{"id":1497,"date":"2012-02-10T09:20:21","date_gmt":"2012-02-10T07:20:21","guid":{"rendered":"http:\/\/www.auditsi.eu\/?p=1497"},"modified":"2012-02-10T09:25:25","modified_gmt":"2012-02-10T07:25:25","slug":"cyber-surveillance-la-surveillance-comportementale","status":"publish","type":"post","link":"https:\/\/www.auditsi.eu\/?p=1497","title":{"rendered":"La surveillance comportementale dans le monde du travail"},"content":{"rendered":"<p style=\"text-align: justify;\">Big Brother et son gros \u0153il est partout ! Dans la rue avec la vid\u00e9o-surveillance (euh, pardon, la vid\u00e9o-protection), sur internet (cookies, journalisation des acc\u00e8s, historiques des consultations\u2026)\u2026 avec votre t\u00e9l\u00e9phone (localisation GPS, num\u00e9ros appel\u00e9s\u2026) m\u00eame votre portefeuille s\u2019y met (avec votre carte bancaire\u2026).<\/p>\n<p style=\"text-align: justify;\">Mais que fait-il de toutes les donn\u00e9es collect\u00e9es plus ou moins \u00e0 votre insu ? Il les exploite pardi et se livre \u00e0 de l\u2019\u00e9tude comportementale\u2026 \u00a0Les entreprises n&#8217;\u00e9chappent pas au ph\u00e9nom\u00e8ne. Certaines int\u00e8grent la surveillance comportementale dans leur politique de s\u00e9curit\u00e9. L\u2019article qui suit dresse un panorama de la surveillance comportementale dans le monde du travail, un sujet d\u2019actualit\u00e9 qui a de l\u2019avenir devant lui\u2026 B.R.<\/p>\n<p style=\"text-align: justify;\">Extraits de l\u2019article intitul\u00e9 \u00ab Dossier GRC : La surveillance comportementale, jusqu&#8217;o\u00f9 ? \u00bb accessible sur l\u2019URL <a title=\"http:\/\/www.mag-securs.com\/Dossiers\/tabid\/67\/articleType\/ArticleView\/articleId\/28911\/Dossier-GRC-La-surveillance-comportementale-jusqu-ou.aspx\" href=\"http:\/\/www.mag-securs.com\/Dossiers\/tabid\/67\/articleType\/ArticleView\/articleId\/28911\/Dossier-GRC-La-surveillance-comportementale-jusqu-ou.aspx\" target=\"_blank\">ici<\/a> :<\/p>\n<p style=\"text-align: justify;\"><em>Sujet \u00f4 combien sensible ! Les solutions de GRC* sont mises en avant pour cibler les comportements \u00e0 risques de salari\u00e9s ind\u00e9licats (vol d\u2019informations, dont on parle de plus en plus) et pour prot\u00e9ger les entreprises, mais aucune n\u2019est pr\u00eate \u00e0 admettre qu\u2019elle m\u00e8ne une politique de surveillance de ses salari\u00e9s.<\/em><\/p>\n<p style=\"text-align: justify;\"><em>Pour ce dossier, nous avons interrog\u00e9 \u00e0 la fois les \u00e9diteurs de logiciels qui d\u00e9ploient des solutions de GRC (Governance, Risk &amp; Compliance) et nous avons \u00e9tendu l\u2019\u00e9tude aux logiciels de surveillance comportementale.<\/em><\/p>\n<p style=\"text-align: justify;\"><em>Nous avons interrog\u00e9 les grandes centrales syndicales, qui se sont, sans surprise, \u00e9lev\u00e9es contre de telles pratiques. Mais celles-ci restent mal connues de leur part. Enfin, Serge Tisseron, psychiatre, sp\u00e9cialiste des nouvelles technologies, nous livre son analyse sur le sujet.<\/em><\/p>\n<p style=\"text-align: justify;\">* \u00e0 ne pas confondre avec GRC = Gestion de la Relation Client.<\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img decoding=\"async\" src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"La%20surveillance%20comportementale%20dans%20le%20monde%20du%20travail\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"excerpt":{"rendered":"<p>Big Brother et son gros \u0153il est partout ! Dans la rue avec la vid\u00e9o-surveillance (euh, pardon, la vid\u00e9o-protection), sur internet (cookies, journalisation des acc\u00e8s, historiques des consultations\u2026)\u2026 avec votre t\u00e9l\u00e9phone (localisation GPS, num\u00e9ros appel\u00e9s\u2026) m\u00eame votre portefeuille s\u2019y met (avec votre carte bancaire\u2026). Mais que fait-il de toutes les donn\u00e9es collect\u00e9es plus ou moins &#8230;<\/p>\n<p><a href=\"https:\/\/www.auditsi.eu\/?p=1497\" class=\"more-link\">Continue reading &lsquo;La surveillance comportementale dans le monde du travail&rsquo; &raquo;<\/a><\/p>\n<div style=\"padding-bottom:20px; padding-top:10px;\" class=\"hupso-share-buttons\"><!-- Hupso Share Buttons - https:\/\/www.hupso.com\/share\/ --><a class=\"hupso_counters\" href=\"https:\/\/www.hupso.com\/share\/\"><img src=\"https:\/\/static.hupso.com\/share\/buttons\/lang\/fr\/share-small.png\" style=\"border:0px; padding-top:2px; float:left;\" alt=\"Share Button\"\/><\/a><script type=\"text\/javascript\">var hupso_services_c=new Array(\"twitter\",\"facebook_like\",\"facebook_send\",\"email\",\"print\",\"linkedin\");var hupso_counters_lang = \"fr_FR\";var hupso_image_folder_url = \"\";var hupso_twitter_via=\"BenoitRiviere14\";var hupso_url_c=\"\";var hupso_title_c=\"La%20surveillance%20comportementale%20dans%20le%20monde%20du%20travail\";<\/script><script type=\"text\/javascript\" src=\"https:\/\/static.hupso.com\/share\/js\/counters.js\"><\/script><!-- Hupso Share Buttons --><\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"ngg_post_thumbnail":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[7,30],"tags":[757,752,755,726,114,756,753,72,66,25,758,100,137,26,317,760,754,207,759,56,65,145,751],"class_list":["post-1497","post","type-post","status-publish","format-standard","hentry","category-breves","category-sites-internet","tag-authentification","tag-big-brother","tag-biometrie","tag-comportement-a-risque","tag-cybersurveillance","tag-geolocalisation","tag-governance-risk-compliance","tag-grc","tag-journalisation","tag-nouvelles-technologies","tag-organisation-du-travail","tag-perte-de-donnees","tag-politique-de-securite","tag-prevention-de-la-fraude","tag-sensibilisation-des-utilisateurs","tag-serge-tisseron","tag-surveillance-comportementale","tag-surveillance-reseau","tag-teletravail","tag-tracabilite","tag-usurpation-didentite","tag-vol-de-donnees","tag-www-mag-securs-com"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/1497","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1497"}],"version-history":[{"count":0,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=\/wp\/v2\/posts\/1497\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1497"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1497"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.auditsi.eu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}