{"id":285,"date":"2024-11-28T15:33:41","date_gmt":"2024-11-28T14:33:41","guid":{"rendered":"https:\/\/ch17-cyber.fr\/?page_id=285"},"modified":"2024-11-28T15:33:43","modified_gmt":"2024-11-28T14:33:43","slug":"service-de-recueil-de-preuve-apres-une-cyberattaque","status":"publish","type":"page","link":"https:\/\/ch17-cyber.fr\/index.php\/service-de-recueil-de-preuve-apres-une-cyberattaque\/","title":{"rendered":"Service de recueil de preuve apr\u00e8s une cyberattaque"},"content":{"rendered":"\n<p class=\"has-bright-blue-color has-text-color has-link-color has-medium-font-size wp-elements-b9ff27cc9ac7393ddf43155ebd5c1291\"><strong>Vous \u00eates victime d&rsquo;une cyberattaque, vous devez geler les preuves avant de reprendre une activit\u00e9 nominale, nous vous accompagnons dans cette d\u00e9marche.<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-link-color wp-elements-2268c0580a8739af1b976763d3e2c29c\" style=\"color:#cc0000\"><strong>Quelle est la base l\u00e9gale de notre d\u00e9marche ?<\/strong><\/p>\n\n\n\n<p>C&rsquo;est tr\u00e8s simple, la <a href=\"https:\/\/www.legifrance.gouv.fr\/jorf\/id\/JORFTEXT000000399095#:~:text=%2D%20L'%C3%A9crit%20sous%20forme%20%C3%A9lectronique,%C3%A0%20en%20garantir%20l'int%C3%A9grit%C3%A9.\" data-type=\"link\" data-id=\"https:\/\/www.legifrance.gouv.fr\/jorf\/id\/JORFTEXT000000399095#:~:text=%2D%20L'%C3%A9crit%20sous%20forme%20%C3%A9lectronique,%C3%A0%20en%20garantir%20l'int%C3%A9grit%C3%A9.\">loi 2000-30 du 13 mars 2000<\/a> parue au journal officiel dispose dans son article 1316-1 que : <\/p>\n\n\n\n<p><em>\u00a0\u00bb\u00a0L&rsquo;\u00e9crit sous forme \u00e9lectronique est admis en preuve au m\u00eame titre que l&rsquo;\u00e9crit sur support papier, sous r\u00e9serve que puisse \u00eatre d\u00fbment identifi\u00e9e la personne dont il \u00e9mane et qu&rsquo;il soit \u00e9tabli et conserv\u00e9 dans des conditions de nature \u00e0 en garantir l&rsquo;int\u00e9grit\u00e9.\u00a0\u00bb<\/em><\/p>\n\n\n\n<p>Ainsi que dans son article 1316-3 que :<\/p>\n\n\n\n<p><em>\u00ab\u00a0L&rsquo;\u00e9crit sur support \u00e9lectronique a la m\u00eame force probante que l&rsquo;\u00e9crit sur support papier.\u00a0\u00ab\u00a0<\/em><\/p>\n\n\n\n<p>Dans notre d\u00e9marche, nous recueillons les preuves sur un support externe, nous les signons.<\/p>\n\n\n\n<p>Ce support est bien sur chiffr\u00e9, c&rsquo;est vous qui d\u00e9tenez le mot de passe et conservez le support.<\/p>\n\n\n\n<p>Les signatures sont int\u00e9gr\u00e9es dans un rapport g\u00e9n\u00e9r\u00e9 par nous m\u00eame qui est lui-m\u00eame sign\u00e9 entre vous et nous via un tiers de confiance conforme EIDAS (il est destin\u00e9 \u00e0 conserver les \u00ab\u00a0hash \u00a0\u00bb des informations recueillies).<\/p>\n\n\n\n<p class=\"has-bright-blue-color has-text-color has-link-color wp-elements-67e8a9d5aceaf80155d01d75ebc35efc\"><strong>Vous disposez ainsi de preuves que nous avons recueilli, identifi\u00e9es, gel\u00e9es et sign\u00e9s, l&rsquo;identification et l&rsquo;int\u00e9grit\u00e9 sont assur\u00e9es.<\/strong><\/p>\n\n\n\n<p class=\"has-bright-blue-color has-text-color has-link-color wp-elements-383620382acc14641dd71fec3b55255b\"><strong>L&rsquo;ensemble sera pr\u00eat a \u00eatre exploit\u00e9 dans une proc\u00e9dure d&rsquo;enqu\u00eate.<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-link-color has-medium-font-size wp-elements-2abae37acfe39e5e2daafde20f03dc33\" style=\"color:#f70808\"><strong>Nous intervenons avec les actions suivantes pour les structures de 15 postes au maximum :<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"background-color:#54f6f6\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-left has-bright-blue-color has-text-color has-link-color has-small-font-size wp-elements-369df7760aa07fa57555bd6f9ba2450c\" style=\"text-transform:uppercase\"><strong>ANALYSE DE VOS BESOINS<\/strong><\/p>\n\n\n\n<p class=\"has-bright-blue-color has-text-color has-link-color has-small-font-size wp-elements-918e9eb0b9b1e35c4a6be0421733380e\" style=\"text-transform:uppercase\"><strong>\u00e9valuation de l&rsquo;impact de l&rsquo;attaque<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-left has-bright-blue-color has-text-color has-link-color has-small-font-size wp-elements-2a0919b6f48c9ab9cb1f6e2ef9d1555c\" style=\"text-transform:uppercase\"><strong>recueil des preuves (SYST\u00c8ME, PARTITION, LOGS&#8230;)<\/strong><\/p>\n\n\n\n<p class=\"has-bright-blue-color has-text-color has-link-color has-small-font-size wp-elements-2913c0d1a5c715393b2b81a4d91989a4\" style=\"text-transform:uppercase\"><strong>AIDE \u00c0 LA notifications aux personnes concern\u00e9es SI VOUS LE SOUHAITEZ<\/strong><\/p>\n\n\n\n<p class=\"has-bright-blue-color has-text-color has-link-color has-small-font-size wp-elements-471f67931bd6e3cc9bb78b20f14451fa\" style=\"text-transform:uppercase\"><strong>signature des \u00c9L\u00c9MENTS<\/strong><\/p>\n\n\n\n<p class=\"has-bright-blue-color has-text-color has-link-color has-small-font-size wp-elements-fc4948677354cd136bc6e95922813699\" style=\"text-transform:uppercase\"><strong>INT\u00c9GRATION DES INFORMATIONS PR\u00c9C\u00c9DENTES DANS UN RAPPORT CERTIFI\u00c9 PAR UN TIERS DE CONFIANCE CONFORME EIDAS<\/strong><\/p>\n\n\n\n<p class=\"has-bright-blue-color has-text-color has-link-color has-small-font-size wp-elements-3ace94ffc7f789676ab0b61a897ef895\" style=\"text-transform:uppercase\"><strong>SCELLEMENT ET REMISE DES SUPPORTS COLLECT\u00c9S<\/strong><\/p>\n<\/div>\n<\/div>\n\n\n\n<p class=\"has-bright-blue-color has-text-color has-link-color has-large-font-size wp-elements-6cd4a3b3c7420bae4dea2af26d0d4b1a\">Nous contacter<\/p>\n\n\n\n<div class=\"wp-block-contact-form-7-contact-form-selector\">\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f15-o1\" lang=\"fr-FR\" dir=\"ltr\" data-wpcf7-id=\"15\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/index.php\/wp-json\/wp\/v2\/pages\/285#wpcf7-f15-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"Formulaire de contact\" novalidate=\"novalidate\" data-status=\"init\">\n<div style=\"display: none;\">\n<input type=\"hidden\" name=\"_wpcf7\" value=\"15\" \/>\n<input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.0.1\" \/>\n<input type=\"hidden\" name=\"_wpcf7_locale\" value=\"fr_FR\" \/>\n<input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f15-o1\" \/>\n<input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/>\n<input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/div>\n<p><label> Votre Soci\u00e9t\u00e9<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-name\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"your-name\" \/><\/span> <\/label>\n<\/p>\n<p><label> Votre E-mail<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"your-email\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-email wpcf7-validates-as-required wpcf7-text wpcf7-validates-as-email\" aria-required=\"true\" aria-invalid=\"false\" value=\"\" type=\"email\" name=\"your-email\" \/><\/span> <\/label>\n<\/p>\n<p><label> Votre num\u00e9ro de T\u00e9l\u00e9phone (optionnel)<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"telephone\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-tel wpcf7-text wpcf7-validates-as-tel\" aria-invalid=\"false\" value=\"\" type=\"tel\" name=\"telephone\" \/><\/span><br \/>\n<\/label>\n<\/p>\n<p><label> Votre demande<br \/>\n<span class=\"wpcf7-form-control-wrap\" data-name=\"socit\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text\" aria-invalid=\"false\" value=\"\" type=\"text\" name=\"socit\" \/><\/span><br \/>\n<\/label>\n<\/p>\n<p><input class=\"wpcf7-form-control wpcf7-submit has-spinner\" type=\"submit\" value=\"Envoyer\" \/>\n<\/p><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n<\/div>\n\n\n\n<p class=\"has-bright-blue-color has-text-color has-link-color has-large-font-size wp-elements-1f5ab2ef66443278ce89654cadd73e94\"><strong>Organisation et r\u00e9alisation<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"background-color:#54f6f6\">\n<div class=\"wp-block-column has-medium-font-size is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-color has-link-color has-small-font-size wp-elements-087879771c500a9fd1fa9fcfb13d117a\" style=\"color:#150da1;text-transform:uppercase\"><strong>d\u00e9tection ANALYSE et \u00c9VALUAtion<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list has-small-font-size\">\n<li>Nous identifions le p\u00e9rim\u00e8tre de l&rsquo;attaque avec vos \u00e9quipes.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list has-small-font-size\">\n<li>Nous d\u00e9terminons les besoins mat\u00e9riels pour les sauvegardes (nombre de supports de sauvegarde n\u00e9cessaires)<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list has-small-font-size\">\n<li>Nous confirmons les modes de recueil \u00e0 mettre en place.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-medium-font-size is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-color has-link-color has-small-font-size wp-elements-1316dc27b84111625c6523333b6c6720\" style=\"color:#150da1;text-transform:uppercase\"><strong>RECUEIL DES PREUVES<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list has-small-font-size\">\n<li>Par partition<\/li>\n\n\n\n<li>Par recopie<\/li>\n\n\n\n<li>Duplication compl\u00e8te du disque dur.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list has-small-font-size\">\n<li>Signature des \u00e9l\u00e9ments recueillis<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list has-small-font-size\">\n<li>Le tout en votre pr\u00e9sence pour attester les actions<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-medium-font-size is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-color has-link-color has-small-font-size wp-elements-660d28af1ab144f9122229425ee687a8\" style=\"color:#150da1;text-transform:uppercase\"><strong>SIGNATURE, RAPPORT<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list has-small-font-size\">\n<li>Cr\u00e9ation d&rsquo;un rapport de synth\u00e8se<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list has-small-font-size\">\n<li>Signature du rapport via un tiers de confiance conforme EIDAS<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-color has-link-color has-small-font-size wp-elements-8bf613808ae960244438967dd5562c4d\" style=\"color:#150da1;text-transform:uppercase\"><strong>SCELLEMENT ET REMISE DES SUPPORTS<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"has-small-font-size\">Scellement des supports selon vos besoins (chiffr\u00e9 ou physiquement)<\/li>\n\n\n\n<li class=\"has-small-font-size\">Remise des supports scell\u00e9s (nous ne conservons aucune donn\u00e9es chez nous)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<p class=\"has-bright-blue-color has-text-color has-link-color has-large-font-size wp-elements-96df50c3aea87a139239ff0da7ee49fa\"><strong>Votre besoin apr\u00e8s une cyberattaque  c&rsquo;est :<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"background-color:#54f6f6\">\n<div class=\"wp-block-column has-medium-font-size is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-color has-link-color has-small-font-size wp-elements-1f81f4750cbe224707d025837c319caf\" style=\"color:#150da1;text-transform:uppercase\"><strong>VOUS \u00c9COUTER<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list has-small-font-size\">\n<li><strong>Vous rassurer<\/strong><\/li>\n\n\n\n<li>Vous aider<\/li>\n\n\n\n<li>Vous accompagner dans la gestion de crise.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-medium-font-size is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-color has-link-color has-small-font-size wp-elements-c0e4ef5f161701d17a1164a431775a95\" style=\"color:#150da1;text-transform:uppercase\"><strong>MA\u00ceTRISER<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list has-small-font-size\">\n<li><strong>Vous permettre de reprendre une activit\u00e9 nominale  le plus rapidement possible<\/strong>.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-medium-font-size is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-color has-link-color has-small-font-size wp-elements-0297f6a077e610c3566191635dedb18e\" style=\"color:#150da1;text-transform:uppercase\"><strong>ACCOMPAGNER<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list has-small-font-size\">\n<li>Vous guider dans les relations avec les autorit\u00e9s (CNIL judiciaires, Assurances) si vous n\u00e9cessaire.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<p class=\"has-bright-blue-color has-text-color has-link-color has-medium-font-size wp-elements-808dbc078e93214577d0b742f73ca25c\"><strong>Une intervention en toute confiance :<\/strong><\/p>\n\n\n\n<p class=\"has-text-color has-link-color wp-elements-a787ae9efdcd601e7636281bfdd5a416\" style=\"color:#f60202\"><strong>La cybers\u00e9curit\u00e9, le RGPD, c&rsquo;est notre ADN.<\/strong><\/p>\n\n\n\n<p>Notre soci\u00e9t\u00e9 est r\u00e9f\u00e9renc\u00e9e sur le site Cybermalveillance.gouv.fr<\/p>\n\n\n\n<p class=\"has-bright-blue-color has-text-color has-link-color has-large-font-size wp-elements-feec0c1e2dd5f1520ff4342cb930bb22\"><strong>D\u00e9roulement type d&rsquo;une intervention<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\" style=\"background-color:#54f6f6\">\n<div class=\"wp-block-column has-medium-font-size is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-color has-link-color has-small-font-size wp-elements-769542d38880e017db491bba513a6255\" style=\"color:#150da1;text-transform:uppercase\"><strong><strong>d\u00e9tection et identification<\/strong><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list has-small-font-size\">\n<li>Gratuit via e-mail ou appel \u00e0 votre convenance<\/li>\n\n\n\n<li>En cas d&rsquo;accord, auto-saisie si n\u00e9cessaire via cybermalveillance.gouv.fr<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-medium-font-size is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-color has-link-color has-small-font-size wp-elements-1316dc27b84111625c6523333b6c6720\" style=\"color:#150da1;text-transform:uppercase\"><strong>RECUEIL DES PREUVES<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list has-small-font-size\">\n<li>Par demi-journ\u00e9e, et en fonction du type de l&rsquo;importance de l&rsquo;attaque.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column has-medium-font-size is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-color has-link-color has-small-font-size wp-elements-823b8d6d2e4e411adb00406ca1c132c2\" style=\"color:#150da1;text-transform:uppercase\"><strong>CR\u00c9ATION DU RAPPORT ET SIGNATURE<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list has-small-font-size\">\n<li>Une journ\u00e9e pour la r\u00e9daction, la pr\u00e9sentation et la signature conforme EIDAS.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-color has-link-color has-small-font-size wp-elements-67746aeb40139fcda10e91778b3b2ed4\" style=\"color:#150da1;text-transform:uppercase\"><strong><strong>SCELLEMENT ET MISE \u00c0 DISPOSITION DES SUPPORTS<\/strong><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"has-small-font-size\">Inclus dans la prestation<\/li>\n\n\n\n<li class=\"has-small-font-size\">Le prix des supports sera int\u00e9gr\u00e9 dans le tarif de notre prestation.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Vous \u00eates victime d&rsquo;une cyberattaque, vous devez geler les preuves avant de reprendre une activit\u00e9 nominale, nous vous accompagnons dans cette d\u00e9marche. Quelle est la base l\u00e9gale de notre d\u00e9marche ? C&rsquo;est tr\u00e8s simple, la loi 2000-30 du 13 mars 2000 parue au journal officiel dispose dans son article 1316-1 que : \u00a0\u00bb\u00a0L&rsquo;\u00e9crit sous forme &hellip; <a href=\"https:\/\/ch17-cyber.fr\/index.php\/service-de-recueil-de-preuve-apres-une-cyberattaque\/\" class=\"more-link\">Continuer la lecture<span class=\"screen-reader-text\"> de &laquo;&nbsp;Service de recueil de preuve apr\u00e8s une cyberattaque&nbsp;&raquo;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-285","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Service de recueil de preuve apr\u00e8s une cyberattaque - CH17-Cyber<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ch17-cyber.fr\/index.php\/service-de-recueil-de-preuve-apres-une-cyberattaque\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Service de recueil de preuve apr\u00e8s une cyberattaque - CH17-Cyber\" \/>\n<meta property=\"og:description\" content=\"Vous \u00eates victime d&rsquo;une cyberattaque, vous devez geler les preuves avant de reprendre une activit\u00e9 nominale, nous vous accompagnons dans cette d\u00e9marche. Quelle est la base l\u00e9gale de notre d\u00e9marche ? C&rsquo;est tr\u00e8s simple, la loi 2000-30 du 13 mars 2000 parue au journal officiel dispose dans son article 1316-1 que : \u00a0\u00bb\u00a0L&rsquo;\u00e9crit sous forme &hellip; Continuer la lecture de &laquo;&nbsp;Service de recueil de preuve apr\u00e8s une cyberattaque&nbsp;&raquo;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ch17-cyber.fr\/index.php\/service-de-recueil-de-preuve-apres-une-cyberattaque\/\" \/>\n<meta property=\"og:site_name\" content=\"CH17-Cyber\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-28T14:33:43+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ch17-cyber.fr\/index.php\/service-de-recueil-de-preuve-apres-une-cyberattaque\/\",\"url\":\"https:\/\/ch17-cyber.fr\/index.php\/service-de-recueil-de-preuve-apres-une-cyberattaque\/\",\"name\":\"Service de recueil de preuve apr\u00e8s une cyberattaque - CH17-Cyber\",\"isPartOf\":{\"@id\":\"https:\/\/ch17-cyber.fr\/#website\"},\"datePublished\":\"2024-11-28T14:33:41+00:00\",\"dateModified\":\"2024-11-28T14:33:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ch17-cyber.fr\/index.php\/service-de-recueil-de-preuve-apres-une-cyberattaque\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ch17-cyber.fr\/index.php\/service-de-recueil-de-preuve-apres-une-cyberattaque\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ch17-cyber.fr\/index.php\/service-de-recueil-de-preuve-apres-une-cyberattaque\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/ch17-cyber.fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service de recueil de preuve apr\u00e8s une cyberattaque\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ch17-cyber.fr\/#website\",\"url\":\"https:\/\/ch17-cyber.fr\/\",\"name\":\"CH17-Cyber\",\"description\":\"Ensembles contre les cybermenaces\",\"publisher\":{\"@id\":\"https:\/\/ch17-cyber.fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ch17-cyber.fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ch17-cyber.fr\/#organization\",\"name\":\"CH17-Cyber\",\"url\":\"https:\/\/ch17-cyber.fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/ch17-cyber.fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ch17-cyber.fr\/wp-content\/uploads\/2024\/10\/cropped-LogoCH17CYBER2.jpg\",\"contentUrl\":\"https:\/\/ch17-cyber.fr\/wp-content\/uploads\/2024\/10\/cropped-LogoCH17CYBER2.jpg\",\"width\":240,\"height\":240,\"caption\":\"CH17-Cyber\"},\"image\":{\"@id\":\"https:\/\/ch17-cyber.fr\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Service de recueil de preuve apr\u00e8s une cyberattaque - CH17-Cyber","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ch17-cyber.fr\/index.php\/service-de-recueil-de-preuve-apres-une-cyberattaque\/","og_locale":"fr_FR","og_type":"article","og_title":"Service de recueil de preuve apr\u00e8s une cyberattaque - CH17-Cyber","og_description":"Vous \u00eates victime d&rsquo;une cyberattaque, vous devez geler les preuves avant de reprendre une activit\u00e9 nominale, nous vous accompagnons dans cette d\u00e9marche. Quelle est la base l\u00e9gale de notre d\u00e9marche ? C&rsquo;est tr\u00e8s simple, la loi 2000-30 du 13 mars 2000 parue au journal officiel dispose dans son article 1316-1 que : \u00a0\u00bb\u00a0L&rsquo;\u00e9crit sous forme &hellip; Continuer la lecture de &laquo;&nbsp;Service de recueil de preuve apr\u00e8s une cyberattaque&nbsp;&raquo;","og_url":"https:\/\/ch17-cyber.fr\/index.php\/service-de-recueil-de-preuve-apres-une-cyberattaque\/","og_site_name":"CH17-Cyber","article_modified_time":"2024-11-28T14:33:43+00:00","twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ch17-cyber.fr\/index.php\/service-de-recueil-de-preuve-apres-une-cyberattaque\/","url":"https:\/\/ch17-cyber.fr\/index.php\/service-de-recueil-de-preuve-apres-une-cyberattaque\/","name":"Service de recueil de preuve apr\u00e8s une cyberattaque - CH17-Cyber","isPartOf":{"@id":"https:\/\/ch17-cyber.fr\/#website"},"datePublished":"2024-11-28T14:33:41+00:00","dateModified":"2024-11-28T14:33:43+00:00","breadcrumb":{"@id":"https:\/\/ch17-cyber.fr\/index.php\/service-de-recueil-de-preuve-apres-une-cyberattaque\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ch17-cyber.fr\/index.php\/service-de-recueil-de-preuve-apres-une-cyberattaque\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ch17-cyber.fr\/index.php\/service-de-recueil-de-preuve-apres-une-cyberattaque\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/ch17-cyber.fr\/"},{"@type":"ListItem","position":2,"name":"Service de recueil de preuve apr\u00e8s une cyberattaque"}]},{"@type":"WebSite","@id":"https:\/\/ch17-cyber.fr\/#website","url":"https:\/\/ch17-cyber.fr\/","name":"CH17-Cyber","description":"Ensembles contre les cybermenaces","publisher":{"@id":"https:\/\/ch17-cyber.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ch17-cyber.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/ch17-cyber.fr\/#organization","name":"CH17-Cyber","url":"https:\/\/ch17-cyber.fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/ch17-cyber.fr\/#\/schema\/logo\/image\/","url":"https:\/\/ch17-cyber.fr\/wp-content\/uploads\/2024\/10\/cropped-LogoCH17CYBER2.jpg","contentUrl":"https:\/\/ch17-cyber.fr\/wp-content\/uploads\/2024\/10\/cropped-LogoCH17CYBER2.jpg","width":240,"height":240,"caption":"CH17-Cyber"},"image":{"@id":"https:\/\/ch17-cyber.fr\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/ch17-cyber.fr\/index.php\/wp-json\/wp\/v2\/pages\/285","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ch17-cyber.fr\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ch17-cyber.fr\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ch17-cyber.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ch17-cyber.fr\/index.php\/wp-json\/wp\/v2\/comments?post=285"}],"version-history":[{"count":8,"href":"https:\/\/ch17-cyber.fr\/index.php\/wp-json\/wp\/v2\/pages\/285\/revisions"}],"predecessor-version":[{"id":293,"href":"https:\/\/ch17-cyber.fr\/index.php\/wp-json\/wp\/v2\/pages\/285\/revisions\/293"}],"wp:attachment":[{"href":"https:\/\/ch17-cyber.fr\/index.php\/wp-json\/wp\/v2\/media?parent=285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}