{"id":22179,"date":"2024-08-01T06:00:07","date_gmt":"2024-08-01T04:00:07","guid":{"rendered":"https:\/\/infotel-software.com\/non-categorise\/data-governance-its-importance-and-three-critical-compliance-factors-dbas-must-consider\/"},"modified":"2025-03-03T12:31:47","modified_gmt":"2025-03-03T11:31:47","slug":"gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer","status":"publish","type":"post","link":"https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/","title":{"rendered":"Gouvernance des donn\u00e9es : son importance et trois facteurs de conformit\u00e9 essentiels que les administrateurs de bases de donn\u00e9es doivent consid\u00e9rer"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; _builder_version=\u00a0\u00bb4.16&Prime; da_disable_devices=\u00a0\u00bboff|off|off\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb da_is_popup=\u00a0\u00bboff\u00a0\u00bb da_exit_intent=\u00a0\u00bboff\u00a0\u00bb da_has_close=\u00a0\u00bbon\u00a0\u00bb da_alt_close=\u00a0\u00bboff\u00a0\u00bb da_dark_close=\u00a0\u00bboff\u00a0\u00bb da_not_modal=\u00a0\u00bbon\u00a0\u00bb da_is_singular=\u00a0\u00bboff\u00a0\u00bb da_with_loader=\u00a0\u00bboff\u00a0\u00bb da_has_shadow=\u00a0\u00bbon\u00a0\u00bb][et_pb_row _builder_version=\u00a0\u00bb4.16&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.16&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]<\/p>\n<p>Aujourd\u2019hui, le r\u00f4le de l\u2019administrateur de bases de donn\u00e9es (DBA) a \u00e9volu\u00e9 au-del\u00e0 des responsabilit\u00e9s traditionnelles de maintien des syst\u00e8mes de bases de donn\u00e9es, d\u2019assurance de la performance et de gestion des sauvegardes. Les\u00a0<a href=\"https:\/\/infotel-software.com\/fr\/performance-des-donnees\/\">DBA<\/a>\u00a0sont d\u00e9sormais des acteurs cl\u00e9s dans la mise en \u0153uvre et le maintien des cadres de gouvernance des donn\u00e9es. La gouvernance des donn\u00e9es est essentielle pour que les organisations g\u00e8rent efficacement leurs actifs de donn\u00e9es, assurant la qualit\u00e9, la s\u00e9curit\u00e9 et la conformit\u00e9 aux r\u00e9glementations. Dans cet article, nous explorerons le concept de gouvernance des donn\u00e9es, son importance et le r\u00f4le crucial que jouent les\u00a0<a href=\"https:\/\/infotel-software.com\/fr\/performance-des-donnees\/\">DBA<\/a>\u00a0dans ce domaine fondamental.<\/p>\n<h6><strong>Comprendre la gouvernance des donn\u00e9es<\/strong><\/h6>\n<p>La gouvernance des donn\u00e9es fait r\u00e9f\u00e9rence \u00e0 l\u2019ensemble des pratiques, politiques et normes utilis\u00e9es pour g\u00e9rer et contr\u00f4ler les donn\u00e9es au sein d\u2019une organisation. Elle englobe les processus et responsabilit\u00e9s qui garantissent que les donn\u00e9es sont exactes, coh\u00e9rentes, s\u00e9curis\u00e9es et utilis\u00e9es de mani\u00e8re appropri\u00e9e. Une gouvernance des donn\u00e9es efficace permet aux organisations de tirer le maximum de valeur de leurs donn\u00e9es tout en minimisant les risques li\u00e9s aux violations de donn\u00e9es, \u00e0 la non-conformit\u00e9 et \u00e0 la mauvaise qualit\u00e9 des donn\u00e9es.<\/p>\n<p>Les composants de base de la gouvernance des donn\u00e9es incluent:<\/p>\n<ul>\n<li>Gestion de la qualit\u00e9 des donn\u00e9es: Assurer que les donn\u00e9es sont pr\u00e9cises, compl\u00e8tes et fiables<\/li>\n<li>S\u00e9curit\u00e9 des donn\u00e9es: Prot\u00e9ger les donn\u00e9es contre les acc\u00e8s non autoris\u00e9s et les violations<\/li>\n<li>Conformit\u00e9 des donn\u00e9es: Respecter les lois et r\u00e9glementations pertinentes<\/li>\n<li>Responsabilit\u00e9 des donn\u00e9es: Attribuer des responsabilit\u00e9s pour les t\u00e2ches de gestion des donn\u00e9es<\/li>\n<li>Architecture des donn\u00e9es: Structurer les donn\u00e9es de mani\u00e8re \u00e0 soutenir les besoins de l\u2019entreprise<\/li>\n<li>Politiques et proc\u00e9dures de donn\u00e9es: \u00c9tablir des lignes directrices pour la gestion et l\u2019utilisation des donn\u00e9es<\/li>\n<\/ul>\n<p>La gouvernance des donn\u00e9es est cruciale pour plusieurs raisons, mais l\u2019une des plus importantes est de garantir que votre organisation se conforme aux r\u00e9glementations gouvernementales et industrielles, c\u2019est-\u00e0-dire la conformit\u00e9 r\u00e9glementaire.<\/p>\n<p>La conformit\u00e9 r\u00e9glementaire est l\u2019objectif des organisations dans leurs efforts pour s\u2019assurer qu\u2019elles sont conscientes des lois, politiques et r\u00e9glementations pertinentes et qu\u2019elles prennent des mesures pour s\u2019y conformer. Les r\u00e9glementations dictent le type de donn\u00e9es que nous devons prot\u00e9ger, le type de contr\u00f4les que nous devons utiliser et les p\u00e9nalit\u00e9s en cas de non-conformit\u00e9. Ces p\u00e9nalit\u00e9s peuvent impliquer des individus qui violent volontairement la loi sur la vie priv\u00e9e. Selon le D\u00e9partement de la Justice des \u00c9tats-Unis, \u00ab tout fonctionnaire ou employ\u00e9 d\u2019une agence, \u2026qui divulgue volontairement le mat\u00e9riel (PII) de quelque mani\u00e8re que ce soit \u00e0 une personne ou une agence non autoris\u00e9e \u00e0 le recevoir, sera coupable d\u2019un d\u00e9lit et passible d\u2019une amende de ne pas plus de 5 000$.<\/p>\n<p>Il existe de nombreux types de r\u00e9glementations qui impactent vos donn\u00e9es et les mesures que vous devez prendre pour les prot\u00e9ger.<\/p>\n<ul>\n<li>Il y a des r\u00e9glementations sur la gouvernance d\u2019entreprise qui dictent la mani\u00e8re dont les entreprises sont dirig\u00e9es et contr\u00f4l\u00e9es ; des exemples de celles-ci incluent les codes d\u2019\u00c9tat des entreprises, la Loi sur les \u00e9changes de valeurs mobili\u00e8res de la SEC, la loi Sarbanes Oxley (SOX), la loi GLBA, la loi FACTA et la norme B\u00e2le II.<\/li>\n<li>Ensuite, il y a les r\u00e9glementations sur la protection et la confidentialit\u00e9 des donn\u00e9es qui dictent comment les donn\u00e9es doivent \u00eatre s\u00e9curis\u00e9es et prot\u00e9g\u00e9es contre l\u2019acc\u00e8s non autoris\u00e9. Quelques exemples de celles-ci incluent HIPAA, PCI-DSS, GDPR, ainsi que les r\u00e9glementations nationales et des \u00c9tats am\u00e9ricains telles que CA SB 1386 et CCPA (California Consumer Privacy Act).<\/li>\n<li>Enfin, il y a les r\u00e9glementations sur la r\u00e9tention et la demande de donn\u00e9es sp\u00e9cifiant la dur\u00e9e pendant laquelle les donn\u00e9es doivent \u00eatre conserv\u00e9es. Plus les donn\u00e9es doivent \u00eatre conserv\u00e9es longtemps, plus il faut mettre en place de contr\u00f4les pour s\u2019assurer qu\u2019elles sont prot\u00e9g\u00e9es. Des exemples de ces r\u00e9glementations incluent FRCP, HIPAA, GDPR, CCPA et d\u2019autres.<\/li>\n<\/ul>\n<p>Bien s\u00fbr, la gouvernance des donn\u00e9es implique bien plus que simplement aider \u00e0 se conformer aux r\u00e9glementations industrielles et gouvernementales. Les autres aspects de la gouvernance des donn\u00e9es incluent l\u2019am\u00e9lioration de la qualit\u00e9 des donn\u00e9es, la r\u00e9duction des risques, la rationalisation de l\u2019efficacit\u00e9 op\u00e9rationnelle et la mise en place de politiques et de processus clairs de gestion des donn\u00e9es pour permettre aux entreprises de fonctionner efficacement.<\/p>\n<h6><strong>Le DBA et la conformit\u00e9 r\u00e9glementaire<\/strong><\/h6>\n<p>Traditionnellement, les\u00a0<a href=\"https:\/\/infotel-software.com\/fr\/performance-des-donnees\/\">DBA<\/a>\u00a0sont charg\u00e9s de g\u00e9rer les syst\u00e8mes de bases de donn\u00e9es et les applications qui y acc\u00e8dent. Cela implique g\u00e9n\u00e9ralement de comprendre les structures de bases de donn\u00e9es, les internes et les points d\u2019acc\u00e8s, mais pas n\u00e9cessairement une connaissance approfondie des donn\u00e9es elles-m\u00eames. N\u00e9anmoins, les t\u00e2ches de gouvernance des donn\u00e9es peuvent avoir un impact significatif sur les devoirs d\u2019administration des bases de donn\u00e9es.<\/p>\n<p>Chaque fois que les politiques et proc\u00e9dures de gestion des donn\u00e9es changent, l\u2019\u00e9quipe\u00a0<a href=\"https:\/\/infotel-software.com\/fr\/performance-des-donnees\/\">DBA<\/a>\u00a0est in\u00e9vitablement impliqu\u00e9e pour aider \u00e0 les mettre en \u0153uvre et assister les utilisateurs lors de l\u2019acc\u00e8s et de la modification des donn\u00e9es et des programmes qui y acc\u00e8dent. De plus, lorsque des produits suppl\u00e9mentaires sont n\u00e9cessaires, comme c\u2019est souvent le cas, les DBA seront impliqu\u00e9s de diverses mani\u00e8res. Ces responsabilit\u00e9s incluent l\u2019\u00e9valuation des fournisseurs et des produits, l\u2019analyse de l\u2019impact du produit sur les proc\u00e9dures existantes, l\u2019installation et la documentation, ainsi que l\u2019int\u00e9gration du produit dans l\u2019environnement.<\/p>\n<p>En outre, le\u00a0<a href=\"https:\/\/infotel-software.com\/fr\/performance-des-donnees\/\">DBA<\/a>\u00a0devra \u00eatre impliqu\u00e9 dans la fourniture de conseils sur la praticit\u00e9 des nouvelles politiques, proc\u00e9dures et produits, ainsi que sur l\u2019impact sur la charge de travail existante. Concentrons-nous sur la mani\u00e8re dont plusieurs des exigences de gouvernance des donn\u00e9es pour la conformit\u00e9 r\u00e9glementaire impactent le\u00a0<a href=\"https:\/\/infotel-software.com\/fr\/performance-des-donnees\/\">DBA<\/a>.<\/p>\n<p>Bien qu\u2019il existe de nombreux domaines \u00e0 aborder pour se conformer aux r\u00e9glementations, nous examinerons trois points importants, en commen\u00e7ant par les types de donn\u00e9es prot\u00e9g\u00e9es par les r\u00e9glementations. Ensuite, nous examinerons deux des t\u00e2ches importantes qui peuvent \u00eatre n\u00e9cessaires pour vos donn\u00e9es prot\u00e9g\u00e9es: l\u2019anonymisation et la suppression d\u00e9fendable.<\/p>\n<h6><strong>Types de donn\u00e9es \u00e0 prot\u00e9ger<\/strong><\/h6>\n<p>Il existe quatre grandes cat\u00e9gories de donn\u00e9es n\u00e9cessitant une protection:<\/p>\n<ul>\n<li>PII \u2013 informations personnelles identifiables**<\/li>\n<li>PHI \u2013 informations de sant\u00e9 prot\u00e9g\u00e9es**<\/li>\n<li>PCI \u2013 informations de carte de paiement**<\/li>\n<li>IP \u2013 propri\u00e9t\u00e9 intellectuelle**<\/li>\n<\/ul>\n<p>Le D\u00e9partement de la S\u00e9curit\u00e9 Int\u00e9rieure des \u00c9tats-Unis d\u00e9finit les informations personnelles identifiables (ou PII) comme toute information permettant de d\u00e9duire directement ou indirectement l\u2019identit\u00e9 d\u2019une personne, y compris toute information li\u00e9e ou pouvant \u00eatre li\u00e9e \u00e0 cette personne. Cela couvre un large \u00e9ventail de donn\u00e9es collect\u00e9es par la plupart des organisations.<\/p>\n<p>HIPAA (Health Insurance Portability and Accountability Act) est une loi f\u00e9d\u00e9rale am\u00e9ricaine qui prot\u00e8ge les informations de sant\u00e9 et garantit l\u2019acc\u00e8s, la portabilit\u00e9 et le renouvellement des soins de sant\u00e9. La r\u00e8gle de confidentialit\u00e9 d\u2019HIPAA d\u00e9finit les informations de sant\u00e9 prot\u00e9g\u00e9es (PHI) comme toutes les formes d\u2019informations de sant\u00e9 prot\u00e9g\u00e9es des individus, qu\u2019elles soient \u00e9lectroniques, \u00e9crites ou orales. Elle d\u00e9finit \u00e9galement les protections requises pour les donn\u00e9es PHI pour toutes les organisations, pas seulement les prestataires de soins de sant\u00e9.<\/p>\n<p>La norme de s\u00e9curit\u00e9 des donn\u00e9es du secteur des cartes de paiement (PCI DSS) est une norme de s\u00e9curit\u00e9 industrielle administr\u00e9e par le Payment Card Industry Security Standards Council. Elle prot\u00e8ge les informations des d\u00e9tenteurs de cartes de paiement (PCI), ce qui \u00e9tend les exigences de protection des donn\u00e9es avec des r\u00e8gles et des pratiques sp\u00e9cifiques pour prot\u00e9ger non seulement les informations personnelles, mais aussi les num\u00e9ros de carte et les informations connexes.<\/p>\n<p>Enfin, votre organisation peut avoir une propri\u00e9t\u00e9 intellectuelle (IP) qu\u2019elle souhaite prot\u00e9ger contre une exposition concurrentielle. Ces informations peuvent devoir \u00eatre prot\u00e9g\u00e9es uniquement en raison de votre d\u00e9sir de les garder priv\u00e9es, ou en fonction du secteur et du type d\u2019informations, l\u2019IP peut \u00e9galement \u00eatre soumise \u00e0 des exigences de conformit\u00e9 r\u00e9glementaire.<\/p>\n<p>L\u2019identification de toutes les PII dans votre organisation peut \u00eatre une t\u00e2che difficile. Elle n\u00e9cessite d\u2019identifier tous les \u00e9l\u00e9ments de donn\u00e9es dans toutes vos applications et bases de donn\u00e9es qui y correspondent. Le degr\u00e9 de difficult\u00e9 d\u00e9pendra du niveau de documentation existant, de l\u2019existence ou non de mod\u00e8les de donn\u00e9es et d\u2019un catalogue de donn\u00e9es \u00e0 votre disposition, et de votre pratique actuelle de gouvernance des donn\u00e9es.<\/p>\n<p>Mais l\u2019identification n\u2019est que la premi\u00e8re partie du probl\u00e8me. Une fois identifi\u00e9es, vous devez ensuite prendre des mesures pour prot\u00e9ger les PII, et je parlerai de deux questions que vous devrez \u00e9tablir : l\u2019anonymisation des donn\u00e9es et la suppression d\u00e9fendable des donn\u00e9es.<\/p>\n<h6><strong>Anonymisation des donn\u00e9es<\/strong><\/h6>\n<p>L\u2019anonymisation des donn\u00e9es, parfois appel\u00e9e masquage des donn\u00e9es, est un exemple de m\u00e9thode que vous pouvez utiliser pour prot\u00e9ger les PII. Mais quel probl\u00e8me l\u2019anonymisation des donn\u00e9es r\u00e9sout-elle ?<\/p>\n<p>De nombreuses organisations se reposent sur la copie des donn\u00e9es de production dans un environnement de test pour d\u00e9velopper et tester des applications. Mais copier simplement les donn\u00e9es de la production vers le test expose les PII. Certaines des donn\u00e9es sont sensibles et ne devraient pas \u00eatre accessibles aux d\u00e9veloppeurs d\u2019applications. Vous ne voulez pas exposer des informations telles que les salaires ou les num\u00e9ros de t\u00e9l\u00e9phone de vos coll\u00e8gues et clients \u00e0 tous vos d\u00e9veloppeurs ! Ou pire encore, exposer les d\u00e9tails des cartes de cr\u00e9dit des clients \u00e0 tout le monde!<\/p>\n<p>Mais vous ne pouvez pas non plus cr\u00e9er simplement une s\u00e9rie de donn\u00e9es incoh\u00e9rentes. Vous devez vous assurer que l\u2019int\u00e9grit\u00e9 r\u00e9f\u00e9rentielle est maintenue lors des tests, m\u00eame si les valeurs des donn\u00e9es changent. Vous avez besoin de donn\u00e9es utiles pour les cas de test. Et vous devez \u00e9galement vous assurer de conversions de donn\u00e9es coh\u00e9rentes.<\/p>\n<p>Ce ne sont pas des exigences insignifiantes.<\/p>\n<p>La solution consiste \u00e0 d\u00e9ployer l\u2019anonymisation des donn\u00e9es, qui est le processus de protection des informations sensibles dans les bases de donn\u00e9es non productives contre une visibilit\u00e9 inappropri\u00e9e. Lorsque vous anonymisez les donn\u00e9es, les donn\u00e9es de production valides sont remplac\u00e9es par des donn\u00e9es coh\u00e9rentes, utilisables, r\u00e9f\u00e9rentiellement intactes, mais non pr\u00e9cises. Apr\u00e8s l\u2019anonymisation, les donn\u00e9es de test sont utilisables comme en production; mais le contenu informatif est s\u00e9curis\u00e9.<\/p>\n<p>Lorsque vous envisagez une solution d\u2019anonymisation des donn\u00e9es, vous devez garder \u00e0 l\u2019esprit les qualit\u00e9s souhaitables suivantes. En vous assurant que votre solution poss\u00e8de ces qualit\u00e9s, vous pouvez masquer en toute s\u00e9curit\u00e9 les donn\u00e9es pour respecter les r\u00e9glementations sur la confidentialit\u00e9 des donn\u00e9es. Quelles sont ces qualit\u00e9s ?<\/p>\n<p>La premi\u00e8re est la permanence. Lorsque les donn\u00e9es sont masqu\u00e9es ou anonymis\u00e9es, elles ne peuvent pas \u00eatre d\u00e9masqu\u00e9es. La deuxi\u00e8me qualit\u00e9 est que le masquage doit \u00eatre irr\u00e9versible. Une fois les donn\u00e9es anonymis\u00e9es, elles ne doivent pas \u00eatre r\u00e9versibles, sauf si c\u2019est ce qui est n\u00e9cessaire. Et la qualit\u00e9 finale est que vous ne devez pas pouvoir inf\u00e9rer la valeur non masqu\u00e9e \u00e0 partir de la valeur masqu\u00e9e. Il ne doit pas \u00eatre possible d\u2019inf\u00e9rer ou de d\u00e9duire le contenu des donn\u00e9es originales non masqu\u00e9es.<\/p>\n<p>En fin de compte, si vous copiez des donn\u00e9es de production dans un environnement de test, il y a des probl\u00e8mes de confidentialit\u00e9 que vous devez aborder. Un processus d\u2019anonymisation des donn\u00e9es qui comprend quelles donn\u00e9es sont des PII sensibles et les masque en cons\u00e9quence est n\u00e9cessaire pour se conformer aux r\u00e9glementations sur la confidentialit\u00e9 des donn\u00e9es que nous avons discut\u00e9es plus t\u00f4t.<\/p>\n<p>Si les donn\u00e9es sensibles sont masqu\u00e9es de mani\u00e8re statique, peu importe si des pirates y acc\u00e8dent. Car les valeurs des \u00e9l\u00e9ments de donn\u00e9es ne seront pas correctes de toute fa\u00e7on!<\/p>\n<h6><strong>Suppression d\u00e9fendable<\/strong><\/h6>\n<p>Une autre tactique dont vous pourriez avoir besoin pour gouverner correctement les donn\u00e9es est une solution pour supprimer les donn\u00e9es. \u00c0 premi\u00e8re vue, cela semble simple, mais c\u2019est vraiment plus complexe si vous plongez dans les d\u00e9tails. Ce qui est n\u00e9cessaire est une strat\u00e9gie et une m\u00e9thodologie pour supprimer de mani\u00e8re d\u00e9fendable les donn\u00e9es qui ne sont plus n\u00e9cessaires \u00e0 votre organisation.<\/p>\n<p>La suppression d\u00e9fendable est la pratique de disposer syst\u00e9matiquement des donn\u00e9es qui ne sont plus n\u00e9cessaires \u00e0 des fins l\u00e9gales, r\u00e9glementaires ou commerciales. Cela fait partie d\u2019une strat\u00e9gie globale de gouvernance de l\u2019information. La suppression d\u00e9fendable consiste \u00e0 supprimer m\u00e9thodiquement les informations stock\u00e9es \u00e9lectroniquement lorsqu\u2019elles ne sont plus utiles.<\/p>\n<p>La suppression d\u00e9fendable peut r\u00e9duire les co\u00fbts de stockage et les risques juridiques associ\u00e9s \u00e0 la r\u00e9tention des informations stock\u00e9es \u00e9lectroniquement.<\/p>\n<p>Chaque donn\u00e9e suit un cycle de vie standard, o\u00f9 les donn\u00e9es sont cr\u00e9\u00e9es \u00e0 un moment donn\u00e9, g\u00e9n\u00e9ralement par le biais d\u2019une transaction. Pendant une p\u00e9riode de temps apr\u00e8s la cr\u00e9ation, les donn\u00e9es entrent dans leur premier \u00e9tat: elles sont op\u00e9rationnelles, c\u2019est-\u00e0-dire que les donn\u00e9es sont n\u00e9cessaires pour compl\u00e9ter les transactions commerciales en cours. L\u2019\u00e9tat op\u00e9rationnel est suivi de l\u2019\u00e9tat de r\u00e9f\u00e9rence. C\u2019est le moment o\u00f9 les donn\u00e9es sont encore n\u00e9cessaires pour les rapports et les requ\u00eates, mais elles ne pilotent pas n\u00e9cessairement les transactions commerciales. Apr\u00e8s un certain temps, les donn\u00e9es passent dans une zone o\u00f9 elles ne sont plus n\u00e9cessaires pour compl\u00e9ter les transactions commerciales et la probabilit\u00e9 qu\u2019elles soient n\u00e9cessaires pour les requ\u00eates et les rapports est minime voire nulle. Cependant, les donn\u00e9es doivent encore \u00eatre conserv\u00e9es pour se conformer aux r\u00e9glementations et \u00e0 d\u2019autres fins l\u00e9gales, en particulier si elles concernent une transaction financi\u00e8re. C\u2019est l\u2019\u00e9tat d\u2019archivage.<\/p>\n<p>Enfin, apr\u00e8s une p\u00e9riode de temps d\u00e9sign\u00e9e dans l\u2019archive, les donn\u00e9es ne sont plus n\u00e9cessaires et peuvent \u00eatre supprim\u00e9es. Cela doit \u00eatre fortement soulign\u00e9 : les donn\u00e9es doivent \u00eatre supprim\u00e9es. Dans la plupart des cas, la seule raison pour laquelle des donn\u00e9es plus anciennes sont conserv\u00e9es est de se conformer aux r\u00e9glementations, dont beaucoup permettent d\u2019intenter des poursuites. Lorsqu\u2019il n\u2019y a pas d\u2019exigence l\u00e9gale pour maintenir ces donn\u00e9es, il est juste et appropri\u00e9 pour les organisations d\u2019exiger qu\u2019elles soient d\u00e9truites \u2013 pourquoi permettre \u00e0 quelqu\u2019un de vous poursuivre si ce n\u2019est pas une exigence l\u00e9gale de le faire?<\/p>\n<p>En outre, de nombreuses r\u00e9glementations et lois exigent que les donn\u00e9es soient supprim\u00e9es \u00e0 un moment donn\u00e9. Le GDPR, par exemple, a le \u00ab droit \u00e0 l\u2019oubli \u00bb. Lorsqu\u2019un client ou un client prot\u00e9g\u00e9 par le GDPR demande \u00e0 \u00eatre oubli\u00e9, vous devez pouvoir supprimer toutes ses donn\u00e9es de vos syst\u00e8mes. Et le \u00ab droit \u00e0 la suppression \u00bb est en cours d\u2019adoption dans de nombreuses r\u00e9glementations et lois suppl\u00e9mentaires, comme la CPRA de la Californie.<\/p>\n<p>Supprimer un seul enregistrement est un jeu d\u2019enfant. Mais qu\u2019en est-il de pouvoir supprimer tous les \u00e9l\u00e9ments de donn\u00e9es interconnect\u00e9s, o\u00f9 qu\u2019ils se trouvent ? Cela peut \u00eatre un probl\u00e8me \u00e9pineux sans une solution qui comprend les complexit\u00e9s interconnect\u00e9es du stockage et de la r\u00e9tention des donn\u00e9es.<\/p>\n<p>Il existe des produits sur le march\u00e9 qui peuvent aider les \u00e9quipes de gouvernance des donn\u00e9es dans l\u2019anonymisation des donn\u00e9es et la suppression d\u00e9fendable des donn\u00e9es, tels que\u00a0<a href=\"https:\/\/deepeo.eu\/fr\/accueil\/\">deepeo\u2122<\/a>\u00a0et\u00a0<a href=\"https:\/\/arcsys-software.fr\/\">Arcsys\u2122<\/a>\u00a0de\u00a0<a href=\"https:\/\/infotel.com\">Infotel<\/a>, bas\u00e9 \u00e0 Paris, en France.<\/p>\n<h6><strong>En conclusion<\/strong><\/h6>\n<p>Bien que comprendre les r\u00e9glementations et leurs exigences soit un travail pour les professionnels et les experts en la mati\u00e8re, les\u00a0<a href=\"https:\/\/infotel-software.fr\/performance-des-donnees\/\">DBA<\/a>\u00a0doivent s\u2019impliquer dans la mise en \u0153uvre des logiciels et des processus qui mettent en \u0153uvre ces exigences. Tout ce qui impacte les donn\u00e9es dans la base de donn\u00e9es est du ressort du DBA, et l\u2019anonymisation et la suppression des donn\u00e9es impactent certainement les donn\u00e9es! En tant que tel, les DBA doivent participer aux travaux de gouvernance des donn\u00e9es de leur organisation avec les professionnels, les auditeurs et l\u2019\u00e9quipe juridique de l\u2019entreprise pour s\u2019assurer que les donn\u00e9es sont trait\u00e9es de mani\u00e8re appropri\u00e9e, efficace et efficiente.<\/p>\n<p><strong>\u00c0 propos de Craig S. Mullins<\/strong><\/p>\n<p>Craig S. Mullins est pr\u00e9sident et consultant principal de Mullins Consulting, Inc., un consultant en or IBM et un IBM Champion pour les donn\u00e9es et l\u2019IA. Il poss\u00e8de plus de trois d\u00e9cennies d\u2019exp\u00e9rience dans tous les aspects du d\u00e9veloppement de syst\u00e8mes de bases de donn\u00e9es, y compris l\u2019administration des bases de donn\u00e9es, la gestion des performances et la mod\u00e9lisation des donn\u00e9es. Visitez\u00a0<a href=\"https:\/\/mullinsconsulting.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/mullinsconsulting.com<\/a>.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00a0\u00bb1_2,1_2&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb module_alignment=\u00a0\u00bbcenter\u00a0\u00bb custom_margin=\u00a0\u00bb2%||||false|false\u00a0\u00bb custom_padding=\u00a0\u00bb|2%||2%|false|false\u00a0\u00bb border_width_all=\u00a0\u00bb2px\u00a0\u00bb border_color_all=\u00a0\u00bb#2EA3F2&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb locked=\u00a0\u00bboff\u00a0\u00bb][et_pb_column type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<div class=\"et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p style=\"text-align: center;\"><strong>Pour obtenir des informations d\u00e9taill\u00e9es, t\u00e9l\u00e9chargez gratuitement nos documentations techniques.<\/strong><\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_button button_url=\u00a0\u00bbhttps:\/\/infotel-software.com\/fr\/documentations\/\u00a0\u00bb button_text=\u00a0\u00bbT\u00e9l\u00e9charger la documentation\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00a0\u00bb1_2&Prime; _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][et_pb_text _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb]<\/p>\n<div class=\"et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p style=\"text-align: center;\"><strong>Vous avez un projet ? Nos experts sont l\u00e0 pour vous accompagner.\u00a0<\/strong><strong>Cliquez ci-dessous pour nous contacter.<\/strong><\/p>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][et_pb_button button_url=\u00a0\u00bbhttps:\/\/infotel-software.com\/fr\/nous-contacter\/\u00a0\u00bb button_text=\u00a0\u00bbContactez-nous\u00a0\u00bb button_alignment=\u00a0\u00bbcenter\u00a0\u00bb _builder_version=\u00a0\u00bb4.27.4&Prime; _module_preset=\u00a0\u00bbdefault\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Aujourd\u2019hui, le r\u00f4le de l\u2019administrateur de bases de donn\u00e9es (DBA) a \u00e9volu\u00e9 au-del\u00e0 des responsabilit\u00e9s traditionnelles de maintien des syst\u00e8mes de bases de donn\u00e9es, d\u2019assurance de la performance et de gestion des sauvegardes. Les\u00a0DBA\u00a0sont d\u00e9sormais des acteurs cl\u00e9s dans la mise en \u0153uvre et le maintien des cadres de gouvernance des donn\u00e9es. La gouvernance des [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":22242,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<p>Today the role of the Database Administrator (DBA) has evolved beyond the traditional responsibilities of maintaining database systems, ensuring performance, and managing backups. DBAs are now critical players in implementing and maintaining data governance frameworks. Data governance is essential for organizations to manage their data assets effectively, ensuring data quality, security, and compliance with regulations. In this article, we will explore the concept of data governance, its importance, and the pivotal role DBAs play in this crucial area.<\/p><h6><strong>Understanding Data Governance<\/strong><\/h6><p>Data governance refers to the collection of practices, policies, and standards used to manage and control data within an organization. It encompasses the processes and responsibilities that ensure data is accurate, consistent, secure, and used appropriately. Effective data governance enables organizations to derive maximum value from their data while minimizing risks related to data breaches, non-compliance, and poor data quality.<\/p><p>The core components of data governance include:<\/p><ul><li>Data Quality Management: Ensuring data is accurate, complete, and reliable<\/li><li>Data Security: Protecting data from unauthorized access and breaches<\/li><li>Data Compliance: Adhering to relevant laws and regulations<\/li><li>Data Stewardship: Assigning responsibility for data management tasks<\/li><li>Data Architecture: Structuring data in a way that supports business needs<\/li><li>Data Policies and Procedures: Establishing guidelines for data management and usage<\/li><\/ul><p>Data governance is crucial for several reasons, but one of the most important reasons is to ensure that your organization is complying with governmental and industry regulations, that is, regulatory compliance.<\/p><p>Regulatory compliance is the goal of organizations in their efforts to ensure that they are aware of and take steps to comply with relevant laws, policies, and regulations. Regulations dictate the type of data we must protect, the type of controls we should use, and the penalties for non-compliance. Such penalties may involve individuals who willingly violate privacy law. According to the\u00a0<a href=\"https:\/\/www.justice.gov\/opcl\/overview-privacy-act-1974-2020-edition\/criminal\" target=\"_blank\" rel=\"noopener\">U.S. Department of Justice<\/a>, \u201cany officer or employee of an agency, \u2026who willfully discloses the material (PII) in any manner to any person or agency not entitled to receive it, shall be guilty of a misdemeanor and fined not more than $5,000.\u201d<\/p><h6>There are many types of regulations that impact your data and the things you need to do to protect that data.<\/h6><ul><li>There are Corporate Governance regulations that dictate the way companies are directed and controlled; Examples of these include State Corporate codes, SEC Securities Exchange Act, Sarbanes Oxley (SOX), GLBA, FACTA, and Basel II.<\/li><li>Then there are Data Privacy & Protection regulations that dictate how data must be secured and protected from access by other than authorized entities. Some examples of these include HIPAA, PCI-DSS, GDPR, as well as country and US State regulations such as CA SB 1386, and CCPA (California Consumer Privacy Act).<\/li><li>Finally, there are Data Retention & Request regulations specifying the length of time that data must be maintained. The longer the data must be kept the more controls that need to be in place to ensure that the data is protected. Examples of these regulations include FRCP, HIPAA, GDPR, CCPA, and others.<\/li><\/ul><p>Of course, data governance implies much more than just being an aid to complying with industry and governmental regulations. Other aspects of data governance include improving data quality, mitigating risk, streamlining operational efficiency, and delivering clear data management policies and processes to enable businesses to operate effectively.<\/p><h6><strong>The DBA and Regulatory Compliance<\/strong><\/h6><p>Traditionally, DBAs are tasked with managing database systems and the applications that access them. This typically involves understanding database structures, internals, and access points, but not necessarily an in-depth knowledge of the data itself. Nevertheless, data governance tasks can significantly impact\u00a0database administration duties.<\/p><p>Whenever data management policies and procedures change, the DBA team is inevitably involved in helping to implement them and assist the users as they access and modify data and programs that access that data. Furthermore, when additional products are required, as they so often are, DBAs will be involved in various capacities. These responsibilities include evaluation of vendors and products, analyzing the impact of the product on existing procedures, installation and documentation, and integrating the product into the environment.<\/p><p>Furthermore, the DBA will need to be involved in providing guidance on the practicality of new policies, procedures, and products, as well as on the impact to existing workload. Let\u2019s focus on how several of the data governance requirements for regulatory compliance impact the DBA.<\/p><p>Although there are many areas that need to be addressed to comply with regulations, we\u2019ll look at three important ones, starting with the types of data that are protected by regulations. Then we\u2019ll look at two of the important tasks that may be required for your protected data. Anonymization and defensible deletion.<\/p><h6><strong>Types of Data That Need to be Protected<\/strong><\/h6><p>There are four broad categories of data that require protection:<\/p><ul><li>PII \u2013 personally identifiable information<\/li><li>PHI \u2013 protected health information<\/li><li>PCI \u2013 payment card information<\/li><li>IP \u2013 intellectual property<\/li><\/ul><p>The US Department of Homeland Security defines personally identifiable information (or\u00a0<strong>PII<\/strong>) as any information that permits the identity of an individual to be directly or indirectly inferred, including any information that is linked or linkable to that individual. This covers a broad swath of data that is collected by most organizations.<\/p><p>HIPAA (Health Insurance Portability and Accountability Act) is a US federal law that protects health information and ensures healthcare access, portability, and renewability. The Privacy Rule of HIPAA defines\u00a0<strong>PHI<\/strong>\u00a0or protected health information as all forms of individuals\u2019 protected<\/p><p>health information, whether electronic, written, or oral. It also defines the protections required for PHI data for all organizations, not just healthcare providers.<\/p><p>The Payment Card Industry Data Security Standard (PCI DSS) is an industry security standard administered by the Payment Card Industry Security Standards Council. It protects payment cardholder information (<strong>PCI<\/strong>) which extends data protection requirements with specific rules and practices for protecting not just personal information, but also card numbers and information<strong>.<\/strong><\/p><p>Finally, your organization may have\u00a0<strong>IP<\/strong>, or intellectual property, that it wants to protect from competitive exposure. Such information may need to be protected based solely on your desire to keep it private, or based on the industry and type of information, IP may also be subject to regulatory compliance requirements.<\/p><p>The identification of all the PII in your organization can be a difficult task. It requires identifying all the data elements in all your applications and databases that qualify. The degree of difficulty will depend on the level of documentation that exists, whether you have data models and a data catalog at your disposal, and, indeed, your existing practice of data governance.<\/p><p>But identification is just the first part of the problem. Once identified, you then need to take steps to protect the PII, and I\u2019ll talk about two issues that you will need to establish: data anonymization and defensible deletion of data.<\/p><p><strong>Data Anonymization<\/strong><\/p><p>Data anonymization, sometimes called data masking, is an example of a method you can use to protect PII. But what problem does data anonymization solve?<\/p><p>Many organizations rely on copying production data to a test environment for developing and testing applications.\u00a0 But simply copying data from prod to test exposes the PII. Some of the data is sensitive & should not be accessible by application developers. You don\u2019t want to expose data such as salary information or phone numbers of co-workers and customers to all your developers! Or worse yet, exposing customer credit card details to everybody!<\/p><p>But you can\u2019t just create a bunch of gibberish either. You need to ensure that referential integrity is maintained in testing, even as data values change. You need useful data for test cases. And you may also need to ensure consistent data conversions.<\/p><p>These are not inconsequential requirements.<\/p><p>The solution is to deploy data anonymization, which is the process of protecting sensitive information in non-production databases from inappropriate visibility.\u00a0 When you anonymize data, valid production data is replaced with consistent, usable, referentially intact, but not accurate data. After anonymization, the test data is usable just like production; but the information content is secure.<\/p><p>As you consider a data anonymization solution you need to keep the following desirable qualities in mind. By assuring that your solution has these qualities you can safely mask data for compliance with data privacy regulations.\u00a0 What are these qualities?<\/p><p>The first is\u00a0<strong>permanence<\/strong>. When the data is masked, or anonymized, it cannot be unmasked. The second quality is that masking should be\u00a0<strong>irreversible<\/strong>. Once the data is anonymized it should not be reversible, unless that is what is needed. And the final quality is that you should not be able to\u00a0<strong>infer<\/strong>\u00a0the unmasked value from the masked value. It must not be possible to infer or deduce the content of the original, unmasked data.<\/p><p>The bottom line is that if you are copying production data to test there are privacy issues you need to address. A data anonymization process that understands what data is sensitive PII and masks it accordingly is needed to be in compliance with the data privacy regulations we discussed earlier.<\/p><p>If sensitive data is statically masked, then it won\u2019t matter if hackers get access to it. Because the values of the data elements will not be correct anyway!<\/p><p><strong>Defensible Deletion<\/strong><\/p><p>Another tactic you may need for governing data appropriately is a solution to delete data. At first glance, this sounds simple, but it is really more complex if you dive into the details. What is required is a strategy and methodology for defensibly deleting data this no longer required by your organization.<\/p><p>Defensible deletion is the\u00a0practice of systematically disposing of data that is no longer needed for legal, regulatory, or business purposes.\u00a0It is part of an overall information governance strategy.\u00a0Defensible deletion is methodically deleting electronically stored information when it is no longer useful.<\/p><p>Defensible deletion can reduce the storage costs and legal risks associated with the retention of electronically stored information.<\/p><p>Every piece of data follows a standard lifecycle, wherein the data gets created at some point, usually by means of a transaction. For a period of time after creation, the data enters its first state: it is operational, that is, the data is needed to complete ongoing business transactions. The operational state is followed by the reference state. This is the time during which the data is still needed for reporting and query purposes, but it is not necessarily driving business transactions. After a time period, the data moves into an area where it is no longer needed for completing business transactions and the chance of it being needed for querying and reporting is small to none. However, the data still needs to be retained for regulatory compliance and other legal purposes, particularly if it pertains to a financial transaction. This is the archive state.<\/p><p>Finally, after a designated period of time in the archive, the data is no longer needed and can be discarded. This needs to be emphasized much stronger: the data\u00a0<strong>must<\/strong>\u00a0be discarded. In most cases, the only reason older data is being kept at all is to comply with regulations, many of which help to enable lawsuits. When there is no legal requirement to maintain such data, it is only right and proper for organizations to demand that it be destroyed \u2013 why enable anyone to sue you if it is not a legal requirement to do so?<\/p><p>Furthermore, many regulations and laws require data to be deleted at some point. GDPR, for example, famously has the \u201cright to be forgotten.\u201d When a customer or client protected by GDPR requests to be forgotten, you must be able to delete all of their data from your systems. And the \u201cRight to deletion\u201d is being enacted in many additional regulations and laws, such as California\u2019s CPRA.<\/p><p>Deleting a single record is a piece of cake. But what about being able to delete all interconnected pieces of data no matter where they reside? This can be a thorny issue without a solution that understands the interrelated intricacies of data storage and retention.<\/p><p>There are products on the market that can aid data governance teams in data anonymization and defensible deletion, such as deepeo\u2122 and Arvitam\u2122 from <a href=\"https:\/\/infotel-software.com\/\" target=\"_blank\" rel=\"noopener\">Infotel Software<\/a>, based in Tampa, Florida. Be sure to investigate such solutions as you implement your data governance policies and procedures.<\/p><p><strong>The Bottom Line<\/strong><\/p><p>Although understanding the regulations and their requirements is a job for businesspeople and subject matter experts, DBAs need to get involved in the implementation of the software and processes that implement the requirements. Anything that impacts the data in the database is the purview of the DBA, and anonymizing and deleting data surely impacts the data! As such, DBAs need to participate in the data governance work of their organization with businesspeople, auditors, and the company\u2019s legal team to ensure that data is being treated properly, effectively, and in an efficient manner.<\/p><p><strong>About Craig S. Mullins<\/strong><\/p><p>Craig S. Mullins is President & Principal Consultant of Mullins Consulting, Inc., an IBM Gold Consultant, and an IBM Champion for Data and AI. He possesses over three decades of experience in all aspects of database systems development, including database administration, performance management, and data modeling. Visit\u00a0<a href=\"https:\/\/mullinsconsulting.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/mullinsconsulting.com<\/a>.<\/p>","_et_gb_content_width":"","footnotes":""},"categories":[83],"tags":[],"class_list":["post-22179","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-fr"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Gouvernance des donn\u00e9es : son importance et trois facteurs de conformit\u00e9 essentiels que les administrateurs de bases de donn\u00e9es doivent consid\u00e9rer - Infotel Software<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gouvernance des donn\u00e9es : son importance et trois facteurs de conformit\u00e9 essentiels que les administrateurs de bases de donn\u00e9es doivent consid\u00e9rer - Infotel Software\" \/>\n<meta property=\"og:description\" content=\"Aujourd\u2019hui, le r\u00f4le de l\u2019administrateur de bases de donn\u00e9es (DBA) a \u00e9volu\u00e9 au-del\u00e0 des responsabilit\u00e9s traditionnelles de maintien des syst\u00e8mes de bases de donn\u00e9es, d\u2019assurance de la performance et de gestion des sauvegardes. Les\u00a0DBA\u00a0sont d\u00e9sormais des acteurs cl\u00e9s dans la mise en \u0153uvre et le maintien des cadres de gouvernance des donn\u00e9es. La gouvernance des [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/\" \/>\n<meta property=\"og:site_name\" content=\"Infotel Software\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-01T04:00:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-03T11:31:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/infotel-software.com\/wp-content\/uploads\/2024\/08\/Mullins-Blog-Banner-July-2024-FR-1080x675-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Nicolas Dedieu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nicolas Dedieu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/\"},\"author\":{\"name\":\"Nicolas Dedieu\",\"@id\":\"https:\/\/infotel-software.com\/fr\/#\/schema\/person\/47332ad494f554830c13cec77898be0f\"},\"headline\":\"Gouvernance des donn\u00e9es : son importance et trois facteurs de conformit\u00e9 essentiels que les administrateurs de bases de donn\u00e9es doivent consid\u00e9rer\",\"datePublished\":\"2024-08-01T04:00:07+00:00\",\"dateModified\":\"2025-03-03T11:31:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/\"},\"wordCount\":3383,\"publisher\":{\"@id\":\"https:\/\/infotel-software.com\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/infotel-software.com\/wp-content\/uploads\/2024\/08\/Mullins-Blog-Banner-July-2024-FR-1080x675-1.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/\",\"url\":\"https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/\",\"name\":\"Gouvernance des donn\u00e9es : son importance et trois facteurs de conformit\u00e9 essentiels que les administrateurs de bases de donn\u00e9es doivent consid\u00e9rer - Infotel Software\",\"isPartOf\":{\"@id\":\"https:\/\/infotel-software.com\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/infotel-software.com\/wp-content\/uploads\/2024\/08\/Mullins-Blog-Banner-July-2024-FR-1080x675-1.jpg\",\"datePublished\":\"2024-08-01T04:00:07+00:00\",\"dateModified\":\"2025-03-03T11:31:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/#primaryimage\",\"url\":\"https:\/\/infotel-software.com\/wp-content\/uploads\/2024\/08\/Mullins-Blog-Banner-July-2024-FR-1080x675-1.jpg\",\"contentUrl\":\"https:\/\/infotel-software.com\/wp-content\/uploads\/2024\/08\/Mullins-Blog-Banner-July-2024-FR-1080x675-1.jpg\",\"width\":1080,\"height\":675},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/infotel-software.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gouvernance des donn\u00e9es : son importance et trois facteurs de conformit\u00e9 essentiels que les administrateurs de bases de donn\u00e9es doivent consid\u00e9rer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/infotel-software.com\/fr\/#website\",\"url\":\"https:\/\/infotel-software.com\/fr\/\",\"name\":\"Insoft Infotel\",\"description\":\"Maximize Performance, Optimize Costs\",\"publisher\":{\"@id\":\"https:\/\/infotel-software.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/infotel-software.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/infotel-software.com\/fr\/#organization\",\"name\":\"Insoft Infotel\",\"url\":\"https:\/\/infotel-software.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/infotel-software.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/infotel-software.com\/wp-content\/uploads\/2024\/06\/logo-insoft-infotel-1.png\",\"contentUrl\":\"https:\/\/infotel-software.com\/wp-content\/uploads\/2024\/06\/logo-insoft-infotel-1.png\",\"width\":1278,\"height\":358,\"caption\":\"Insoft Infotel\"},\"image\":{\"@id\":\"https:\/\/infotel-software.com\/fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/infotel-software.com\/fr\/#\/schema\/person\/47332ad494f554830c13cec77898be0f\",\"name\":\"Nicolas Dedieu\",\"url\":\"https:\/\/infotel-software.com\/fr\/author\/n_ded\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Gouvernance des donn\u00e9es : son importance et trois facteurs de conformit\u00e9 essentiels que les administrateurs de bases de donn\u00e9es doivent consid\u00e9rer - Infotel Software","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/","og_locale":"fr_FR","og_type":"article","og_title":"Gouvernance des donn\u00e9es : son importance et trois facteurs de conformit\u00e9 essentiels que les administrateurs de bases de donn\u00e9es doivent consid\u00e9rer - Infotel Software","og_description":"Aujourd\u2019hui, le r\u00f4le de l\u2019administrateur de bases de donn\u00e9es (DBA) a \u00e9volu\u00e9 au-del\u00e0 des responsabilit\u00e9s traditionnelles de maintien des syst\u00e8mes de bases de donn\u00e9es, d\u2019assurance de la performance et de gestion des sauvegardes. Les\u00a0DBA\u00a0sont d\u00e9sormais des acteurs cl\u00e9s dans la mise en \u0153uvre et le maintien des cadres de gouvernance des donn\u00e9es. La gouvernance des [&hellip;]","og_url":"https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/","og_site_name":"Infotel Software","article_published_time":"2024-08-01T04:00:07+00:00","article_modified_time":"2025-03-03T11:31:47+00:00","og_image":[{"width":1080,"height":675,"url":"https:\/\/infotel-software.com\/wp-content\/uploads\/2024\/08\/Mullins-Blog-Banner-July-2024-FR-1080x675-1.jpg","type":"image\/jpeg"}],"author":"Nicolas Dedieu","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Nicolas Dedieu","Dur\u00e9e de lecture estim\u00e9e":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/#article","isPartOf":{"@id":"https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/"},"author":{"name":"Nicolas Dedieu","@id":"https:\/\/infotel-software.com\/fr\/#\/schema\/person\/47332ad494f554830c13cec77898be0f"},"headline":"Gouvernance des donn\u00e9es : son importance et trois facteurs de conformit\u00e9 essentiels que les administrateurs de bases de donn\u00e9es doivent consid\u00e9rer","datePublished":"2024-08-01T04:00:07+00:00","dateModified":"2025-03-03T11:31:47+00:00","mainEntityOfPage":{"@id":"https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/"},"wordCount":3383,"publisher":{"@id":"https:\/\/infotel-software.com\/fr\/#organization"},"image":{"@id":"https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/#primaryimage"},"thumbnailUrl":"https:\/\/infotel-software.com\/wp-content\/uploads\/2024\/08\/Mullins-Blog-Banner-July-2024-FR-1080x675-1.jpg","articleSection":["Blog"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/","url":"https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/","name":"Gouvernance des donn\u00e9es : son importance et trois facteurs de conformit\u00e9 essentiels que les administrateurs de bases de donn\u00e9es doivent consid\u00e9rer - Infotel Software","isPartOf":{"@id":"https:\/\/infotel-software.com\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/#primaryimage"},"image":{"@id":"https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/#primaryimage"},"thumbnailUrl":"https:\/\/infotel-software.com\/wp-content\/uploads\/2024\/08\/Mullins-Blog-Banner-July-2024-FR-1080x675-1.jpg","datePublished":"2024-08-01T04:00:07+00:00","dateModified":"2025-03-03T11:31:47+00:00","breadcrumb":{"@id":"https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/#primaryimage","url":"https:\/\/infotel-software.com\/wp-content\/uploads\/2024\/08\/Mullins-Blog-Banner-July-2024-FR-1080x675-1.jpg","contentUrl":"https:\/\/infotel-software.com\/wp-content\/uploads\/2024\/08\/Mullins-Blog-Banner-July-2024-FR-1080x675-1.jpg","width":1080,"height":675},{"@type":"BreadcrumbList","@id":"https:\/\/infotel-software.com\/fr\/blog-fr\/gouvernance-des-donnees-son-importance-et-trois-facteurs-de-conformite-essentiels-que-les-administrateurs-de-bases-de-donnees-doivent-considerer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/infotel-software.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Gouvernance des donn\u00e9es : son importance et trois facteurs de conformit\u00e9 essentiels que les administrateurs de bases de donn\u00e9es doivent consid\u00e9rer"}]},{"@type":"WebSite","@id":"https:\/\/infotel-software.com\/fr\/#website","url":"https:\/\/infotel-software.com\/fr\/","name":"Insoft Infotel","description":"Maximize Performance, Optimize Costs","publisher":{"@id":"https:\/\/infotel-software.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/infotel-software.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/infotel-software.com\/fr\/#organization","name":"Insoft Infotel","url":"https:\/\/infotel-software.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/infotel-software.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/infotel-software.com\/wp-content\/uploads\/2024\/06\/logo-insoft-infotel-1.png","contentUrl":"https:\/\/infotel-software.com\/wp-content\/uploads\/2024\/06\/logo-insoft-infotel-1.png","width":1278,"height":358,"caption":"Insoft Infotel"},"image":{"@id":"https:\/\/infotel-software.com\/fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/infotel-software.com\/fr\/#\/schema\/person\/47332ad494f554830c13cec77898be0f","name":"Nicolas Dedieu","url":"https:\/\/infotel-software.com\/fr\/author\/n_ded\/"}]}},"_links":{"self":[{"href":"https:\/\/infotel-software.com\/fr\/wp-json\/wp\/v2\/posts\/22179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infotel-software.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infotel-software.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infotel-software.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/infotel-software.com\/fr\/wp-json\/wp\/v2\/comments?post=22179"}],"version-history":[{"count":3,"href":"https:\/\/infotel-software.com\/fr\/wp-json\/wp\/v2\/posts\/22179\/revisions"}],"predecessor-version":[{"id":22249,"href":"https:\/\/infotel-software.com\/fr\/wp-json\/wp\/v2\/posts\/22179\/revisions\/22249"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infotel-software.com\/fr\/wp-json\/wp\/v2\/media\/22242"}],"wp:attachment":[{"href":"https:\/\/infotel-software.com\/fr\/wp-json\/wp\/v2\/media?parent=22179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infotel-software.com\/fr\/wp-json\/wp\/v2\/categories?post=22179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infotel-software.com\/fr\/wp-json\/wp\/v2\/tags?post=22179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}