{"id":1584,"date":"2014-02-01T17:07:00","date_gmt":"2014-02-01T22:07:00","guid":{"rendered":"https:\/\/www.dialoginsight.com\/5-regles-dor-securiser-liste-contacts\/"},"modified":"2023-06-15T14:46:49","modified_gmt":"2023-06-15T18:46:49","slug":"5-golden-rules-ensure-data-security","status":"publish","type":"post","link":"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/","title":{"rendered":"5 Golden Rules to Ensure Your Data Security"},"content":{"rendered":"<p><img decoding=\"async\" src=\" https:\/\/cdn.ofsys.com\/T\/OFSYS\/H\/716063\/DcckbK\/Securite_150.jpg \" alt=\"S\u00e9curit\u00e9\" \/><\/p>\n<p><a href=\"http:\/\/en.wikipedia.org\/wiki\/Edward_Snowden\" target=\"_blank\" rel=\"noopener\">Edward Snowden<\/a>\u2018s revelations about U.S. surveillance and new\u00a0<a href=\"http:\/\/c28.dialoginsight.com\/en\/home.html\" target=\"_blank\" rel=\"noopener\">Canadian anti-spam legislation<\/a>\u00a0are good reasons to evaluate your data privacy policies. Here are some important elements to ensure the security of your contact list.<\/p>\n<p>Who do you think controls access to your data? In your organization, you all have one or more network administrators that provide you with your individual access codes to your computers, servers, files, tools, etc. What about your contact list? The one you send to your external suppliers?<\/p>\n<p>Here are 5 important rules to ensure the confidentiality of your data.<\/p>\n<p><strong>Designate the Person in Charge<\/strong><\/p>\n<p>For obvious security reasons, external suppliers should never create or edit your employees platform access over the phone or by email. Identify a person (usually IT) in your office to be responsible for managing everyone\u2019s access. This person will be responsible for defining roles and responsibilities and for providing login codes.<\/p>\n<p><strong>One Login = One User<\/strong><\/p>\n<p>It happened to me, several years ago, during a training session, to see my clients completely panicked. The reason: an employee who had left the company continued to access the platform. After validation, this was not the case; a new person was using his login. In such a situation where the logins are shared, it is impossible to know who actually did an action. For security reasons, you may want to preserve a reliable history. So, when someone leaves, disable his access and create new ones for substitutes. Remember, your list is priceless \u2013 think of all the time it took to build it!<\/p>\n<p><strong>Password Rules<\/strong><\/p>\n<p>Make sure to use secure passwords rules. The most secure level will require a password containing at least 7 characters with a letter, a number, a capital letter and a special character. Make sure that people cannot enter 1234. Also, provide a temporary password which must be changed at the first connection. This way, only the users will know their codes.<\/p>\n<p><strong>Secure Files<\/strong><\/p>\n<p>Never send a list without adding a password in order for the recipient to open the file. And look out! Do not send the password in the same email. Who has not made the mistake of sending an email to the wrong person? ?? If you have not already done so, you\u2019re lucky. Anyway, make sure to always secure data exchanges.<\/p>\n<p><strong>Hosting in Canada or in the United States<\/strong><\/p>\n<p>The american law (Patriot Act), provides data access to the U.S. government and gives it control over the data that is hosted in its territory. The Snowden case demonstrate that american listening goes beyond this Law. Following this event, we see that many public businesses, especially in the banking sectors and governments, apply restrictions and promote data hosting in Canada. In their privacy policies, they require entities wishing to host data outside Canada to advise their client when taking coordinates.\u00a0<span class=\"hps\">Thus,<\/span>\u00a0using a\u00a0<span class=\"hps\">Canadian provider<\/span>\u00a0that is\u00a0<span class=\"hps\">hosting data<\/span>\u00a0<span class=\"hps\">in Canada<\/span>\u00a0<span class=\"hps\">facilitates compliance with<\/span>\u00a0<span class=\"hps\">the<\/span>\u00a0<span class=\"hps\">Privacy<\/span>\u00a0<span class=\"hps\">Act<\/span>. Whatever your choice is, make sure you secure your data access and that you comply with the policies in your organization.<\/p>\n<p>In addition to these tips to limit access to your contacts, we strongly suggest that you define roles and responsibilities that define which contacts a user can access and the tasks they are allowed to do.<\/p>\n<p>Need help to create roles or want to know more about user management?\u00a0<a href=\"https:\/\/www.dialoginsight.com\/en\/contact\/\" target=\"_blank\" rel=\"noopener\">Contact our team<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Edouard Snowden&#8217;s revelations about American surveillance and Canada&#8217;s new anti-spam law are excellent reasons to evaluate your data privacy policies.<\/p>\n","protected":false},"author":2,"featured_media":279,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1584","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>5 Golden Rules to Ensure Your Data Security - Dialog Insight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Golden Rules to Ensure Your Data Security - Dialog Insight\" \/>\n<meta property=\"og:description\" content=\"Edouard Snowden&#039;s revelations about American surveillance and Canada&#039;s new anti-spam law are excellent reasons to evaluate your data privacy policies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Dialog Insight\" \/>\n<meta property=\"article:published_time\" content=\"2014-02-01T22:07:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-15T18:46:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/05\/5-regles-dor-pour-securiser-votre-liste-de-contacts.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pascale Guay\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pascale Guay\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/\"},\"author\":{\"name\":\"Pascale Guay\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/7054871a1ca37436e73b8e0cc971d670\"},\"headline\":\"5 Golden Rules to Ensure Your Data Security\",\"datePublished\":\"2014-02-01T22:07:00+00:00\",\"dateModified\":\"2023-06-15T18:46:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/\"},\"wordCount\":568,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/05\/5-regles-dor-pour-securiser-votre-liste-de-contacts.jpeg\",\"articleSection\":[\"Data Management\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/\",\"url\":\"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/\",\"name\":\"5 Golden Rules to Ensure Your Data Security - Dialog Insight\",\"isPartOf\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/05\/5-regles-dor-pour-securiser-votre-liste-de-contacts.jpeg\",\"datePublished\":\"2014-02-01T22:07:00+00:00\",\"dateModified\":\"2023-06-15T18:46:49+00:00\",\"author\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/7054871a1ca37436e73b8e0cc971d670\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/#primaryimage\",\"url\":\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/05\/5-regles-dor-pour-securiser-votre-liste-de-contacts.jpeg\",\"contentUrl\":\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/05\/5-regles-dor-pour-securiser-votre-liste-de-contacts.jpeg\",\"width\":1200,\"height\":628,\"caption\":\"regles dor pour securiser votre liste de contacts\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.dialoginsight.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Golden Rules to Ensure Your Data Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#website\",\"url\":\"https:\/\/www.dialoginsight.com\/en\/\",\"name\":\"Dialog Insight\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dialoginsight.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/7054871a1ca37436e73b8e0cc971d670\",\"name\":\"Pascale Guay\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/da316bcfa54507d75e1b17a3c105573ce98ae7b2e60719e8eeb009b44407533c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/da316bcfa54507d75e1b17a3c105573ce98ae7b2e60719e8eeb009b44407533c?s=96&d=mm&r=g\",\"caption\":\"Pascale Guay\"},\"description\":\"Co-fondatrice et pr\u00e9sidente de Dialog Insight, Pascale Guay a pr\u00e8s de 20 ans d'exp\u00e9rience dans le d\u00e9veloppement des affaires et le marketing relationnel. Elle dirige le service de strat\u00e9gie de conseil offert \u00e0 plus de 300 clients importants de Dialog Insight. Elle participe activement \u00e0 l'identification des strat\u00e9gies \u00e0 mettre en \u0153uvre en collaboration avec les clients tout en assurant la croissance de l'entreprise.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Golden Rules to Ensure Your Data Security - Dialog Insight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/","og_locale":"en_US","og_type":"article","og_title":"5 Golden Rules to Ensure Your Data Security - Dialog Insight","og_description":"Edouard Snowden's revelations about American surveillance and Canada's new anti-spam law are excellent reasons to evaluate your data privacy policies.","og_url":"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/","og_site_name":"Dialog Insight","article_published_time":"2014-02-01T22:07:00+00:00","article_modified_time":"2023-06-15T18:46:49+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/05\/5-regles-dor-pour-securiser-votre-liste-de-contacts.jpeg","type":"image\/jpeg"}],"author":"Pascale Guay","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Pascale Guay","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/#article","isPartOf":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/"},"author":{"name":"Pascale Guay","@id":"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/7054871a1ca37436e73b8e0cc971d670"},"headline":"5 Golden Rules to Ensure Your Data Security","datePublished":"2014-02-01T22:07:00+00:00","dateModified":"2023-06-15T18:46:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/"},"wordCount":568,"commentCount":0,"image":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/05\/5-regles-dor-pour-securiser-votre-liste-de-contacts.jpeg","articleSection":["Data Management"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/","url":"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/","name":"5 Golden Rules to Ensure Your Data Security - Dialog Insight","isPartOf":{"@id":"https:\/\/www.dialoginsight.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/#primaryimage"},"image":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/05\/5-regles-dor-pour-securiser-votre-liste-de-contacts.jpeg","datePublished":"2014-02-01T22:07:00+00:00","dateModified":"2023-06-15T18:46:49+00:00","author":{"@id":"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/7054871a1ca37436e73b8e0cc971d670"},"breadcrumb":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/#primaryimage","url":"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/05\/5-regles-dor-pour-securiser-votre-liste-de-contacts.jpeg","contentUrl":"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2023\/05\/5-regles-dor-pour-securiser-votre-liste-de-contacts.jpeg","width":1200,"height":628,"caption":"regles dor pour securiser votre liste de contacts"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dialoginsight.com\/en\/blog\/data-management\/5-golden-rules-ensure-data-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.dialoginsight.com\/en\/"},{"@type":"ListItem","position":2,"name":"5 Golden Rules to Ensure Your Data Security"}]},{"@type":"WebSite","@id":"https:\/\/www.dialoginsight.com\/en\/#website","url":"https:\/\/www.dialoginsight.com\/en\/","name":"Dialog Insight","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dialoginsight.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/7054871a1ca37436e73b8e0cc971d670","name":"Pascale Guay","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/da316bcfa54507d75e1b17a3c105573ce98ae7b2e60719e8eeb009b44407533c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/da316bcfa54507d75e1b17a3c105573ce98ae7b2e60719e8eeb009b44407533c?s=96&d=mm&r=g","caption":"Pascale Guay"},"description":"Co-fondatrice et pr\u00e9sidente de Dialog Insight, Pascale Guay a pr\u00e8s de 20 ans d'exp\u00e9rience dans le d\u00e9veloppement des affaires et le marketing relationnel. Elle dirige le service de strat\u00e9gie de conseil offert \u00e0 plus de 300 clients importants de Dialog Insight. Elle participe activement \u00e0 l'identification des strat\u00e9gies \u00e0 mettre en \u0153uvre en collaboration avec les clients tout en assurant la croissance de l'entreprise."}]}},"_links":{"self":[{"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/posts\/1584","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/comments?post=1584"}],"version-history":[{"count":0,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/posts\/1584\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/media\/279"}],"wp:attachment":[{"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/media?parent=1584"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/categories?post=1584"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/tags?post=1584"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}