{"id":51,"date":"2016-01-17T21:40:50","date_gmt":"2016-01-17T20:40:50","guid":{"rendered":"http:\/\/werle.pro\/?page_id=51"},"modified":"2016-10-15T16:29:43","modified_gmt":"2016-10-15T15:29:43","slug":"veille","status":"publish","type":"page","link":"https:\/\/werle.pro\/index.php\/veille\/","title":{"rendered":"Textes"},"content":{"rendered":"<h3>Veille politique num\u00e9rique<\/h3>\n<ul>\n<li>https:\/\/positions.contexte.com\/lab\/positions\/app\/<\/li>\n<li>https:\/\/www.contexte.com\/sujet\/numerique<\/li>\n<\/ul>\n<h3><strong>Documents MENESR<br \/>\n<\/strong><\/h3>\n<ul>\n<li>Strat\u00e9gie Nationales Enseignement Sup\u00e9rieur &#8211; La soci\u00e9t\u00e9 apprenante\n<ul>\n<li><a href=\"http:\/\/cache.media.enseignementsup-recherche.gouv.fr\/file\/STRANES\/13\/4\/STRANES_de_poche_06_HD_461134.pdf\" target=\"_blank\">STRANES de poche<\/a><\/li>\n<li><a href=\"http:\/\/cache.media.enseignementsup-recherche.gouv.fr\/file\/STRANES\/12\/2\/STRANES_entier_bd_461122.pdf\" target=\"_blank\">STRANES document complet<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3>Documents Sup Num\u00e9rique<\/h3>\n<ul>\n<li><a href=\"http:\/\/www.sup-numerique.gouv.fr\/pid33291\/publications-deployer-le-numerique.html\" target=\"_blank\">Les publications<\/a><\/li>\n<\/ul>\n<h3><strong>Documents de l&rsquo;AMUE<\/strong><\/h3>\n<ul>\n<li><a href=\"http:\/\/werle.pro\/wp-content\/Documents\/Gouv_Veille\/AMUE_Guide_Methodologique_Gouvernance_SI.pdf\" target=\"_blank\">Guide m\u00e9thodologique de la gouvernance du SI<\/a><\/li>\n<\/ul>\n<h3><strong>Documents ANSSI<br \/>\n<\/strong><\/h3>\n<ul>\n<li><a href=\"http:\/\/www.ssi.gouv.fr\/actualite\/la-strategie-nationale-pour-la-securite-du-numerique-une-reponse-aux-nouveaux-enjeux-des-usages-numeriques\/\" target=\"_blank\">Strat\u00e9gie Nationale de la S\u00e9curit\u00e9 du Num\u00e9rique<\/a><\/li>\n<li>Politiques\n<ul>\n<li><a href=\"http:\/\/www.ssi.gouv.fr\/entreprise\/reglementation\/protection-des-systemes-dinformations\/\" target=\"_blank\">Protection des Syst\u00e8mes d&rsquo;Information<\/a><\/li>\n<li><a href=\"http:\/\/www.ssi.gouv.fr\/entreprise\/reglementation\/protection-des-systemes-dinformations\/la-politique-de-securite-des-systemes-dinformation-de-letat-pssie\/\" target=\"_blank\">Politique SSI de l&rsquo;Etat<\/a><\/li>\n<\/ul>\n<\/li>\n<li>R\u00e9glementation\n<ul>\n<li><a href=\"http:\/\/www.ssi.gouv.fr\/entreprise\/reglementation\/administration-electronique\/le-referentiel-general-de-securite-rgs\/\" target=\"_blank\">RGS v2<\/a><\/li>\n<li><a href=\"http:\/\/www.ssi.gouv.fr\/entreprise\/reglementation\/reglementation-technique\/\" target=\"_blank\">R\u00e9glementation Technique<\/a><\/li>\n<\/ul>\n<\/li>\n<li>M\u00e9thode\n<ul>\n<li><a href=\"http:\/\/www.ssi.gouv.fr\/guide\/ebios-2010-expression-des-besoins-et-identification-des-objectifs-de-securite\/\" target=\"_blank\">Expression du Besoin et Identification des Objectifs de S\u00e9curit\u00e9<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Sensibilisation &amp; Formation\n<ul>\n<li><a href=\"http:\/\/www.ssi.gouv.fr\/guide\/guide-dhygiene-informatique\/\" target=\"_blank\">Guides d&rsquo;hygi\u00e8ne informatique<\/a><\/li>\n<li><a href=\"http:\/\/www.ssi.gouv.fr\/particulier\/precautions-elementaires\/\" target=\"_blank\">Pr\u00e9cautions pour les usagers<\/a><\/li>\n<li><a href=\"http:\/\/www.ssi.gouv.fr\/guide\/guide-dhygiene-informatique\/\" target=\"_blank\">Bonnes pratiques<\/a><\/li>\n<li><a href=\"http:\/\/www.ssi.gouv.fr\/particulier\/formation\/formation-et-cybersecurite-en-france\/\" target=\"_blank\">Centre de Formation SSI<\/a><\/li>\n<li><a href=\"http:\/\/www.ssi.gouv.fr\/particulier\/formation\/cyberedu\/\" target=\"_blank\">CyberEdu<\/a><\/li>\n<li><a href=\"http:\/\/www.ssi.gouv.fr\/particulier\/formation\/formation-et-cybersecurite-en-france\/\" target=\"_blank\">Formations labellis\u00e9es<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3><strong>Documents de la CNIL<\/strong><\/h3>\n<ul>\n<li><a href=\"http:\/\/www.cnil.fr\/documentation\/textes-fondateurs\/\" target=\"_blank\">Textes fondateurs<\/a><\/li>\n<li><a href=\"http:\/\/www.cnil.fr\/documentation\/deliberations\/\" target=\"_blank\">D\u00e9lib\u00e9rations (actes, avis, normes simplifi\u00e9s, dispenses)<\/a><\/li>\n<li><a href=\"http:\/\/www.cnil.fr\/documentation\/fiches-pratiques\/\" target=\"_blank\">Fiches pratiques<\/a><\/li>\n<li><a href=\"http:\/\/www.cnil.fr\/documentation\/guides\/\" target=\"_blank\">Guides pour approfondir<\/a><\/li>\n<li><a href=\"http:\/\/www.cnil.fr\/les-themes\/securite\/\" target=\"_blank\">S\u00e9curit\u00e9 du SI<\/a><\/li>\n<li>Sensibilisation\n<ul>\n<li>CNIL et Internet<\/li>\n<li>Espace jeunes<\/li>\n<li><a href=\"https:\/\/www.france-universite-numerique-mooc.fr\/courses\/CNAM\/01013\/session01\/courseware\/d15140ab9ef547d6a4fe5d3f8b8cafb9\/\" target=\"_blank\">MooC du CNAM : Informatique et libert\u00e9s sur internet<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"http:\/\/www.cnil.fr\/documentation\/rapports-dactivite\/\" target=\"_blank\">Rapports d&rsquo;activit\u00e9<\/a><\/li>\n<li><a href=\"http:\/\/www.cnil.fr\/documentation\/open-cnil\/\" target=\"_blank\">Open Data de la CNIL<\/a><\/li>\n<\/ul>\n<ul>\n<li>Exemple de bonnes pratiques : La page des <a href=\"http:\/\/www.ratp.fr\/fr\/ratp\/r_23895\/mentions-legales\/\" target=\"_blank\">mentions l\u00e9gales et du registre<\/a> de la RAPT<\/li>\n<\/ul>\n<ul>\n<li><a href=\"https:\/\/secure.edps.europa.eu\/EDPSWEB\/webdav\/site\/mySite\/shared\/Documents\/EDPS\/Publications\/Strategy\/15-07-30_Strategy_2015_2019_Update_FR.pdf\" target=\"_blank\">Contr\u00f4leur Europ\u00e9en de la Protection des Donn\u00e9es EDPS<br \/>\n<\/a><\/p>\n<ul>\n<li><a href=\"https:\/\/secure.edps.europa.eu\/EDPSWEB\/webdav\/site\/mySite\/shared\/Documents\/EDPS\/Publications\/Strategy\/15-07-30_Strategy_2015_2019_Update_FR.pdf\" target=\"_blank\">Strat\u00e9gie 2015-2019<\/a><\/li>\n<li><a href=\"https:\/\/secure.edps.europa.eu\/EDPSWEB\/edps\/site\/mySite\/ReferenceLibrary\" target=\"_blank\">Biblioth\u00e8que virtuelle de r\u00e9f\u00e9rences<\/a><\/li>\n<li><a href=\"https:\/\/secure.edps.europa.eu\/EDPSWEB\/webdav\/site\/mySite\/shared\/Documents\/Supervision\/Inquiries\/2016\/16-01-21_Report_Survey_2015_EN.pdf\" target=\"_blank\">\u00c9tude de la conformit\u00e9 des \u00c9tats europ\u00e9ens<\/a> (21\/1\/2016)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><strong>R\u00e8glement Europ\u00e9en<\/strong> sur la protection des donn\u00e9es \u00e0 caract\u00e8re personnel\n<ul>\n<li><a href=\"http:\/\/data.consilium.europa.eu\/doc\/document\/ST-5455-2016-INIT\/fr\/pdf\" target=\"_blank\">Le projet de texte du R\u00e8glement Europ\u00e9en (Europa)<\/a><\/li>\n<li><a href=\"http:\/\/www.cnil.fr\/linstitution\/international\/reglement-europeen\/\" target=\"_blank\">CNIL &#8211; <\/a><a href=\"http:\/\/www.cnil.fr\/linstitution\/international\/reglement-europeen\/\" target=\"_blank\">R\u00e8glement europ\u00e9en<\/a><a href=\"http:\/\/www.cnil.fr\/linstitution\/international\/reglement-europeen\/\" target=\"_blank\"> : Pourquoi &#8211; Quand &#8211; Comment<\/a><\/li>\n<li><a href=\"http:\/\/www.cnil.fr\/linstitution\/actualite\/article\/article\/plus-de-droits-pour-vos-donnees\/\" target=\"_blank\">CNIL &amp; G29 &#8211; R\u00e8glement europ\u00e9en : La protection des donn\u00e9es expliqu\u00e9es en 6 dessins<\/a><\/li>\n<li><a href=\"http:\/\/ec.europa.eu\/justice\/data-protection\/index_fr.htm\" target=\"_blank\">Commission Europ\u00e9enne &#8211; Protection des donn\u00e9es<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><a href=\"http:\/\/www.cnil.fr\/linstitution\/actualite\/article\/article\/vers-de-nouvelles-methodologies-de-reference-pour-simpifier-la-recherche-dans-le-domaine-de-la-sa\/\" target=\"_blank\">Recherche dans le domaine de la sant\u00e9 &#8211; Nouvelles m\u00e9thodologies<\/a><\/li>\n<\/ul>\n<h3><strong>Documents concernant la politique du num\u00e9rique<br \/>\n<\/strong><\/h3>\n<ul>\n<li>CNNum\n<ul>\n<li><a href=\"https:\/\/contribuez.cnnumerique.fr\/\">Ambition num\u00e9rique pour la France et l&rsquo;Europe<\/a><\/li>\n<li><a href=\"https:\/\/contribuez.cnnumerique.fr\/sites\/default\/files\/media\/CNNum--rapport-ambition-numerique.pdf\" target=\"_blank\">Le rapport &#8211; Pour une politique fran\u00e7aise et europ\u00e9enne de la transition num\u00e9rique<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.republique-numerique.fr\/\" target=\"_blank\">R\u00e9publique Num\u00e9rique<\/a>\n<ul>\n<li><a href=\"https:\/\/www.republique-numerique.fr\/consultations\/projet-de-loi-numerique\/consultation\/consultation\" target=\"_blank\">Projet de Loi<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"http:\/\/www.educnum.fr\/\" target=\"_blank\">Le site EducNum de la CNIL<\/a>\n<ul>\n<li><a href=\"http:\/\/www.educnum.fr\/quest-ce-que-la-cnil\/\" target=\"_blank\">La CNIL expliqu\u00e9e \u00e0 la jeunesse<\/a><\/li>\n<li><a href=\"http:\/\/www.jeunes.cnil.fr\/\" target=\"_blank\">Espace jeune de la CNIL<\/a><\/li>\n<li><a href=\"https:\/\/www.jeunes.cnil.fr\/fileadmin\/documents\/POSTER_10CONSEILS_WEB_A1_170715.pdf\" target=\"_blank\">Les 10 conseils internet de la CNIL \u00e0 la jeunesse<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h3><strong>Documents Minist\u00e8re de la Sant\u00e9<\/strong><\/h3>\n<ul>\n<li><a href=\"http:\/\/esante.gouv.fr\/services\/politique-generale-de-securite-des-systemes-d-information-de-sante-pgssi-s\/en-savoir-plus-0\" target=\"_blank\">Politique G\u00e9n\u00e9rale de la S\u00e9curit\u00e9 des Syst\u00e8mes d&rsquo;Information de Sant\u00e9<\/a><\/li>\n<\/ul>\n<p><strong><a href=\"http:\/\/www.lecese.fr\/category\/tags\/numerique\" target=\"_blank\">Documents Conseil \u00c9conomique, Social et Environnemental<\/a><br \/>\n<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Veille politique num\u00e9rique https:\/\/positions.contexte.com\/lab\/positions\/app\/ https:\/\/www.contexte.com\/sujet\/numerique Documents MENESR Strat\u00e9gie Nationales Enseignement Sup\u00e9rieur &#8211; La soci\u00e9t\u00e9 apprenante STRANES de poche STRANES document complet Documents Sup Num\u00e9rique Les publications Documents de l&rsquo;AMUE Guide m\u00e9thodologique de la gouvernance du SI Documents ANSSI Strat\u00e9gie Nationale de la S\u00e9curit\u00e9 du Num\u00e9rique Politiques Protection des Syst\u00e8mes d&rsquo;Information Politique SSI de l&rsquo;Etat R\u00e9glementation &#8230; <a title=\"Textes\" class=\"read-more\" href=\"https:\/\/werle.pro\/index.php\/veille\/\" aria-label=\"Read more about Textes\">Lire la suite<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P7ALXt-P","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/pages\/51"}],"collection":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/comments?post=51"}],"version-history":[{"count":27,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/pages\/51\/revisions"}],"predecessor-version":[{"id":692,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/pages\/51\/revisions\/692"}],"wp:attachment":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/media?parent=51"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}