[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$faVDaPHxNnMAp8o_Eb47g866qSrG-6jVEO3ZmJlVROvc":3},{"sections":4,"resultAnalysis":469,"id":470,"version":471,"newVersion":23,"label":472,"isPinned":23,"isShared":42,"sharingToken":473,"isRevision":23,"isBlockAnalysisShared":23,"nbReferences":474,"referenceId":9,"nbResponses":11,"parentId":9,"revisionDescription":9,"logoUrl":475,"description":476,"scheduleIntervalDays":9,"versionNumber":477,"dateCreation":478,"dateUpdate":479,"dateArchived":9,"archived":23,"type":480,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":480,"creator":481,"objectType":9,"defaultOwners":489,"tags":490,"privacyHubs":9,"nbQuestions":508,"nbQuestionsRequired":11,"nbDatas":11,"deadLineDays":9},[5,59,247,365,447],{"id":6,"slug":7,"label":8,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":13,"questions":14,"sections":58},"72042a65-94c1-460a-b10a-157529c8b1b4","protection-des-donnees","Protection des données",null,"Default",0,"SectionType_Default","",[15,43],{"id":16,"slug":17,"label":18,"tooltipHtml":9,"descriptionHtml":19,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":24,"displayConditions":9,"answers":25,"listQuestions":9,"required":23,"requiredJustification":23,"suggestTask":23,"riskEnabled":42,"native":23},"c8403931-3d6e-43c6-b11a-3fa90c430216","la-charte-contient-un-rappel-des-regles-de-protection-des-donnees","La charte contient un rappel des règles de protection des données ","\u003Cp>Par exemple, les principes cardinaux de la protection des données (transparence, finalité, conservation, sécurité, droit)\u003C/p>","Radio",7,"Liste de cases à cocher (une seule réponse)",false,[],[26,31],{"id":27,"color":9,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":30},"7d85da0f-a46c-4f07-88c0-c158ab8d96c6","Oui",2,[],{"id":32,"color":9,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":34},"62d853a2-0648-49a3-88b8-056d7e5928bf","Non",[35],{"id":36,"label":37,"userId":9,"color":9,"description":38,"priority":39,"priorityIndex":29,"priorityColor":40,"priorityIcon":9,"priorityText":41},"2110b079-f09e-4034-87b0-3c796d845188","Compléter la charte informatique","\u003Cp>Inclure les règles de protection des données de l'organisation prévues dans la politique interne\u003C/p>","Medium","#ffc107","Moyen",true,{"id":44,"slug":45,"label":46,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":47,"displayConditions":9,"answers":48,"listQuestions":9,"required":23,"requiredJustification":23,"suggestTask":23,"riskEnabled":42,"native":23},"cfb8277d-95e8-403a-8c74-13e1d8978f78","la-charte-contient-un-rappel-des-sanctions-encourues-en-cas-de-non-respect-des-regles-de-protection-des-donnees","La charte contient un rappel des sanctions encourues en cas de non respect des règles de protection des données",[],[49,52],{"id":50,"color":9,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":51},"4a958519-6352-4b18-bc24-0064a33d910d",[],{"id":53,"color":9,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":54},"c00f3002-4326-4f0b-b1a2-150096ffcfe4",[55],{"id":56,"label":37,"userId":9,"color":9,"description":57,"priority":39,"priorityIndex":29,"priorityColor":40,"priorityIcon":9,"priorityText":41},"4a0e66a7-ef0b-4739-85d3-209d6e8105ee","\u003Cp>Rappeler les sanctions encourues \u003C/p>",[],{"id":60,"slug":61,"label":62,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":9,"questions":63,"sections":246},"76afe672-166e-4c6d-8798-fe1544b29308","champ-dapplication","Champ d'application",[64,80,96,112,136,158,180,202,224],{"id":65,"slug":66,"label":67,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":68,"displayConditions":9,"answers":69,"listQuestions":9,"required":23,"requiredJustification":23,"suggestTask":23,"riskEnabled":42,"native":23},"f98314a2-1ce5-4a6a-8097-8f88d7bbc391","le-champ-dapplication-de-la-charte-inclut-les-modalites-dintervention-des-equipes-chargees-de-la-gestion-des-ressources-informatiquesde-lorganisme","Le champ d’application de la charte inclut les modalités d’intervention des équipes chargées de la gestion des ressources informatiques\nde l’organisme",[],[70,73],{"id":71,"color":9,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":72},"634500ed-5c40-4f2a-b1cf-25e32ba09ce3",[],{"id":74,"color":9,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":75},"88030415-cde9-4f17-98de-0765d974ae1c",[76],{"id":77,"label":78,"userId":9,"color":9,"description":79,"priority":39,"priorityIndex":29,"priorityColor":40,"priorityIcon":9,"priorityText":41},"94b62ab7-19f2-445f-b194-21a867d5ee5e","Modalités d'intervention des équipes SI","\u003Cp>Inclure les modalités d’intervention des équipes chargées de la gestion des ressources informatiques de l’organisme\u003C/p>",{"id":81,"slug":82,"label":83,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":84,"displayConditions":9,"answers":85,"listQuestions":9,"required":23,"requiredJustification":23,"suggestTask":23,"riskEnabled":42,"native":23},"7c31752a-d289-470b-8a21-48c46b3eba06","le-champ-dapplication-de-la-charte-inclut-les-moyens-dauthentification-utilises-par-lorganisme","Le champ d’application de la charte inclut les moyens d’authentification utilisés par l’organisme",[],[86,89],{"id":87,"color":9,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":88},"d7f98f5a-4edf-448a-ab26-42cc5a2c004e",[],{"id":90,"color":9,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":91},"00ca071a-4adb-4ffd-9f95-6c9a5f49720a",[92],{"id":93,"label":94,"userId":9,"color":9,"description":95,"priority":39,"priorityIndex":29,"priorityColor":40,"priorityIcon":9,"priorityText":41},"dd0cd849-a4a0-45e9-9f28-ce300b33ae25","Moyens d’authentification ","\u003Cp>Inclure les moyens d’authentification utilisés par l’organisme\u003C/p>",{"id":97,"slug":98,"label":99,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":100,"displayConditions":9,"answers":101,"listQuestions":9,"required":23,"requiredJustification":23,"suggestTask":23,"riskEnabled":42,"native":23},"b43233ae-ca40-42e9-a7e5-9284a8bd145d","le-champ-dapplication-de-la-charte-inclut-les-regles-de-securite-auxquelles-les-utilisateurs-doivent-se-conformer","Le champ d'application de la charte inclut les règles de sécurité auxquelles les utilisateurs doivent se conformer",[],[102,105],{"id":103,"color":9,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":104},"4463b9dd-0425-42d1-aa8e-2309ba62b577",[],{"id":106,"color":9,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":107},"b9bb4f0c-89f4-4475-9f36-023d255c9cab",[108],{"id":109,"label":110,"userId":9,"color":9,"description":111,"priority":39,"priorityIndex":29,"priorityColor":40,"priorityIcon":9,"priorityText":41},"20f71f0a-3f62-4425-b9c5-7ffb97955955","Règles de sécurité","\u003Cp>Inclure les règles de sécurité auxquelles les utilisateurs doivent se conformer\u003C/p>",{"id":113,"slug":114,"label":115,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":116,"displayConditions":117,"answers":125,"listQuestions":9,"required":23,"requiredJustification":23,"suggestTask":23,"riskEnabled":42,"native":23},"1c6a649a-169a-47d7-a3be-449d73bac73b","les-regles-de-securite-incluent-lobligation-de-signaler-au-service-informatique-interne-toute-violation-ou-tentative-de-violation-suspectee-de-son-compte-informatique-et-de-maniere-generale-tout-dysfonctionnement","Les règles de sécurité incluent l'obligation de signaler au service informatique interne toute violation ou tentative de violation suspectée de son compte informatique et de manière générale tout dysfonctionnement ",[],{"id":118,"separator":119,"field":9,"operator":120,"value":9,"rules":121},"96e9c530-7367-4011-8a26-9295f723e9a0","And","equal",[122],{"id":123,"separator":9,"field":97,"operator":120,"value":103,"rules":124},"4b9be432-8c76-4aa3-8424-afaa95983968",[],[126,129],{"id":127,"color":9,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":128},"d2641d97-2aef-45c8-89fc-f7ca1ad1c6af",[],{"id":130,"color":9,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":131},"58c2288c-b19c-41d1-bb79-7cc67d7c77a9",[132],{"id":133,"label":134,"userId":9,"color":9,"description":135,"priority":39,"priorityIndex":29,"priorityColor":40,"priorityIcon":9,"priorityText":41},"02df34eb-da73-4160-ae97-adff936eb4d6","Signalement de violations","\u003Cp>Inclure les règles de signalement des violations de données\u003C/p>",{"id":137,"slug":138,"label":139,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":140,"displayConditions":141,"answers":147,"listQuestions":9,"required":23,"requiredJustification":23,"suggestTask":23,"riskEnabled":42,"native":23},"9ae97568-671d-4441-bf5d-3a7d3169322d","les-regles-de-securite-incluent-lobligation-de-ne-jamais-confier-son-identifiant-mot-de-passe-a-un-tiers","Les règles  de sécurité incluent l'obligation de ne jamais confier son identifiant/mot de passe à un tiers",[],{"id":142,"separator":119,"field":9,"operator":120,"value":9,"rules":143},"fc0b7fdd-36cb-4952-a10b-a1d009b9946b",[144],{"id":145,"separator":9,"field":97,"operator":120,"value":103,"rules":146},"01ec216b-e429-4fe0-b2d9-cea82bc17949",[],[148,151],{"id":149,"color":9,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":150},"3c8a8157-b8e2-4ca7-8eee-ce5090f143e3",[],{"id":152,"color":9,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":153},"b61f38a8-0272-41b4-9617-d0d264b60b81",[154],{"id":155,"label":156,"userId":9,"color":9,"description":157,"priority":39,"priorityIndex":29,"priorityColor":40,"priorityIcon":9,"priorityText":41},"28b12efc-f2c7-473c-ac8a-d7bfda4c9630","Identifiants et mots de passe","\u003Cp>Inclure l'obligation de garder son mot de passe personnel et secret\u003C/p>",{"id":159,"slug":160,"label":161,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":162,"displayConditions":163,"answers":169,"listQuestions":9,"required":23,"requiredJustification":23,"suggestTask":23,"riskEnabled":42,"native":23},"72dba7ce-1320-471a-9caa-50b7a5205534","les-regles-de-securite-incluent-lobligation-de-ne-pas-installer-copier-modifier-detruire-des-logiciels-sans-autorisation","Les règles de sécurité incluent l'obligation de ne pas installer, copier, modifier, détruire des logiciels sans autorisation ",[],{"id":164,"separator":119,"field":9,"operator":120,"value":9,"rules":165},"9faa26a0-e21d-4c90-9cf7-128041266fce",[166],{"id":167,"separator":9,"field":97,"operator":120,"value":103,"rules":168},"6c44588f-f201-4462-bba8-dc3d5f76e87a",[],[170,173],{"id":171,"color":9,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":172},"ec596d01-945e-47c5-ba65-4002c5cee9d4",[],{"id":174,"color":9,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":175},"b16c3f03-3132-473a-8313-2485ec67e14f",[176],{"id":177,"label":178,"userId":9,"color":9,"description":179,"priority":39,"priorityIndex":29,"priorityColor":40,"priorityIcon":9,"priorityText":41},"c3b49d20-e60b-4e7a-b890-f00a507df9e5","Protection des logiciels","\u003Cp>Inclure la règle de protection et de prévention des logiciels malveillants \u003C/p>",{"id":181,"slug":182,"label":183,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":184,"displayConditions":185,"answers":191,"listQuestions":9,"required":23,"requiredJustification":23,"suggestTask":23,"riskEnabled":42,"native":23},"48bb4b75-8308-4225-9eb7-9a48fba9d8ed","les-regles-de-securite-incluent-lobligation-de-verrouiller-son-ordinateur-des-que-lon-quitte-son-poste-de-travail","Les règles de sécurité incluent l'obligation de verrouiller son ordinateur dès que l’on quitte son poste de travail",[],{"id":186,"separator":119,"field":9,"operator":120,"value":9,"rules":187},"72079746-aca5-4dd5-ad33-c5175b3a8688",[188],{"id":189,"separator":9,"field":97,"operator":120,"value":103,"rules":190},"232cd50a-2923-41a2-972d-38c26b20522e",[],[192,195],{"id":193,"color":9,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":194},"3c395dc8-bcf0-46be-9488-804dcb3a1aa2",[],{"id":196,"color":9,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":197},"0dca2461-0fb1-4703-b698-c74b6a8f9dab",[198],{"id":199,"label":200,"userId":9,"color":9,"description":201,"priority":39,"priorityIndex":29,"priorityColor":40,"priorityIcon":9,"priorityText":41},"35eaa782-6d82-4c7a-a9fb-22ae08fc98d5","Verrouillage des postes de travail","\u003Cp>Inclure les règles de verrouillage des postes de travail\u003C/p>",{"id":203,"slug":204,"label":205,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":206,"displayConditions":207,"answers":213,"listQuestions":9,"required":23,"requiredJustification":23,"suggestTask":23,"riskEnabled":42,"native":23},"80d3bc95-4739-4f46-bd58-333bc76433bb","les-regles-de-securite-incluent-lobligation-de-ne-pas-acceder-tenter-dacceder-ou-supprimer-des-informations-si-cela-ne-releve-pas-des-tachesincombant-a-lutilisateur","Les règles de sécurité incluent l'obligation de ne pas accéder, tenter d’accéder, ou supprimer des informations si cela ne relève pas des tâches\nincombant à l’utilisateur",[],{"id":208,"separator":119,"field":9,"operator":120,"value":9,"rules":209},"740bd75b-4a4a-45d5-9e92-25a894cf2532",[210],{"id":211,"separator":9,"field":97,"operator":120,"value":103,"rules":212},"05ba7e7a-3bd2-4979-8168-988e3ad6d575",[],[214,217],{"id":215,"color":9,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":216},"176f25a5-496a-4155-bc94-1d0ba00789a9",[],{"id":218,"color":9,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":219},"077ef379-7c7a-4d03-ac2f-6a0979568952",[220],{"id":221,"label":222,"userId":9,"color":9,"description":223,"priority":39,"priorityIndex":29,"priorityColor":40,"priorityIcon":9,"priorityText":41},"a2b737a0-5cc3-49f1-b212-38e741a1871e","Confidentialité","\u003Cp>Inclure l'obligation de ne pas accéder, tenter d’accéder, ou supprimer des informations si cela ne relève pas des tâches incombant à l’utilisateur\u003C/p>",{"id":225,"slug":226,"label":227,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":228,"displayConditions":229,"answers":235,"listQuestions":9,"required":23,"requiredJustification":23,"suggestTask":23,"riskEnabled":42,"native":23},"bde5a663-b8e3-4e96-82b9-623e2a209ee0","les-regles-de-securite-incluent-lobligation-de-respecter-les-procedures-prealablement-definies-par-lorganisme-afin-dencadrer-les-operationsde-copie-de-donnees-sur-des-supports-amovibles-notamment-en-obtenant-laccord-prealable-du-superieur-hierarchique-et-en-respectant-les-regles-de-securite","Les règles de sécurité incluent l'obligation de respecter les procédures préalablement définies par l’organisme afin d’encadrer les opérations\nde copie de données sur des supports amovibles, notamment en obtenant l’accord préalable du supérieur hiérarchique et en respectant les règles de sécurité",[],{"id":230,"separator":119,"field":9,"operator":120,"value":9,"rules":231},"c48f071d-082c-4097-90e4-3909917c2e4a",[232],{"id":233,"separator":9,"field":97,"operator":120,"value":103,"rules":234},"8e9c9df3-fed0-42a5-a976-386a158a2141",[],[236,239],{"id":237,"color":9,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":238},"0bab27a9-efcd-472b-9a13-cb755c5a103b",[],{"id":240,"color":9,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":241},"6ad5ddf8-16ac-450a-9ef9-eaffa5f78cbb",[242],{"id":243,"label":244,"userId":9,"color":9,"description":245,"priority":39,"priorityIndex":29,"priorityColor":40,"priorityIcon":9,"priorityText":41},"f22ef193-d688-4ef0-8626-74117fbe8d7d","Copies de données","\u003Cp>Inclure l'obligation de respecter les procédures préalablement définies par l’organisme afin d’encadrer les opérations de copie de données sur des supports amovibles, notamment en obtenant l’accord préalable du supérieur hiérarchique et en respectant les règles de sécurité\u003C/p>",[],{"id":248,"slug":249,"label":250,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":9,"questions":251,"sections":364},"d5b86b23-6667-4534-a81c-704d114c469b","utilisation-des-moyens-informatiques-et-de-telecommunication","Utilisation des moyens informatiques et de télécommunication ",[252,268,284,300,316,332,348],{"id":253,"slug":254,"label":255,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":256,"displayConditions":9,"answers":257,"listQuestions":9,"required":23,"requiredJustification":23,"suggestTask":23,"riskEnabled":42,"native":23},"7b21748f-26d0-4053-ae90-0202fb1cf980","la-charte-encadre-les-modalites-dutilisation-des-postes-de-travail","La charte encadre les modalités d'utilisation des postes de travail",[],[258,261],{"id":259,"color":9,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":260},"c58cb4ed-54bc-4d10-a900-a96b371b00c5",[],{"id":262,"color":9,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":263},"db45b4ab-af3f-4643-b9ae-16420258e6d9",[264],{"id":265,"label":266,"userId":9,"color":9,"description":267,"priority":39,"priorityIndex":29,"priorityColor":40,"priorityIcon":9,"priorityText":41},"0e281712-2235-420c-badb-0c0959cc5209","Modalités d'utilisation des postes de travail","\u003Cp>Inclure les modalités d'utilisation des postes de travail\u003C/p>",{"id":269,"slug":270,"label":271,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":272,"displayConditions":9,"answers":273,"listQuestions":9,"required":23,"requiredJustification":23,"suggestTask":23,"riskEnabled":42,"native":23},"897a71c9-f41d-4396-be72-c6da51f4477e","la-charte-encadre-les-modalites-dutilisation-des-equipements-nomades-notamment-dans-le-cadre-du-teletravail","La charte encadre les modalités d'utilisation des équipements nomades (notamment dans le cadre du télétravail)  ",[],[274,277],{"id":275,"color":9,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":276},"d9262074-b236-4607-bcff-e660408aee39",[],{"id":278,"color":9,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":279},"7ad606c8-b40b-4b29-b8f7-52aebaecff37",[280],{"id":281,"label":282,"userId":9,"color":9,"description":283,"priority":39,"priorityIndex":29,"priorityColor":40,"priorityIcon":9,"priorityText":41},"a165b7ac-d3c1-4890-b2d9-ba847dc00f10","Equipements nomades (télétravail)","\u003Cp>Inclure les modalités d'utilisation des équipements nomades (notamment dans le cadre du télétravail)\u003C/p>",{"id":285,"slug":286,"label":287,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":288,"displayConditions":9,"answers":289,"listQuestions":9,"required":23,"requiredJustification":23,"suggestTask":23,"riskEnabled":42,"native":23},"87b9483b-b57f-48a1-8d07-b7d08c0634f1","la-charte-encadre-les-modalites-dutilisation-des-reseaux-locaux","La charte encadre les modalités d'utilisation des réseaux locaux",[],[290,293],{"id":291,"color":9,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":292},"e7b3d30c-0cbd-4135-ba06-52fa8a1f2b0b",[],{"id":294,"color":9,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":295},"7bb30786-d9ab-40f7-a06d-79ebe1d0a68c",[296],{"id":297,"label":298,"userId":9,"color":9,"description":299,"priority":39,"priorityIndex":29,"priorityColor":40,"priorityIcon":9,"priorityText":41},"267d561d-f6a7-41b0-bb89-25b21250d82c","Modalités d'utilisation des réseaux locaux","\u003Cp>Inclure les modalités d'utilisation des réseaux locaux\u003C/p>",{"id":301,"slug":302,"label":303,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":304,"displayConditions":9,"answers":305,"listQuestions":9,"required":23,"requiredJustification":23,"suggestTask":23,"riskEnabled":42,"native":23},"b81d3e83-873b-43ac-8d71-80f2d0be8a3e","la-charte-encadre-les-modalites-dutilisation-des-conditions-dutilisation-des-dispositifs-personnels","La charte encadre les modalités d'utilisation des conditions d’utilisation des dispositifs personnels",[],[306,309],{"id":307,"color":9,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":308},"de632c81-5d8f-4027-b914-00454364cb89",[],{"id":310,"color":9,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":311},"9f723c72-3ae5-43cf-a57d-3449cca45063",[312],{"id":313,"label":314,"userId":9,"color":9,"description":315,"priority":39,"priorityIndex":29,"priorityColor":40,"priorityIcon":9,"priorityText":41},"cb4677dd-2508-4e44-aee6-a85f5eaa3e29","Dispositifs personnels","\u003Cp>Inclure les modalités d'utilisation des conditions d’utilisation des dispositifs personnels\u003C/p>",{"id":317,"slug":318,"label":319,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":320,"displayConditions":9,"answers":321,"listQuestions":9,"required":23,"requiredJustification":23,"suggestTask":23,"riskEnabled":42,"native":23},"0660807a-3061-4f95-a340-20d425c34fd3","la-charte-encadre-les-modalites-dutilisation-dinternet","La charte encadre les modalités d'utilisation d'Internet",[],[322,325],{"id":323,"color":9,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":324},"49aadb70-94d9-41e6-9177-cdfbb8ba4b3c",[],{"id":326,"color":9,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":327},"5478bf5a-c9f9-472a-9fee-79cb77ebb6e5",[328],{"id":329,"label":330,"userId":9,"color":9,"description":331,"priority":39,"priorityIndex":29,"priorityColor":40,"priorityIcon":9,"priorityText":41},"578aefc7-e371-4539-9fa9-62ca946153c8","Modalités d'utilisation d'Internet","\u003Cp>Inclure les modalités d'utilisation d'Internet\u003C/p>",{"id":333,"slug":334,"label":335,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":336,"displayConditions":9,"answers":337,"listQuestions":9,"required":23,"requiredJustification":23,"suggestTask":23,"riskEnabled":42,"native":23},"477a51d5-f15d-40bc-b16b-a544b2d7926e","la-charte-encadre-les-modalites-dutilisation-de-la-messagerie-electronique","La charte encadre les modalités d'utilisation de la messagerie électronique ",[],[338,341],{"id":339,"color":9,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":340},"7a16589b-098b-4152-ba50-077475484de5",[],{"id":342,"color":9,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":343},"651be918-fd37-46fc-b2d8-f8dbb533472f",[344],{"id":345,"label":346,"userId":9,"color":9,"description":347,"priority":39,"priorityIndex":29,"priorityColor":40,"priorityIcon":9,"priorityText":41},"9317636c-de7c-4063-9a8c-eac33275e3c9","Modalités d'utilisation de la messagerie électronique","\u003Cp>Inclure les modalités d'utilisation de la messagerie électronique\u003C/p>",{"id":349,"slug":350,"label":351,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":352,"displayConditions":9,"answers":353,"listQuestions":9,"required":23,"requiredJustification":23,"suggestTask":23,"riskEnabled":42,"native":23},"e76063ed-d019-4c33-86a6-8091bb770135","la-charte-encadre-les-modalites-dutilisation-de-la-telephonie","La charte encadre les modalités d'utilisation de la téléphonie",[],[354,357],{"id":355,"color":9,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":356},"1c9b47ba-78af-4cee-acda-58ae09753f0b",[],{"id":358,"color":9,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":359},"3e3bb1f4-949c-4005-9f40-d2ae2f32c083",[360],{"id":361,"label":362,"userId":9,"color":9,"description":363,"priority":39,"priorityIndex":29,"priorityColor":40,"priorityIcon":9,"priorityText":41},"3dc1902f-6b62-407c-8d7d-0241af5486cd","Modalités d'utilisation de la téléphonie","\u003Cp>Inclure les modalités d'utilisation de la téléphonie\u003C/p>",[],{"id":366,"slug":367,"label":368,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":9,"questions":369,"sections":446},"9c6361e7-25e4-4298-99ab-a7b231ec0355","administration-du-systeme-dinformation","Administration du système d'information",[370,386,407,427],{"id":371,"slug":372,"label":373,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":374,"displayConditions":9,"answers":375,"listQuestions":9,"required":23,"requiredJustification":23,"suggestTask":23,"riskEnabled":42,"native":23},"bc364fc8-68e5-40b4-8b73-28eb19a2296c","la-charte-encadre-les-conditions-dadministration-du-systeme-dinformation","La charte encadre les conditions d’administration du système d’information",[],[376,379],{"id":377,"color":9,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":378},"c87a1448-0f2b-4e20-afa7-a52ecf3d6ddb",[],{"id":380,"color":9,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":381},"84c66f40-b317-4c5a-9b9d-c5b6a5d9c2d0",[382],{"id":383,"label":384,"userId":9,"color":9,"description":385,"priority":39,"priorityIndex":29,"priorityColor":40,"priorityIcon":9,"priorityText":41},"75ad64fc-4283-4ece-994b-31813677a840","Conditions d’administration du système d’information","\u003Cp>Encadrer les conditions d’administration du système d’information\u003C/p>",{"id":387,"slug":388,"label":389,"tooltipHtml":9,"descriptionHtml":390,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":391,"displayConditions":9,"answers":392,"listQuestions":9,"required":23,"requiredJustification":23,"suggestTask":23,"riskEnabled":42,"native":23},"8456274c-4063-4f82-9388-b16dbe1cad09","la-charte-encadre-les-systemes-automatiques-de-filtrage","La charte encadre les systèmes automatiques de filtrage","\u003Cp>En particulier, la charte indique leur existence et les modalités de leur utilisation. \u003C/p>\u003Cp>Les systèmes automatiques de filtrage permettent de bloquer l'accès à certains contenus (comme des sites web par exemple) à partir du poste de travail d'un employé. \u003C/p>",[],[393,396,403],{"id":394,"color":9,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":395},"8215ca2f-dc16-40be-b032-a8a904017e26",[],{"id":397,"color":9,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":398},"3d999fd3-2a0b-4700-8598-c45865efd527",[399],{"id":400,"label":401,"userId":9,"color":9,"description":402,"priority":39,"priorityIndex":29,"priorityColor":40,"priorityIcon":9,"priorityText":41},"edf308e6-8702-4478-bff2-c105e7f6cd25","Systèmes automatiques de filtrage","\u003Cp>Encadrer les systèmes automatiques de filtrage. \u003C/p>\u003Cp>En particulier, la charte indique leur existence et les modalités de leur utilisation.\u003C/p>\u003Cp>Les systèmes automatiques de filtrage permettent de bloquer l'accès à certains contenus (comme des sites web par exemple) à partir du poste de travail d'un employé.\u003C/p>",{"id":404,"color":9,"rangeValue":9,"label":405,"slug":9,"description":9,"score":9,"nonApplicable":42,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":406},"b4b4a201-2f3d-480b-adbc-8b54cea2dd42","Non concerné",[],{"id":408,"slug":409,"label":410,"tooltipHtml":9,"descriptionHtml":411,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":412,"displayConditions":9,"answers":413,"listQuestions":9,"required":23,"requiredJustification":23,"suggestTask":23,"riskEnabled":42,"native":23},"fb0c30c3-f38e-4ae0-8674-637060cfdfe1","la-charte-encadre-les-systemes-automatiques-de-tracabilite","La charte encadre les systèmes automatiques de traçabilité","\u003Cp>Il s'agit notamment des logs de connexion\u003C/p>",[],[414,417,424],{"id":415,"color":9,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":416},"ea0e30ee-d2e3-430b-9bfd-8b12eade8974",[],{"id":418,"color":9,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":419},"0d4edabf-0f8b-47e5-a138-f92a50210ef2",[420],{"id":421,"label":422,"userId":9,"color":9,"description":423,"priority":39,"priorityIndex":29,"priorityColor":40,"priorityIcon":9,"priorityText":41},"5013205d-8361-4b0d-9d8d-0a2316e660d7","Systèmes automatiques de traçabilité","\u003Cp>Encadrer les systèmes automatiques de traçabilité\u003Cstrong> \u003C/strong>(notamment des logs de connexion).\u003C/p>",{"id":425,"color":9,"rangeValue":9,"label":405,"slug":9,"description":9,"score":9,"nonApplicable":42,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":426},"89f2ba8a-5aa9-464a-87fa-e3aa8a7a46b3",[],{"id":428,"slug":429,"label":430,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":431,"displayConditions":9,"answers":432,"listQuestions":9,"required":23,"requiredJustification":23,"suggestTask":23,"riskEnabled":42,"native":23},"2cd8920e-8267-43d6-8baf-ebe058bea53f","la-charte-encadre-la-gestion-du-poste-de-travail","La charte encadre la gestion du poste de travail",[],[433,436,443],{"id":434,"color":9,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":435},"39a11df5-ca73-47f3-8664-0fc2676f6bc6",[],{"id":437,"color":9,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":438},"e5c70520-9b80-499e-b46e-5725ff580848",[439],{"id":440,"label":441,"userId":9,"color":9,"description":442,"priority":39,"priorityIndex":29,"priorityColor":40,"priorityIcon":9,"priorityText":41},"1b505ad2-9fb7-4d85-b360-10bf47d50c80","Gestion du poste de travail","\u003Cp>Encadrer la gestion du poste de travail\u003C/p>",{"id":444,"color":9,"rangeValue":9,"label":405,"slug":9,"description":9,"score":9,"nonApplicable":42,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":445},"0d254927-8039-493e-b380-9cc06adc53e7",[],[],{"id":448,"slug":449,"label":450,"emoji":9,"type":10,"typeIndex":11,"typeColor":9,"typeIcon":9,"typeText":12,"descriptionHtml":9,"questions":451,"sections":468},"c7cfb863-ee81-42ba-ab41-a14c50a0b360","responsabilites-et-sanctions","Responsabilités et sanctions ",[452],{"id":453,"slug":454,"label":455,"tooltipHtml":9,"descriptionHtml":9,"badResponseCommentHtml":9,"goodResponseCommentHtml":9,"placeholder":9,"min":9,"max":9,"regex":9,"unit":9,"type":20,"typeIndex":21,"typeColor":9,"typeIcon":9,"typeText":22,"dynamicSelectType":9,"editableOptions":23,"complianceRules":456,"displayConditions":9,"answers":457,"listQuestions":9,"required":23,"requiredJustification":23,"suggestTask":23,"riskEnabled":42,"native":23},"1c309b68-0ce7-401c-b4cd-ecc53639c66a","la-charte-decrit-les-sanctions-applicables-en-cas-de-non-respect-de-la-charte","La charte décrit les sanctions applicables en cas de non respect de la charte",[],[458,461],{"id":459,"color":9,"rangeValue":9,"label":28,"slug":9,"description":9,"score":29,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":460},"6cadac40-7f74-4201-81b7-3063d963d0f5",[],{"id":462,"color":9,"rangeValue":9,"label":33,"slug":9,"description":9,"score":11,"nonApplicable":23,"tooltip":9,"goodAnswer":23,"redFlag":23,"impact":9,"probability":9,"taskSuggestions":463},"952bbe7d-6870-4b1d-9eda-19dd86c63632",[464],{"id":465,"label":466,"userId":9,"color":9,"description":467,"priority":39,"priorityIndex":29,"priorityColor":40,"priorityIcon":9,"priorityText":41},"6f3f96ca-8dfd-4296-a013-c169ceaff4c2","Sanctions applicables en cas de non respect de la charte","\u003Cp>Décrire les sanctions applicables en cas de non respect de la charte\u003C/p>",[],[],"a0c76554-38d7-47de-b65b-bb484da950f8","1.0","Charte informatique","jni3FVjXLCkulnBQ13KhaGq6hkZ7w42hTqHttTy4ijvB1HPCevPyPMgt7I40",11,"https://static.dastra.eu/tenant-3/audit/b50e3687-6f59-4f7d-9ff0-47084065d976/icon-audit500x-83e64f4e61-150.png","Ce modèle d'audit permet de s'assurer que la charte informatique présente l'ensemble des éléments requis par la règlementation selon la CNIL.\n\nVersion 1.0",1,"2021-02-24T09:49:55.476478","2025-05-22T20:09:43.6628376","Standard",{"id":482,"displayName":483,"familyName":484,"givenName":485,"email":486,"active":42,"color":487,"avatarUrl":488,"tenantId":11},69,"Dastro Naute","Naute","Dastro","contact@dastra.eu","#784000","https://static.dastra.eu/tenant-3/avatar/69/assistant-150.png",[],[491,500,504],{"id":492,"label":493,"type":494,"typeIndex":495,"typeColor":496,"typeIcon":497,"typeText":498,"color":499},"38981f73-69f7-4822-89f3-213137eb3205","Gouvernance","AuditTemplate",9,"#83d162","ds-icon-audit","Modèle de questionnaire","#E8E462",{"id":501,"label":502,"type":494,"typeIndex":495,"typeColor":496,"typeIcon":497,"typeText":498,"color":503},"737d45ba-94c7-414e-93e8-4172b80010dd","Organisation","#2F537B",{"id":505,"label":506,"type":494,"typeIndex":495,"typeColor":496,"typeIcon":497,"typeText":498,"color":507},"48db524d-e5d9-4140-b1f2-60a20ca38936","CNIL","#dc3545",23]