{"id":1411,"date":"2023-10-31T11:00:19","date_gmt":"2023-10-31T10:00:19","guid":{"rendered":"https:\/\/memority.p2.pp-izhak.fr\/2023\/10\/31\/identite-numerique-le-nouveau-contrat-de-confiance\/"},"modified":"2024-07-07T23:47:14","modified_gmt":"2024-07-07T21:47:14","slug":"digital-identity-the-new-contract-of-trust","status":"publish","type":"post","link":"https:\/\/memority.p2.pp-izhak.fr\/en\/digital-identity-the-new-contract-of-trust\/","title":{"rendered":"Digital identity: the new contract of trust"},"content":{"rendered":"<h3 class=\"wp-block-heading\"><strong>Digital identity: a heritage to be preserved<\/strong><\/h3>\n<p>Today, almost everyone knows someone who had their personal e-mail account hacked, an iPad blocked or their identity stolen\u2026 This illustrates both the impact of the risks raised by digital uses, and\u00a0<strong>the major strategic role played by digital identities<\/strong>\u00a0in protecting access and data.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-651 \" src=\"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/230731_VignetteCybermois_1080X1080_Adam-1-768x768-1.jpg\" alt=\"\" width=\"567\" height=\"567\" srcset=\"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/230731_VignetteCybermois_1080X1080_Adam-1-768x768-1.jpg 768w, https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/230731_VignetteCybermois_1080X1080_Adam-1-768x768-1-300x300.jpg 300w, https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/230731_VignetteCybermois_1080X1080_Adam-1-768x768-1-150x150.jpg 150w, https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/230731_VignetteCybermois_1080X1080_Adam-1-768x768-1-640x640.jpg 640w, https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/230731_VignetteCybermois_1080X1080_Adam-1-768x768-1-320x320.jpg 320w\" sizes=\"auto, (max-width: 567px) 100vw, 567px\" \/><\/p>\n<p class=\"has-link-color wp-elements-4685a2e0c567c6e158ded615af3a6440\">The European Cyber Month has just finished, and we would like to salute the campaign run by\u00a0<a href=\"https:\/\/www.cybermalveillance.gouv.fr\/\">cybermalcybermalveillance.gouv.fr<\/a>\u00a0and all cybersecurity professionals.\u00a0<strong>To round off this month of awareness-raising, we\u2019ve chosen to focus on digital identity.<\/strong><\/p>\n<h3 class=\"wp-block-heading\"><strong>Quickly, quickly\u2026<\/strong><\/h3>\n<p>We all have a kind of frenzy (not to say bulimia) when it comes to consuming digital services.\u00a0<strong>The common denominator of all these services is identity,<\/strong>\u00a0and with it the issue of personal data, which enables us to obtain the door openen to validate our order, access information or watch the latest TV show!<\/p>\n<p>This step of sharing information with the service provider is often perceived as restrictive (\u201cAnother site asking me for information\u2026\u201d), but it is above all a necessary evil.\u00a0<strong>The consequence is simple: by going too fast, we forget to be vigilant\u00a0<\/strong>(a bit like the quick click to make the pop-up about cookies or personal data disappear)! It has to be said that the main challenge for service providers is to make the customer experience as fluid as possible, to reduce drop-out rates before purchase, and to provide access to information as quickly as possible\u2026<\/p>\n<h3 class=\"wp-block-heading\"><strong>\u2026 but not too much either!<\/strong><\/h3>\n<p><strong>Ever faster, that\u2019s okay! But what about security?<\/strong>\u00a0Did you know that there are several ways of logging on? Wouldn\u2019t it be a good time to change your old favorite password \u201cpizza1234\u201d (and throw away the post-it note stuck to your computer screen)? And, while you\u2019re at it, unsubscribe from all those newsletters that go straight into your inbox?<\/p>\n<h3 class=\"wp-block-heading\"><strong>Establish your contract of digital trust<\/strong><\/h3>\n<p>Just like in a serious relationship, where getting to know each other helps to establish a relationship based on trust,\u00a0<strong>creating a digital identity is the moment when you establish a contract of digital trust:\u00a0<\/strong>who am I, what do I need, how can I personalize my password to remember it while making it unique\u2026 these are all questions that deserve our attention for just a few minutes (promise, just a few minutes, we haven\u2019t forgotten the famous requirement for speed!).<\/p>\n<p>Our advice?\u00a0<strong>Take the time to (re)establish serious, secure relationships with your service providers.<\/strong>\u00a0There\u2019s many benefits: for the security of your data, your time, your money and also to better control your digital impact (if you take the time, you\u2019ll notice that the box you thought you were checking to not receive the newsletter, was in fact the option allowing you to receive it! \ud83e\uddd0).<\/p>\n<div class=\"wp-block-spacer\" aria-hidden=\"true\"><\/div>\n<p class=\"has-link-color wp-elements-1abf8dae1f3288efa37383a00df8fcc0\">-&gt; For more information and advice on managing your passwords:\u00a0<a href=\"https:\/\/www.cybermalveillance.gouv.fr\/medias\/2020\/04\/fiche_mots_de_passe.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Les-mots-de-passe.pdf (cybermalveillance.gouv.fr)<\/a><br \/>\n-&gt; Learn more about The European Cyber Month :\u00a0<a href=\"https:\/\/www.cybermalveillance.gouv.fr\/tous-nos-contenus\/actualites\/cybermois-092023\" target=\"_blank\" rel=\"noreferrer noopener\">Cybermoi\/s 2023 : un mois pour devenir #CyberResponsable \u2013 Assistance aux victimes de cybermalveillance<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Digital identity: a heritage to be preserved Today, almost everyone knows someone who had their personal e-mail account hacked, an iPad blocked or their identity stolen\u2026 This illustrates both the impact of the risks raised by digital uses, and\u00a0the major strategic role played by digital identities\u00a0in protecting access and data. The European Cyber Month has [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":996,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[34,36,30,35,31,32,33,37,38,41,39,40],"class_list":["post-1411","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-non-classifiee","tag-annonce-en","tag-ciam-en","tag-cybersecurity-en","tag-frenchtech-en","tag-iam-en","tag-idaas-en","tag-identityfactory-en","tag-memoriteam-en","tag-memority2023-en","tag-my-en","tag-myteam-en","tag-passwordless-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Digital identity: the new contract of trust - Memority<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez en quoi l&#039;identit\u00e9 num\u00e9rique joue un r\u00f4le strat\u00e9gique majeur jou\u00e9 en mati\u00e8re de protection des acc\u00e8s et des donn\u00e9es.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital identity: the new contract of trust - Memority\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez en quoi l&#039;identit\u00e9 num\u00e9rique joue un r\u00f4le strat\u00e9gique majeur jou\u00e9 en mati\u00e8re de protection des acc\u00e8s et des donn\u00e9es.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/memority.p2.pp-izhak.fr\/identite-numerique-le-nouveau-contrat-de-confiance\/\" \/>\n<meta property=\"og:site_name\" content=\"Memority\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-31T10:00:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-07T21:47:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/miniature-confiance-numerique.png\" \/>\n\t<meta property=\"og:image:width\" content=\"329\" \/>\n\t<meta property=\"og:image:height\" content=\"206\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Izhak-contenu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Izhak-contenu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/identite-numerique-le-nouveau-contrat-de-confiance\/\",\"url\":\"https:\/\/memority.p2.pp-izhak.fr\/identite-numerique-le-nouveau-contrat-de-confiance\/\",\"name\":\"Digital identity: the new contract of trust - Memority\",\"isPartOf\":{\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/identite-numerique-le-nouveau-contrat-de-confiance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/identite-numerique-le-nouveau-contrat-de-confiance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/miniature-confiance-numerique.png\",\"datePublished\":\"2023-10-31T10:00:19+00:00\",\"dateModified\":\"2024-07-07T21:47:14+00:00\",\"author\":{\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/#\/schema\/person\/c6ac154af9e29cdadf1380102b48a162\"},\"description\":\"D\u00e9couvrez en quoi l'identit\u00e9 num\u00e9rique joue un r\u00f4le strat\u00e9gique majeur jou\u00e9 en mati\u00e8re de protection des acc\u00e8s et des donn\u00e9es.\",\"breadcrumb\":{\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/identite-numerique-le-nouveau-contrat-de-confiance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/memority.p2.pp-izhak.fr\/identite-numerique-le-nouveau-contrat-de-confiance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/identite-numerique-le-nouveau-contrat-de-confiance\/#primaryimage\",\"url\":\"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/miniature-confiance-numerique.png\",\"contentUrl\":\"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/miniature-confiance-numerique.png\",\"width\":329,\"height\":206},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/identite-numerique-le-nouveau-contrat-de-confiance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/memority.p2.pp-izhak.fr\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Digital identity: the new contract of trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/#website\",\"url\":\"https:\/\/memority.p2.pp-izhak.fr\/\",\"name\":\"Memority\",\"description\":\"L&#039;IDaaS europ\u00e9enau service des enjeux business\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/memority.p2.pp-izhak.fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/#\/schema\/person\/c6ac154af9e29cdadf1380102b48a162\",\"name\":\"Izhak-contenu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/60656c8b16f6a95bfb54034344a959d53d08b47923ca24bc24069dc93f6c7bf1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/60656c8b16f6a95bfb54034344a959d53d08b47923ca24bc24069dc93f6c7bf1?s=96&d=mm&r=g\",\"caption\":\"Izhak-contenu\"},\"url\":\"https:\/\/memority.p2.pp-izhak.fr\/en\/author\/izhak-contenu\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digital identity: the new contract of trust - Memority","description":"D\u00e9couvrez en quoi l'identit\u00e9 num\u00e9rique joue un r\u00f4le strat\u00e9gique majeur jou\u00e9 en mati\u00e8re de protection des acc\u00e8s et des donn\u00e9es.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Digital identity: the new contract of trust - Memority","og_description":"D\u00e9couvrez en quoi l'identit\u00e9 num\u00e9rique joue un r\u00f4le strat\u00e9gique majeur jou\u00e9 en mati\u00e8re de protection des acc\u00e8s et des donn\u00e9es.","og_url":"https:\/\/memority.p2.pp-izhak.fr\/identite-numerique-le-nouveau-contrat-de-confiance\/","og_site_name":"Memority","article_published_time":"2023-10-31T10:00:19+00:00","article_modified_time":"2024-07-07T21:47:14+00:00","og_image":[{"width":329,"height":206,"url":"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/miniature-confiance-numerique.png","type":"image\/png"}],"author":"Izhak-contenu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Izhak-contenu","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/memority.p2.pp-izhak.fr\/identite-numerique-le-nouveau-contrat-de-confiance\/","url":"https:\/\/memority.p2.pp-izhak.fr\/identite-numerique-le-nouveau-contrat-de-confiance\/","name":"Digital identity: the new contract of trust - Memority","isPartOf":{"@id":"https:\/\/memority.p2.pp-izhak.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/memority.p2.pp-izhak.fr\/identite-numerique-le-nouveau-contrat-de-confiance\/#primaryimage"},"image":{"@id":"https:\/\/memority.p2.pp-izhak.fr\/identite-numerique-le-nouveau-contrat-de-confiance\/#primaryimage"},"thumbnailUrl":"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/miniature-confiance-numerique.png","datePublished":"2023-10-31T10:00:19+00:00","dateModified":"2024-07-07T21:47:14+00:00","author":{"@id":"https:\/\/memority.p2.pp-izhak.fr\/#\/schema\/person\/c6ac154af9e29cdadf1380102b48a162"},"description":"D\u00e9couvrez en quoi l'identit\u00e9 num\u00e9rique joue un r\u00f4le strat\u00e9gique majeur jou\u00e9 en mati\u00e8re de protection des acc\u00e8s et des donn\u00e9es.","breadcrumb":{"@id":"https:\/\/memority.p2.pp-izhak.fr\/identite-numerique-le-nouveau-contrat-de-confiance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/memority.p2.pp-izhak.fr\/identite-numerique-le-nouveau-contrat-de-confiance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/memority.p2.pp-izhak.fr\/identite-numerique-le-nouveau-contrat-de-confiance\/#primaryimage","url":"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/miniature-confiance-numerique.png","contentUrl":"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/miniature-confiance-numerique.png","width":329,"height":206},{"@type":"BreadcrumbList","@id":"https:\/\/memority.p2.pp-izhak.fr\/identite-numerique-le-nouveau-contrat-de-confiance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/memority.p2.pp-izhak.fr\/en\/"},{"@type":"ListItem","position":2,"name":"Digital identity: the new contract of trust"}]},{"@type":"WebSite","@id":"https:\/\/memority.p2.pp-izhak.fr\/#website","url":"https:\/\/memority.p2.pp-izhak.fr\/","name":"Memority","description":"L&#039;IDaaS europ\u00e9enau service des enjeux business","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/memority.p2.pp-izhak.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/memority.p2.pp-izhak.fr\/#\/schema\/person\/c6ac154af9e29cdadf1380102b48a162","name":"Izhak-contenu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/memority.p2.pp-izhak.fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/60656c8b16f6a95bfb54034344a959d53d08b47923ca24bc24069dc93f6c7bf1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/60656c8b16f6a95bfb54034344a959d53d08b47923ca24bc24069dc93f6c7bf1?s=96&d=mm&r=g","caption":"Izhak-contenu"},"url":"https:\/\/memority.p2.pp-izhak.fr\/en\/author\/izhak-contenu\/"}]}},"_links":{"self":[{"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/posts\/1411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/comments?post=1411"}],"version-history":[{"count":2,"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/posts\/1411\/revisions"}],"predecessor-version":[{"id":1413,"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/posts\/1411\/revisions\/1413"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/media\/996"}],"wp:attachment":[{"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/media?parent=1411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/categories?post=1411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/tags?post=1411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}