{"id":6917,"date":"2025-09-02T09:22:26","date_gmt":"2025-09-02T07:22:26","guid":{"rendered":"https:\/\/obsam.shebam.fr\/?page_id=6917"},"modified":"2025-09-10T14:47:12","modified_gmt":"2025-09-10T12:47:12","slug":"charte-informatique","status":"publish","type":"page","link":"https:\/\/obsam.com\/en\/charte-informatique\/","title":{"rendered":"IT Charter"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"6917\" class=\"elementor elementor-6917\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ee7a918 e-con-full e-flex e-con e-parent\" data-id=\"ee7a918\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5414a2b elementor-widget elementor-widget-html\" data-id=\"5414a2b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<div class=\"shape-alternative2\">\r\n<\/div>\r\n<div class=\"shape-alternative\"><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5db130a elementor-widget elementor-widget-heading\" data-id=\"5db130a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Our <span style=\"font-weight: 700;color: var(--e-global-color-accent)\">IT charter<\/span><\/h2>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-556e1e2 e-con-full e-flex e-con e-child\" data-id=\"556e1e2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5c157a5 elementor-widget elementor-widget-text-editor\" data-id=\"5c157a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>OBSAM's business is centered on the accumulation and management of specialized data (references for industry) for the benefit of its customers. It implements an information and communication system necessary for the performance of its missions, by providing its employees with appropriate IT tools. The smooth running of OBSAM's business depends on the appropriate use of available IT resources and compliance with the company's recommendations.<\/p><p>The present charter <strong>defines conditions of access and rules for use of IT resources<\/strong> and external resources via OBSAM's communication tools. It also aims to <strong>raise user awareness<\/strong> the risks associated with the use of these resources in terms of the integrity and confidentiality of the information processed. These risks require compliance with certain rules of security and good conduct. Carelessness, negligence or malice on the part of a user may lead to serious consequences, incurring civil and\/or criminal liability, as well as that of the company.<br \/>The implementation of this charter is in line with the Corporate Social Responsibility (CSR) approach adopted by OBSAM for a virtuous and reasoned use of IT resources.<br \/>This IT Charter includes an appendix reminding the applicable legal provisions. This IT Charter does not concern the use of IT tools made available by OBSAM to customers.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dd79be8 e-flex e-con-boxed e-con e-parent\" data-id=\"dd79be8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9b4af4a elementor-widget elementor-widget-heading\" data-id=\"9b4af4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">A few definitions:<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1268a79 elementor-widget elementor-widget-text-editor\" data-id=\"1268a79\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li>The term \u00abuser\u00bb or \u00abemployee\u00bb refers to any person authorized to access and use OBSAM's IT tools and means of communication: employees, trainees, temporary staff, staff from service providers, occasional visitors, etc.<\/li><li>The term \u00abIT department\u00bb is used interchangeably with \u00abtechnical resources\u00bb to refer to the department in charge of network operation and security, as well as IT and communications resources.<\/li><li>The terms \u00abIT tools\u00bb and \u00abcommunication tools\u00bb all cover<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e3870a2 e-flex e-con-boxed e-con e-parent\" data-id=\"e3870a2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6a54aa8 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6a54aa8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c010c94 elementor-widget elementor-widget-heading\" data-id=\"c010c94\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Protection of personal data<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-38e67e3 elementor-widget elementor-widget-text-editor\" data-id=\"38e67e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The French Data Protection Act no. 78-17 of January 6, 1978, amended in 2004, and the General Data Protection Regulation that came into force on May 25, 2018, define the conditions under which personal data may be processed. It gives people affected by processing a right to access and rectify data recorded on their account.<br \/>OBSAM has appointed a Data Controller (RT). He or she keeps a register listing all Obsam's personal data processing operations as they are implemented. The Data Processor ensures that a correspondent, designated for each department, carries out personal data management tasks.<br \/>The RT ensures that the rights of individuals (right of access, rectification and opposition) are respected. In the event of difficulties encountered in exercising these rights, the persons concerned may refer the matter to the correspondent, or failing this to the RT.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7719f39 e-flex e-con-boxed e-con e-parent\" data-id=\"7719f39\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e2fdb1a elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"e2fdb1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e27a26e elementor-widget elementor-widget-heading\" data-id=\"e27a26e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">THE SCOPE OF THE CHARTER<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cde7c99 elementor-widget elementor-widget-text-editor\" data-id=\"cde7c99\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The present charter applies to all users of the OBSAM Information and Communication System in the exercise of their professional activities. Private use of these tools is tolerated during breaks.<br \/>Generic addresses used simultaneously by several OBSAM employees (contact@obsam.com, support@obsam.com, etc.) may not be used for private purposes. An electronic signature is created for each employee using these addresses. Each employee must conclude any e-mail sent with the corresponding electronic signature.<\/p><p>The charter is available on OBSAM's Agora (general procedure Technical Resources), brought to the attention of all users by memo, and e-mailed to all new arrivals. The availability of OBSAM's personnel is deemed to constitute a reading and a commitment.<\/p><p><strong><span style=\"color: var(--e-global-color-accent);\">An annual awareness-raising session is held on SSI risks, data use and good IT practices.<\/span><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a7885ec e-flex e-con-boxed e-con e-parent\" data-id=\"a7885ec\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89eb284 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"89eb284\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-da04d5e elementor-widget elementor-widget-heading\" data-id=\"da04d5e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">RULES FOR USING OBSAM'S INFORMATION SYSTEM<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-be79f8b elementor-widget elementor-widget-text-editor\" data-id=\"be79f8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Each user has access to the IT tools required for his or her professional activity under the conditions defined by OBSAM.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5c6e24 elementor-widget elementor-widget-heading\" data-id=\"b5c6e24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. How OBSAM's IT department works<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4feee43 elementor-widget elementor-widget-text-editor\" data-id=\"4feee43\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>OBSAM ensures the proper operation and security of networks, IT and communication resources through its own technical resources and, if necessary, with the help of an external service provider. Its staff are equipped with the technical tools needed to investigate and control the use of the information systems in place.<br \/>They have access to all technical data, but undertake to respect the rules of confidentiality applicable to document content.<br \/>They are subject to a duty of confidentiality, and are required to maintain the confidentiality of any data they come into contact with in the course of their duties.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-593af0c elementor-widget elementor-widget-heading\" data-id=\"593af0c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. Safety rules and best practices<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ac8005 elementor-widget elementor-widget-text-editor\" data-id=\"6ac8005\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><br \/>All users undertake to comply with the following safety rules:<br \/>Report to OBSAM's IT department any suspected violation or attempted violation of its network account, and in general any malfunction.<\/p><ul style=\"padding-bottom: 10px; padding-top: 10px;\"><li>Never give out your login\/password.<\/li><li>Never ask an employee for his or her login\/password.<\/li><li>Don't hide your true identity.<\/li><li>Do not usurp the identity of others.<\/li><li>Do not modify workstation settings.<\/li><li>Do not install unauthorized software.<\/li><li>Do not copy, modify or destroy OBSAM's software properties and data sources.<\/li><li>Lock your computer as soon as you leave your workstation.<\/li><li>Not to access, attempt to access, delete or modify information that does not belong to it.<br \/>- Any copy of data onto an external medium must be approved by the line manager and comply with the rules defined by OBSAM.<\/li><\/ul><p>It should also be noted that visitors may not access OBSAM's Information System without the company's prior consent.<br \/>Consequently, contracts signed between OBSAM and any third party having access to data, computer programs or other means, must include a clause delimiting the obligations to respect the charter to be imposed on themselves, their employees and any subcontractors.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a976530 e-flex e-con-boxed e-con e-parent\" data-id=\"a976530\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a994c8d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"a994c8d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4c7e129 elementor-widget elementor-widget-heading\" data-id=\"4c7e129\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">IT RESOURCES<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-00c1afc elementor-widget elementor-widget-heading\" data-id=\"00c1afc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. Employee arrival\/workstation configuration<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-520657f elementor-widget elementor-widget-text-editor\" data-id=\"520657f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>OBSAM ensures the proper operation and security of networks, IT and communication resources through its own technical resources and, if necessary, with the help of an external service provider. Its staff are equipped with the technical tools needed to investigate and control the use of the information systems in place.<br \/>They have access to all technical data, but undertake to respect the rules of confidentiality applicable to document content.<br \/>They are subject to a duty of confidentiality, and are required to maintain the confidentiality of any data they come into contact with in the course of their duties.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-768aea4 elementor-widget elementor-widget-heading\" data-id=\"768aea4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. Safety rules and best practices<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d0c06d elementor-widget elementor-widget-text-editor\" data-id=\"4d0c06d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul style=\"padding-bottom: 10px;\"><li>OBSAM provides each user with a workstation equipped with the IT tools required for the performance of his or her duties (see job description). The user's signature on the equipment handover form confirms acceptance of the equipment.<br \/>The user must not :<\/li><li>Modify this equipment and its operation, parameterization, and physical or software configuration.<\/li><li>Unauthorized connection or disconnection of computer and communications equipment.<\/li><li>Move computer equipment (unless it's \u00abnomadic equipment\u00bb).<\/li><li>Interfere with computer and communications tools.<\/li><\/ul><p>Any installation of additional software (e.g. for viewing multimedia files) is subject to the agreement of the technical resources manager.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afb7311 elementor-widget elementor-widget-heading\" data-id=\"afb7311\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2. Nomadic equipment and procedures specific to lending equipment<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eea1cdc elementor-widget elementor-widget-text-editor\" data-id=\"eea1cdc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"text-decoration: underline;\"><strong>Mobile equipment<\/strong><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-906c6d8 elementor-widget elementor-widget-text-editor\" data-id=\"906c6d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tNomadic equipment\u00ab refers to all mobile technical resources (laptops, portable printers, cell phones or smartphones, CD ROMs, USB sticks, etc.).\nWhenever technically possible, they must be specially secured, in view of the sensitivity of the documents they may store, notably by encryption.\nThe use of smartphones for automatic e-mail retrieval entails particular risks for the confidentiality of messages, particularly in the event of loss or theft. When these devices are not in use for a few minutes, they must be locked by a suitable means to prevent unauthorized access to the data they contain.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b1aed2 elementor-widget elementor-widget-heading\" data-id=\"6b1aed2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. Internet<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c60bb6d elementor-widget elementor-widget-text-editor\" data-id=\"c60bb6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Users may consult websites of any kind that have a direct and necessary link with their professional activity.<br \/>However, punctual and reasonable use of websites for personal reasons, whose content is not contrary to the law or public order, and does not jeopardize the company's interests, security or reputation, is permitted. In such cases, improper use may constitute professional misconduct. This private consultation time is tolerated during break periods... The consultation, even involuntary, of malicious sites would be likely to constitute professional misconduct.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-80d6efe elementor-widget elementor-widget-heading\" data-id=\"80d6efe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">4. Using generative artificial intelligence<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d51fd4b elementor-widget elementor-widget-text-editor\" data-id=\"d51fd4b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>OBSAM tolerates the use of generative artificial intelligence under the following conditions:<\/p><ul><li style=\"list-style-type: none;\"><ul><li>only for professional use and in connection with the employee's position; ;<\/li><li>with a formal ban on transmitting to the generative artificial intelligence solution:<ul><li>personal data,<\/li><li>sensitive information (strategic, commercial, balance sheet data, etc.) concerning the company's business,<\/li><li>intellectual property.<\/li><\/ul><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50be6f3 elementor-widget elementor-widget-heading\" data-id=\"50be6f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">5. Electronic messaging<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc4d92d elementor-widget elementor-widget-text-editor\" data-id=\"bc4d92d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"text-decoration: underline;\"><strong>Terms of use<\/strong><\/span><\/p><p>The messaging system made available to users is intended for professional use. Personal use is tolerated as long as it does not affect the agent's work or the security of OBSAM's computer network.<\/p><p>Any message that expressly or clearly states its personal nature will benefit from the right to privacy and secrecy of correspondence. Otherwise, the message is presumed to be professional.<\/p><p>OBSAM will not access files or messages identified as \u00abpersonal\u00bb in the subject line of the agent's e-mail.<\/p><p>The use of e-mail is subject to the rules of use defined by the service provider.<\/p><p>Transferring work-related messages and attachments to personal e-mail accounts is subject to the same rules as copying data to external media.<\/p><p>Agents can consult their e-mail remotely, using a browser (webmail). It is not advisable to save documents from this mailbox on personal equipment during this consultation. If necessary, files copied to the agent's computer should be deleted from the computer as soon as possible.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e127eba elementor-widget elementor-widget-text-editor\" data-id=\"e127eba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"text-decoration: underline;\"><strong>Mailbox consultation<\/strong><\/span><\/p><p>In the event of an employee's absence and in order not to interrupt the operation of the department, OBSAM's technical resources department may, on an ad hoc basis, forward to management or a department head an electronic message of an exclusively professional nature and identified as such by its subject and\/or sender, without the explicit authorization of the recipient or sender of this message (see conditions of use).<\/p><p>Management or the head of department do not have access to the agent's other messages. The agent concerned is informed as soon as possible of the list of messages that have been transferred.<\/p><p>In the event of an agent's prolonged absence (long-term illness), the head of department may ask the IT manager, with the agreement of his or her director, to forward messages received.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c5bdf93 elementor-widget elementor-widget-text-editor\" data-id=\"c5bdf93\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"text-decoration: underline;\"><strong>Unsolicited e-mail<\/strong><\/span><\/p><p>OBSAM has a tool to combat the spread of unwanted messages (spam). In order not to increase network congestion linked to this phenomenon, users are invited to limit their prior explicit consent to receive commercial messages, newsletters, subscriptions or other, and to subscribe to a limited number of mailing lists, particularly if they are not strictly professional.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-412a081 elementor-widget elementor-widget-heading\" data-id=\"412a081\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">6. Phone<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c6afcaa elementor-widget elementor-widget-text-editor\" data-id=\"c6afcaa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>OBSAM provides users with fixed and mobile telephones for their professional activities.<\/p><p>Private telephone use is permitted, provided it remains reasonable.<\/p><p>Restrictions on the use of landline telephones by agents have been put in place to take account of their duties. For example, calls are restricted to certain numbers.<\/p><p>OBSAM does not have access to all the numbers called via the automatic exchange set up or via cell phones. However, in the event of manifestly abnormal use, the IT or administrative department, at the request of the line manager, reserves the right to access the complete numbers of individual statements.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4bf4753 elementor-widget elementor-widget-heading\" data-id=\"4bf4753\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">7. The use of IT tools by employee representatives<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a9d0f9 elementor-widget elementor-widget-text-editor\" data-id=\"5a9d0f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>As part of their mandate, full and alternate members of the CSE use the IT tools allocated to them to carry out their professional activities. They have a dedicated e-mail address (<strong><a href=\"mailto:cse@obsam.com\">cse@obsam.com<\/a><\/strong>).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-10d15b6 e-flex e-con-boxed e-con e-parent\" data-id=\"10d15b6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d6f0f52 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"d6f0f52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c3aef3 elementor-widget elementor-widget-heading\" data-id=\"5c3aef3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">INFORMATION SYSTEM ADMINISTRATION<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7eead7f elementor-widget elementor-widget-text-editor\" data-id=\"7eead7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Various systems are in place to monitor the operation and security of the information and communications system, with access to all technical data while respecting the rules of confidentiality applicable to document content.<br \/>They are subject to a duty of confidentiality, and are required to maintain the confidentiality of any data they come into contact with in the course of their duties.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dc83caa elementor-widget elementor-widget-heading\" data-id=\"dc83caa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1. Automatic filtering systems<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-225189a elementor-widget elementor-widget-text-editor\" data-id=\"225189a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>As a preventive measure, automatic filtering systems reduce the flow of information for OBSAM and ensure data security and confidentiality. These include filtering Internet sites, eliminating unsolicited e-mail and blocking certain protocols (peer-to-peer, instant messaging, etc.).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-606eef8 elementor-widget elementor-widget-heading\" data-id=\"606eef8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2. Automatic traceability systems<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-daca338 elementor-widget elementor-widget-text-editor\" data-id=\"daca338\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>OBSAM's IT department carries out, without warning, the necessary investigations to resolve malfunctions in the information system or any of its components, which jeopardize its operation or integrity.<\/p><p>It relies on log files, which record all connections and attempted connections to the information system. These files contain the following data: dates, workstations and event object.<\/p><p>The IT department is the sole user of this information, which is deleted after three years.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90bafa5 elementor-widget elementor-widget-heading\" data-id=\"90bafa5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3. Workstation management<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5ddf5d elementor-widget elementor-widget-text-editor\" data-id=\"e5ddf5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>For IT maintenance purposes, OBSAM's IT department may remotely access all workstations. Such access is subject to the user's express authorization.<\/p><p>In the context of information system updates and upgrades, and when no user is logged on to his or her workstation, the IT department may need to intervene in the technical environment of workstations. Access to content is forbidden.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c13b861 e-flex e-con-boxed e-con e-parent\" data-id=\"c13b861\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-465b9ea elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"465b9ea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72fe71e elementor-widget elementor-widget-heading\" data-id=\"72fe71e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">REASONED USE OF INFORMATION AND COMMUNICATION TECHNOLOGIES (RSE)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe765d9 elementor-widget elementor-widget-text-editor\" data-id=\"fe765d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The use of digital technology increases our carbon footprint. OBSAM, as part of its CSR approach, has adopted collective measures such as the use of reconditioned computer equipment, aimed at greater digital sobriety. Obsam invites employees to apply the following non-exhaustive recommendations:<\/p><ul><li>put unused equipment on standby or switch it off (in the evening, during long absences, etc.),<\/li><li>limit replies to e-mails to the strict minimum (thanks, etc.),<\/li><li>limit the size of attachments (prefer pdf),<\/li><li>limit high-consumption digital uses (high-quality videos, etc.),<\/li><li>limit archiving to what is strictly necessary: e-mails, files...<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3db1ca2 e-flex e-con-boxed e-con e-parent\" data-id=\"3db1ca2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6e33e6e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6e33e6e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-376f14c elementor-widget elementor-widget-heading\" data-id=\"376f14c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">PROCEDURE APPLICABLE WHEN THE USER LEAVES<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ce78c52 elementor-widget elementor-widget-text-editor\" data-id=\"ce78c52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>On departure, the user must return the equipment to the IT department.<\/p><p>Private files and data must be deleted beforehand. All copies of business documents must be authorized by the department head.<\/p><p>The user's accounts and personal data are, in any case, deleted within a maximum period of one month after his departure.<\/p><p>In the case of generic e-mail addresses, all exchanges will be available to subsequent users. Departing users must therefore ensure that they have deleted all personal exchanges, and that all exchanges have been properly filed in the corresponding folders.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5826caa e-flex e-con-boxed e-con e-parent\" data-id=\"5826caa\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6e0f4be elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"6e0f4be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bdf1e51 elementor-widget elementor-widget-heading\" data-id=\"bdf1e51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">RESPONSIBILITIES - PENALTIES<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f272b1 elementor-widget elementor-widget-text-editor\" data-id=\"5f272b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tFailure to comply with the security and confidentiality rules and measures defined in this charter may result in the user being held liable and subject to sanctions.\n<ul style=\"padding-top: 10px; padding-bottom: 10px\">\n \t<li>Internal sanctions may be imposed:<\/li>\n \t<li>In the first instance, a call to order from the user's department head or the person in charge of technical resources; ;<\/li>\n \t<li>In the second stage, and in the event of a repeat offence, after consultation with the technical resources manager and the agent's line manager, the agent is summoned by management, which may lead to disciplinary action.<\/li>\n<\/ul>\nFailure to comply with applicable laws and regulations on information systems security (see attached list of regulations) may result in legal penalties.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-956ea5b e-flex e-con-boxed e-con e-parent\" data-id=\"956ea5b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-595b28c elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"595b28c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2ef02f elementor-widget elementor-widget-heading\" data-id=\"b2ef02f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">ENTRY INTO FORCE OF THE CHARTER<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-391b7ba elementor-widget elementor-widget-text-editor\" data-id=\"391b7ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The present charter has been adopted after informing OBSAM employees. It is applicable from January 2, 2025.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-32182a1 e-flex e-con-boxed e-con e-parent\" data-id=\"32182a1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-03ac066 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"03ac066\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d193e7c elementor-widget elementor-widget-heading\" data-id=\"d193e7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">APPLICABLE LEGAL PROVISIONS<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7c72855 elementor-widget elementor-widget-text-editor\" data-id=\"7c72855\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tDirective 95\/46\/EC of October 24, 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data.\nLaw no. 78-17 of January 6, 1978 on data processing, data files and individual liberties, amended by law no. 2004-801 of August 6, 2004.\nPenal provisions :\n<ul style=\"padding-top: 10px;padding-bottom: 10px\">\n \t<li>Penal Code (legislative part): art 226-16 to 226-24<\/li>\n \t<li>Penal Code (regulatory part): art R. 625-10 to R. 625-13\n<\/ul>\nLaw no. 88-19 of January 5, 1988 on computer fraud, known as the Godfrain Law.\nPenal provisions: articles 323-1 to 323-3 of the French Penal Code.\nLaw n\u00b094-361 of May 10, 1994 on the intellectual property of software.\nLaw n\u00b02004-575 of June 21, 2004 on confidence in the digital economy (LCEN). Penal provision: art L.335-2 of the French Penal Code.<\/li>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Notre charte informatique Soci\u00e9t\u00e9 dont l\u2019activit\u00e9 est centr\u00e9e sur l\u2019accumulation et la gestion de donn\u00e9es sp\u00e9cialis\u00e9es (r\u00e9f\u00e9rences pour l\u2019industrie) au profit de ses clients, OBSAM met en oeuvre un syst\u00e8me d\u2019information et de communication n\u00e9cessaire \u00e0 l\u2019exercice de ses missions en mettant \u00e0 disposition de ses collaborateurs des outils informatiques adapt\u00e9s. Le bon d\u00e9roulement de [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-6917","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/obsam.com\/en\/wp-json\/wp\/v2\/pages\/6917","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/obsam.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/obsam.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/obsam.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/obsam.com\/en\/wp-json\/wp\/v2\/comments?post=6917"}],"version-history":[{"count":0,"href":"https:\/\/obsam.com\/en\/wp-json\/wp\/v2\/pages\/6917\/revisions"}],"wp:attachment":[{"href":"https:\/\/obsam.com\/en\/wp-json\/wp\/v2\/media?parent=6917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}