndex":29,"typeColor":9,"typeIcon":9,"typeText":30,"dynamicSelectType":9,"editableOptions":31,"complianceRules":52,"displayConditions":9,"answers":53,"listQuestions":9,"required":31,"requiredJustification":31,"suggestTask":31,"riskEnabled":47,"native":31},"d3fa2b62-7887-4f79-ab8a-85c8c6f6f104","le-sous-traitant-a-designe-un-dpo","Le sous-traitant a désigné un DPO",[],[54,57,60],{"id":55,"color":9,"rangeValue":9,"label":36,"slug":9,"description":9,"score":37,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":56},"46279a7c-6a17-4902-86bf-4a2a4dd92f2e",[],{"id":58,"color":9,"rangeValue":9,"label":41,"slug":9,"description":9,"score":20,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":59},"db1bc681-49e9-4113-8e5a-e01f72203ead",[],{"id":61,"color":9,"rangeValue":9,"label":45,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":62},"f4fea07d-b0a0-479d-8bc2-60c35a7e9d7f",[],{"id":64,"slug":65,"label":66,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":28,"typeIndex":29,"typeColor":9,"typeIcon":9,"typeText":30,"dynamicSelectType":9,"editableOptions":31,"complianceRules":67,"displayConditions":9,"answers":68,"listQuestions":9,"required":31,"requiredJustification":31,"suggestTask":31,"riskEnabled":47,"native":31},"807b7a35-6883-47f6-8a6c-f82679a42e70","le-sous-traitant-tient-un-registre-de-traitement-pour-les-prestations-confiees","Le sous-traitant tient un registre de traitement pour les prestations confiées",[],[69,72,75],{"id":70,"color":9,"rangeValue":9,"label":36,"slug":9,"description":9,"score":37,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":71},"53b6b1a3-b695-4277-813a-21eacbff99cb",[],{"id":73,"color":9,"rangeValue":9,"label":41,"slug":9,"description":9,"score":20,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":74},"6be4bcf1-8938-48a2-b0a1-d076d080d3f2",[],{"id":76,"color":9,"rangeValue":9,"label":45,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":77},"efcc6950-445a-4c0b-8ea6-82c9624a0e85",[],{"id":79,"slug":80,"label":81,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":28,"typeIndex":29,"typeColor":9,"typeIcon":9,"typeText":30,"dynamicSelectType":9,"editableOptions":31,"complianceRules":82,"displayConditions":9,"answers":83,"listQuestions":9,"required":31,"requiredJustification":31,"suggestTask":31,"riskEnabled":47,"native":31},"c47d9df5-7407-4001-8688-ce24edc9c754","le-sous-traitant-a-defini-et-met-en-oeuvre-un-plan-de-sensibilisation-des-collaborateurs-a-la-reglementation-rgpd","Le sous-traitant a défini et met en oeuvre un plan de sensibilisation des collaborateurs à la règlementation RGPD",[],[84,87,90],{"id":85,"color":9,"rangeValue":9,"label":36,"slug":9,"description":9,"score":37,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":86},"f5a5d42f-dd45-4f45-b2d3-5d53b5d322bb",[],{"id":88,"color":9,"rangeValue":9,"label":41,"slug":9,"description":9,"score":20,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":89},"b77bc76e-9833-49ce-a622-337f87bd9372",[],{"id":91,"color":9,"rangeValue":9,"label":45,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":92},"4607e711-eb80-42a7-be93-2a59d3c64895",[],{"id":94,"slug":95,"label":96,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":28,"typeIndex":29,"typeColor":9,"typeIcon":9,"typeText":30,"dynamicSelectType":9,"editableOptions":31,"complianceRules":97,"displayConditions":9,"answers":98,"listQuestions":9,"required":31,"requiredJustification":31,"suggestTask":31,"riskEnabled":47,"native":31},"c33563dc-8445-4b52-966d-6f52daeff679","le-sous-traitant-a-deja-procede-a-un-audit-de-conformite-relatif-aux-donnees-personnelles-exploitees-dans-le-cadre-des-prestations-confiees","Le sous-traitant a déjà procédé à un audit de conformité relatif aux données personnelles exploitées dans le cadre des prestations confiées",[],[99,102,105],{"id":100,"color":9,"rangeValue":9,"label":36,"slug":9,"description":9,"score":37,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":101},"c0a1e1ca-3f07-4bf3-b7aa-3f2553857831",[],{"id":103,"color":9,"rangeValue":9,"label":41,"slug":9,"description":9,"score":20,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":104},"8ff21edd-3700-48a1-9e4d-82241a85db5e",[],{"id":106,"color":9,"rangeValue":9,"label":45,"slug":9,"description":9,"score":20,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":107},"ad7aa340-4790-4a81-884d-4f10af1b0c27",[],{"id":109,"slug":110,"label":111,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":28,"typeIndex":29,"typeColor":9,"typeIcon":9,"typeText":30,"dynamicSelectType":9,"editableOptions":31,"complianceRules":112,"displayConditions":9,"answers":113,"listQuestions":9,"required":31,"requiredJustification":31,"suggestTask":31,"riskEnabled":47,"native":31},"0500d9f6-5122-4245-8f80-0e91ca9a7bba","une-analyse-de-risque-a-ete-realisee-sur-les-prestations-confiees-du-point-de-vue-de-la-protection-des-dcp","Une analyse de risque a été réalisée sur les prestations confiées du point de vue de la protection des DCP",[],[114,117,120],{"id":115,"color":9,"rangeValue":9,"label":36,"slug":9,"description":9,"score":37,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":116},"df794dd2-7aa5-4fd4-912a-c35fdb46648c",[],{"id":118,"color":9,"rangeValue":9,"label":41,"slug":9,"description":9,"score":20,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":119},"27a44815-8baf-4357-a53a-0a06742bd2f2",[],{"id":121,"color":9,"rangeValue":9,"label":45,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":122},"7c4fa836-8d8a-4eea-9029-585ede77d232",[],{"id":124,"slug":125,"label":126,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":28,"typeIndex":29,"typeColor":9,"typeIcon":9,"typeText":30,"dynamicSelectType":9,"editableOptions":31,"complianceRules":127,"displayConditions":9,"answers":128,"listQuestions":9,"required":31,"requiredJustification":31,"suggestTask":31,"riskEnabled":47,"native":31},"b8dc7940-c297-4188-a2cc-2cf1b42640db","le-sous-traitant-a-defini-et-formalise-les-procedures-de-protection-des-donnees-exercice-du-droit-des-personnes-violation-de-donnees-privacy-by-design-default-","Le sous-traitant a défini et formalisé les procédures de protection des données : exercice du droit des personnes, violation de données, privacy by design / default, ...",[],[129,132,135],{"id":130,"color":9,"rangeValue":9,"label":36,"slug":9,"description":9,"score":37,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":131},"81fd91fd-9930-492e-8245-6bdc3987c9ea",[],{"id":133,"color":9,"rangeValue":9,"label":41,"slug":9,"description":9,"score":20,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":134},"92103379-a759-44a1-b63f-959cbfa39729",[],{"id":136,"color":9,"rangeValue":9,"label":45,"slug":9,"description":9,"score":9,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":137},"da5b2fee-fbd8-4913-9fd7-9846350e1738",[],[],{"id":140,"slug":141,"label":142,"emoji":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"descriptionHtml":143,"questions":144,"sections":186},"06cc19d0-9526-4003-a03e-560544fde2e9","documentation-1-2-3","Documentation","\u003Cp>Section relative aux documents et/ou certificats du sous-traitant.\u003C/p>",[145],{"id":146,"slug":147,"label":148,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":149,"typeIndex":150,"typeColor":9,"typeIcon":9,"typeText":151,"dynamicSelectType":9,"editableOptions":31,"complianceRules":152,"displayConditions":9,"answers":153,"listQuestions":9,"required":31,"requiredJustification":31,"suggestTask":31,"riskEnabled":47,"native":31},"8e69dfab-8d04-423c-8583-d4b6f770919b","quels-documents-et-ou-certificats-disposent-le-sous-traitant-qui-peuvent-prouver-ou-expliquer-les-mesures-mises-en-oeuvre-le-cas-echeant","Quels documents et/ou certificats disposent le sous-traitant qui peuvent prouver ou expliquer les mesures mises en oeuvre (le cas échéant)","Tags",11,"Sélecteur de tags",[],[154,158,162,166,170,174,178,182],{"id":155,"color":9,"rangeValue":9,"label":156,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":157},"85355570-0802-4811-9b72-6be9acde309c","Certificat ISO 27001",[],{"id":159,"color":9,"rangeValue":9,"label":160,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":161},"4f51e6e9-f67f-46a3-a6dc-792b34dfc674","Certificat ISO 22301",[],{"id":163,"color":9,"rangeValue":9,"label":164,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":165},"3d69fdd9-5a97-4a19-8b07-0162b60c980b","Certificat PCI-DSS",[],{"id":167,"color":9,"rangeValue":9,"label":168,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":169},"95e5ecd6-2f5d-4a43-a632-df4fa28d7258","Règles d'entreprises contraignantes (REC)",[],{"id":171,"color":9,"rangeValue":9,"label":172,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":173},"56c3761f-af86-43b0-a111-5195875a6a97","Concept de sécurité",[],{"id":175,"color":9,"rangeValue":9,"label":176,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":177},"e5261b70-1bed-4569-ab34-e1b83a9ead92","Certification RGPD (Art. 42 RGPD)",[],{"id":179,"color":9,"rangeValue":9,"label":180,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":181},"f3e335c0-270a-45d3-8165-71093aab230c","Certificat TISAX",[],{"id":183,"color":9,"rangeValue":9,"label":184,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":185},"2eff81f1-5c6f-4b5e-b927-346c4d4e05aa","Certificat ISAE 3402",[],[],{"id":188,"slug":189,"label":190,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":9,"questions":191,"sections":192},"99320a9a-0138-42ef-8f7e-78d4ffa12bf7","securite","Sécurité",[],[193,295],{"id":194,"slug":195,"label":196,"emoji":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"descriptionHtml":197,"questions":198,"sections":294},"f78db345-6876-43b0-becb-a1d7fed07af1","acces-aux-locaux-et-aux-installations-aux-systemes-informatiques-1","Accès aux locaux, aux installations et aux systèmes informatiques ","\u003Cp>Section relative à l'accès aux locaux, aux installations et aux systèmes informatiques du sous-traitant.\u003C/p>",[199,216,232,248,263,278],{"id":200,"slug":201,"label":202,"tooltipHtml":203,"descriptionHtml":204,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":28,"typeIndex":29,"typeColor":9,"typeIcon":9,"typeText":30,"dynamicSelectType":9,"editableOptions":31,"complianceRules":205,"displayConditions":9,"answers":206,"listQuestions":9,"required":31,"requiredJustification":31,"suggestTask":31,"riskEnabled":47,"native":31},"08756d39-8dfa-480e-bae6-8e814f42c6d3","le-sous-traitant-a-pris-les-mesures-techniques-et-organisationnelles-appropriees-conformes-a-letat-de-lart-permettant-de-controler-lacces-aux-locaux-et-aux-installations-ou-les-donnees-a-caractere-personnelles-sont-traitees-notamment-pour-verifier-lautorisation-","Le sous-traitant a pris les mesures techniques et organisationnelles appropriées, conformes à l'état de l'art permettant de contrôler l'accès aux locaux et aux installations où les données à caractère personnelles sont traitées, notamment pour vérifier l'autorisation.","\u003Cp>\u003Cstrong>\u003Cem>Exemple : \u003C/em>\u003C/strong>\u003Cem>système de contrôle d'accès (lecteur identifiant, carte magnétique, carte à puce), (Remise) de clés, Verrouillage des portes (ouverture électrique des portes, etc.), Personnel de sécurité, vigiles, Installations de surveillance (système d'alarme, vidéo / CCTV), Connexion d'accès au centre de données, Revue régulière des autorisations permanentes d'accès\u003C/em>\u003C/p>","\u003Cp>\u003C/p>",[],[207,210,213],{"id":208,"color":9,"rangeValue":9,"label":36,"slug":9,"description":9,"score":37,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":209},"0820a6b8-19ba-40d4-b06b-bec049e056ea",[],{"id":211,"color":9,"rangeValue":9,"label":41,"slug":9,"description":9,"score":20,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":212},"68cdc688-d984-4ea8-9416-65e8a40d2068",[],{"id":214,"color":9,"rangeValue":9,"label":45,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":215},"6a55011c-425a-4791-aed3-66f83f1cbf3f",[],{"id":217,"slug":218,"label":219,"tooltipHtml":220,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":28,"typeIndex":29,"typeColor":9,"typeIcon":9,"typeText":30,"dynamicSelectType":9,"editableOptions":31,"complianceRules":221,"displayConditions":9,"answers":222,"listQuestions":9,"required":31,"requiredJustification":31,"suggestTask":31,"riskEnabled":47,"native":31},"8825bafe-3622-4a62-99fe-d1c3376ca78e","le-sous-traitant-a-pris-les-mesures-techniques-et-organisationnelles-didentification-et-dauthentification-de-lutilisateur-pour-limiter-lacces-aux-systemes-informatiques-aux-seules-personnes-concernees-par-lexploitation-des-donnees-personnelles-pour-la-prestation-confiee","Le sous-traitant a pris les mesures techniques et organisationnelles d'identification et d'authentification de l'utilisateur pour limiter l'accès aux systèmes informatiques aux seules personnes concernées par l'exploitation  des données personnelles pour la prestation confiée","\u003Cp>\u003Cstrong>\u003Cem>Exemples : \u003C/em>\u003C/strong>\u003Cem>procédures de mot de passe (y compris les caractères spéciaux, la longueur minimale, le changement régulier de mot de passe), blocage automatique (par ex. mot de passe ou arrêt), création d'un dossier maître par utilisateur, cryptage des supports de données\u003C/em>\u003C/p>",[],[223,226,229],{"id":224,"color":9,"rangeValue":9,"label":36,"slug":9,"description":9,"score":37,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":225},"d99eae5b-f0ae-4807-baf0-5025bff850b2",[],{"id":227,"color":9,"rangeValue":9,"label":41,"slug":9,"description":9,"score":20,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":228},"b56d586f-be02-41ee-ba30-29e37038b4f9",[],{"id":230,"color":9,"rangeValue":9,"label":45,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":231},"260de6b3-353c-4473-a6af-b463866375d7",[],{"id":233,"slug":234,"label":235,"tooltipHtml":236,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":28,"typeIndex":29,"typeColor":9,"typeIcon":9,"typeText":30,"dynamicSelectType":9,"editableOptions":31,"complianceRules":237,"displayConditions":9,"answers":238,"listQuestions":9,"required":31,"requiredJustification":31,"suggestTask":31,"riskEnabled":47,"native":31},"9b91e8e9-f218-4fc3-a06a-c32e2ae0fcf6","le-sous-traitant-a-pris-les-mesures-appropriees-pour-controler-la-gestion-des-acces-sur-les-plateformes-outils-logiciels-dedies","Le sous-traitant a pris les mesures appropriées pour contrôler la gestion des accès sur les plateformes / outils logiciels dédiés","\u003Cp>\u003Cstrong>\u003Cem>Exemples : \u003C/em>\u003C/strong>\u003Cem>Droits d'accès différenciés (profils, rôles, transactions et objets), Rapports, Droits associés (modification, suppression), absence de partage de compte\u003C/em>\u003C/p>",[],[239,242,245],{"id":240,"color":9,"rangeValue":9,"label":36,"slug":9,"description":9,"score":37,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":241},"2a3ab602-0f0a-42cf-83de-465d6cabc49d",[],{"id":243,"color":9,"rangeValue":9,"label":41,"slug":9,"description":9,"score":20,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":244},"91b02ec7-5dd7-4a75-8b9d-5609675baa7f",[],{"id":246,"color":9,"rangeValue":9,"label":45,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":247},"203b34c3-fa00-46ac-b715-fdca7f0d96bf",[],{"id":249,"slug":250,"label":251,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":28,"typeIndex":29,"typeColor":9,"typeIcon":9,"typeText":30,"dynamicSelectType":9,"editableOptions":31,"complianceRules":252,"displayConditions":9,"answers":253,"listQuestions":9,"required":31,"requiredJustification":31,"suggestTask":31,"riskEnabled":47,"native":31},"4d36f988-b8bd-413f-8b73-cfc7e4b1fdad","le-sous-traitant-fait-une-evaluation-reguliere-des-mesures-techniques-et-organisationnelles-destinees-a-controler-lacces-aux-donnees-a-caractere-personnelles-par-exemple-test-de-penetration","Le sous-traitant fait une évaluation régulière des mesures techniques et organisationnelles destinées à contrôler l'accès aux données à caractère personnelles (par exemple test de pénétration)",[],[254,257,260],{"id":255,"color":9,"rangeValue":9,"label":36,"slug":9,"description":9,"score":37,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":256},"f3d3e07e-8a51-4d95-8460-7ef348ae5cea",[],{"id":258,"color":9,"rangeValue":9,"label":41,"slug":9,"description":9,"score":20,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":259},"64c23fc7-9ede-474e-b070-4e1da5411794",[],{"id":261,"color":9,"rangeValue":9,"label":45,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":262},"b311a796-ed17-4c81-91ce-6601ec7820b9",[],{"id":264,"slug":265,"label":266,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":28,"typeIndex":29,"typeColor":9,"typeIcon":9,"typeText":30,"dynamicSelectType":9,"editableOptions":31,"complianceRules":267,"displayConditions":9,"answers":268,"listQuestions":9,"required":31,"requiredJustification":31,"suggestTask":31,"riskEnabled":47,"native":31},"cd985b6a-590d-4fb0-95ad-9245d8241f78","le-sous-traitant-a-mis-en-place-une-procedure-de-gestion-des-incidents-de-securite","Le sous-traitant a mis en place une procédure de gestion des incidents de sécurité",[],[269,272,275],{"id":270,"color":9,"rangeValue":9,"label":36,"slug":9,"description":9,"score":37,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":271},"d2876c52-d9b5-44b7-8dab-7ee030f81913",[],{"id":273,"color":9,"rangeValue":9,"label":41,"slug":9,"description":9,"score":20,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":274},"11a4ddf3-99dc-4d93-a9f8-ea68c583c239",[],{"id":276,"color":9,"rangeValue":9,"label":45,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":277},"facdb1c9-2df7-4453-a69f-50cbab282d29",[],{"id":279,"slug":280,"label":281,"tooltipHtml":282,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":28,"typeIndex":29,"typeColor":9,"typeIcon":9,"typeText":30,"dynamicSelectType":9,"editableOptions":31,"complianceRules":283,"displayConditions":9,"answers":284,"listQuestions":9,"required":31,"requiredJustification":31,"suggestTask":31,"riskEnabled":47,"native":31},"60de4d78-3b2d-4cf5-8050-2117fff26a07","le-sous-traitant-prend-des-mesures-pour-empecher-la-perte-lalteration-ou-la-divulgation-non-autorisee-lors-du-transfert-electronique-du-transport-de-donnees-du-controle-de-transmission-de-communication-ou-de-stockage-des-donnees-sur-les-supports-de-donnees-manuels-ou-electroniques-etc-et-ainsi-maitriser-les-risques-de-divulgation-non-autorises","Le sous-traitant prend des mesures pour empêcher la perte, l'altération ou la divulgation non autorisée lors du transfert électronique, du transport de données, du contrôle de transmission, de communication ou de stockage des données sur les supports de données (manuels ou électroniques), etc, et ainsi maîtriser les risques de divulgation non autorisés","\u003Cp>\u003Cstrong>\u003Cem>Exemples :\u003C/em>\u003C/strong>\u003Cem> Chiffrement /canalisation (VPN=Virtual Private Network), Signature électronique, Connexion, Sécurité du transport\u003C/em>\u003C/p>",[],[285,288,291],{"id":286,"color":9,"rangeValue":9,"label":36,"slug":9,"description":9,"score":37,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":287},"2f5785d9-3207-4a86-9c74-0112600a1418",[],{"id":289,"color":9,"rangeValue":9,"label":41,"slug":9,"description":9,"score":20,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":290},"86cb4b42-f39c-4a31-a519-b218c74869fb",[],{"id":292,"color":9,"rangeValue":9,"label":45,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":293},"751ea21b-ebf7-4693-9616-90d4db790a54",[],[],{"id":296,"slug":297,"label":298,"emoji":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"descriptionHtml":299,"questions":300,"sections":347},"ba5a8366-77f4-42a0-8846-0bc6eb6ba456","hebergement-et-stockage-des-donnees-personnelles-1","Hébergement et stockage des données personnelles","\u003Cp>Section relative à l'hébergement et le stockage par le sous-traitant des données personnelles.\u003C/p>",[301,317,332],{"id":302,"slug":303,"label":304,"tooltipHtml":305,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":28,"typeIndex":29,"typeColor":9,"typeIcon":9,"typeText":30,"dynamicSelectType":9,"editableOptions":31,"complianceRules":306,"displayConditions":9,"answers":307,"listQuestions":9,"required":31,"requiredJustification":31,"suggestTask":31,"riskEnabled":47,"native":31},"858c1235-5ecb-44ae-acf6-f0677bbc2edf","le-sous-traitant-a-pris-les-mesures-appropriees-pour-se-proteger-contre-la-destruction-ou-la-perte-accidentelle-de-donnees-a-caractere-personnel-principe-de-disponibilite","Le sous-traitant a pris les mesures appropriées pour se protéger contre la destruction ou la perte accidentelle de données à caractère personnel (principe de disponibilité)","\u003Cp>\u003Cstrong>\u003Cem>Exemples :\u003C/em>\u003C/strong>\u003Cem> procédures de sauvegarde / résilience des systèmes informatiques, intégrité du système informatique, miroitage des disques durs, par ex. par la technologie RAID, maintien permanent de l'alimentation électrique (UPS), stockage (des sauvegardes ?) à distance, systèmes de pare-feu / antivirus, plan de reprise d'urgence\u003C/em>\u003C/p>",[],[308,311,314],{"id":309,"color":9,"rangeValue":9,"label":36,"slug":9,"description":9,"score":37,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":310},"2fa78a09-a0bb-4bd9-b559-954e8593f348",[],{"id":312,"color":9,"rangeValue":9,"label":41,"slug":9,"description":9,"score":20,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":313},"31a836d7-4096-462c-8c28-ba8af4e1f91e",[],{"id":315,"color":9,"rangeValue":9,"label":45,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":316},"c9ee52bd-ae5f-48fb-a0da-203990c68d9a",[],{"id":318,"slug":319,"label":320,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":28,"typeIndex":29,"typeColor":9,"typeIcon":9,"typeText":30,"dynamicSelectType":9,"editableOptions":31,"complianceRules":321,"displayConditions":9,"answers":322,"listQuestions":9,"required":31,"requiredJustification":31,"suggestTask":31,"riskEnabled":47,"native":31},"0776d7ee-d54e-4875-9cde-916e32990e39","le-sous-traitant-procede-a-la-suppression-ou-a-la-restitution-des-donnees-a-caractere-personnel-conformement-aux-instructions-documentees-recues-du-client-a-defaut-il-a-defini-et-mis-en-place-une-politique-interne-de-conservation-des-donnees-conforme-aux-exigences-du-rgpd","Le sous-traitant procède à la suppression ou à la restitution des données à caractère personnel conformément aux instructions documentées reçues du Client. A défaut, il a défini et mis en place une politique interne de conservation des données conforme aux exigences du RGPD",[],[323,326,329],{"id":324,"color":9,"rangeValue":9,"label":36,"slug":9,"description":9,"score":37,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":325},"e11706f3-c1a4-48e0-bb74-ca8f91e97d09",[],{"id":327,"color":9,"rangeValue":9,"label":41,"slug":9,"description":9,"score":20,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":328},"5b6a5c71-474a-4aae-bdcb-4c2645c7bddd",[],{"id":330,"color":9,"rangeValue":9,"label":45,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":331},"f3206b95-72df-4966-bd0b-016e0255825e",[],{"id":333,"slug":334,"label":335,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":28,"typeIndex":29,"typeColor":9,"typeIcon":9,"typeText":30,"dynamicSelectType":9,"editableOptions":31,"complianceRules":336,"displayConditions":9,"answers":337,"listQuestions":9,"required":31,"requiredJustification":31,"suggestTask":31,"riskEnabled":47,"native":31},"47d082ca-efeb-4928-8ac0-c156b25ffeff","sauf-autorisation-expresse-prevue-au-contrat-les-donnees-confiees-pour-traitement-par-le-client-au-sous-traitant-sont-hebergees-et-exploitees-au-sein-de-lue","Sauf autorisation expresse prévue au contrat, les données confiées pour traitement par le Client au sous-traitant sont hébergées et exploitées au sein de l'UE",[],[338,341,344],{"id":339,"color":9,"rangeValue":9,"label":36,"slug":9,"description":9,"score":37,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":340},"98190edd-4822-4473-a28f-20a022c4a37f",[],{"id":342,"color":9,"rangeValue":9,"label":41,"slug":9,"description":9,"score":20,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":343},"21dae29a-f798-4411-a475-f1e4cc46ad31",[],{"id":345,"color":9,"rangeValue":9,"label":45,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":346},"005a1308-9fea-4999-b14d-bc44415eb52d",[],[],{"id":349,"slug":350,"label":351,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":9,"questions":352,"sections":353},"8910e099-0074-46a2-a558-dea1473c4c05","contrat","Contrat",[],[354,416,485],{"id":355,"slug":356,"label":357,"emoji":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"descriptionHtml":358,"questions":359,"sections":415},"1e8c1ed8-cb73-4797-bb03-bd217f32cd49","contrat-de-sous-traitance","Contrat de sous-traitance","\u003Cp>Section relative aux contrats passés entre le responsable du traitement et le sous-traitant\u003C/p>",[360,388],{"id":361,"slug":362,"label":363,"tooltipHtml":9,"descriptionHtml":364,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":28,"typeIndex":29,"typeColor":9,"typeIcon":9,"typeText":30,"dynamicSelectType":9,"editableOptions":31,"complianceRules":365,"displayConditions":9,"answers":366,"listQuestions":9,"required":31,"requiredJustification":31,"suggestTask":31,"riskEnabled":47,"native":31},"1f909de6-3d12-4760-b243-29ab12d65e3c","avez-vous-passe-un-contrat-avec-votre-sous-traitant-","Avez-vous passé un contrat avec votre sous-traitant ?","\u003Cp>Les relations entre un responsable de traitement et un sous-traitant doivent être encadrées par un contrat conformément à l'article 28 du RPGD.\u003C/p>",[],[367,370,385],{"id":368,"color":9,"rangeValue":9,"label":36,"slug":9,"description":9,"score":37,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":369},"82b068f0-c856-4840-9346-a023d9a2795f",[],{"id":371,"color":9,"rangeValue":9,"label":41,"slug":9,"description":9,"score":20,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":372,"impactIndex":373,"impactColor":374,"impactIcon":9,"impactText":375,"probability":372,"probabilityIndex":373,"probabilityColor":374,"probabilityIcon":9,"probabilityText":376,"taskSuggestions":377},"0efb9b9c-115f-4c71-8baf-69b532522423","VeryHigh",5,"var(--bs-danger)","Critique","Très probable",[378],{"id":379,"label":380,"userId":9,"color":9,"description":381,"priority":382,"priorityIndex":11,"priorityColor":383,"priorityIcon":9,"priorityText":384},"e665217b-0920-4266-a3eb-ee4fb9252185","Ecrire un contrat","","High","#DC3545","Élevé",{"id":386,"color":9,"rangeValue":9,"label":45,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":387},"2eebd82b-a4a5-4a24-89b3-a8a2ac8652df",[],{"id":389,"slug":390,"label":391,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":28,"typeIndex":29,"typeColor":9,"typeIcon":9,"typeText":30,"dynamicSelectType":9,"editableOptions":31,"complianceRules":392,"displayConditions":393,"answers":401,"listQuestions":9,"required":31,"requiredJustification":31,"suggestTask":31,"riskEnabled":47,"native":31},"e2467111-59f7-4c20-b475-774c1bc48db1","ce-contrat-comprend-il-une-partie-relative-a-la-protection-des-donnees-personnelles-","Ce contrat comprend il une partie relative à la protection des données personnelles ? ",[],{"id":394,"separator":395,"field":9,"operator":396,"value":9,"rules":397},"efed83db-13db-488a-a829-9ae169bc88fc","And","equal",[398],{"id":399,"separator":9,"field":361,"operator":396,"value":368,"rules":400},"cf8a4b1e-1296-424f-adc9-2759516ba622",[],[402,409,412],{"id":403,"color":9,"rangeValue":9,"label":36,"slug":9,"description":9,"score":37,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":404,"impactIndex":11,"impactColor":405,"impactIcon":9,"impactText":406,"probability":404,"probabilityIndex":11,"probabilityColor":405,"probabilityIcon":9,"probabilityText":407,"taskSuggestions":408},"85fd67e5-a450-4f1a-b1de-63ed4ce1f2d4","VeryLow","var(--bs-success)","Négligable","Improbable",[],{"id":410,"color":9,"rangeValue":9,"label":41,"slug":9,"description":9,"score":20,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":372,"impactIndex":373,"impactColor":374,"impactIcon":9,"impactText":375,"probability":372,"probabilityIndex":373,"probabilityColor":374,"probabilityIcon":9,"probabilityText":376,"taskSuggestions":411},"3b9a7fae-67a0-40b5-84ce-412b2b569049",[],{"id":413,"color":9,"rangeValue":9,"label":45,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":414},"b14e9050-5c50-4314-b4db-1be6cfc2ec68",[],[],{"id":417,"slug":418,"label":419,"emoji":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"descriptionHtml":420,"questions":421,"sections":484},"a0876b61-e4cc-40c4-9ff6-522361dd1c55","conformite-de-mise-en-oeuvre-des-activites-de-traitement-1","Conformité de mise en oeuvre des activités de traitement","\u003Cp>Section relative à la conformité de mise en oeuvre des activités de traitement du sous-traitant.\u003C/p>",[422,437,452,468],{"id":423,"slug":424,"label":425,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":28,"typeIndex":29,"typeColor":9,"typeIcon":9,"typeText":30,"dynamicSelectType":9,"editableOptions":31,"complianceRules":426,"displayConditions":9,"answers":427,"listQuestions":9,"required":31,"requiredJustification":31,"suggestTask":31,"riskEnabled":47,"native":31},"df63318d-25fa-492c-a9e6-37c0569798fb","le-sous-traitant-a-mis-en-place-des-mesures-de-verification-ulterieure-de-la-saisie-de-la-modification-ou-de-la-suppression-des-donnees-et-de-la-personne-y-ayant-procede-journalisation-des-acces-et-des-reporting","Le sous-traitant a mis en place des mesures de vérification ultérieure de la saisie, de la modification ou de la suppression des données, et de la personne y ayant procédé (journalisation des accès et des reporting)",[],[428,431,434],{"id":429,"color":9,"rangeValue":9,"label":36,"slug":9,"description":9,"score":37,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":430},"cd0bbc1c-a981-4a5f-838a-a1ffdbf74b9d",[],{"id":432,"color":9,"rangeValue":9,"label":41,"slug":9,"description":9,"score":20,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":433},"48f27438-5c98-4600-94c2-e1201875b6c7",[],{"id":435,"color":9,"rangeValue":9,"label":45,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":436},"9d769068-8d48-45fd-9e35-13c777e353e1",[],{"id":438,"slug":439,"label":440,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":28,"typeIndex":29,"typeColor":9,"typeIcon":9,"typeText":30,"dynamicSelectType":9,"editableOptions":31,"complianceRules":441,"displayConditions":9,"answers":442,"listQuestions":9,"required":31,"requiredJustification":31,"suggestTask":31,"riskEnabled":47,"native":31},"f11429b6-d223-4d90-af00-5162e2b03c2a","le-sous-traitant-informe-regulierement-son-client-de-la-bonne-execution-du-contrat-pour-les-prestations-qui-lui-sont-confiees-conformite-aux-instructions-documentees","Le sous-traitant informe régulièrement son Client de la bonne exécution du Contrat pour les prestations qui lui sont confiées (conformité aux instructions documentées)",[],[443,446,449],{"id":444,"color":9,"rangeValue":9,"label":36,"slug":9,"description":9,"score":37,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":445},"2d2f8fe8-563c-45b1-b2c4-f616bb95dba6",[],{"id":447,"color":9,"rangeValue":9,"label":41,"slug":9,"description":9,"score":20,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":448},"5a107061-fed5-469d-bac1-1477ad3bef05",[],{"id":450,"color":9,"rangeValue":9,"label":45,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":451},"62da93b0-06c7-41de-bace-acd82ed7d74d",[],{"id":453,"slug":454,"label":455,"tooltipHtml":456,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":28,"typeIndex":29,"typeColor":9,"typeIcon":9,"typeText":30,"dynamicSelectType":9,"editableOptions":31,"complianceRules":457,"displayConditions":9,"answers":458,"listQuestions":9,"required":31,"requiredJustification":31,"suggestTask":31,"riskEnabled":47,"native":31},"121a3d3e-e121-496c-908c-f5414c3bb29f","le-sous-traitant-respecte-les-principes-disolation-des-traitements-pour-des-finalites-differentes-et-a-mis-en-place-les-dispositions-appropriees","Le sous-traitant respecte les principes d'isolation des traitements pour des finalités différentes et a mis en place les dispositions appropriées","\u003Cp>\u003Cstrong>\u003Cem>Exemple :\u003C/em>\u003C/strong>\u003Cem> bacs à sable pour les activités de développement, séparation des activités dans l'organisation des droits, ...\u003C/em>\u003C/p>",[],[459,462,465],{"id":460,"color":9,"rangeValue":9,"label":36,"slug":9,"description":9,"score":37,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":461},"38ce39cf-01db-4772-9883-390109721ccc",[],{"id":463,"color":9,"rangeValue":9,"label":41,"slug":9,"description":9,"score":20,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":464},"c39357c7-69f2-4489-943b-d132e905188c",[],{"id":466,"color":9,"rangeValue":9,"label":45,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":467},"43f434f1-44ab-46c0-ad73-6d311dbf2077",[],{"id":469,"slug":470,"label":471,"tooltipHtml":472,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":28,"typeIndex":29,"typeColor":9,"typeIcon":9,"typeText":30,"dynamicSelectType":9,"editableOptions":31,"complianceRules":473,"displayConditions":9,"answers":474,"listQuestions":9,"required":31,"requiredJustification":31,"suggestTask":31,"riskEnabled":47,"native":31},"aea39d6f-c468-4219-b5e4-f39000f05650","le-sous-traitant-a-mis-en-place-les-mesures-permettant-le-traitement-separe-stockage-modification-suppression-transmission-des-donnees-a-differentes-fins","Le sous-traitant a mis en place les mesures permettant le traitement séparé (stockage, modification, suppression, transmission) des données à différentes fins","\u003Cp>\u003Cstrong>\u003Cem>Exemple : \u003C/em>\u003C/strong>\u003Cem>concept de client interne / limitation d'utilisation, séparation des fonctions dans l'organisation pour développement / test / production\u003C/em>\u003C/p>",[],[475,478,481],{"id":476,"color":9,"rangeValue":9,"label":36,"slug":9,"description":9,"score":37,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":477},"7fd1b612-18cb-4e17-b7e6-ce4b51f5ae1f",[],{"id":479,"color":9,"rangeValue":9,"label":41,"slug":9,"description":9,"score":20,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":480},"693737a1-f6ba-4a88-995c-4d086d8d1650",[],{"id":482,"color":9,"rangeValue":9,"label":45,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":483},"41aa01f0-586e-4ff8-9b72-8c4196e48b38",[],[],{"id":486,"slug":487,"label":488,"emoji":9,"type":19,"typeIndex":20,"typeColor":9,"typeIcon":9,"typeText":21,"descriptionHtml":489,"questions":490,"sections":551},"011ed9eb-4620-4e69-ba5f-28bc997c51eb","sous-traitance-ulterieure-1-2-3-4","Sous-traitance ultérieure","\u003Cp>Section relative à la sous-traitance ultérieure du sous-traitant.\u003C/p>",[491,506,521,536],{"id":492,"slug":493,"label":494,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":28,"typeIndex":29,"typeColor":9,"typeIcon":9,"typeText":30,"dynamicSelectType":9,"editableOptions":31,"complianceRules":495,"displayConditions":9,"answers":496,"listQuestions":9,"required":31,"requiredJustification":31,"suggestTask":31,"riskEnabled":47,"native":31},"89d2ab80-1423-4272-a4a5-b191a2bf822d","les-relations-avec-les-sous-traitants-ulterieurs-ont-fait-lobjet-dun-contrat-","Les relations avec les sous-traitants ultérieurs ont fait l'objet d'un contrat.",[],[497,500,503],{"id":498,"color":9,"rangeValue":9,"label":36,"slug":9,"description":9,"score":37,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":499},"6b04d39a-bbd9-4388-99d5-ccb8a6153be1",[],{"id":501,"color":9,"rangeValue":9,"label":41,"slug":9,"description":9,"score":20,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":502},"df8c1a5c-d77e-4a4c-bc71-dfa15212c2e9",[],{"id":504,"color":9,"rangeValue":9,"label":45,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":505},"3a5872e1-93cf-4f1c-8315-70afadf2be5a",[],{"id":507,"slug":508,"label":509,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":28,"typeIndex":29,"typeColor":9,"typeIcon":9,"typeText":30,"dynamicSelectType":9,"editableOptions":31,"complianceRules":510,"displayConditions":9,"answers":511,"listQuestions":9,"required":31,"requiredJustification":31,"suggestTask":31,"riskEnabled":47,"native":31},"e9dba852-0b9e-46a3-9307-82cc18947ae9","si-oui-ces-contrats-prennent-en-compte-les-exigences-rgpd","Si oui, ces contrats prennent en compte les exigences RGPD",[],[512,515,518],{"id":513,"color":9,"rangeValue":9,"label":36,"slug":9,"description":9,"score":37,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":514},"2242b7ce-de16-4d22-b2f3-ef0a78018d25",[],{"id":516,"color":9,"rangeValue":9,"label":41,"slug":9,"description":9,"score":20,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":517},"0209b120-b8e6-43ec-8ae4-58b91d67b485",[],{"id":519,"color":9,"rangeValue":9,"label":45,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":520},"7a081dcc-ef30-4ca3-82e8-4e31ae585f8b",[],{"id":522,"slug":523,"label":524,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":28,"typeIndex":29,"typeColor":9,"typeIcon":9,"typeText":30,"dynamicSelectType":9,"editableOptions":31,"complianceRules":525,"displayConditions":9,"answers":526,"listQuestions":9,"required":31,"requiredJustification":31,"suggestTask":31,"riskEnabled":47,"native":31},"2ed0f049-580b-4e66-9a35-e84763ae26a4","les-transferts-eventuels-de-donnees-hors-ue-sont-encadres-par-des-clauses-type-ou-autres-garanties-prevues-par-le-rgpd","Les transferts éventuels de données hors UE sont encadrés par des clauses-type ou autres garanties prévues par le RGPD",[],[527,530,533],{"id":528,"color":9,"rangeValue":9,"label":36,"slug":9,"description":9,"score":37,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":529},"320ec324-14df-4736-89d1-e3b9b2c0c6e0",[],{"id":531,"color":9,"rangeValue":9,"label":41,"slug":9,"description":9,"score":20,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":532},"c0fa6866-a122-41c8-8d71-07209d757e49",[],{"id":534,"color":9,"rangeValue":9,"label":45,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":535},"080fa0fc-b330-41ef-bd98-fdad5cacae96",[],{"id":537,"slug":538,"label":539,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":28,"typeIndex":29,"typeColor":9,"typeIcon":9,"typeText":30,"dynamicSelectType":9,"editableOptions":31,"complianceRules":540,"displayConditions":9,"answers":541,"listQuestions":9,"required":31,"requiredJustification":31,"suggestTask":31,"riskEnabled":47,"native":31},"2f3d2f08-af13-4920-8d63-1b28dbf99d1c","le-sous-traitant-sest-assure-que-les-sous-traitants-ulterieurs-ont-pris-les-mesures-organisationnelles-et-techniques-permettant-dassurer-des-garanties-suffisantes-pour-la-protection-des-donnees-a-caractere-personnel","Le sous-traitant s'est assuré que les sous-traitants ultérieurs ont pris les mesures organisationnelles et techniques permettant d'assurer des garanties suffisantes pour la protection des données à caractère personnel",[],[542,545,548],{"id":543,"color":9,"rangeValue":9,"label":36,"slug":9,"description":9,"score":37,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":544},"9aa8d5a4-34e6-42f4-a5c0-00fbcc7796e7",[],{"id":546,"color":9,"rangeValue":9,"label":41,"slug":9,"description":9,"score":20,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":547},"b8c5ed79-5511-4558-b184-37fac1928b3a",[],{"id":549,"color":9,"rangeValue":9,"label":45,"slug":9,"description":9,"score":11,"nonApplicable":31,"tooltip":9,"goodAnswer":31,"redFlag":31,"impact":9,"probability":9,"taskSuggestions":550},"74f0d523-db6f-4925-b3d2-9559828ef46b",[],[],[],"9e6711f4-5178-4ab8-7b53-08d8c722d0b3","1.0","Sous-traitant RGPD (simple)","HDlNOTWcvO2OggAvY7EbnO2JSf1NpxSgIchrztY5gyED8JxrklsfMLi3nDgN",315,"https://static.dastra.eu/tenant-3/audit/99c849d3-538b-45f3-b6b9-01d40374ad7c/icon-audit500x-c6fe934913-150.png","Auto-évaluation des dispositions mise en oeuvre pour répondre aux exigences RGPD.\n\nVersion 1.0","2021-02-02T02:37:56.9533043","2024-08-30T13:54:37.7831972","Vendor",3,"Audit sous-traitant",{"id":566,"displayName":567,"familyName":568,"givenName":569,"email":570,"active":47,"color":571,"avatarUrl":572,"tenantId":20},69,"Dastro Naute","Naute","Dastro","contact@dastra.eu","#784000","https://static.dastra.eu/tenant-3/avatar/69/assistant-150.png","Actor","ds-icon-actor","Acteurs",[577],{"id":578,"displayName":579,"familyName":580,"givenName":581,"email":582,"active":47,"color":583,"avatarUrl":9,"tenantId":20},39,"Antoine Bidault","Bidault","Antoine","antoine.bidault@dastra.eu","#197BBD",[585,594],{"id":586,"label":587,"type":588,"typeIndex":589,"typeColor":590,"typeIcon":591,"typeText":592,"color":593},"cb79e346-9a2a-4e6f-ae8f-cb9bc9e1c9e1","Sous-traitant","AuditTemplate",9,"#83d162","ds-icon-audit","Modèle de questionnaire","#22e292",{"id":595,"label":596,"type":588,"typeIndex":589,"typeColor":590,"typeIcon":591,"typeText":592,"color":597},"87b8e0f8-3e5f-435a-806f-f6011b1fa576","RGPD","#6610f2",27]