{"id":11864,"date":"2022-12-27T18:45:53","date_gmt":"2022-12-27T16:45:53","guid":{"rendered":"https:\/\/adaltys.com\/?post_type=expertises&#038;p=11864"},"modified":"2022-12-27T18:47:22","modified_gmt":"2022-12-27T16:47:22","slug":"digital-data-and-cybersecurity-2","status":"publish","type":"expertises","link":"https:\/\/adaltys.com\/en\/expertises\/digital-data-and-cybersecurity-2\/","title":{"rendered":"Digital, data and cybersecurity"},"content":{"rendered":"\n<p>Adaltys assists you in the fields of digital technology and in particular in the audit, negotiation and drafting of IT or telecom contracts, as well as training and advice on compliance with the RGPD.<br>Adaltys has developed a recognized legal and operational know-how in complex and constrained environments (telecommunications, airports, transport, freight logistics, automobiles, energy, OIV\/OSE concerned by the LPM and the NIS directive) in areas of expertise: high-speed connectivity, traceability and mobility business solutions, connected vehicles, IoT in industrial environments and cybersecurity.<\/p>\n\n\n\n<p><br>Adaltys&#8217; lawyers work in synergy with the various expertise and SS2I (PASSI, PDIS) required to assist you in the context of audit or control procedures and litigation, in France and internationally.<\/p>\n","protected":false},"featured_media":11255,"parent":0,"menu_order":0,"template":"","categories":[16],"class_list":["post-11864","expertises","type-expertises","status-publish","has-post-thumbnail","hentry","category-comptences-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Digital, data and cybersecurity - Adaltys Avocats<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/adaltys.com\/en\/expertises\/digital-data-and-cybersecurity-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital, data and cybersecurity - Adaltys Avocats\" \/>\n<meta property=\"og:description\" content=\"Adaltys assists you in the fields of digital technology and in particular in the audit, negotiation and drafting of IT or telecom contracts, as well as training and advice on compliance with the RGPD.Adaltys has developed a recognized legal and operational know-how in complex and constrained environments (telecommunications, airports, transport, freight logistics, automobiles, energy, OIV\/OSE [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/adaltys.com\/en\/expertises\/digital-data-and-cybersecurity-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Adaltys Avocats\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-27T16:47:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/adaltys.com\/wp-content\/uploads\/2022\/09\/Capture-decran-2022-09-28-a-10.15.43.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1914\" \/>\n\t<meta property=\"og:image:height\" content=\"1278\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/adaltys.com\\\/en\\\/expertises\\\/digital-data-and-cybersecurity-2\\\/\",\"url\":\"https:\\\/\\\/adaltys.com\\\/en\\\/expertises\\\/digital-data-and-cybersecurity-2\\\/\",\"name\":\"Digital, data and cybersecurity - Adaltys Avocats\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/adaltys.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/adaltys.com\\\/en\\\/expertises\\\/digital-data-and-cybersecurity-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/adaltys.com\\\/en\\\/expertises\\\/digital-data-and-cybersecurity-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/adaltys.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/Capture-decran-2022-09-28-a-10.15.43.png\",\"datePublished\":\"2022-12-27T16:45:53+00:00\",\"dateModified\":\"2022-12-27T16:47:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/adaltys.com\\\/en\\\/expertises\\\/digital-data-and-cybersecurity-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/adaltys.com\\\/en\\\/expertises\\\/digital-data-and-cybersecurity-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/adaltys.com\\\/en\\\/expertises\\\/digital-data-and-cybersecurity-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/adaltys.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/Capture-decran-2022-09-28-a-10.15.43.png\",\"contentUrl\":\"https:\\\/\\\/adaltys.com\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/Capture-decran-2022-09-28-a-10.15.43.png\",\"width\":1914,\"height\":1278},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/adaltys.com\\\/en\\\/expertises\\\/digital-data-and-cybersecurity-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/adaltys.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Digital, data and cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/adaltys.com\\\/#website\",\"url\":\"https:\\\/\\\/adaltys.com\\\/\",\"name\":\"Adaltys Avocats\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/adaltys.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digital, data and cybersecurity - Adaltys Avocats","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/adaltys.com\/en\/expertises\/digital-data-and-cybersecurity-2\/","og_locale":"en_US","og_type":"article","og_title":"Digital, data and cybersecurity - Adaltys Avocats","og_description":"Adaltys assists you in the fields of digital technology and in particular in the audit, negotiation and drafting of IT or telecom contracts, as well as training and advice on compliance with the RGPD.Adaltys has developed a recognized legal and operational know-how in complex and constrained environments (telecommunications, airports, transport, freight logistics, automobiles, energy, OIV\/OSE [&hellip;]","og_url":"https:\/\/adaltys.com\/en\/expertises\/digital-data-and-cybersecurity-2\/","og_site_name":"Adaltys Avocats","article_modified_time":"2022-12-27T16:47:22+00:00","og_image":[{"width":1914,"height":1278,"url":"https:\/\/adaltys.com\/wp-content\/uploads\/2022\/09\/Capture-decran-2022-09-28-a-10.15.43.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/adaltys.com\/en\/expertises\/digital-data-and-cybersecurity-2\/","url":"https:\/\/adaltys.com\/en\/expertises\/digital-data-and-cybersecurity-2\/","name":"Digital, data and cybersecurity - Adaltys Avocats","isPartOf":{"@id":"https:\/\/adaltys.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/adaltys.com\/en\/expertises\/digital-data-and-cybersecurity-2\/#primaryimage"},"image":{"@id":"https:\/\/adaltys.com\/en\/expertises\/digital-data-and-cybersecurity-2\/#primaryimage"},"thumbnailUrl":"https:\/\/adaltys.com\/wp-content\/uploads\/2022\/09\/Capture-decran-2022-09-28-a-10.15.43.png","datePublished":"2022-12-27T16:45:53+00:00","dateModified":"2022-12-27T16:47:22+00:00","breadcrumb":{"@id":"https:\/\/adaltys.com\/en\/expertises\/digital-data-and-cybersecurity-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/adaltys.com\/en\/expertises\/digital-data-and-cybersecurity-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/adaltys.com\/en\/expertises\/digital-data-and-cybersecurity-2\/#primaryimage","url":"https:\/\/adaltys.com\/wp-content\/uploads\/2022\/09\/Capture-decran-2022-09-28-a-10.15.43.png","contentUrl":"https:\/\/adaltys.com\/wp-content\/uploads\/2022\/09\/Capture-decran-2022-09-28-a-10.15.43.png","width":1914,"height":1278},{"@type":"BreadcrumbList","@id":"https:\/\/adaltys.com\/en\/expertises\/digital-data-and-cybersecurity-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/adaltys.com\/en\/"},{"@type":"ListItem","position":2,"name":"Digital, data and cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/adaltys.com\/#website","url":"https:\/\/adaltys.com\/","name":"Adaltys Avocats","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/adaltys.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/adaltys.com\/en\/wp-json\/wp\/v2\/expertises\/11864","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adaltys.com\/en\/wp-json\/wp\/v2\/expertises"}],"about":[{"href":"https:\/\/adaltys.com\/en\/wp-json\/wp\/v2\/types\/expertises"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/adaltys.com\/en\/wp-json\/wp\/v2\/media\/11255"}],"wp:attachment":[{"href":"https:\/\/adaltys.com\/en\/wp-json\/wp\/v2\/media?parent=11864"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adaltys.com\/en\/wp-json\/wp\/v2\/categories?post=11864"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}