{"id":59283,"date":"2020-07-01T13:16:44","date_gmt":"2020-07-01T12:16:44","guid":{"rendered":"https:\/\/beta-site.mopinion.com\/data-breach-procedure\/"},"modified":"2024-04-25T09:51:29","modified_gmt":"2024-04-25T08:51:29","slug":"procedure-data-breach","status":"publish","type":"page","link":"https:\/\/mopinion.com\/fr\/legal\/security\/procedure-data-breach\/","title":{"rendered":"Data Breach Procedure"},"content":{"rendered":"<section class=\"header-light\">\n<div class=\"container\">\n<div class=\"row\">\n<div class=\"text-center\">\n<h1>Data Breach Procedure<\/h1>\n<p>\t\t\t\t<em>For legal purposes, this document is only available in English.<\/em><\/p>\n<p>\t\t\t\t<a href=\"https:\/\/mopinion.com\/wp-content\/themes\/Mopinionated\/images\/docs\/Procedure_Data_Breach.pdf\" download><span class=\"btn btn-md btn-tertiary\">Download this document <i class=\"fas fa-download\"><\/i><\/span><\/a>\n\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/section>\n<section class=\"usp\">\n<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-md-12 col-lg-4 legal-nav text-left int-mb-20\">\n              \t\t\n\t<div class=\"cat-wrap\">\n\t\t<h5><a href=\"https:\/\/mopinion.com\/fr\/legal\/\" class=\"legal-overview\">Overview<\/a><\/h5>\n\t<\/div>\n\t<div class=\"cat-wrap\">\n\t\t\t\t<h5><a href=\"https:\/\/mopinion.com\/fr\/legal\/terms-overview\/\" class=\"terms-overview\">Terms & Conditions<\/a><\/h5>\n\t\t\t\t<ul>\n\t\t\t\t\t<a href=\"https:\/\/mopinion.com\/fr\/legal\/terms-and-conditions\/general-terms-conditions\/\" class=\"terms\"><li>General Terms & Conditions<\/li><\/a>\n\t\t\t\t\t<a href=\"https:\/\/mopinion.com\/fr\/legal\/policies\/fair-use\/\" class=\"fup\"><li>Fair Use Policy<\/li><\/a>\t\n\t\t\t\t\t<a href=\"https:\/\/mopinion.com\/fr\/legal\/terms-and-conditions\/ethics-code\/\" class=\"ethics-code\"><li>Code of Ethics<\/li><\/a>\n\t\t\t\t<\/ul>\n\t\t\t<\/div>\n\t\t\t<div class=\"cat-wrap\">\n\t\t\t\t<h5><a href=\"https:\/\/mopinion.com\/fr\/legal\/policies\/\" class=\"policies-overview\">Privacy & Accessibility<\/a><\/h5>\n\t\t\t\t\t<ul>\n\t\t\t\t\t\t<a href=\"https:\/\/mopinion.com\/fr\/legal\/policies\/privacy-statements\/\" class=\"privacy\"><li>Privacy Statement<\/li><\/a>\t\t\t\t\t\t\t\n\t\t\t\t\t\t<a href=\"https:\/\/mopinion.com\/fr\/legal\/policies\/cookie-statement\/\" class=\"applicant-privacy\"><li>Cookie Statement<\/li><\/a>\n\t\t\t\t\t\t<a href=\"https:\/\/mopinion.com\/fr\/legal\/terms-and-conditions\/data-processing-agreement\/\" class=\"dpagreement\"><li>Data Processing Agreement<\/li><\/a>\n\t\t\t\t\t\t<a href=\"https:\/\/mopinion.com\/fr\/legal\/policies\/accessibility\/\" class=\"accessibility\"><li>Accessibility<\/li><\/a>\n\t\t\t\t\t\t<a href=\"https:\/\/mopinion.com\/fr\/legal\/policies\/sub-processors\/\" class=\"subprocessors\"><li>Sub-Processors<\/li><\/a>\n\n\t\t\t\t\t<\/ul>\n\t\t\t<\/div>\n\t\t\t<div class=\"cat-wrap\">\n\t\t\t\t<h5><a href=\"https:\/\/mopinion.com\/fr\/legal\/security-overview\/\" class=\"security-overview\">Security<\/a><\/h5>\n\t\t\t\t\t<ul>\n\t\t\t\t\t\t<a href=\"https:\/\/mopinion.com\/fr\/legal\/security-overview\/data-security\/\" class=\"data-security\"><li>Data & Security<\/li><\/a>\n\t\t\t\t\t\t<a href=\"https:\/\/mopinion.com\/fr\/legal\/security-overview\/iso\/\" class=\"iso\"><li>ISO 27001<\/li><\/a>\t\n\t\t\t\t\t\t<a href=\"https:\/\/mopinion.com\/fr\/legal\/policies\/vulnerability-disclosure-policy-vdp\/\" class=\"vulnerability-disclosure-policy\"><li>Vulnerability Disclosure Policy<\/li><\/a>\n\t\t\t\t\t<\/ul>\n\t\t\t<\/div>\n\t\t\t\t<\/p><\/div>\n<div class=\"col-md-12 col-lg-8 doc-wrap\">\n<h5>Introduction<\/h5>\n<p>\n\t\t\t\t\tThis document outlines the different steps taken by Mopinion in the event of a data<br \/>\n\t\t\t\t\tbreach, which falls under the data breach notification obligation (Meldplicht Datalekken).<br \/>\n\t\t\t\t\tThe data breach notification obligation is a modification to the Personal Data Protection<br \/>\n\t\t\t\t\tAct (Wet Bescherming Persoonsgegevens), which entered into force with effect from<br \/>\n\t\t\t\t\tJanuary 1st, 2016. When there is a data breach, there is a security breach of personal<br \/>\n\t\t\t\t\tdata (referred to in Article 13 of the Personal Data Protection Act). The personal data is<br \/>\n\t\t\t\t\tthen exposed to loss or unlawful processing.<\/p>\n<p>\t\t\t\t\tData breaches can occur through:<\/p>\n<ul>\n<li>&#8211; willful action (cyber crime, hacking, identity theft, malware infection);<\/li>\n<li>&#8211; technical failure (ICT malfunctions);<\/li>\n<li>&#8211; human error (passwords are too simple\/providing a username or password to<br \/>\ncolleagues and external contacts);<\/li>\n<li>&#8211; disaster (fire in data centre, flooding);<\/li>\n<li>&#8211; loss of USB stick or laptop;<\/li>\n<li>&#8211; sending an e-mail including e-mail addresses of all recipients;<\/li>\n<li>&#8211; as well as the unlawful processing of data (DDS application Shipping and Receiving<br \/>\nStation for Customers\/Buyers.<\/li>\n<\/ul>\n<p><\/p>\n<p>A data breach should be reported to the Authority for Personal Data immediately (within<br \/>\n\t\t\t\t\ttwo days) after the person responsible (1) within Mopinion has been informed. The<br \/>\n\t\t\t\t\tparties concerned must also be notified about the data breach. For Mopinion, these are<br \/>\n\t\t\t\t\tgenerally customers (citizens and companies) or employees. Those involved are those<br \/>\n\t\t\t\t\twhose personal data has been involved in an infringement. The person concerned must<br \/>\n\t\t\t\t\tbe informed immediately of the breach if the breach is likely to adversely affect his\/her<br \/>\n\t\t\t\t\tprivacy. A processor (2) is required to report the data breach to the person responsible.<\/p>\n<p><strong>1.<\/strong> Person responsible: CTO (Chief Technology Officer) of Mopinion. The person<br \/>\n\t\t\t\t\tresponsible has control over the purpose and method of processing. Formally, legally<br \/>\n\t\t\t\t\tand factually (functionally), he\/she is the person who determines the purpose and<br \/>\n\t\t\t\t\tmethod of processing personal data. The person who has this control and responsibility<br \/>\n\t\t\t\t\tover purpose and method of processing also makes decisions about the retention<br \/>\n\t\t\t\t\tperiods, providing access requests, etc. The person responsible has the directive role<br \/>\n\t\t\t\t\t(control of the privacy management in the chain);<\/p>\n<p><strong>2.<\/strong> Processor: the individual that processes the data on behalf of the person responsible<br \/>\n\t\t\t\t\twithout being subject to his\/her direct authority (also externally). The processor<br \/>\n\t\t\t\t\tprocesses personal data in accordance with the instructions and ultimate responsibility of<br \/>\n\t\t\t\t\tthe person responsible. The processor does not make decisions about the use of the data,<br \/>\n\t\t\t\t\tthe disclosure to third parties and other recipients, the duration of data storage, etc.<\/p>\n<h5>Report<\/h5>\n<p>\n\t\t\t\t\tAll data breaches of personal data must be reported internally and documented by the<br \/>\n\t\t\t\t\tData Protection Officer (DPO). The report can be made by every employee and every<br \/>\n\t\t\t\t\tprocessor. The report can also be made by an external contact or by an employee of<br \/>\n\t\t\t\t\tMopinion. The report must be sent out directly and by telephone to the DPO and it must<br \/>\n\t\t\t\t\tbe in writing. Our DPO reports the data breach, if necessary, to the Personal Data<br \/>\n\t\t\t\t\tAuthority.<\/p>\n<p>\t\t\t\t\tThe DPO establishes:<\/p>\n<ul>\n<li>&#8211; name of the reporter;<\/li>\n<li>&#8211; date and time of the report;<\/li>\n<li>&#8211; nature of the infringement (is there a substantial risk of loss or unlawful processing?);<\/li>\n<li>&#8211; the personal data in the report;<\/li>\n<li>&#8211; which amount and\/or data records is it regarding;<\/li>\n<li>&#8211; which (groups) persons are involved in the report;<\/li>\n<li>&#8211; which measures have been or will be taken by the reporter;<\/li>\n<li>&#8211; what are the implications for those involved, according to the reporter;<\/li>\n<li>&#8211; the contact person for the report.<\/li>\n<\/ul>\n<h5>First analysis<\/h5>\n<p>\n\t\t\t\t\tThe DPO assess whether the infringement \u201ccan be reasonably assumed to lead to a<br \/>\n\t\t\t\t\tsignificant risk of loss or unlawful processing, which adversely affects the privacy of the<br \/>\n\t\t\t\t\tparties related.\u201d If this is not the case, then the DPO will carry out the following<br \/>\n\t\t\t\t\tactions: <\/p>\n<ul>\n<li><strong>1.<\/strong> inform the CTO (Chief Technology Officer) of Mopinion by phone;<\/li>\n<li><strong>2.<\/strong> inform the manager of specific department officer by phone;<\/li>\n<li><strong>3.<\/strong> during office hours: directly convene the Data Breach Response team, consisting of:<br \/>\n\t\t\t\t\t\t\t\t\t\t\t\tThe DPO, CTO, manager responsible for the department where the breach was found,<br \/>\n\t\t\t\t\t\t\t\t\t\t\t\tand a member of the controlling team. The DPO is responsible for reporting.<\/li>\n<\/ul>\n<p><\/p>\n<p>\n\t\t\t\t\tOutside office hours and over the weekend, a report is made by the DPO. If the DPO<br \/>\n\t\t\t\t\tcannot be reached, the report is made by the CTO. If possible, the necessary meetings<br \/>\n\t\t\t\t\twill be postponed and re-scheduled during office hours. If this is not possible, the<br \/>\n\t\t\t\t\tmeeting will be conducted by telephone and electronically.<\/p>\n<h5>Data Breach Response Team<\/h5>\n<p>\n\t\t\t\t\tThe Data Breach Response Team, in case of a high priority, is convened by the DPO. The<br \/>\n\t\t\t\t\tmeeting is chaired by the DPO. The response team discusses and defines: <\/p>\n<ul>\n<li>&#8211; the information that has been recorded by the DPO when drawing up the report;<\/li>\n<li>&#8211; the necessary follow-up actions with regard to the data breach (immediately seal the<br \/>\nleak, limit access to information and simultaneously gather more information about the<br \/>\nintruder);<\/li>\n<li>&#8211; what will reported by the DPO to the Personal Data Authority (aside from the nature of<br \/>\nthe infringement, which personal information, number of persons\/records involved);<\/li>\n<li>&#8211; the potential consequences for those involved;<\/li>\n<li>&#8211; the measures Mopinion takes or can take to reduce the damages for those involved;<\/li>\n<li>&#8211; the measures that those involved can take to further reduce damages, including the<br \/>\nmanner with which they are notified;<\/li>\n<li>&#8211; contact information for those involved;<\/li>\n<li>&#8211; the method of handling the breach internally, including communication with the one<br \/>\nwho reported the breach, the relevant department(s) and manager(s);<\/li>\n<li>&#8211; whether there is personal liability, or third party liability, such as on account of breach<br \/>\nof contract (because a confidentiality obligation has been breached, or inadequate<br \/>\nsecurity was realised which is in violation of a contractual obligation) or tort;<\/li>\n<li>&#8211; assess whether to make a declaration and determine whether there is criminal culpability.<br \/>\n\t\t\t\t\t\t\tThis can come into play when there is, for example, involvement from Mopinion itself, a<br \/>\n\t\t\t\t\t\t\tprocessor, or when insufficient measures have been taken to prevent disturbances. If<br \/>\n\t\t\t\t\t\t\tdesired, the meeting will be held with the legal counsel;<\/li>\n<li>&#8211; what is communicated internally and at what time;<\/li>\n<li>&#8211; what is communicated externally and at what time. It is determined whether the press should be informed;<\/li>\n<li>&#8211; if other stakeholders need to be informed, in addition to the Personal Data Authority;<\/li>\n<li>&#8211; if other individuals and\/or companies need to be informed;<\/li>\n<li>&#8211; how it is reported internally, including the actionee;<\/li>\n<li>&#8211; if any damage is covered by the insurance policy.<\/li>\n<\/ul>\n<h5>Continuation<\/h5>\n<p>\n\t\t\t\t\tThe DPO reports the results of the Data Breach Response Team meeting to the CTO of<br \/>\n\t\t\t\t\tMopinion. The CTO either approves the activities to be carried out, as stipulated by the<br \/>\n\t\t\t\t\tData Breach Response Team, or adjusts them. The activities stipulated by the CTO are<br \/>\n\t\t\t\t\tthen carried out.<\/p>\n<h5>Reporting to the Personal Data Authority<\/h5>\n<p>\n\t\t\t\t\tThe DPO reports the data breach to the Personal Data Authority (Personal Data Authority<br \/>\n\t\t\t\t\tonline form) within 2 days and according to the preferred method. The following must be<br \/>\n\t\t\t\t\treported, in any case:<\/p>\n<ul>\n<li>&#8211; nature of the infringement, including categories involved, number of persons involved,<br \/>\nnumber of data records;<\/li>\n<li>&#8211; description of the anticipated effects;<\/li>\n<li>&#8211; undertaken and\/or proposed measures;<\/li>\n<li>&#8211; Information about the measures that should be taken by the person involved, to limit<br \/>\nthe adverse effects;<\/li>\n<li>&#8211; contact information for those involved;<\/li>\n<\/ul>\n<h5>Delivery confirmation of Personal Data Authority<\/h5>\n<p>\n\t\t\t\t\tIf a report has been made, Mopinion will receive a delivery confirmation. In the reports<br \/>\nthat give rise to further action by the Authority, the Authority will contact Mopinion to<br \/>\nverify the origin of the message. <\/p>\n<h5>Absence of DPO<\/h5>\n<p>\n\t\t\t\t\tIn the event of absence, the DPO\u2019s role will be filled by either the CTO or Head of<br \/>\nSupport.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/section>\n\n\t\t\t<section class=\"legal-contact xs-pt-60 xs-pb-60 light-bg\">\n\t\t\t\t<div class=\"container\">\n\t\t\t\t\t<div class=\"row justify-content-center\">\n\t\t\t\t\t\t<div class=\"col-10 col-md-8\">\n\t\t\t\t\t\t\t<h2>Do you have any questions?<\/h2>\n\t\t\t\t\t\t\t<p>If you need any more information about Data Breaches, feel free to contact us by using <a href=\"https:\/\/mopinion.com\/fr\/company\/contact-us\/\">this form<\/a> or send an email at: <a href=\"mailto:support@mopinion.com\">support@mopinion.com<\/a><\/p> \n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<section>\n\t\t\t\n","protected":false},"excerpt":{"rendered":"<p>Data Breach Procedure For legal purposes, this document is only available in English. Download this document Introduction This document outlines the different steps taken by Mopinion in the event of a data breach, which falls under the data breach notification obligation (Meldplicht Datalekken). The data breach notification obligation is a modification to the Personal Data [&hellip;]<\/p>\n","protected":false},"author":39,"featured_media":0,"parent":59212,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"categories":[],"tags":[],"class_list":["post-59283","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data Breach Procedure - Mopinion<\/title>\n<meta name=\"description\" content=\"Mopinion -Data Breach Procedure. For legal purposes, this document is only available in English.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mopinion.com\/fr\/legal\/security\/procedure-data-breach\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Breach Procedure - Mopinion\" \/>\n<meta property=\"og:description\" content=\"Mopinion -Data Breach Procedure. For legal purposes, this document is only available in English.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mopinion.com\/fr\/legal\/security\/procedure-data-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"Mopinion\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-25T08:51:29+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mopinion.com\/fr\/legal\/security\/procedure-data-breach\/\",\"url\":\"https:\/\/mopinion.com\/fr\/legal\/security\/procedure-data-breach\/\",\"name\":\"Data Breach Procedure - Mopinion\",\"isPartOf\":{\"@id\":\"https:\/\/mopinion.com\/fr\/#website\"},\"datePublished\":\"2020-07-01T12:16:44+00:00\",\"dateModified\":\"2024-04-25T08:51:29+00:00\",\"description\":\"Mopinion -Data Breach Procedure. For legal purposes, this document is only available in English.\",\"breadcrumb\":{\"@id\":\"https:\/\/mopinion.com\/fr\/legal\/security\/procedure-data-breach\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mopinion.com\/fr\/legal\/security\/procedure-data-breach\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mopinion.com\/fr\/legal\/security\/procedure-data-breach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mopinion.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Legal\",\"item\":\"https:\/\/mopinion.com\/fr\/legal\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security\",\"item\":\"https:\/\/mopinion.com\/fr\/legal\/security\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Data Breach Procedure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mopinion.com\/fr\/#website\",\"url\":\"https:\/\/mopinion.com\/fr\/\",\"name\":\"Mopinion\",\"description\":\"Customer Feedback Intelligence For Digital Enterprises\",\"publisher\":{\"@id\":\"https:\/\/mopinion.com\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mopinion.com\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/mopinion.com\/fr\/#organization\",\"name\":\"Mopinion\",\"url\":\"https:\/\/mopinion.com\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/mopinion.com\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/media.mopinion.com\/wp-content\/uploads\/2015\/12\/28084926\/m_icon.png\",\"contentUrl\":\"https:\/\/media.mopinion.com\/wp-content\/uploads\/2015\/12\/28084926\/m_icon.png\",\"width\":140,\"height\":140,\"caption\":\"Mopinion\"},\"image\":{\"@id\":\"https:\/\/mopinion.com\/fr\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Breach Procedure - Mopinion","description":"Mopinion -Data Breach Procedure. For legal purposes, this document is only available in English.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mopinion.com\/fr\/legal\/security\/procedure-data-breach\/","og_locale":"fr_FR","og_type":"article","og_title":"Data Breach Procedure - Mopinion","og_description":"Mopinion -Data Breach Procedure. For legal purposes, this document is only available in English.","og_url":"https:\/\/mopinion.com\/fr\/legal\/security\/procedure-data-breach\/","og_site_name":"Mopinion","article_modified_time":"2024-04-25T08:51:29+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/mopinion.com\/fr\/legal\/security\/procedure-data-breach\/","url":"https:\/\/mopinion.com\/fr\/legal\/security\/procedure-data-breach\/","name":"Data Breach Procedure - Mopinion","isPartOf":{"@id":"https:\/\/mopinion.com\/fr\/#website"},"datePublished":"2020-07-01T12:16:44+00:00","dateModified":"2024-04-25T08:51:29+00:00","description":"Mopinion -Data Breach Procedure. For legal purposes, this document is only available in English.","breadcrumb":{"@id":"https:\/\/mopinion.com\/fr\/legal\/security\/procedure-data-breach\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mopinion.com\/fr\/legal\/security\/procedure-data-breach\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/mopinion.com\/fr\/legal\/security\/procedure-data-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mopinion.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Legal","item":"https:\/\/mopinion.com\/fr\/legal\/"},{"@type":"ListItem","position":3,"name":"Security","item":"https:\/\/mopinion.com\/fr\/legal\/security\/"},{"@type":"ListItem","position":4,"name":"Data Breach Procedure"}]},{"@type":"WebSite","@id":"https:\/\/mopinion.com\/fr\/#website","url":"https:\/\/mopinion.com\/fr\/","name":"Mopinion","description":"Customer Feedback Intelligence For Digital Enterprises","publisher":{"@id":"https:\/\/mopinion.com\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mopinion.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/mopinion.com\/fr\/#organization","name":"Mopinion","url":"https:\/\/mopinion.com\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/mopinion.com\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/media.mopinion.com\/wp-content\/uploads\/2015\/12\/28084926\/m_icon.png","contentUrl":"https:\/\/media.mopinion.com\/wp-content\/uploads\/2015\/12\/28084926\/m_icon.png","width":140,"height":140,"caption":"Mopinion"},"image":{"@id":"https:\/\/mopinion.com\/fr\/#\/schema\/logo\/image\/"}}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"Yannick Post","author_link":"https:\/\/mopinion.com\/fr\/author\/yannick-post\/"},"rttpg_comment":0,"rttpg_category":false,"rttpg_excerpt":"Data Breach Procedure For legal purposes, this document is only available in English. Download this document Introduction This document outlines the different steps taken by Mopinion in the event of a data breach, which falls under the data breach notification obligation (Meldplicht Datalekken). The data breach notification obligation is a modification to the Personal Data\u2026","_links":{"self":[{"href":"https:\/\/mopinion.com\/fr\/wp-json\/wp\/v2\/pages\/59283","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mopinion.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/mopinion.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/mopinion.com\/fr\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/mopinion.com\/fr\/wp-json\/wp\/v2\/comments?post=59283"}],"version-history":[{"count":4,"href":"https:\/\/mopinion.com\/fr\/wp-json\/wp\/v2\/pages\/59283\/revisions"}],"predecessor-version":[{"id":91813,"href":"https:\/\/mopinion.com\/fr\/wp-json\/wp\/v2\/pages\/59283\/revisions\/91813"}],"up":[{"embeddable":true,"href":"https:\/\/mopinion.com\/fr\/wp-json\/wp\/v2\/pages\/59212"}],"wp:attachment":[{"href":"https:\/\/mopinion.com\/fr\/wp-json\/wp\/v2\/media?parent=59283"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mopinion.com\/fr\/wp-json\/wp\/v2\/categories?post=59283"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mopinion.com\/fr\/wp-json\/wp\/v2\/tags?post=59283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}