Votre espace
Affichage dynamiqueVidéo (EasyMovie)
AUDIENCEs
Clients
Employés
Flux
Marché
ressourcesCASTINGABOUTCONTACT
Centre d'aideSupportLégalCybersécuritéPlan du site
Votre espace
Affichage dynamiqueVidéo (EasyMovie)
CONTACT
Derniers articles
Qu'est-ce que le Retail Media et pourquoi est-il stratégique ?
Accélérateur de prise de décision dans le parcours d'achat du consommateur, le retail media connaît une forte croissance. Découvrez son fonctionnement et ses enjeux.
Lire l'article
Point de vente
Qu’est-ce que le flex office ? Définition, fonctionnement et bonnes pratiques
Le flex office transforme l'organisation du travail. Découvrez ses avantages, inconvénients et les meilleures pratiques pour l'adopter en entreprise.
Lire l'article
Communication interne
Structurer sa communication interne : les 9 étapes essentielles
Découvrez une méthode en 9 étapes pour structurer votre communication interne, renforcer l’engagement et impliquer durablement vos collaborateurs.
Lire l'article
Communication
Digital out of home - publicité commerciales
Les avantages d’une régie publicitaire DOOH pour maximiser les performances des campagnes
Découvrez comment une régie publicitaire spécialisée DOOH optimise l'affichage dynamique pour maximiser la visibilité et renforcer le rayonnement d’une marque.
Lire l'article
Affichage Dynamique
Monétiser et rentabiliser ses écrans en magasin
Les écrans d’affichage dynamique sont des espaces de communication à fort potentiel de rentabilisation. Découvrez la solution pour monétiser vos écrans.
Lire l'article
Affichage Dynamique
Point de vente
L’évolution des moyens de communication à l’ère du digital
L’évolution des moyens de communication s’accélère avec le digital. Découvrez les tendances clés et leurs impacts sur les entreprises.
Lire l'article
Affichage Dynamique
Comment choisir le moyen de communication adapté à votre entreprise ?
Découvrez comment choisir le bon moyen de communication en entreprise : interne, externe, digital ou traditionnel, et optimisez votre stratégie.
Lire l'article
Communication interne
Montage vidéo : conseils et outils de création
Découvrez les meilleurs conseils et outils pour le montage vidéo afin de créer des contenus captivants et professionnels facilement.
Lire l'article
Vidéo
Tutos vidéo
Comment faire un plan de communication ? 10 étapes
Voici les 10 étapes à suivre pour construire un plan de communication efficace et rapidement actionnable par votre entreprise.
Lire l'article
Communication
Zero-click content : qu'est ce que c'est, et pourquoi en créer ?
Découvrez comment créer du contenu "zero click" efficace pour attirer et engager votre audience sans qu'ils aient besoin de cliquer pour plus d'informations.
Lire l'article
Vidéo
Voir tous les articles
CONTACT
MENU
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.
This is some text inside of a div block.

This policy outlines Cenareo’s approach to managing data security and cybersecurity risks, protecting our assets, and ensuring the confidentiality, integrity, and availability of customer's data throughout its lifecycle.

‍

Risk Assessment

Cenareo conducts periodic risk assessments to identify potential threats, vulnerabilities, and their impact on data security and cybersecurity.

These assessments consider various factors, including:

  • Data classification
  • System and application security postures
  • Network infrastructure vulnerabilities
  • Internal and external threats (e.g., cyberattacks, human error)

The results of the risk assessments inform our security strategy, resource allocation, and implementation of appropriate controls.

‍

Data Classification

Cenareo categorizes data based on its sensitivity and potential impact in case of a breach.

This helps prioritize security measures and allocate resources effectively, as well as warranty:

  • Improved Security: By identifying the most critical assets and prioritizing security controls for their protection.
  • Compliance: By aligning with data privacy regulations that often mandate specific safeguards for certain types of data (e.g., GDPR).
  • Efficient Resource Allocation: By understanding data sensitivity, organizations can allocate security resources more effectively and avoid over-protecting low-risk data.
  • Incident Response: By simplifying incident response, providing a clear understanding of the potential impact of a data breach.

‍

Data classification is an ongoing process, Cenareo regularly reviews and updates classification schemes to reflect changes in business, regulations, and the threat landscape.

Cenareo Data is categorized with the following definitions:

‍

Highly Confidential Data

This category includes data that is critical to the Cenareo operations, financial well-being, or reputation. A breach could result in severe financial losses, legal repercussions, or damage to public trust.Examples:

  • Customer financial information (credit card numbers, Social Security numbers)
  • Proprietary trade secrets or intellectual property
  • Personally identifiable information (PII) subject to strict regulations
  • Executive communications and strategic plans

‍

Confidential Data

This category encompasses sensitive data that, if compromised, could cause moderate financial harm, reputational damage, or operational disruptions.Examples:

  • Customer names, contact information, and purchase history
  • Internal employee data (salary information, performance reviews)
  • Confidential business documents (contracts, proposals)
  • Marketing campaign data

‍

Internal Data

This category includes sensitive information that is important for internal operations but doesn't necessarily have the same level of criticality as confidential data.Examples:

  • Employee training materials
  • Internal communications and memos
  • Non-public customer service records
  • IT infrastructure information

‍

Public Data

  • Definition: This category refers to information that is publicly available or intended for public dissemination.
  • Examples:some text
    • Company website content
    • Press releases and marketing materials
    • Public financial reports
    • Product manuals and brochures

‍

Asset Management

Cenareo maintains a comprehensive inventory of all assets that store, process, or transmit customer data. This includes:

  • Hardware (servers, workstations, mobile devices)
  • Software applications
  • Network devices
  • Data storage systems

Access to these assets is strictly controlled based on the principle of least privilege.

‍

Supply Chain & Subcontracting

Cenareo recognizes the importance of cybersecurity within our supply chain and has established a risk management strategy agreed upon by relevant stakeholders.This strategy includes conducting cyber supply chain risk assessments for:

  • Information system vendors
  • Third-party partners providing components or services
  • Subcontractors entrusted with customer's data

These assessments evaluate the security practices and potential risks associated with these entities.

‍

Third-Party Management

Cenareo conducts routine assessments of critical suppliers and third-party partners through:

  • Security audits
  • Penetration testing results
  • Other forms of security risk evaluations

This ensures they meet their cybersecurity requirements and adequately protect customer's data.Cenareo requires third parties to remediate identified vulnerabilities and security risks within a defined timeframe.

‍

Contractual Safeguards

Cenareo only shares data with third-party vendors when absolutely necessary for operational purposes. All such data sharing is governed by strict information security clauses within the contracts. These clauses address:

  • Confidentiality obligations regarding customer's data
  • Data integrity and availability requirements
  • Security controls and incident reporting procedures

‍

Non-Production Environments

Cenareo strictly minimizes the storage of customer data in non-production environments. This emphasizes the preference to avoid storing customer data in development, testing, and user acceptance testing (UAT) environments whenever possible. When necessary, customer data must be stored in non-production environments, and the same or equivalent security measures used in production environments are applied.

Besoin de nous joindre ?

Contactez nos équipes pour toute question sur ce sujet.

Contactez nous
Cenareo

Gestion des risques liés aux données et à la cybersécurité

Text Link
Engagez vos audiences,
devenez un média.
Audiences
ClientsEmployésFluxMarché
SOLUTIONS
Solution Affichage dynamiqueSolution Vidéo
Entreprise
CastingAboutNous contacter
Ressources
BlogInsightsCas clientsVidéos
© CENAREO 2024, All rights reserved.
Centre d'aideSupportLégalRGPDCybersécuritéPlan du site
Cenareo - affichage dynamique, solution video