{"id":3222,"date":"2025-01-13T11:46:01","date_gmt":"2025-01-13T10:46:01","guid":{"rendered":"https:\/\/tuto.provacy.com\/?page_id=3222"},"modified":"2025-01-15T14:15:19","modified_gmt":"2025-01-15T13:15:19","slug":"scenario","status":"publish","type":"page","link":"https:\/\/tuto.provacy.com\/en\/pia\/scenario\/","title":{"rendered":"06. Supporting assets, impacts, scenarios"},"content":{"rendered":"<div class=\"wp-block-group top-nav is-nowrap is-layout-flex wp-container-core-group-layout-1 wp-block-group-is-layout-flex\">\n\n<\/div>\n\n\n\n<h4 class=\"wp-block-heading\">6. Supporting assets, impacts, scenarios<\/h4>\n\n\n\n<p>The reference lists are accessible through the Administration menu by the DPO and their team (assistants). They are fully customizable and can be enriched.<\/p>\n\n\n\n<div class=\"wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-layout-2 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50)\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"230\" src=\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/screenshot-test-c9993_provacy4_eu-2025_01_08-16_17_45-2-1.png\" alt=\"\" class=\"wp-image-3224\" srcset=\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/screenshot-test-c9993_provacy4_eu-2025_01_08-16_17_45-2-1.png 295w, https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/screenshot-test-c9993_provacy4_eu-2025_01_08-16_17_45-2-1-16x12.png 16w\" sizes=\"(max-width: 290px) 100vw, 290px\" \/><\/figure>\n<\/div>\n\n\n\n<p>The reference frameworks are derived from the document \"Knowledge Bases\" by the CNIL:<\/p>\n\n\n\n<div class=\"wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-layout-3 wp-block-group-is-layout-flex\" style=\"padding-top:0;padding-bottom:0\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"748\" height=\"1024\" src=\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/AIPD-2-Page-1-748x1024.png\" alt=\"\" class=\"wp-image-3225\" style=\"width:200px\" srcset=\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/AIPD-2-Page-1-748x1024.png 748w, https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/AIPD-2-Page-1-219x300.png 219w, https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/AIPD-2-Page-1-768x1052.png 768w, https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/AIPD-2-Page-1-9x12.png 9w, https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/AIPD-2-Page-1.png 857w\" sizes=\"(max-width: 748px) 100vw, 748px\" \/><\/figure>\n<\/div>\n\n\n\n<h5 class=\"wp-block-heading\"><img loading=\"lazy\" decoding=\"async\" width=\"572\" height=\"565\" class=\"wp-image-3146\" style=\"width: 40px\" src=\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/aipd2.png\" alt=\"\" srcset=\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/aipd2.png 572w, https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/aipd2-300x296.png 300w, https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/aipd2-12x12.png 12w\" sizes=\"(max-width: 572px) 100vw, 572px\" \/><strong> Data supporting assets<\/strong><\/h5>\n\n\n\n<p>The supporting assets are organized by type and selected in the \"Data\" tab. Analysis authors can easily add new supporting assets:<\/p>\n\n\n\n<div class=\"wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-layout-4 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50)\">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2023\/08\/62abc118-ff89-4b6b-a750-17facbd2e2d6.png\" alt=\"\" style=\"width:800px\" \/><\/figure>\n<\/div>\n\n\n\n<p>Once selected, the supporting assets are displayed in a summary, highlighting vulnerabilities by type to assist you in the analysis:<\/p>\n\n\n\n<div class=\"wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-layout-5 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50)\">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2023\/08\/e9167b37-500b-4201-b15e-9f11c76d5533.png\" alt=\"\" style=\"width:700px\" \/><\/figure>\n<\/div>\n\n\n\n<p>At the bottom of the \"Measures\" tab, you will find the list of selected supporting assets. You can identify supporting assets with residual vulnerabilities, based on the applied security measures, that require review. By default, all supporting assets are selected:<\/p>\n\n\n\n<div class=\"wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-layout-6 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50)\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"210\" src=\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/AIPD-2-Page-1-4.png\" alt=\"\" class=\"wp-image-3229\" style=\"width:600px\" srcset=\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/AIPD-2-Page-1-4.png 1416w, https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/AIPD-2-Page-1-4-300x66.png 300w, https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/AIPD-2-Page-1-4-1024x225.png 1024w, https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/AIPD-2-Page-1-4-768x169.png 768w, https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/AIPD-2-Page-1-4-18x4.png 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<p>The supporting assets checked here will be used in the risk analysis to create scenarios.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><img loading=\"lazy\" decoding=\"async\" width=\"572\" height=\"565\" class=\"wp-image-3146\" style=\"width: 40px\" src=\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/aipd2.png\" alt=\"\" srcset=\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/aipd2.png 572w, https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/aipd2-300x296.png 300w, https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/aipd2-12x12.png 12w\" sizes=\"(max-width: 572px) 100vw, 572px\" \/> Impacts on the data subjects<\/h5>\n\n\n\n<p>Impacts are assessed for the three types of risks in the \"Confidentiality,\" \"Integrity,\" and \"Availability\" tabs.<\/p>\n\n\n\n<div class=\"wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-layout-7 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50)\">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2023\/08\/92554146-1566-4721-bc55-0cd9aa9b1bea.png\" alt=\"\" style=\"width:800px\" \/><\/figure>\n<\/div>\n\n\n\n<p>They can be physical, material, or moral and are associated with a severity level:<\/p>\n\n\n\n<div class=\"wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-layout-8 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50)\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"338\" height=\"450\" src=\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/AIPD-2-Page-1-3.png\" alt=\"\" class=\"wp-image-3237\" style=\"width:130px\" srcset=\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/AIPD-2-Page-1-3.png 338w, https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/AIPD-2-Page-1-3-225x300.png 225w, https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/AIPD-2-Page-1-3-9x12.png 9w\" sizes=\"(max-width: 338px) 100vw, 338px\" \/><\/figure>\n<\/div>\n\n\n\n<p>You can easily add new impacts at the bottom of the list:<\/p>\n\n\n\n<div class=\"wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-layout-9 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50)\">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2023\/08\/7813b6e9-86c4-46e6-9501-1cc0e8e1bfc2.png\" alt=\"\" style=\"width:800px\" \/><\/figure>\n<\/div>\n\n\n\n<p>The definitions from the CNIL's PIA module assist you in determining the severity of impacts when creating them:<\/p>\n\n\n\n<div class=\"wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-layout-10 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50)\">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2023\/08\/d36e2346-2a2f-4ee4-8839-8b97417c63f4.png\" alt=\"\" style=\"width:700px\" \/><\/figure>\n<\/div>\n\n\n\n<h5 class=\"wp-block-heading\"><img loading=\"lazy\" decoding=\"async\" width=\"572\" height=\"565\" class=\"wp-image-3146\" style=\"width: 40px\" src=\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/aipd2.png\" alt=\"\" srcset=\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/aipd2.png 572w, https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/aipd2-300x296.png 300w, https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/aipd2-12x12.png 12w\" sizes=\"(max-width: 572px) 100vw, 572px\" \/> Risk scenarios<\/h5>\n\n\n\n<p>For each type of risk (loss of confidentiality, integrity, or availability), you can build multiple scenarios:<\/p>\n\n\n\n<div class=\"wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-layout-11 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50)\">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2023\/08\/d2a4ffcd-da08-49e6-80b1-664372b065f8.png\" alt=\"\" style=\"width:800px\" \/><figcaption class=\"wp-element-caption\">It is possible to copy a scenario from one DPIA to another, provided that the latter is in Draft status.<\/figcaption><\/figure>\n<\/div>\n\n\n\n<p>The suggested threats depend on the selected supporting asset and the type of risk, according to the lists from the CNIL's knowledge base. This allows you to examine the different possible threats for each supporting asset.<\/p>\n\n\n\n<div class=\"wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-layout-12 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50)\">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2023\/08\/87096be8-77f1-4b1a-899a-01eef42aff2b.png\" alt=\"\" style=\"width:700px\" \/><\/figure>\n<\/div>\n\n\n\n<p>Threat sources are categorized into three types: internal human, external human, or non-human. From the Administration menu, the DPO can customize this list to match their organization.<\/p>\n\n\n\n<div class=\"wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-layout-13 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50)\">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2023\/08\/2e0f7a29-de4c-43cb-90a4-836c6df20ccb.png\" alt=\"\" style=\"width:700px\" \/><\/figure>\n<\/div>\n\n\n\n<p>Select the measures to implement in order to reduce the risks:<\/p>\n\n\n\n<div class=\"wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-layout-14 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50)\">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2023\/08\/7fdaaaed-ff55-480f-829a-2c29219e615e.png\" alt=\"\" style=\"width:700px\" \/><\/figure>\n<\/div>\n\n\n\n<p>Add a description of the threat and assess its severity and likelihood. The evaluation of threats after applying the measures can be done directly from the list of scenarios.<\/p>\n\n\n\n<div class=\"wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-layout-15 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50)\">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2023\/08\/8f19f7c5-995d-4c85-97c1-4e5e65bd3f1c.png\" alt=\"\" style=\"width:700px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-layout-16 wp-block-group-is-layout-flex\" style=\"padding-top:var(--wp--preset--spacing--50);padding-bottom:var(--wp--preset--spacing--50)\">\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2023\/08\/f21c5be4-dde0-4f01-919f-13281f8e7b1b.png\" alt=\"\" style=\"width:700px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-columns bottom-nav is-layout-flex wp-container-core-columns-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\"><\/div>\n<\/div>\n\n\n\n<span class=\"sidebar-toggle hidden\" title=\"Show\/Hide side menu\"><i class=\"fal fa-table-layout\"><\/i><\/span>\n<script src=\"\/wp-includes\/js\/provacy\/js.cookie.min.js\"><\/script>\n<script>\nvar shown = true, $ = jQuery, b = $('body'), t = $('.sidebar-toggle'), c = Cookies.get('sidebar');\nif (c) {\n  shown = c == 1;\n}\nb.addClass('sidebar-' + (shown ? 'shown' : 'hidden'));\nif (shown) {\n  t.find('i').toggleClass('fa-table-layout fa-window-maximize');\n}\nt.on('click', function() {\n  shown = !shown;\n  t.find('i').toggleClass('fa-table-layout fa-window-maximize');\n  b.toggleClass('sidebar-shown sidebar-hidden');\n  Cookies.set('sidebar', shown ? 1 : 0, { expires: 30 });\n});\n\n$('figure.wp-lightbox-container').on('click', function(e) {\n  var img = $(e.target).parents('figure:first').find('img:first'), src = img.attr('src'), enlarged = $('figure.enlarged-image img.' + img.attr('class'));\n  if (enlarged.length && src != enlarged.attr('src')) {\n    let count = 0;\n    function incr() {\n      count++;\n      if (src != enlarged.attr('src'))\n        enlarged.attr('src', src);\n      if (count >= 10) {\n        clearInterval(intervalId);\n      }\n    }\n    const intervalId = setInterval(incr, 100);\n  }\n\n  \/\/console.log('lightbox clicked', e, this);\n});\n\n<\/script>","protected":false},"excerpt":{"rendered":"<p>6. Supports, impacts, sc\u00e9narios Les listes des r\u00e9f\u00e9rentiels sont accessibles via le menu Administration par le DPO et son \u00e9quipe (assistants). Elles sont enti\u00e8rement personnalisables et peuvent \u00eatre enrichies. Les r\u00e9f\u00e9rentiels proviennent du document \"Les bases de connaissances\" de la CNIL : Supports de donn\u00e9es Les supports sont organis\u00e9s par type et s\u00e9lectionn\u00e9s dans l'onglet &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/tuto.provacy.com\/en\/pia\/scenario\/\"> <span class=\"screen-reader-text\">06. Supporting assets, impacts, scenarios<\/span> Read More &raquo;<\/a><\/p>","protected":false},"author":2,"featured_media":0,"parent":3145,"menu_order":93,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>06. Supports, impacts, sc\u00e9narios - Guide utilisateur<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"06. Supports, impacts, sc\u00e9narios - Guide utilisateur\" \/>\n<meta property=\"og:description\" content=\"6. Supports, impacts, sc\u00e9narios Les listes des r\u00e9f\u00e9rentiels sont accessibles via le menu Administration par le DPO et son \u00e9quipe (assistants). Elles sont enti\u00e8rement personnalisables et peuvent \u00eatre enrichies. Les r\u00e9f\u00e9rentiels proviennent du document &quot;Les bases de connaissances&quot; de la CNIL : Supports de donn\u00e9es Les supports sont organis\u00e9s par type et s\u00e9lectionn\u00e9s dans l&#039;onglet &hellip; 06. Supports, impacts, sc\u00e9narios Read More &raquo;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tuto.provacy.com\/en\/pia\/scenario\/\" \/>\n<meta property=\"og:site_name\" content=\"Guide utilisateur\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-15T13:15:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/screenshot-test-c9993_provacy4_eu-2025_01_08-16_17_45-1.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tuto.provacy.com\/pia\/scenario\/\",\"url\":\"https:\/\/tuto.provacy.com\/pia\/scenario\/\",\"name\":\"06. Supports, impacts, sc\u00e9narios - Guide utilisateur\",\"isPartOf\":{\"@id\":\"https:\/\/tuto.provacy.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tuto.provacy.com\/pia\/scenario\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tuto.provacy.com\/pia\/scenario\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/screenshot-test-c9993_provacy4_eu-2025_01_08-16_17_45-1.png\",\"datePublished\":\"2025-01-13T10:46:01+00:00\",\"dateModified\":\"2025-01-15T13:15:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/tuto.provacy.com\/pia\/scenario\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tuto.provacy.com\/pia\/scenario\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/tuto.provacy.com\/pia\/scenario\/#primaryimage\",\"url\":\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/screenshot-test-c9993_provacy4_eu-2025_01_08-16_17_45-1.png\",\"contentUrl\":\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/screenshot-test-c9993_provacy4_eu-2025_01_08-16_17_45-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tuto.provacy.com\/pia\/scenario\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/tuto.provacy.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Analyse d'impact\",\"item\":\"https:\/\/tuto.provacy.com\/pia\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"06. Supports, impacts, sc\u00e9narios\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tuto.provacy.com\/#website\",\"url\":\"https:\/\/tuto.provacy.com\/\",\"name\":\"Guide utilisateur\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/tuto.provacy.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tuto.provacy.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/tuto.provacy.com\/#organization\",\"name\":\"Guide utilisateur\",\"url\":\"https:\/\/tuto.provacy.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/tuto.provacy.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2023\/10\/cropped-power-logo-white-slogan.png\",\"contentUrl\":\"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2023\/10\/cropped-power-logo-white-slogan.png\",\"width\":1231,\"height\":272,\"caption\":\"Guide utilisateur\"},\"image\":{\"@id\":\"https:\/\/tuto.provacy.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"06. Supports, impacts, sc\u00e9narios - Guide utilisateur","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"06. Supports, impacts, sc\u00e9narios - Guide utilisateur","og_description":"6. Supports, impacts, sc\u00e9narios Les listes des r\u00e9f\u00e9rentiels sont accessibles via le menu Administration par le DPO et son \u00e9quipe (assistants). Elles sont enti\u00e8rement personnalisables et peuvent \u00eatre enrichies. Les r\u00e9f\u00e9rentiels proviennent du document \"Les bases de connaissances\" de la CNIL : Supports de donn\u00e9es Les supports sont organis\u00e9s par type et s\u00e9lectionn\u00e9s dans l'onglet &hellip; 06. Supports, impacts, sc\u00e9narios Read More &raquo;","og_url":"https:\/\/tuto.provacy.com\/en\/pia\/scenario\/","og_site_name":"Guide utilisateur","article_modified_time":"2025-01-15T13:15:19+00:00","og_image":[{"url":"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/screenshot-test-c9993_provacy4_eu-2025_01_08-16_17_45-1.png"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tuto.provacy.com\/pia\/scenario\/","url":"https:\/\/tuto.provacy.com\/pia\/scenario\/","name":"06. Supports, impacts, sc\u00e9narios - Guide utilisateur","isPartOf":{"@id":"https:\/\/tuto.provacy.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tuto.provacy.com\/pia\/scenario\/#primaryimage"},"image":{"@id":"https:\/\/tuto.provacy.com\/pia\/scenario\/#primaryimage"},"thumbnailUrl":"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/screenshot-test-c9993_provacy4_eu-2025_01_08-16_17_45-1.png","datePublished":"2025-01-13T10:46:01+00:00","dateModified":"2025-01-15T13:15:19+00:00","breadcrumb":{"@id":"https:\/\/tuto.provacy.com\/pia\/scenario\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tuto.provacy.com\/pia\/scenario\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/tuto.provacy.com\/pia\/scenario\/#primaryimage","url":"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/screenshot-test-c9993_provacy4_eu-2025_01_08-16_17_45-1.png","contentUrl":"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2025\/01\/screenshot-test-c9993_provacy4_eu-2025_01_08-16_17_45-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/tuto.provacy.com\/pia\/scenario\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/tuto.provacy.com\/"},{"@type":"ListItem","position":2,"name":"Analyse d'impact","item":"https:\/\/tuto.provacy.com\/pia\/"},{"@type":"ListItem","position":3,"name":"06. Supports, impacts, sc\u00e9narios"}]},{"@type":"WebSite","@id":"https:\/\/tuto.provacy.com\/#website","url":"https:\/\/tuto.provacy.com\/","name":"Guide utilisateur","description":"","publisher":{"@id":"https:\/\/tuto.provacy.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tuto.provacy.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/tuto.provacy.com\/#organization","name":"Guide utilisateur","url":"https:\/\/tuto.provacy.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/tuto.provacy.com\/#\/schema\/logo\/image\/","url":"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2023\/10\/cropped-power-logo-white-slogan.png","contentUrl":"https:\/\/tuto.provacy.com\/wp-content\/uploads\/sites\/4\/2023\/10\/cropped-power-logo-white-slogan.png","width":1231,"height":272,"caption":"Guide utilisateur"},"image":{"@id":"https:\/\/tuto.provacy.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/tuto.provacy.com\/en\/wp-json\/wp\/v2\/pages\/3222"}],"collection":[{"href":"https:\/\/tuto.provacy.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/tuto.provacy.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/tuto.provacy.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tuto.provacy.com\/en\/wp-json\/wp\/v2\/comments?post=3222"}],"version-history":[{"count":23,"href":"https:\/\/tuto.provacy.com\/en\/wp-json\/wp\/v2\/pages\/3222\/revisions"}],"predecessor-version":[{"id":3446,"href":"https:\/\/tuto.provacy.com\/en\/wp-json\/wp\/v2\/pages\/3222\/revisions\/3446"}],"up":[{"embeddable":true,"href":"https:\/\/tuto.provacy.com\/en\/wp-json\/wp\/v2\/pages\/3145"}],"wp:attachment":[{"href":"https:\/\/tuto.provacy.com\/en\/wp-json\/wp\/v2\/media?parent=3222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}