{"id":11515,"date":"2023-08-21T06:21:08","date_gmt":"2023-08-21T04:21:08","guid":{"rendered":"https:\/\/www.auditsi.eu\/?p=11515"},"modified":"2023-09-23T11:37:37","modified_gmt":"2023-09-23T09:37:37","slug":"se-proteger-de-lusurpation-didentite-avec-les-filigranes","status":"publish","type":"post","link":"https:\/\/www.auditsi.eu\/?p=11515","title":{"rendered":"Se prot\u00e9ger de l&#8217;usurpation d&#8217;identit\u00e9 avec les filigranes"},"content":{"rendered":"<p style=\"text-align: justify;\">L&#8217;usurpation d&#8217;identit\u00e9 est un v\u00e9ritable fl\u00e9au. En effet, avec l&#8217;<strong>essor d&#8217;Internet<\/strong>, les donn\u00e9es personnelles sont devenues plus accessibles que jamais. Les pirates informatiques et les escrocs utilisent diverses m\u00e9thodes, telles que l&#8217;hame\u00e7onnage (<em>phishing<\/em>), le vol de donn\u00e9es et les logiciels malveillants, pour recueillir des informations sensibles sur des individus.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-11516\" src=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2023\/07\/Filigrane-GOUV-FR.png\" alt=\"Filigrane GOUV FR\" width=\"977\" height=\"607\" srcset=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2023\/07\/Filigrane-GOUV-FR.png 977w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2023\/07\/Filigrane-GOUV-FR-300x186.png 300w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2023\/07\/Filigrane-GOUV-FR-768x477.png 768w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2023\/07\/Filigrane-GOUV-FR-730x454.png 730w\" sizes=\"auto, (max-width: 977px) 100vw, 977px\" \/><\/p>\n<p style=\"text-align: justify;\">Une fois en possession de ces donn\u00e9es, ils peuvent facilement se faire passer pour leurs victimes. L&#8217;usurpation d&#8217;identit\u00e9 consiste \u00e0 <strong>utiliser les informations personnelles d&#8217;une autre personne \u00e0 son insu<\/strong>, afin d&#8217;ouvrir des comptes bancaires, d&#8217;obtenir des pr\u00eats ou de faire des achats&#8230;.<\/p>\n<p style=\"text-align: justify;\">Les victimes d&#8217;usurpation d&#8217;identit\u00e9 peuvent se retrouver \u00e0 <strong>assumer des dettes qu&#8217;elles n&#8217;ont pas contract\u00e9es<\/strong> et \u00eatre poursuivies par les cr\u00e9anciers en vue de leur paiement.<\/p>\n<p style=\"text-align: justify;\">Il existe plusieurs fa\u00e7ons de <strong>se prot\u00e9ger<\/strong> de l&#8217;usurpation d&#8217;identit\u00e9. L&#8217;une des plus importantes est de <strong>ne jamais communiquer ses informations personnelles<\/strong> \u00e0 des personnes inconnues. Si vous devez communiquer vos informations personnelles, assurez-vous de le faire de mani\u00e8re s\u00e9curis\u00e9e.<\/p>\n<p style=\"text-align: justify;\">Une des fa\u00e7ons de se prot\u00e9ger de l&#8217;usurpation d&#8217;identit\u00e9 est d&#8217;<strong>ajouter un filigrane \u00e0 vos documents sensibles (pi\u00e8ces d&#8217;identit\u00e9<\/strong>, relev\u00e9 d&#8217;identit\u00e9 bancaire (RIB) et justificatifs de domicile) avant de les communiquer \u00e0 des tiers. Un filigrane est une image ou un texte transparent qui est imprim\u00e9 sur un document, sans en alt\u00e9rer la lisibilit\u00e9, de sorte qu&#8217;il ne peut pas \u00eatre supprim\u00e9. Les filigranes peuvent aider \u00e0 prot\u00e9ger vos documents contre la falsification et le vol d&#8217;identit\u00e9.<\/p>\n<p style=\"text-align: justify;\">Le filigrane contiendra utilement une date, un motif, un nom de destinataire ou de projet&#8230; Par exemple, pour un dossier de location remis \u00e0 un propri\u00e9taire : &#8220;Dossier location agence immobili\u00e8re DURAND 15\/07\/2023&#8221;. Ce filigrane devrait rendre le document impropre \u00e0 une autre utilisation que celle mentionn\u00e9e.<\/p>\n<p style=\"text-align: justify;\">Le gouvernement a mis en place un <strong>service en ligne simple et gratuit<\/strong> (accessible \u00e0 l&#8217;adresse <a href=\"https:\/\/filigrane.beta.gouv.fr\/\" target=\"_blank\" rel=\"noopener\">https:\/\/filigrane.beta.gouv.fr\/<\/a>) qui ajoute un filigrane \u00e0 un fichier PDF ou \u00e0 une photo (format JPEG, PNG&#8230;) t\u00e9l\u00e9charg\u00e9 par l&#8217;utilisateur.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-11517\" src=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2023\/07\/CNI-filigrane.png\" alt=\"CNI filigrane\" width=\"617\" height=\"806\" srcset=\"https:\/\/www.auditsi.eu\/wp-content\/uploads\/2023\/07\/CNI-filigrane.png 617w, https:\/\/www.auditsi.eu\/wp-content\/uploads\/2023\/07\/CNI-filigrane-230x300.png 230w\" sizes=\"auto, (max-width: 617px) 100vw, 617px\" \/><\/p>\n<p style=\"text-align: justify;\">En conclusion, ajouter un filigrane \u00e0 ses documents est un moyen simple et efficace de se prot\u00e9ger de l&#8217;usurpation d&#8217;identit\u00e9 et de ses cons\u00e9quences.<\/p>\n<p style=\"text-align: justify;\">A lire \u00e9galement : <a href=\"https:\/\/www.auditsi.eu\/?p=10022\">En finir avec la plaie du d\u00e9marchage t\u00e9l\u00e9phonique et des appels malveillants<\/a>.<\/p>\n<p style=\"text-align: justify;\">___<\/p>\n<p style=\"text-align: justify;\">Pour aller plus loin : <a href=\"https:\/\/www.dossierfacile.fr\/\" target=\"_blank\" rel=\"noopener\">Monter un dossier de location s\u00e9curis\u00e9 pour trouver un logement<\/a> \/ <a href=\"https:\/\/www.cybermalveillance.gouv.fr\/tous-nos-contenus\/fiches-reflexes\/usurpation-identite-que-faire\" target=\"_blank\" rel=\"noopener\">Usurpation d\u2019identit\u00e9, que faire si cela arrive ?<\/a>&nbsp;\/ <a href=\"https:\/\/www.auditsi.eu\/?p=9232\">Sensibilisation aux risques num\u00e9riques<\/a><\/p>\n<div id=\"sconnect-is-installed\" style=\"display: none; text-align: justify;\">2.13.0.0<\/div>\n<div id=\"sconnect-is-installed\" style=\"display: none;\">2.13.0.0<\/div>\n<div id=\"sconnect-is-installed\" style=\"display: none;\">2.13.0.0<\/div>\n<div id=\"sconnect-is-installed\" style=\"display: none;\">2.13.0.0<\/div>\n<div id=\"sconnect-is-installed\" style=\"display: none;\">2.13.0.0<\/div>\n<div id=\"sconnect-is-installed\" style=\"display: none;\">2.13.0.0<\/div>\n<div id=\"sconnect-is-installed\" style=\"display: none;\">2.13.0.0<\/div>\n<div id=\"sconnect-is-installed\" style=\"display: none;\">2.13.0.0<\/div>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img decoding=\"async\" src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Se%20prot%C3%A9ger%20de%20l%27usurpation%20d%27identit%C3%A9%20avec%20les%20filigranes\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"excerpt":{"rendered":"<p>L&#8217;usurpation d&#8217;identit\u00e9 est un v\u00e9ritable fl\u00e9au. En effet, avec l&#8217;essor d&#8217;Internet, les donn\u00e9es personnelles sont devenues plus accessibles que jamais. Les pirates informatiques et les escrocs utilisent diverses m\u00e9thodes, telles que l&#8217;hame\u00e7onnage (phishing), le vol de donn\u00e9es et les logiciels malveillants, pour recueillir des informations sensibles sur des individus. Une fois en possession de ces &#8230;<\/p>\n<p><a href=\"https:\/\/www.auditsi.eu\/?p=11515\" class=\"more-link\">Continue reading &lsquo;Se prot\u00e9ger de l&#8217;usurpation d&#8217;identit\u00e9 avec les filigranes&rsquo; &raquo;<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"Se%20prot%C3%A9ger%20de%20l%27usurpation%20d%27identit%C3%A9%20avec%20les%20filigranes\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"ngg_post_thumbnail":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[7],"tags":[499,491,2961,1621,2344,506,146,2836,118,26,802,317,65],"class_list":["post-11515","post","type-post","status-publish","format-standard","hentry","category-breves","tag-cybercriminalite","tag-escroquerie","tag-filigrane","tag-fraude","tag-hameconnage","tag-informations-sensibles","tag-malveillance","tag-phishing","tag-piratage","tag-prevention-de-la-fraude","tag-rib","tag-sensibilisation-des-utilisateurs","tag-usurpation-didentite"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/11515","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=11515"}],"version-history":[{"count":9,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/11515\/revisions"}],"predecessor-version":[{"id":11521,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/11515\/revisions\/11521"}],"wp:attachment":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=11515"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=11515"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=11515"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}