﻿{"id":397,"date":"2019-01-21T21:29:33","date_gmt":"2019-01-21T20:29:33","guid":{"rendered":"http:\/\/www.uqac.ca\/cybersecurite\/?p=397"},"modified":"2019-01-21T21:32:47","modified_gmt":"2019-01-21T20:32:47","slug":"le-chiffrement-des-ordinateurs-portables","status":"publish","type":"post","link":"https:\/\/www.uqac.ca\/cybersecurite\/le-chiffrement-des-ordinateurs-portables\/","title":{"rendered":"Le chiffrement des ordinateurs portables"},"content":{"rendered":"\n<p>Depuis janvier 2019, lors de la livraison des nouveaux ordinateurs portables par le Service des technologies de l\u2019information de l&rsquo;UQAC, ceux-ci sont chiffr\u00e9s.  La perte ou le vol de l\u2019\u00e9quipement emp\u00eachera une personne qui ne peut s\u2019authentifier d\u2019avoir acc\u00e8s aux donn\u00e9es du disque dur. <\/p>\n\n\n\n<p>Le chiffrement des \u00e9quipements mobiles est une des meilleures pratiques \u00e0 mettre en place dans la <strong>directive de s\u00e9curit\u00e9 de l\u2019information d\u00e9coulant de la loi sur la gouvernance et la gestion des ressources informationnelles<\/strong>.  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Depuis janvier 2019, lors de la livraison des nouveaux ordinateurs portables par le Service des technologies de l\u2019information de l&rsquo;UQAC, ceux-ci sont chiffr\u00e9s. La perte ou le vol de l\u2019\u00e9quipement emp\u00eachera une personne qui ne peut s\u2019authentifier d\u2019avoir acc\u00e8s aux donn\u00e9es du disque dur. Le chiffrement des \u00e9quipements mobiles est une des meilleures pratiques \u00e0 [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":400,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7],"tags":[],"class_list":["post-397","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-chiffrement"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/397","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/comments?post=397"}],"version-history":[{"count":2,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/397\/revisions"}],"predecessor-version":[{"id":401,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/posts\/397\/revisions\/401"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media\/400"}],"wp:attachment":[{"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/media?parent=397"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/categories?post=397"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.uqac.ca\/cybersecurite\/wp-json\/wp\/v2\/tags?post=397"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}