{"id":2518,"date":"2025-09-24T14:38:47","date_gmt":"2025-09-24T12:38:47","guid":{"rendered":"https:\/\/www.oneytrust.com\/?p=2518"},"modified":"2025-09-24T14:38:47","modified_gmt":"2025-09-24T12:38:47","slug":"digital-identity-the-new-identity-card-for-the-digital-age","status":"publish","type":"post","link":"https:\/\/www.oneytrust.com\/fr\/digital-identity-the-new-identity-card-for-the-digital-age\/","title":{"rendered":"L\u2019identit\u00e9 digitale : la nouvelle carte d\u2019identit\u00e9 de l\u2019\u00e8re num\u00e9rique - Partie 1"},"content":{"rendered":"<p>L\u2019identit\u00e9 digitale s\u2019impose alors comme la colonne vert\u00e9brale du monde connect\u00e9. Elle condense nos donn\u00e9es personnelles, nos empreintes \u00ab techniques \u00bb (device fingerprinting), nos comportements et nos interactions. Elle est \u00e0 la fois un outil de reconnaissance, un bouclier contre la fraude et un s\u00e9same pour acc\u00e9der aux services.<\/p>\n\n\n\n<p><strong>1. D\u00e9finir l\u2019identit\u00e9 digitale<\/strong>:<\/p>\n\n\n\n<p>\u00c0 la diff\u00e9rence de l\u2019identit\u00e9 civile, \u00e9tablie et certifi\u00e9e par l\u2019\u00c9tat, l\u2019identit\u00e9 digitale est polyforme. Elle se nourrit de quatre dimensions principales :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Les donn\u00e9es d\u00e9claratives<\/strong>: nom, pr\u00e9nom, e-mail, num\u00e9ro de t\u00e9l\u00e9phone, adresse. Ces informations sont fournies volontairement, mais peuvent \u00eatre usurp\u00e9es \/ \u00ab imit\u00e9es \u00bb.<\/li>\n\n\n\n<li><strong>Les empreintes \u00ab techniques \u00bb<\/strong>: chaque appareil connect\u00e9 g\u00e9n\u00e8re une signature unique (IP, configuration, capteurs, fuseaux horaires, cookies). Ces signaux, invisibles \u00e0 l\u2019\u0153il nu, deviennent des indices pr\u00e9cieux pour reconna\u00eetre un utilisateur.<\/li>\n\n\n\n<li><strong>Les comportements<\/strong>: vitesse de saisie, horaires de connexion, localisation, fr\u00e9quence d\u2019utilisation des services. Ces \u00e9l\u00e9ments sont plus difficiles \u00e0 falsifier et constituent une signature comportementale quasi biom\u00e9trique.<\/li>\n\n\n\n<li><strong>Les interactions sociales et \u00e9conomiques<\/strong>: historique d\u2019usage des donn\u00e9es de contact, de paiements, de navigation. Ces donn\u00e9es construisent un r\u00e9cit coh\u00e9rent\u2026 ou au contraire trahissent une incoh\u00e9rence typique d\u2019\u00e9v\u00e8nements frauduleux.<\/li>\n<\/ul>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><strong>Une identit\u00e9 en mouvement<\/strong><\/li>\n<\/ol>\n\n\n\n<p>\u00c0 la diff\u00e9rence de la carte nationale, fig\u00e9e au moment de sa d\u00e9livrance, l\u2019identit\u00e9 digitale est vivante. Chaque connexion, chaque paiement, chaque interaction vient enrichir ce portrait num\u00e9rique. Cette dynamique apporte de la robustesse \u2013 il est difficile de simuler une vie num\u00e9rique coh\u00e9rente sur la dur\u00e9e \u2013 mais soul\u00e8ve aussi des questions \u00e9thiques :<\/p>\n\n\n\n<p>Quelle quantit\u00e9 de donn\u00e9es collecter sans empi\u00e9ter sur la vie priv\u00e9e ?<\/p>\n\n\n\n<p>Comment s\u2019assurer que l\u2019usager garde la main sur son identit\u00e9 digitale ?<\/p>\n\n\n\n<p>Quels garde-fous mettre en place pour \u00e9viter une surveillance g\u00e9n\u00e9ralis\u00e9e ?<\/p>\n\n\n\n<p>Le RGPD en Europe ou la notion de \u00ab self-sovereign identity \u00bb (identit\u00e9 auto-souveraine) tentent d\u2019apporter des r\u00e9ponses. Mais l\u2019\u00e9quilibre reste fragile entre s\u00e9curit\u00e9, fluidit\u00e9 et respect des libert\u00e9s individuelles.<\/p>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li><strong>Pourquoi cette notion est-elle devenue centrale ?<\/strong><\/li>\n<\/ol>\n\n\n\n<p>Deux grandes tendances expliquent son importance croissante.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Une digitalisation g\u00e9n\u00e9ralis\u00e9e<\/strong>: le smartphone est devenu notre guichet universel. Des services publics aux soins de sant\u00e9, tout transite par le num\u00e9rique. Les initiatives comme France Identit\u00e9 ou le r\u00e8glement europ\u00e9en eIDAS 2.0 visent \u00e0 cr\u00e9er des identit\u00e9s num\u00e9riques reconnues \u00e0 l\u2019\u00e9chelle nationale et supranationale.<\/li>\n\n\n\n<li><strong>Une criminalit\u00e9 100% web en plein essor<\/strong>: les fraudes \u00e0 l\u2019identit\u00e9 explosent. Le concept d\u2019\u00ab identit\u00e9 synth\u00e9tique \u00bb illustre cette \u00e9volution.  Les fraudeurs assemblent des morceaux de donn\u00e9es r\u00e9elles et invent\u00e9es pour cr\u00e9er de faux profils capables de duper les contr\u00f4les traditionnels.<\/li>\n<\/ul>\n\n\n\n<p>Dans ce contexte, la capacit\u00e9 \u00e0 \u00e9valuer la cr\u00e9dibilit\u00e9 d\u2019une identit\u00e9 digitale devient strat\u00e9gique pour les banques, assureurs, commer\u00e7ants, mais aussi pour les \u00c9tats.<\/p>\n\n\n\n<p><strong>In a nutshell...<\/strong><\/p>\n\n\n\n<p>L\u2019identit\u00e9 digitale s\u2019impose comme un objet en perp\u00e9tuelle \u00e9volution : fa\u00e7onn\u00e9e par nos usages, encadr\u00e9e par des r\u00e9glementations, scrut\u00e9e pour sa valeur s\u00e9curitaire et commerciale. Mais cette dynamique ne va pas sans poser des d\u00e9fis. Dans une seconde partie, nous aborderons les enjeux multiples qu\u2019elle soul\u00e8ve \u2013 s\u00e9curit\u00e9, confiance, souverainet\u00e9, inclusion \u2013 et les perspectives qui pourraient red\u00e9finir notre rapport \u00e0 l\u2019identit\u00e9 d\u2019ici 2030.<\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Digital identity is therefore becoming the backbone of the connected world. It condenses our personal data, our \u2018technical\u2019 fingerprints (device fingerprinting), our behaviours and our interactions. It is at once a recognition tool, a shield against fraud and a key to accessing services. 1 . Defining digital identity: Unlike civil identity, which is established and&#8230;<\/p>","protected":false},"author":3,"featured_media":2519,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"categories":[6,1],"tags":[45,31,37,32,26,44,46],"class_list":["post-2518","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-expertise","category-general","tag-adn","tag-ecommerce","tag-fraude","tag-ia","tag-luttecontrelafraude","tag-securite","tag-technologie"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Digital identity: the new identity card for the digital age<\/title>\n<meta name=\"description\" content=\"In 2025, few tasks are carried out without the use of digital technology. Opening a bank account, applying for a job, ordering a product, registering for a training course, consulting medical results: behind each of these actions lies a key question \u2013 is the person behind the screen who they say they are?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.oneytrust.com\/fr\/digital-identity-the-new-identity-card-for-the-digital-age\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital identity: the new identity card for the digital age\" \/>\n<meta property=\"og:description\" content=\"In 2025, few tasks are carried out without the use of digital technology. Opening a bank account, applying for a job, ordering a product, registering for a training course, consulting medical results: behind each of these actions lies a key question \u2013 is the person behind the screen who they say they are?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.oneytrust.com\/fr\/digital-identity-the-new-identity-card-for-the-digital-age\/\" \/>\n<meta property=\"og:site_name\" content=\"Oneytrust\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-24T12:38:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Digital_Identity_Sept25.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1172\" \/>\n\t<meta property=\"og:image:height\" content=\"1172\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Julie Breton\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julie Breton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/\"},\"author\":{\"name\":\"Julie Breton\",\"@id\":\"https:\/\/www.oneytrust.com\/#\/schema\/person\/7468b32537747c2a80c28ba0064f7f4d\"},\"headline\":\"Digital identity: the new identity card for the digital age &#8211; Part 1\",\"datePublished\":\"2025-09-24T12:38:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/\"},\"wordCount\":464,\"publisher\":{\"@id\":\"https:\/\/www.oneytrust.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Digital_Identity_Sept25.png\",\"keywords\":[\"ADN\",\"ecommerce\",\"FRAUDE\",\"IA\",\"luttecontrelafraude\",\"s\u00e9curit\u00e9\",\"technologie\"],\"articleSection\":[\"Expertise\",\"General\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/\",\"url\":\"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/\",\"name\":\"Digital identity: the new identity card for the digital age\",\"isPartOf\":{\"@id\":\"https:\/\/www.oneytrust.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Digital_Identity_Sept25.png\",\"datePublished\":\"2025-09-24T12:38:47+00:00\",\"description\":\"In 2025, few tasks are carried out without the use of digital technology. Opening a bank account, applying for a job, ordering a product, registering for a training course, consulting medical results: behind each of these actions lies a key question \u2013 is the person behind the screen who they say they are?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/#primaryimage\",\"url\":\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Digital_Identity_Sept25.png\",\"contentUrl\":\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Digital_Identity_Sept25.png\",\"width\":1200,\"height\":1200,\"caption\":\"Empreinte num\u00e9rique d'un doigt sur un fond digital fonc\u00e9.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.oneytrust.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Digital identity: the new identity card for the digital age &#8211; Part 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.oneytrust.com\/#website\",\"url\":\"https:\/\/www.oneytrust.com\/\",\"name\":\"Oneytrust\",\"description\":\"Only Trusted Customers. Oneytrust provides fraud detection and identity validation for merchants and banks. Unique consortia data, unbeatable fraud scoring.\",\"publisher\":{\"@id\":\"https:\/\/www.oneytrust.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.oneytrust.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.oneytrust.com\/#organization\",\"name\":\"Oneytrust\",\"url\":\"https:\/\/www.oneytrust.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.oneytrust.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/04\/oneytrust-logo.svg\",\"contentUrl\":\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/04\/oneytrust-logo.svg\",\"width\":171,\"height\":40,\"caption\":\"Oneytrust\"},\"image\":{\"@id\":\"https:\/\/www.oneytrust.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.oneytrust.com\/#\/schema\/person\/7468b32537747c2a80c28ba0064f7f4d\",\"name\":\"Julie Breton\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.oneytrust.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7d778d89a656901040a5cb3d84c274d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7d778d89a656901040a5cb3d84c274d6?s=96&d=mm&r=g\",\"caption\":\"Julie Breton\"},\"url\":\"https:\/\/www.oneytrust.com\/fr\/author\/julie-breton\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digital identity: the new identity card for the digital age","description":"En 2025, rares sont les d\u00e9marches qui ne passent pas par le num\u00e9rique. Cr\u00e9er un compte bancaire, postuler \u00e0 un emploi, commander un produit, s\u2019inscrire \u00e0 une formation, consulter ses r\u00e9sultats m\u00e9dicaux : derri\u00e8re chacune de ces actions se cache une question cl\u00e9 \u2013 est-ce que la personne derri\u00e8re l\u2019\u00e9cran est bien l\u2019individu l\u00e9gitime ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.oneytrust.com\/fr\/digital-identity-the-new-identity-card-for-the-digital-age\/","og_locale":"fr_FR","og_type":"article","og_title":"Digital identity: the new identity card for the digital age","og_description":"In 2025, few tasks are carried out without the use of digital technology. Opening a bank account, applying for a job, ordering a product, registering for a training course, consulting medical results: behind each of these actions lies a key question \u2013 is the person behind the screen who they say they are?","og_url":"https:\/\/www.oneytrust.com\/fr\/digital-identity-the-new-identity-card-for-the-digital-age\/","og_site_name":"Oneytrust","article_published_time":"2025-09-24T12:38:47+00:00","og_image":[{"url":"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Digital_Identity_Sept25.png","width":1172,"height":1172,"type":"image\/png"}],"author":"Julie Breton","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"Julie Breton","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/#article","isPartOf":{"@id":"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/"},"author":{"name":"Julie Breton","@id":"https:\/\/www.oneytrust.com\/#\/schema\/person\/7468b32537747c2a80c28ba0064f7f4d"},"headline":"Digital identity: the new identity card for the digital age &#8211; Part 1","datePublished":"2025-09-24T12:38:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/"},"wordCount":464,"publisher":{"@id":"https:\/\/www.oneytrust.com\/#organization"},"image":{"@id":"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/#primaryimage"},"thumbnailUrl":"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Digital_Identity_Sept25.png","keywords":["ADN","ecommerce","FRAUDE","IA","luttecontrelafraude","s\u00e9curit\u00e9","technologie"],"articleSection":["Expertise","General"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/","url":"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/","name":"Digital identity: the new identity card for the digital age","isPartOf":{"@id":"https:\/\/www.oneytrust.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/#primaryimage"},"image":{"@id":"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/#primaryimage"},"thumbnailUrl":"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Digital_Identity_Sept25.png","datePublished":"2025-09-24T12:38:47+00:00","description":"En 2025, rares sont les d\u00e9marches qui ne passent pas par le num\u00e9rique. Cr\u00e9er un compte bancaire, postuler \u00e0 un emploi, commander un produit, s\u2019inscrire \u00e0 une formation, consulter ses r\u00e9sultats m\u00e9dicaux : derri\u00e8re chacune de ces actions se cache une question cl\u00e9 \u2013 est-ce que la personne derri\u00e8re l\u2019\u00e9cran est bien l\u2019individu l\u00e9gitime ?","breadcrumb":{"@id":"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/#primaryimage","url":"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Digital_Identity_Sept25.png","contentUrl":"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Digital_Identity_Sept25.png","width":1200,"height":1200,"caption":"Empreinte num\u00e9rique d'un doigt sur un fond digital fonc\u00e9."},{"@type":"BreadcrumbList","@id":"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.oneytrust.com\/"},{"@type":"ListItem","position":2,"name":"Digital identity: the new identity card for the digital age &#8211; Part 1"}]},{"@type":"WebSite","@id":"https:\/\/www.oneytrust.com\/#website","url":"https:\/\/www.oneytrust.com\/","name":"Oneytrust","description":"Only Trusted Customers. Oneytrust provides fraud detection and identity validation for merchants and banks. Unique consortia data, unbeatable fraud scoring.","publisher":{"@id":"https:\/\/www.oneytrust.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.oneytrust.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.oneytrust.com\/#organization","name":"Oneytrust","url":"https:\/\/www.oneytrust.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.oneytrust.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/04\/oneytrust-logo.svg","contentUrl":"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/04\/oneytrust-logo.svg","width":171,"height":40,"caption":"Oneytrust"},"image":{"@id":"https:\/\/www.oneytrust.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.oneytrust.com\/#\/schema\/person\/7468b32537747c2a80c28ba0064f7f4d","name":"Julie Breton","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.oneytrust.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7d778d89a656901040a5cb3d84c274d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7d778d89a656901040a5cb3d84c274d6?s=96&d=mm&r=g","caption":"Julie Breton"},"url":"https:\/\/www.oneytrust.com\/fr\/author\/julie-breton\/"}]}},"taxonomy_info":{"category":[{"value":6,"label":"Expertise"},{"value":1,"label":"General"}],"post_tag":[{"value":45,"label":"ADN"},{"value":31,"label":"ecommerce"},{"value":37,"label":"FRAUDE"},{"value":32,"label":"IA"},{"value":26,"label":"luttecontrelafraude"},{"value":44,"label":"s\u00e9curit\u00e9"},{"value":46,"label":"technologie"}]},"featured_image_src_large":["https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Digital_Identity_Sept25.png",1172,1172,false],"author_info":{"display_name":"Julie Breton","author_link":"https:\/\/www.oneytrust.com\/fr\/author\/julie-breton\/"},"comment_info":0,"category_info":[{"term_id":6,"name":"Expertise","slug":"expertise","term_group":0,"term_taxonomy_id":6,"taxonomy":"category","description":"","parent":0,"count":29,"filter":"raw","cat_ID":6,"category_count":29,"category_description":"","cat_name":"Expertise","category_nicename":"expertise","category_parent":0},{"term_id":1,"name":"General","slug":"general","term_group":0,"term_taxonomy_id":1,"taxonomy":"category","description":"","parent":0,"count":30,"filter":"raw","cat_ID":1,"category_count":30,"category_description":"","cat_name":"General","category_nicename":"general","category_parent":0}],"tag_info":[{"term_id":45,"name":"ADN","slug":"adn","term_group":0,"term_taxonomy_id":45,"taxonomy":"post_tag","description":"","parent":0,"count":4,"filter":"raw"},{"term_id":31,"name":"ecommerce","slug":"ecommerce","term_group":0,"term_taxonomy_id":31,"taxonomy":"post_tag","description":"","parent":0,"count":18,"filter":"raw"},{"term_id":37,"name":"FRAUDE","slug":"fraude","term_group":0,"term_taxonomy_id":37,"taxonomy":"post_tag","description":"","parent":0,"count":17,"filter":"raw"},{"term_id":32,"name":"IA","slug":"ia","term_group":0,"term_taxonomy_id":32,"taxonomy":"post_tag","description":"","parent":0,"count":8,"filter":"raw"},{"term_id":26,"name":"luttecontrelafraude","slug":"luttecontrelafraude","term_group":0,"term_taxonomy_id":26,"taxonomy":"post_tag","description":"","parent":0,"count":16,"filter":"raw"},{"term_id":44,"name":"s\u00e9curit\u00e9","slug":"securite","term_group":0,"term_taxonomy_id":44,"taxonomy":"post_tag","description":"","parent":0,"count":7,"filter":"raw"},{"term_id":46,"name":"technologie","slug":"technologie","term_group":0,"term_taxonomy_id":46,"taxonomy":"post_tag","description":"","parent":0,"count":6,"filter":"raw"}],"_links":{"self":[{"href":"https:\/\/www.oneytrust.com\/fr\/wp-json\/wp\/v2\/posts\/2518","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.oneytrust.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.oneytrust.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.oneytrust.com\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.oneytrust.com\/fr\/wp-json\/wp\/v2\/comments?post=2518"}],"version-history":[{"count":1,"href":"https:\/\/www.oneytrust.com\/fr\/wp-json\/wp\/v2\/posts\/2518\/revisions"}],"predecessor-version":[{"id":2520,"href":"https:\/\/www.oneytrust.com\/fr\/wp-json\/wp\/v2\/posts\/2518\/revisions\/2520"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.oneytrust.com\/fr\/wp-json\/wp\/v2\/media\/2519"}],"wp:attachment":[{"href":"https:\/\/www.oneytrust.com\/fr\/wp-json\/wp\/v2\/media?parent=2518"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.oneytrust.com\/fr\/wp-json\/wp\/v2\/categories?post=2518"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.oneytrust.com\/fr\/wp-json\/wp\/v2\/tags?post=2518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}