Séance 2: Analyse d'impact
- Impact Analysis and risk: /images/td/aipd.gif
- Impact Analysis: https://www.cnil.fr/sites/default/files/atoms/files/wp248_rev.01_fr.pdf
- PIA context
- PIA usage
- Juridic document:
- Data transformations, proportional security, risk analysis (Traitements envisagés, proportionnalité des opérations de traitement, analyse des risques)
- DPO, DSO
- Security techniques
- https secure http, 0-knowledge
- anomymous data
- pseudo
- access rights
- views
- PIA report
- Register
- Answers to the questions
- Data Schemas, Computation Schemas
- Examples
- Medical data (Hospital)
- CCTV (video cameras)
- Social Networks
- Notation of individuals
- Mailing lists
- Advertising (Criteo)
- Private data of a practioner
- PIA of the site www.up2.fr
- PIA of the site www.dreem.com