﻿{"id":1029,"date":"2019-10-15T08:01:01","date_gmt":"2019-10-15T12:01:01","guid":{"rendered":"https:\/\/www.uqac.ca\/cybersecurite\/?p=1029"},"modified":"2019-10-15T08:01:03","modified_gmt":"2019-10-15T12:01:03","slug":"semaine-3-le-detenteur-de-linformation","status":"publish","type":"post","link":"https:\/\/www.uqac.ca\/cybersecurite\/semaine-3-le-detenteur-de-linformation\/","title":{"rendered":"Semaine 3 &#8211; Le d\u00e9tenteur de l&rsquo;information"},"content":{"rendered":"\n<p style=\"background-color:#5a7410\" class=\"has-text-color has-background has-medium-font-size has-very-light-gray-color\"><a>Le d\u00e9tenteur ou propri\u00e9taire de\nl\u2019information<\/a><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2019\/10\/key-30417_960_720.png\" alt=\"\" class=\"wp-image-1033\" width=\"258\" height=\"129\" srcset=\"https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2019\/10\/key-30417_960_720.png 960w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2019\/10\/key-30417_960_720-300x150.png 300w, https:\/\/www.uqac.ca\/cybersecurite\/wp-content\/uploads\/2019\/10\/key-30417_960_720-768x384.png 768w\" sizes=\"auto, (max-width: 258px) 100vw, 258px\" \/><\/figure><\/div>\n\n\n\n<p>Un r\u00f4le cl\u00e9 en s\u00e9curit\u00e9 de l\u2019information est celui du d\u00e9tenteur de l\u2019information. &nbsp;\u00c0 l\u2019UQAC, le gestionnaire d\u2019un secteur d\u2019activit\u00e9s est le d\u00e9tenteur de l\u2019information relative \u00e0 la mission de son secteur.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Il est invit\u00e9 \u00e0 participer \u00e0 l\u2019exercice de cat\u00e9gorisation des actifs et\/ou de classification de l\u2019information de son secteur d\u2019activit\u00e9s.<\/li><li>Il autorise l\u2019acc\u00e8s (ajout, modification, retrait) aux actifs informationnels sous sa responsabilit\u00e9.<\/li><li>Il participe \u00e0 la gestion des incidents de s\u00e9curit\u00e9 de l\u2019information concernant ces m\u00eames actifs.<\/li><li>Il participe \u00e0 la mise en place et au respect des mesures de s\u00e9curit\u00e9 relatives aux actifs informationnels sous sa responsabilit\u00e9.<\/li><\/ul>\n\n\n\n<p><br><\/p>\n\n\n\n<p><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le d\u00e9tenteur ou propri\u00e9taire de l\u2019information Un r\u00f4le cl\u00e9 en s\u00e9curit\u00e9 de l\u2019information est celui du d\u00e9tenteur de l\u2019information. &nbsp;\u00c0 l\u2019UQAC, le gestionnaire d\u2019un secteur d\u2019activit\u00e9s est le d\u00e9tenteur de l\u2019information relative \u00e0 la mission de son secteur. Il est invit\u00e9 \u00e0 participer \u00e0 l\u2019exercice de cat\u00e9gorisation des actifs et\/ou de classification de l\u2019information de [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":1033,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4,8,10],"tags":[],"class_list":["post-1029","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-calendrier","category-campagne-de-sensibilisation"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/1029","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/comments?post=1029"}],"version-history":[{"count":17,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/1029\/revisions"}],"predecessor-version":[{"id":1073,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/1029\/revisions\/1073"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media\/1033"}],"wp:attachment":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media?parent=1029"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/categories?post=1029"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/tags?post=1029"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}