{"id":3254,"date":"2025-11-06T14:12:00","date_gmt":"2025-11-06T14:12:00","guid":{"rendered":"https:\/\/im-cybersec.com\/?page_id=3254"},"modified":"2025-12-30T09:41:05","modified_gmt":"2025-12-30T09:41:05","slug":"privacy-policy-im-cybersec","status":"publish","type":"page","link":"https:\/\/im-cybersec.com\/fr\/privacy-policy-im-cybersec\/","title":{"rendered":"PRIVACY &#038; POLICY"},"content":{"rendered":"<div class=\"wp-block-uagb-container uagb-block-ffc1542d alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-image alignleft uagb-block-0f41bedb wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-left\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/11\/IM-CyberSec-\u2013-kopija-6-1024x256.png ,https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/11\/IM-CyberSec-\u2013-kopija-6-scaled.png 780w, https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/11\/IM-CyberSec-\u2013-kopija-6-scaled.png 360w\" sizes=\"auto, (max-width: 480px) 150px\" src=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/11\/IM-CyberSec-\u2013-kopija-6-1024x256.png\" alt=\"\" class=\"uag-image-3265\" width=\"1024\" height=\"256\" title=\"IM CyberSec \u2013 kopija (6)\" loading=\"lazy\" role=\"img\"\/><\/figure><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-bc9d6916 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div style=\"height:49px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-724a3849 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td>Politique de confidentialit\u00e9<br><br>We appreciate your interest in our company. Data protection is a top priority for the management of Imagine CyberSec GmbH and Imagine CyberSec SAS. The websites at https:\/\/im-cybersec.com\/ can generally be used without providing any personal data. If a data subject wishes to use special services via our website, processing of personal data may become necessary. If such processing is required and there is no legal basis for it, we will generally obtain the data subject\u2019s consent.<br><br>Scope for two controllers: This privacy policy applies equally to Imagine CyberSec GmbH and Imagine CyberSec SAS. Where the text refers only to \u201cIM CyberSec\u201d or \u201cthe controller\u201d, this includes both companies unless expressly stated otherwise. Depending on the processing activity, both companies act as controllers within the meaning of the GDPR. A single point of contact for data subject rights is named below.<br><br>The processing of personal data, such as the name, address, email address, or telephone number of a data subject, is always carried out in accordance with the General Data Protection Regulation and the national data protection provisions applicable to Imagine CyberSec GmbH and Imagine CyberSec SAS. With this privacy policy we inform the public about the type, scope, and purpose of the personal data we collect, use, and process. We also explain the rights of data subjects.<br><br>As controllers, Imagine CyberSec GmbH and Imagine CyberSec SAS have implemented numerous technical and organizational measures to ensure the most complete protection possible of personal data processed via this website. Nevertheless, internet based data transmissions can have security gaps, so absolute protection cannot be guaranteed. For this reason, any data subject is free to transmit personal data to us by alternative means, for example by telephone.<br><br>1. D\u00e9finitions<br><br>Les d\u00e9finitions correspondent au R\u00e8glement g\u00e9n\u00e9ral sur la protection des donn\u00e9es. Notre politique de confidentialit\u00e9 doit \u00eatre lisible et compr\u00e9hensible tant par le public que par nos clients et partenaires. \u00c0 cet effet, nous expliquons au pr\u00e9alable les termes utilis\u00e9s:<br><br>a) donn\u00e9es \u00e0 caract\u00e8re personnel<br>b) personne concern\u00e9e<br>c) traitement<br>d) limitation du traitement<br>e) profilage<br>f) pseudonymisation<br>g) responsable du traitement<br>h) sous\u2011traitant<br>i) destinataire<br>j) tiers<br>k) consentement<br><br>2. Noms et adresses des responsables de traitement<br><br>Responsables conjoints au sens de l\u2019art. 4(7) et de l\u2019art. 26 du RGPD<br>Les entreprises suivantes sont responsables des traitements d\u00e9crits dans la pr\u00e9sente politique. Elles ont conclu un accord de responsabilit\u00e9 conjointe. Le point de contact central pour l\u2019exercice des droits est l\u2019adresse e\u2011mail indiqu\u00e9e ci\u2011dessous.<br><br>Imagine CyberSec GmbH<br>K\u00f6ttinger Weg 122<br>57537 Wissen<br>Allemagne<br><br>Imagine CyberSec SAS<br>60 rue Fran\u00e7ois 1er<br>75008 Paris<br>France<br><br>Contact :<br>Tel.: +49 274 26929981<br>Email: datenschutz@im-cybersec.com<br>Website: https:\/\/im-cybersec.com\/<br><br>Sur demande, nous fournissons les \u00e9l\u00e9ments essentiels de l\u2019accord conform\u00e9ment \u00e0 l\u2019article 26 du RGPD.<br><br>3. Cookies<br><br>Les sites https:\/\/im-cybersec.com\/ utilisent des cookies. Les cookies sont des fichiers texte stock\u00e9s sur un syst\u00e8me informatique via un navigateur. Beaucoup contiennent un identifiant permettant de reconna\u00eetre le navigateur et d\u2019offrir des services plus conviviaux.<br><br>Vous pouvez emp\u00eacher \u00e0 tout moment l\u2019installation de cookies via les param\u00e8tres du navigateur et supprimer les cookies d\u00e9j\u00e0 install\u00e9s. En cas de d\u00e9sactivation, certaines fonctionnalit\u00e9s du site pourraient ne pas \u00eatre pleinement disponibles.<br><br>4. Collecte de donn\u00e9es et d\u2019informations g\u00e9n\u00e9rales<br><br>\u00c0 chaque consultation du site, certaines donn\u00e9es g\u00e9n\u00e9rales sont enregistr\u00e9es dans des journaux serveurs: types et versions de navigateur, syst\u00e8me d\u2019exploitation, page pr\u00e9c\u00e9demment visit\u00e9e, sous\u2011pages consult\u00e9es, date et heure d\u2019acc\u00e8s, adresse IP, fournisseur d\u2019acc\u00e8s internet, ainsi que des donn\u00e9es similaires destin\u00e9es \u00e0 pr\u00e9venir les attaques contre nos syst\u00e8mes.<br><br>Aucune attribution \u00e0 une personne identifi\u00e9e n\u2019est effectu\u00e9e. L\u2019analyse sert \u00e0 d\u00e9livrer correctement le contenu, \u00e0 optimiser le site et la publicit\u00e9, \u00e0 assurer la disponibilit\u00e9 \u00e0 long terme de nos syst\u00e8mes, et \u00e0 fournir des informations aux autorit\u00e9s en cas de cyberattaque. Les donn\u00e9es anonymes des journaux sont conserv\u00e9es s\u00e9par\u00e9ment des donn\u00e9es personnelles fournies.<br><br>5. Inscription sur notre site<br><br>Les personnes concern\u00e9es peuvent s\u2019inscrire sur notre site en fournissant des donn\u00e9es personnelles. Les donn\u00e9es collect\u00e9es figurent dans le formulaire correspondant. Elles sont utilis\u00e9es exclusivement \u00e0 des fins internes et peuvent \u00eatre transmises \u00e0 des sous\u2011traitants qui les utilisent \u00e9galement en interne.<br><br>Lors de l\u2019inscription, l\u2019adresse IP, la date et l\u2019heure sont enregistr\u00e9es pour pr\u00e9venir les abus et, le cas \u00e9ch\u00e9ant, \u00e9lucider des infractions p\u00e9nales. Les personnes inscrites peuvent modifier ou supprimer leurs donn\u00e9es \u00e0 tout moment. Nous renseignons sur les donn\u00e9es conserv\u00e9es sur simple demande.<br><br>6. Abonnement \u00e0 notre newsletter<br><br>Un bulletin peut \u00eatre souscrit sur https:\/\/im-cybersec.com\/. Une adresse e\u2011mail valide et une inscription sont n\u00e9cessaires. Pour des raisons l\u00e9gales, nous envoyons un e\u2011mail de confirmation en double opt in. Nous enregistrons l\u2019adresse IP, la date et l\u2019heure de l\u2019inscription. Les donn\u00e9es servent exclusivement \u00e0 l\u2019envoi du bulletin et ne sont pas transmises \u00e0 des tiers. Le consentement peut \u00eatre retir\u00e9 \u00e0 tout moment, par exemple via le lien de d\u00e9sinscription pr\u00e9sent dans chaque e\u2011mail.<br><br>7. Suivi des newsletters<br><br>Nos newsletters contiennent des pixels de suivi. Ils nous permettent d\u2019\u00e9valuer statistiquement si et quand un e\u2011mail a \u00e9t\u00e9 ouvert et quels liens ont \u00e9t\u00e9 consult\u00e9s. Ces donn\u00e9es nous aident \u00e0 optimiser les envois futurs. Aucune transmission \u00e0 des tiers n\u2019a lieu. Le consentement peut \u00eatre retir\u00e9 \u00e0 tout moment. La d\u00e9sinscription est consid\u00e9r\u00e9e comme un retrait du consentement.<br><br>8. Contact via le site<br><br>Le site contient des informations permettant un contact \u00e9lectronique rapide, notamment une adresse e\u2011mail g\u00e9n\u00e9rique. Si une personne nous contacte par e\u2011mail ou via un formulaire, les donn\u00e9es transmises sont enregistr\u00e9es automatiquement et utilis\u00e9es uniquement pour traiter la demande. Aucune transmission \u00e0 des tiers n\u2019a lieu.<br><br>Contact :<br>Demandes g\u00e9n\u00e9rales: info@im-cybersec.com<br>Demandes li\u00e9es \u00e0 la protection des donn\u00e9es: datenschutz@im-cybersec.com<br><br>9. Effacement et blocage des donn\u00e9es<br><br>Les donn\u00e9es personnelles sont trait\u00e9es et conserv\u00e9es uniquement pendant la dur\u00e9e n\u00e9cessaire \u00e0 l\u2019objectif poursuivi ou pr\u00e9vue par la loi. Si l\u2019objectif dispara\u00eet ou si un d\u00e9lai l\u00e9gal expire, les donn\u00e9es sont bloqu\u00e9es ou effac\u00e9es.<br><br>10. Droits des personnes concern\u00e9es<br><br>Les personnes concern\u00e9es disposent des droits suivants:<br>a) confirmation,<br>b) acc\u00e8s,<br>c) rectification,<br>d) effacement,<br>e) limitation du traitement,<br>f) portabilit\u00e9 des donn\u00e9es,<br>g) opposition,<br>h) de ne pas faire l\u2019objet d\u2019une d\u00e9cision fond\u00e9e exclusivement sur un traitement automatis\u00e9, y compris le profilage,<br>i) retrait du consentement.<br><br>Pour exercer ces droits, il suffit d\u2019un message informel \u00e0 datenschutz@im-cybersec.com.<br><br>11. Donn\u00e9es des candidatures et proc\u00e9dure de recrutement<br><br>Nous traitons les donn\u00e9es personnelles des candidats aux fins de la gestion de la proc\u00e9dure de recrutement, y compris sous forme \u00e9lectronique. En cas de conclusion d\u2019un contrat de travail, les donn\u00e9es sont conserv\u00e9es pour la gestion de la relation d\u2019emploi. \u00c0 d\u00e9faut, les donn\u00e9es sont supprim\u00e9es deux mois apr\u00e8s la notification de la d\u00e9cision de refus, sauf int\u00e9r\u00eat l\u00e9gitime contraire, par exemple l\u2019obligation de preuve au titre de la l\u00e9gislation applicable.<br><br>12. Base juridique du traitement<br><br>L\u2019article 6, paragraphe 1, point a), du RGPD sert de base pour les traitements fond\u00e9s sur le consentement. Pour l\u2019ex\u00e9cution d\u2019un contrat ou des mesures pr\u00e9contractuelles, l\u2019article 6, paragraphe 1, point b), s\u2019applique. Les obligations l\u00e9gales reposent sur l\u2019article 6, paragraphe 1, point c). Les int\u00e9r\u00eats vitaux sur l\u2019article 6, paragraphe 1, point d). Les traitements r\u00e9alis\u00e9s aux fins d\u2019int\u00e9r\u00eats l\u00e9gitimes reposent sur l\u2019article 6, paragraphe 1, point f). Un int\u00e9r\u00eat l\u00e9gitime peut exister notamment lorsque la personne concern\u00e9e est cliente du responsable.<br><br>13. Int\u00e9r\u00eats l\u00e9gitimes<br><br>Lorsque le traitement repose sur l\u2019article 6, paragraphe 1, point f), notre int\u00e9r\u00eat l\u00e9gitime est la conduite de nos activit\u00e9s au b\u00e9n\u00e9fice de nos salari\u00e9s et actionnaires.<br><br>14. Dur\u00e9e de conservation<br><br>Les d\u00e9lais l\u00e9gaux de conservation sont d\u00e9terminants. Une fois ces d\u00e9lais expir\u00e9s, les donn\u00e9es sont supprim\u00e9es si elles ne sont plus n\u00e9cessaires \u00e0 l\u2019ex\u00e9cution ou \u00e0 la pr\u00e9paration d\u2019un contrat.<br><br>15. Obligations l\u00e9gales ou contractuelles de fournir des donn\u00e9es<br><br>La fourniture de donn\u00e9es personnelles peut \u00eatre requise par la loi ou par un contrat. Il peut \u00eatre n\u00e9cessaire qu\u2019une personne nous fournisse des donn\u00e9es pour conclure un contrat. \u00c0 d\u00e9faut, le contrat ne pourrait pas \u00eatre conclu. Avant toute fourniture, la personne concern\u00e9e peut nous contacter pour savoir s\u2019il existe une obligation et quelles seraient les cons\u00e9quences d\u2019une absence de fourniture.<br><br>16. D\u00e9cision automatis\u00e9e<br><br>En tant qu\u2019entreprises responsables, nous ne recourons pas \u00e0 la prise de d\u00e9cision automatis\u00e9e ni au profilage au sens de l\u2019article 22 du RGPD.<br><\/td><\/tr><\/tbody><\/table><\/figure>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Privacy Policy We appreciate your interest in our company. Data protection is a top priority for the management of Imagine CyberSec GmbH and Imagine CyberSec SAS. The websites at https:\/\/im-cybersec.com\/ can generally be used without providing any personal data. If a data subject wishes to use special services via our website, processing of personal data [&hellip;]<\/p>","protected":false},"author":1,"featured_media":3153,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"plain-container","ast-site-content-layout":"normal-width-container","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-3254","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>PRIVACY &amp; POLICY - IM CyberSec<\/title>\n<meta name=\"description\" content=\"Don&#039;t Want to be Hacked or Need a Strategy? Let&#039;s Connect! We will respond to your inquiry at the earliest opportunity\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/im-cybersec.com\/fr\/privacy-policy-im-cybersec\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PRIVACY &amp; POLICY - IM CyberSec\" \/>\n<meta property=\"og:description\" content=\"Don&#039;t Want to be Hacked or Need a Strategy? Let&#039;s Connect! We will respond to your inquiry at the earliest opportunity\" \/>\n<meta property=\"og:url\" content=\"https:\/\/im-cybersec.com\/fr\/privacy-policy-im-cybersec\/\" \/>\n<meta property=\"og:site_name\" content=\"IM CyberSec\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-30T09:41:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"2560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/im-cybersec.com\/privacy-policy-im-cybersec\/\",\"url\":\"https:\/\/im-cybersec.com\/privacy-policy-im-cybersec\/\",\"name\":\"PRIVACY & POLICY - IM CyberSec\",\"isPartOf\":{\"@id\":\"https:\/\/im-cybersec.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/im-cybersec.com\/privacy-policy-im-cybersec\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/im-cybersec.com\/privacy-policy-im-cybersec\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png\",\"datePublished\":\"2025-11-06T14:12:00+00:00\",\"dateModified\":\"2025-12-30T09:41:05+00:00\",\"description\":\"Don't Want to be Hacked or Need a Strategy? Let's Connect! We will respond to your inquiry at the earliest opportunity\",\"breadcrumb\":{\"@id\":\"https:\/\/im-cybersec.com\/privacy-policy-im-cybersec\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/im-cybersec.com\/privacy-policy-im-cybersec\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/im-cybersec.com\/privacy-policy-im-cybersec\/#primaryimage\",\"url\":\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png\",\"contentUrl\":\"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png\",\"width\":2560,\"height\":2560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/im-cybersec.com\/privacy-policy-im-cybersec\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/im-cybersec.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PRIVACY &#038; POLICY\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/im-cybersec.com\/#website\",\"url\":\"https:\/\/im-cybersec.com\/\",\"name\":\"IM CyberSec\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/im-cybersec.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PRIVACY & POLICY - IM CyberSec","description":"Don't Want to be Hacked or Need a Strategy? Let's Connect! We will respond to your inquiry at the earliest opportunity","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/im-cybersec.com\/fr\/privacy-policy-im-cybersec\/","og_locale":"fr_FR","og_type":"article","og_title":"PRIVACY & POLICY - IM CyberSec","og_description":"Don't Want to be Hacked or Need a Strategy? Let's Connect! We will respond to your inquiry at the earliest opportunity","og_url":"https:\/\/im-cybersec.com\/fr\/privacy-policy-im-cybersec\/","og_site_name":"IM CyberSec","article_modified_time":"2025-12-30T09:41:05+00:00","og_image":[{"width":2560,"height":2560,"url":"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/im-cybersec.com\/privacy-policy-im-cybersec\/","url":"https:\/\/im-cybersec.com\/privacy-policy-im-cybersec\/","name":"PRIVACY & POLICY - IM CyberSec","isPartOf":{"@id":"https:\/\/im-cybersec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/im-cybersec.com\/privacy-policy-im-cybersec\/#primaryimage"},"image":{"@id":"https:\/\/im-cybersec.com\/privacy-policy-im-cybersec\/#primaryimage"},"thumbnailUrl":"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png","datePublished":"2025-11-06T14:12:00+00:00","dateModified":"2025-12-30T09:41:05+00:00","description":"Don't Want to be Hacked or Need a Strategy? Let's Connect! We will respond to your inquiry at the earliest opportunity","breadcrumb":{"@id":"https:\/\/im-cybersec.com\/privacy-policy-im-cybersec\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/im-cybersec.com\/privacy-policy-im-cybersec\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/im-cybersec.com\/privacy-policy-im-cybersec\/#primaryimage","url":"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png","contentUrl":"https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png","width":2560,"height":2560},{"@type":"BreadcrumbList","@id":"https:\/\/im-cybersec.com\/privacy-policy-im-cybersec\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/im-cybersec.com\/"},{"@type":"ListItem","position":2,"name":"PRIVACY &#038; POLICY"}]},{"@type":"WebSite","@id":"https:\/\/im-cybersec.com\/#website","url":"https:\/\/im-cybersec.com\/","name":"IM CyberSec","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/im-cybersec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"uagb_featured_image_src":{"full":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-scaled.png",2560,2560,false],"thumbnail":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-150x150.png",150,150,true],"medium":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-300x300.png",300,300,true],"medium_large":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-768x768.png",768,768,true],"large":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-1024x1024.png",1024,1024,true],"1536x1536":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-1536x1536.png",1536,1536,true],"2048x2048":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-2048x2048.png",2048,2048,true],"trp-custom-language-flag":["https:\/\/im-cybersec.com\/wp-content\/uploads\/2025\/10\/10-12x12.png",12,12,true]},"uagb_author_info":{"display_name":"anita.xd@yahoo.com","author_link":"https:\/\/im-cybersec.com\/fr\/author\/anita-xdyahoo-com\/"},"uagb_comment_info":0,"uagb_excerpt":"Privacy Policy We appreciate your interest in our company. Data protection is a top priority for the management of Imagine CyberSec GmbH and Imagine CyberSec SAS. The websites at https:\/\/im-cybersec.com\/ can generally be used without providing any personal data. If a data subject wishes to use special services via our website, processing of personal data\u2026","_links":{"self":[{"href":"https:\/\/im-cybersec.com\/fr\/wp-json\/wp\/v2\/pages\/3254","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/im-cybersec.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/im-cybersec.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/im-cybersec.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/im-cybersec.com\/fr\/wp-json\/wp\/v2\/comments?post=3254"}],"version-history":[{"count":7,"href":"https:\/\/im-cybersec.com\/fr\/wp-json\/wp\/v2\/pages\/3254\/revisions"}],"predecessor-version":[{"id":3386,"href":"https:\/\/im-cybersec.com\/fr\/wp-json\/wp\/v2\/pages\/3254\/revisions\/3386"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/im-cybersec.com\/fr\/wp-json\/wp\/v2\/media\/3153"}],"wp:attachment":[{"href":"https:\/\/im-cybersec.com\/fr\/wp-json\/wp\/v2\/media?parent=3254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}