SECUTITE POUR LES AVOCATS
Sécurité et déontologie
1. Approche général
1.1 Préambule
Far far away, behind the word Mountains far from the countries Vokalia and Consonantia, there live the blind texts. Separated they live in Bookmark
1.2 Situation générale
Even the all-powerful Pointing has no control about the blind texts it is an almost unorthographic life One day however a small line
1.3 Démarche
Marks and devious Semikoli but the Little Blind Text didn’t listen. She packed her seven versalia, put her initial into the belt and made herself on the way.
2. Sécurité et principes déontologiques
2.1 Les sources applicables : RIN, avis CNB, Cnil…
Far far away, behind the word Mountains far from the countries Vokalia and Consonantia, there live the blind texts. Separated they live in Bookmark
2.2 Les principes déontologiques dans un environnement numérique : secret professionnel, devoir de formation…
Even the all-powerful Pointing has no control about the blind texts it is an almost unorthographic life One day however a small line
2.3 Les risques numériques dans la profession d’avocat : télétravail, cloud, shadow IT
Marks and devious Semikoli but the Little Blind Text didn’t listen. She packed her seven versalia, put her initial into the belt and made herself on the way.
3. La réglementation encadrant la pratique numérique de la profession
3.1 La réglementation professionnelle
Far far away, behind the word Mountains far from the countries Vokalia and Consonantia, there live the blind texts. Separated they live in Bookmark
3.2 Les initiatives proposées par les Ordres : cloud avocats, messageries sécurisées, RPVS, e- barreau)
Even the all-powerful Pointing has no control about the blind texts it is an almost unorthographic life One day however a small line
3.3 Les directives de l’Union Internationale des avocats
Marks and devious Semikoli but the Little Blind Text didn’t listen. She packed her seven versalia, put her initial into the belt and made herself on the way.
4. Ethique de la communication des avocats et sécurité
4.1 Les réseaux sociaux, sites internet, plateformes collaboratives et de mise en relation
Far far away, behind the word Mountains far from the countries Vokalia and Consonantia, there live the blind texts. Separated they live in Bookmark
4.2 L’usage des IA génératives et moteurs de recherche juridique
Even the all-powerful Pointing has no control about the blind texts it is an almost unorthographic life One day however a small line
4.3 Gestion de la preuve numérique : preuve licite/illicite, principe de prudence
Marks and devious Semikoli but the Little Blind Text didn’t listen. She packed her seven versalia, put her initial into the belt and made herself on the way.
4.4 Responsabilité déontologique en cas d’incident
Marks and devious Semikoli but the Little Blind Text didn’t listen. She packed her seven versalia, put her initial into the belt and made herself on the way.
5. Sécurisation des échanges avec les clients et les tiers
5.1 Moyens techniques de gestion de la confidentialité : chiffrement, coffre-fort numérique, signature électronique
Far far away, behind the word Mountains far from the countries Vokalia and Consonantia, there live the blind texts. Separated they live in Bookmark
5.2 Pratiques prohibées ou risquées
Even the all-powerful Pointing has no control about the blind texts it is an almost unorthographic life One day however a small line
5.3 Le socle technique et organisationnel de la sécurité : pare feu, anti virus, charte des systèmes d’information, sensibilisation interne, formation interne
Marks and devious Semikoli but the Little Blind Text didn’t listen. She packed her seven versalia, put her initial into the belt and made herself on the way.