{"id":220654,"date":"2021-07-20T10:53:46","date_gmt":"2021-07-20T14:53:46","guid":{"rendered":"https:\/\/www.cyberark.com\/trust\/privacy\/"},"modified":"2026-02-11T12:41:37","modified_gmt":"2026-02-11T17:41:37","slug":"privacy","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/fr\/trust\/privacy\/","title":{"rendered":"Privacy"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero-noimg dark\u00a0\u00bb][vc_column width=\u00a0\u00bb3\/4&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text el_class=\u00a0\u00bbcyb-breadcrumb\u00a0\u00bb]<i class=\"fa fa-long-arrow-left\"><\/i><a href=\"https:\/\/www.cyberark.com\/fr\/trust\/\">Retour au Centre de confiance<\/a>[\/vc_column_text][vc_column_text]<\/p>\n<h1>Confidentialit\u00e9 et protection des donn\u00e9es<\/h1>\n<p><\/p>\n<h2>CyberArk s&rsquo;engage \u00e0 prot\u00e9ger vos donn\u00e9es contre tout acc\u00e8s non autoris\u00e9 et \u00e0 aider votre organisation \u00e0 respecter les r\u00e8gles de confidentialit\u00e9 des donn\u00e9es.<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 cybv2-pad privacy\u00a0\u00bb][vc_column width=\u00a0\u00bb2\/3&Prime; offset=\u00a0\u00bbvc_col-sm-offset-2&Prime;][vc_column_text css=\u00a0\u00bb\u00a0\u00bb]CyberArk is a Palo Alto Networks Company. For information on how Palo Alto Networks processes personal data, visit <a href=\"https:\/\/www.paloaltonetworks.com\/legal-notices\/trust-center\/privacy\">https:\/\/www.paloaltonetworks.com\/legal-notices\/trust-center\/privacy<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p class=\"text-center\"><strong>Notre approche en mati\u00e8re de confidentialit\u00e9 et de protection des donn\u00e9es<\/strong><\/p>\n<p>Chez CyberArk, nous nous engageons tout particuli\u00e8rement \u00e0 respecter votre vie priv\u00e9e et celle de votre personnel. D\u00e9couvrez ci-dessous nos engagements en mati\u00e8re de confidentialit\u00e9 et de protection des donn\u00e9es.<\/p>\n<p><strong>Avis de confidentialit\u00e9 <\/strong><\/p>\n<p>Nous nous engageons \u00e0 faire preuve de transparence afin que vous sachiez comment nous utilisons les donn\u00e9es personnelles dans nos processus commerciaux. <a href=\"https:\/\/www.cyberark.com\/fr\/privacy-notice\/\">Notre avis de confidentialit\u00e9<\/a> vous indique quelles informations nous collectons \u00e0 votre sujet, ce que nous en faisons et comment nous les prot\u00e9geons.<\/p>\n<p><strong>FAQ sur la confidentialit\u00e9 et la protection des donn\u00e9es <\/strong><\/p>\n<p>Nous nous engageons \u00e0 fournir des informations claires sur la mani\u00e8re dont nous traitons les donn\u00e9es personnelles des utilisateurs finaux de nos clients pour leur compte, comme indiqu\u00e9 dans notre <a href=\"https:\/\/www.cyberark.com\/privacy-and-data-protection-faqs\/\">FAQ sur la confidentialit\u00e9 et la protection des donn\u00e9es \u00e0 l&rsquo;intention des clients<\/a>.<\/p>\n<p><strong>RGPD et autres l\u00e9gislations applicables en mati\u00e8re de confidentialit\u00e9 <\/strong><\/p>\n<p>Nous nous engageons \u00e0 respecter le RGPD, le CCPA, le CPRA et les autres lois applicables en mati\u00e8re de confidentialit\u00e9 et de protection des donn\u00e9es dans le monde entier. Cela inclut la mise en place d&rsquo;un programme mondial de conformit\u00e9 en mati\u00e8re de confidentialit\u00e9 et la formation de nos employ\u00e9s sur la mani\u00e8re de traiter les donn\u00e9es de nos clients et de nos partenaires.<\/p>\n<p><strong>Addendum relatif au traitement des donn\u00e9es <\/strong><\/p>\n<p>Nous nous engageons \u00e0 vous donner le contr\u00f4le de vos donn\u00e9es. Nous ne traiterons les donn\u00e9es personnelles des clients que sur vos instructions, conform\u00e9ment \u00e0 notre <a href=\"https:\/\/www.cyberark.com\/CyberArk-Data-Processing-Addendum.pdf\" target=\"_blank\" rel=\"noopener\">addendum relatif au traitement des donn\u00e9es<\/a>.<\/p>\n<p><strong>Sous-traitants <\/strong><\/p>\n<p>Nous nous engageons \u00e0 informer nos clients avec qui nous partageons leurs donn\u00e9es, et \u00e0 ne les partager qu&rsquo;avec nos <a href=\"https:\/\/www.cyberark.com\/fr\/sub-processors\/\" target=\"_blank\" rel=\"noopener\">sous-traitants<\/a> , c&rsquo;est-\u00e0-dire les tiers qui nous aident \u00e0 fournir nos services.<\/p>\n<p>Nos accords juridiques standard qui s&rsquo;appliquent \u00e0 nos produits et services sont disponibles sur notre page Conditions contractuelles.<\/p>\n<p><strong>FAQ sur la loi sur la r\u00e9silience op\u00e9rationnelle num\u00e9rique (DORA)<\/strong><\/p>\n<p>En tant que fournisseur de technologies de l&rsquo;information et de la communication (TIC), nous reconnaissons qu&rsquo;il est de notre responsabilit\u00e9 d&rsquo;aider les entit\u00e9s financi\u00e8res dans leurs efforts de conformit\u00e9 \u00e0 la loi DORA. Ces <a href=\"https:\/\/www.cyberark.com\/digital-operational-resilience-act\/\">FAQ sur la loi sur la r\u00e9silience op\u00e9rationnelle num\u00e9rique (DORA)<\/a> apportent des \u00e9claircissements sur la mani\u00e8re dont nous pouvons aider nos clients du secteur financier dans ces efforts.[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=\u00a0\u00bbstretch_row\u00a0\u00bb el_class=\u00a0\u00bbcybv2 int-hero-noimg dark\u00a0\u00bb][vc_column width=\u00a0\u00bb3\/4&Prime; el_class=\u00a0\u00bbcolumn-1&Prime;][vc_column_text el_class=\u00a0\u00bbcyb-breadcrumb\u00a0\u00bb]Retour au Centre de confiance[\/vc_column_text][vc_column_text] Confidentialit\u00e9 et protection des donn\u00e9es CyberArk s&rsquo;engage \u00e0 prot\u00e9ger vos donn\u00e9es contre tout acc\u00e8s non autoris\u00e9 et \u00e0 aider votre organisation \u00e0 respecter&#8230;<\/p>\n","protected":false},"author":164,"featured_media":0,"parent":131027,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-220654","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Confidentialit\u00e9 | CyberArk<\/title>\n<meta name=\"description\" content=\"CyberArk s&#039;engage \u00e0 prot\u00e9ger vos donn\u00e9es contre tout acc\u00e8s non autoris\u00e9 et \u00e0 aider votre organisation \u00e0 respecter les r\u00e8gles de confidentialit\u00e9 des donn\u00e9es.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/fr\/trust\/privacy\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy\" \/>\n<meta property=\"og:description\" content=\"CyberArk s&#039;engage \u00e0 prot\u00e9ger vos donn\u00e9es contre tout acc\u00e8s non autoris\u00e9 et \u00e0 aider votre organisation \u00e0 respecter les r\u00e8gles de confidentialit\u00e9 des donn\u00e9es.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/fr\/trust\/privacy\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-11T17:41:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/trust\/privacy\/\",\"url\":\"https:\/\/www.cyberark.com\/fr\/trust\/privacy\/\",\"name\":\"Confidentialit\u00e9 | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#website\"},\"datePublished\":\"2021-07-20T14:53:46+00:00\",\"dateModified\":\"2026-02-11T17:41:37+00:00\",\"description\":\"CyberArk s'engage \u00e0 prot\u00e9ger vos donn\u00e9es contre tout acc\u00e8s non autoris\u00e9 et \u00e0 aider votre organisation \u00e0 respecter les r\u00e8gles de confidentialit\u00e9 des donn\u00e9es.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/trust\/privacy\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/fr\/trust\/privacy\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/trust\/privacy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Centre de confiance\",\"item\":\"https:\/\/www.cyberark.com\/fr\/trust\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Privacy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#website\",\"url\":\"https:\/\/www.cyberark.com\/fr\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Confidentialit\u00e9 | CyberArk","description":"CyberArk s'engage \u00e0 prot\u00e9ger vos donn\u00e9es contre tout acc\u00e8s non autoris\u00e9 et \u00e0 aider votre organisation \u00e0 respecter les r\u00e8gles de confidentialit\u00e9 des donn\u00e9es.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/fr\/trust\/privacy\/","og_locale":"fr_FR","og_type":"article","og_title":"Privacy","og_description":"CyberArk s'engage \u00e0 prot\u00e9ger vos donn\u00e9es contre tout acc\u00e8s non autoris\u00e9 et \u00e0 aider votre organisation \u00e0 respecter les r\u00e8gles de confidentialit\u00e9 des donn\u00e9es.","og_url":"https:\/\/www.cyberark.com\/fr\/trust\/privacy\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-02-11T17:41:37+00:00","og_image":[{"width":1024,"height":535,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2022\/09\/CYBR-gradient-bg-og-120x627-01-1024x535.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/fr\/trust\/privacy\/","url":"https:\/\/www.cyberark.com\/fr\/trust\/privacy\/","name":"Confidentialit\u00e9 | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/fr\/#website"},"datePublished":"2021-07-20T14:53:46+00:00","dateModified":"2026-02-11T17:41:37+00:00","description":"CyberArk s'engage \u00e0 prot\u00e9ger vos donn\u00e9es contre tout acc\u00e8s non autoris\u00e9 et \u00e0 aider votre organisation \u00e0 respecter les r\u00e8gles de confidentialit\u00e9 des donn\u00e9es.","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/fr\/trust\/privacy\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/fr\/trust\/privacy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/fr\/trust\/privacy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Centre de confiance","item":"https:\/\/www.cyberark.com\/fr\/trust\/"},{"@type":"ListItem","position":3,"name":"Privacy"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/fr\/#website","url":"https:\/\/www.cyberark.com\/fr\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/fr\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/220654","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/users\/164"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/comments?post=220654"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/220654\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/pages\/131027"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/media?parent=220654"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/fr\/wp-json\/wp\/v2\/product_category?post=220654"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}