[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fOfm1iPQ04VP9Wad3cfkjrPryfHYcNmDa-ggF39qZuwk":3},{"assets":4,"attachments":5,"tags":6,"dataRetentionRules":12,"creatorUser":16,"creatorUserId":16,"updatedBy":16,"updatedById":16,"publishedBy":16,"publishedById":16,"areaOwnerId":16,"owners":76,"customFields":77,"area":78,"entity":82,"mergedFrom":16,"workflowStep":83,"accountables":89,"responsibles":90,"informedOwners":91,"securityMeasures":92,"personCategories":142,"id":20,"source":174,"label":21,"state":88,"versionDescription":175,"processingType":27,"parentId":16,"areaId":26,"mergeType":16,"readonly":17,"editable":34,"workflowStepId":84,"dateDeployment":16,"dateCreation":25,"dateArchived":16,"datePublication":176,"archived":17,"dateUpdate":24,"reviewDate":16,"nextReviewDate":16,"ref":16,"processingState":16,"description":22,"descriptionHtml":16,"subjectRightProcessDescription":16,"rightOfInformation":16,"rightOfAccess":16,"rightOfRectification":16,"rightOfErasure":16,"rightOfRestriction":16,"rightOfOpposition":16,"rightOfDataPortability":16,"advanceDirectives":16,"advanceDirectivesDescription":16,"rightOfInformationDescription":16,"rightOfAccessDescription":16,"rightOfRectificationDescription":16,"rightOfErasureDescription":16,"rightOfRestrictionDescription":16,"rightOfOppositionDescription":16,"rightOfDataPortabilityDescription":16,"stakeHolders":177,"assessmentScoring":16,"automaticDecision":16,"systematicMonitoring":16,"specialCategoryData":16,"largeScaleCollection":16,"crossReferencing":16,"vulnerablePeople":16,"isDPIARequired":16,"dpiaDate":16,"dpiaExemption":17,"dpiaExemptionJustification":16,"innovativeUse":16,"exclusionBenefitRightContract":16,"recipients":178,"dataControllers":194,"purposes":195,"progression":212,"quality":213,"sensitivity":214,"visible":34,"workspaceId":23,"nbReferences":215,"referenceId":20},[],[],[7],{"id":8,"label":9,"type":10,"color":11},"f77cd71f-6de1-4b33-ae56-15e8231ebafa","Informatique et télécoms","DataProcessing","#2F6A91",[13],{"customFields":14,"tags":15,"creator":16,"readonly":17,"purposes":16,"dataProcessings":18,"dataFields":28,"asset":16,"subjectCategories":69,"id":70,"ref":16,"externalId":16,"externalLastSyncDate":16,"externalSource":16,"label":71,"description":72,"dateCreation":73,"dateUpdate":16,"baseActiveOverride":17,"intermediateArchivingOverride":17,"destructionOverride":17,"baseActiveDescription":74,"baseActiveLegalBasis":16,"baseActiveRetentionDuration":16,"baseActiveMinMax":16,"intermediateArchivingLegalBasis":16,"intermediateArchivingDescription":16,"intermediateArchivingRetentionDuration":16,"intermediateArchivingMinMax":16,"destructionDescription":16,"destructionLegalBasis":16,"dataSetSource":75,"sourceDescription":16,"assetId":16,"source":39},{},[],null,false,[19],{"id":20,"label":21,"ref":16,"description":22,"workspaceId":23,"archived":17,"dateUpdate":24,"dateCreation":25,"areaId":26,"processingType":27},"17c4c846-cc25-4002-a27d-37f1728c578c","Gestion des identités et accès","Gestion sécurisée et unifiée des identités numériques et des accès des employés, partenaires, clients et objets connecté",68,"2025-09-16T09:04:29.5418155","2025-09-10T13:42:54.3441563",354,"Default",[29,40,48,55,62],{"id":30,"customFields":31,"ref":16,"archivingPolicy":16,"required":17,"label":32,"definition":33,"technicalDefinition":16,"sensitiveDataFieldLegalJustification":16,"sensitiveDataFieldLegalJustificationDescription":16,"sensitiveData":34,"sensitivityClassification":35,"personalDataCategory":36,"dataType":16,"dateCreation":37,"dateUpdate":16,"creator":16,"workflowStepId":38,"workflowStep":16,"source":39},"e5db8dd3-88d5-427b-b72c-65d0b4876672",{},"Données d'authentification MFA","Informations liées aux facteurs d'authentification multiples, y compris biométrie le cas échéant",true,"Sensitive","BiometricData","2025-09-10T13:42:54.5032898",83450,"Intern",{"id":41,"customFields":42,"ref":16,"archivingPolicy":16,"required":17,"label":43,"definition":44,"technicalDefinition":16,"sensitiveDataFieldLegalJustification":16,"sensitiveDataFieldLegalJustificationDescription":16,"sensitiveData":17,"sensitivityClassification":45,"personalDataCategory":46,"dataType":16,"dateCreation":47,"dateUpdate":16,"creator":16,"workflowStepId":38,"workflowStep":16,"source":39},"6a98dd9d-34cc-4436-946f-666f27ac8b05",{},"Informations personnelles des utilisateurs","Nom, prénom, fonction, contact professionnel","Current","ProfessionalLife","2025-09-10T13:42:54.5166827",{"id":49,"customFields":50,"ref":16,"archivingPolicy":16,"required":17,"label":51,"definition":52,"technicalDefinition":16,"sensitiveDataFieldLegalJustification":16,"sensitiveDataFieldLegalJustificationDescription":16,"sensitiveData":17,"sensitivityClassification":45,"personalDataCategory":53,"dataType":16,"dateCreation":54,"dateUpdate":16,"creator":16,"workflowStepId":38,"workflowStep":16,"source":39},"dfdf4b6e-6a0a-4bf2-9521-9cf6bf1aae63",{},"Logs d'accès et d'activité","Historique des connexions et accès aux services et applications","ConnectionData","2025-09-10T13:42:54.5299658",{"id":56,"customFields":57,"ref":16,"archivingPolicy":16,"required":17,"label":58,"definition":59,"technicalDefinition":16,"sensitiveDataFieldLegalJustification":16,"sensitiveDataFieldLegalJustificationDescription":16,"sensitiveData":17,"sensitivityClassification":45,"personalDataCategory":60,"dataType":16,"dateCreation":61,"dateUpdate":16,"creator":16,"workflowStepId":38,"workflowStep":16,"source":39},"876d3ea8-efb5-44e5-92ca-c44258546c04",{},"Identifiants utilisateurs","Identifiants numériques uniques attribués aux utilisateurs pour connexion","InternetData","2025-09-10T13:42:54.4889175",{"id":63,"customFields":64,"ref":16,"archivingPolicy":16,"required":17,"label":65,"definition":66,"technicalDefinition":16,"sensitiveDataFieldLegalJustification":16,"sensitiveDataFieldLegalJustificationDescription":16,"sensitiveData":17,"sensitivityClassification":45,"personalDataCategory":67,"dataType":16,"dateCreation":68,"dateUpdate":16,"creator":16,"workflowStepId":38,"workflowStep":16,"source":39},"346721f1-ece9-405f-8677-eab0e7eb0944",{},"Informations sur les appareils connectés (IoT)","Données d'identification et d'authentification des objets connectés","Other","2025-09-10T13:42:54.5440696",[],"a2fd5991-1173-40b4-a980-375ee14ede6c","Conservation des identités et accès","Données liées aux identités numériques, droits d'accès, authentifications et habilitations","2025-09-10T13:42:54.4622378","Conservation pendant la durée nécessaire à la gestion des accès et conformément aux obligations légales","Direct",[],{},{"dpo":16,"referent":16,"owner":16,"representative":16,"dataProtectionAuthority":16,"id":26,"type":79,"parentId":16,"ref":16,"label":80,"description":16,"logoUrl":16,"address":16,"zipCode":16,"city":16,"region":16,"countryCode":81,"immatriculationNumber":16,"phoneNumber":16,"mailAddress":16,"dpoId":16,"referentId":16,"ownerId":16,"representativeId":16,"dataProtectionAuthorityId":16},"Entity","Entité","FR",{"dpo":16,"referent":16,"owner":16,"representative":16,"dataProtectionAuthority":16,"id":26,"type":79,"parentId":16,"ref":16,"label":80,"description":16,"logoUrl":16,"address":16,"zipCode":16,"city":16,"region":16,"countryCode":81,"immatriculationNumber":16,"phoneNumber":16,"mailAddress":16,"dpoId":16,"referentId":16,"ownerId":16,"representativeId":16,"dataProtectionAuthorityId":16},{"id":84,"label":85,"color":86,"order":87,"itemLimit":16,"type":10,"finalStep":34,"initialStep":17,"authorizedRole":16,"authorizedRoleId":16,"descriptionHtml":16,"mappedState":88},1011,"Ok","#42c478",3,"Active",[],[],[],[93,105,115,124,133],{"date":94,"state":95,"descriptionHtml":16,"readonly":17,"purposes":16,"customFields":96,"id":97,"ref":16,"label":98,"type":99,"description":100,"relatedRisk":16,"moreDetailsUrl":16,"dateCreation":101,"dateUpdate":16,"tags":102,"attachments":103,"creatorUser":16,"workflowStepId":104,"workflowStep":16},"2026-04-21T18:51:28.1021149Z","None",{},"87a8b690-1036-4379-8e91-069ab988d2fa","Certifications et conformité ISO","Organizational","Maintien des certifications ISO27001, ISO27701 et conformité SecNumCloud pour la gestion et la protection des données.","2025-09-10T13:42:54.4418975",[],[],90384,{"date":106,"state":95,"descriptionHtml":16,"readonly":17,"purposes":16,"customFields":107,"id":108,"ref":16,"label":109,"type":110,"description":111,"relatedRisk":16,"moreDetailsUrl":16,"dateCreation":112,"dateUpdate":16,"tags":113,"attachments":114,"creatorUser":16,"workflowStepId":104,"workflowStep":16},"2026-04-21T18:51:28.1021195Z",{},"b9bda25f-a9df-447a-ad1e-505c1859069a","Authentification multifactorielle (MFA)","Technical","Mise en œuvre de facteurs multiples d'authentification pour renforcer la sécurité des accès.","2025-09-10T13:42:54.4002573",[],[],{"date":116,"state":95,"descriptionHtml":16,"readonly":17,"purposes":16,"customFields":117,"id":118,"ref":16,"label":119,"type":99,"description":120,"relatedRisk":16,"moreDetailsUrl":16,"dateCreation":121,"dateUpdate":16,"tags":122,"attachments":123,"creatorUser":16,"workflowStepId":104,"workflowStep":16},"2026-04-21T18:51:28.1021229Z",{},"fba3df4a-c3d4-4ea8-826a-8b1a02bca462","Gestion des droits personnalisée et délégation multi-dimensionnelle","Assignation fine des habilitations et gestion des responsabilités pour limiter les accès selon les besoins métier.","2025-09-10T13:42:54.413364",[],[],{"date":125,"state":95,"descriptionHtml":16,"readonly":17,"purposes":16,"customFields":126,"id":127,"ref":16,"label":128,"type":110,"description":129,"relatedRisk":16,"moreDetailsUrl":16,"dateCreation":130,"dateUpdate":16,"tags":131,"attachments":132,"creatorUser":16,"workflowStepId":104,"workflowStep":16},"2026-04-21T18:51:28.1021234Z",{},"b226d856-d762-454b-90df-d0716ad027aa","Architecture sécurisée cloud native","Hébergement sur infrastructures sécurisées, multi-tenant, avec architecture microservices garantissant isolation et scalabilité.","2025-09-10T13:42:54.386481",[],[],{"date":134,"state":95,"descriptionHtml":16,"readonly":17,"purposes":16,"customFields":135,"id":136,"ref":16,"label":137,"type":110,"description":138,"relatedRisk":16,"moreDetailsUrl":16,"dateCreation":139,"dateUpdate":16,"tags":140,"attachments":141,"creatorUser":16,"workflowStepId":104,"workflowStep":16},"2026-04-21T18:51:28.1021239Z",{},"1d90d7d9-7264-4b84-b957-dfe5e9eec5ca","Analyse et monitoring continu","Surveillance et analyse des accès, authentifications et événements de sécurité en temps réel via tableaux de bord et rapports.","2025-09-10T13:42:54.4267575",[],[],[143,151,160,167],{"subjectCategory":144,"displayName":146,"id":149,"subjectCategoryId":145,"comment":16,"dataSubjectVolumeMax":16,"readonly":17,"purposes":150},{"id":145,"label":146,"ref":16,"dateCreation":147,"dateUpdate":16,"creatorUserId":16,"creatorUser":16,"description":16,"minorConcerned":17,"workflowStepId":148,"workflowStep":16},"8b9dd7e2-2eb8-4ef5-2689-08dac757bbf1","Employés","2022-11-15T22:21:35.8123871",97319,"54e9354c-b8ec-41d3-b3cc-577b336c4186",[],{"subjectCategory":152,"displayName":154,"id":158,"subjectCategoryId":153,"comment":16,"dataSubjectVolumeMax":16,"readonly":17,"purposes":159},{"id":153,"label":154,"ref":16,"dateCreation":155,"dateUpdate":16,"creatorUserId":156,"creatorUser":16,"description":16,"minorConcerned":17,"workflowStepId":157,"workflowStep":16},"4a1bd5e8-1ad9-4a45-bfe7-a135505051ff","Partenaires","2025-09-10T13:42:54.6358485",31,97318,"1b7117ea-b91f-4a67-a258-766b18f4133c",[],{"subjectCategory":161,"displayName":163,"id":165,"subjectCategoryId":162,"comment":16,"dataSubjectVolumeMax":16,"readonly":17,"purposes":166},{"id":162,"label":163,"ref":16,"dateCreation":164,"dateUpdate":16,"creatorUserId":16,"creatorUser":16,"description":16,"minorConcerned":17,"workflowStepId":148,"workflowStep":16},"983407ad-24f5-48b6-268b-08dac757bbf1","Clients","2022-11-15T22:21:36.912217","5b9805f6-86ff-4ef0-856c-b22e181f556f",[],{"subjectCategory":168,"displayName":170,"id":172,"subjectCategoryId":169,"comment":16,"dataSubjectVolumeMax":16,"readonly":17,"purposes":173},{"id":169,"label":170,"ref":16,"dateCreation":171,"dateUpdate":16,"creatorUserId":156,"creatorUser":16,"description":16,"minorConcerned":17,"workflowStepId":157,"workflowStep":16},"b1ac772f-a472-4b0b-9425-842f94b6fbe0","Objets connectés","2025-09-10T13:42:54.6645262","7525bd5e-f189-4ecb-af5f-fc61238989dd",[],"AI","","2025-09-16T09:04:29.5418154",[],[179],{"purposes":180,"dataRetentionRules":16,"parentId":16,"children":181,"displayName":182,"label":16,"transfers":183,"recipientType":184,"type":185,"jobTitle":16,"id":186,"actorId":187,"actor":188,"areaId":16,"area":16,"description":16,"readonly":17},[],[],"Service informatique interne",[],"InternalService","Recipient","b0ab42c7-041f-4776-a0d8-3129df8676c2","20969282-a145-4964-98de-bac035c3d1b2",{"label":182,"id":187,"ref":16,"dateCreation":189,"dateUpdate":16,"reviewDate":16,"nextReviewDate":16,"logoUrl":16,"state":190,"actorType":191,"description":192,"countryCode":81,"readonly":17,"email":16,"phoneNumber":16,"contactName":16,"contactPosition":16,"immatriculationNumber":16,"websiteUrl":16,"address":16,"zipCode":16,"city":16,"region":16,"workflowStepId":193,"areaId":16,"source":39},"2025-09-10T13:42:54.6026202","New","Morale","Administration et exploitation de la solution IAM Memority par l'équipe IT de l'entreprise",76516,[],[196,204],{"id":197,"key":198,"label":199,"description":200,"legalBasis":201,"legalBasisText":202,"legalBasisDescription":203,"readonly":17},"d32bf182-f41d-491e-9341-99c9e43bdb16","8332b09e-7f6b-4f8c-a678-e74ec14ad21c","Conformité réglementaire et cybersécurité","Respect des normes ISO27001, ISO27701 et SecNumCloud, sécurisation des données personnelles et prévention des cyberattaques","LegalCommitment","Obligation légale","Respect des obligations légales et réglementaires en matière de sécurité et protection des données personnelles",{"id":205,"key":206,"label":207,"description":208,"legalBasis":209,"legalBasisText":210,"legalBasisDescription":211,"readonly":17},"80b77272-d919-43ea-810c-ac5ccdf1cd3b","271536c2-ac73-4e60-b042-cd29bb17b1bf","Gestion des identités et contrôle des accès","Gestion du cycle de vie des identités numériques, authentification sécurisée et contrôle des accès aux services","LegitimateInterest","Intérêts légitimes du responsable du traitement ou d'un tiers","Garantir la sécurité des systèmes d'information et des données conformément aux intérêts légitimes de l'organisation",100,34,23,4]