{"id":25885,"date":"2017-12-27T11:12:59","date_gmt":"2017-12-27T16:12:59","guid":{"rendered":"https:\/\/dev-gordon-food-service-canada.pantheonsite.io\/ideas\/safeguarding-healthcare-foodservice-data\/"},"modified":"2023-01-31T08:39:55","modified_gmt":"2023-01-31T13:39:55","slug":"proteger-les-donnees-des-services-alimentaires","status":"publish","type":"post","link":"https:\/\/gfs.ca\/fr-ca\/ideas\/safeguarding-healthcare-foodservice-data\/","title":{"rendered":"Prot\u00e9ger les donn\u00e9es des services alimentaires"},"content":{"rendered":"<h2>Beaucoup de logiciels utilis\u00e9s par les services alimentaires contiennent des renseignements sur les patients qui doivent \u00eatre prot\u00e9g\u00e9s des pirates informatiques<\/h2>\n<p>Selon Ponemon Institute, une soci\u00e9t\u00e9 de recherche en s\u00e9curit\u00e9 du Michigan, dans les deux derni\u00e8res ann\u00e9es, pr\u00e8s 90 pour cent des fournisseurs de soins ont subi une atteinte \u00e0 la protection des donn\u00e9es.&nbsp;<\/p>\n<p>Compte tenu de la quantit\u00e9 de renseignements \u00e9lectroniques conserv\u00e9s, cela n\u2019a rien de surprenant : nom, \u00e9tat de sant\u00e9, ant\u00e9c\u00e9dents familiaux, num\u00e9ro d\u2019assurance sociale, donn\u00e9es de facturation, etc. Tout y est, et les voleurs pourront revendre l\u2019information sur le march\u00e9 noir.<\/p>\n<p>Comme les syst\u00e8mes de gestion de la di\u00e8te et des commandes peuvent contenir de l\u2019information sensible \u00e0 propos des patients, les services alimentaires sont aussi concern\u00e9s que les autres d\u00e9partements. Et le danger ne provient pas que de l\u2019ext\u00e9rieur. Par exemple, un employ\u00e9 ou un visiteur pourrait obtenir des donn\u00e9es personnelles en consultant le relev\u00e9 d\u2019un plateau-repas.&nbsp;<\/p>\n<h3>Cinq fa\u00e7ons de pr\u00e9venir ou de g\u00e9rer les atteintes \u00e0 la protection des donn\u00e9es<\/h3>\n<p><strong>1. Rep\u00e9rer les vuln\u00e9rabilit\u00e9s.<\/strong> Tentez de trouver les failles qui pourraient permettre l\u2019acc\u00e8s aux donn\u00e9es. M\u00eame si les cyberattaques constituent la principale source de violation, d\u00e9terminez aussi les mesures \u00e0 prendre en cas de n\u00e9gligence ou de malveillance du personnel, de vol ou de perte de mat\u00e9riel informatique ainsi que d\u2019attaques de logiciels malveillants.<\/p>\n<p><strong>2. Collaborer avec les TI.<\/strong> Consultez le service des TI (technologies de l\u2019information) ou un sp\u00e9cialiste en cybers\u00e9curit\u00e9. Ils pourront vous proposer des strat\u00e9gies qui permettront de r\u00e9duire les risques au maximum, par exemple, le recours aux technologies de chiffrement. Assurez-vous \u00e9galement que vos fournisseurs respectent vos protocoles de protection de la vie priv\u00e9e.<\/p>\n<p><strong>3. Informer son personnel.<\/strong> Veillez \u00e0 ce que vos employ\u00e9s connaissent la r\u00e9glementation applicable et les politiques internes concernant la protection des renseignements personnels. Ajoutez la protection \u00e0 toutes les descriptions de t\u00e2ches, assurez-vous que chacun sache que les renseignements m\u00e9dicaux sont des donn\u00e9es sensibles et pr\u00e9sentez les moyens de protection en place.&nbsp;<\/p>\n<p><strong>4. Surveiller les appareils et les dossiers.<\/strong> Rappelez aux employ\u00e9s de surveiller attentivement ce qu\u2019ils ont en leur possession. Beaucoup de violations de donn\u00e9es r\u00e9sultent de vols dans des r\u00e9sidences, des v\u00e9hicules ou des bureaux.<\/p>\n<p><strong>5. \u00c9laborer un plan d\u2019intervention.<\/strong> En collaboration avec divers intervenants (direction de l\u2019\u00e9tablissement, professionnel des communications, avocat, agent de conformit\u00e9, sp\u00e9cialiste de la cybers\u00e9curit\u00e9, etc.), \u00e9laborez un plan \u00e0 suivre en cas d\u2019atteinte \u00e0 la protection des donn\u00e9es.<\/p>\n<h3>Autre type de violation<\/h3>\n<p>En mars dernier, des organismes de cybers\u00e9curit\u00e9 au Canada et aux \u00c9tats-Unis ont diffus\u00e9 une mise en garde concernant le nombre croissant d\u2019attaques de logiciels de ran\u00e7on ciblant les organisations de sant\u00e9. Plut\u00f4t que de voler des donn\u00e9es, les pirates informatiques paralysent les syst\u00e8mes et demandent ensuite une ran\u00e7on.<\/p>\n<p>Ainsi, le <em>Los Angeles Times <\/em>rapportait en f\u00e9vrier que le Hollywood Presbyterian Medical Center a pay\u00e9 une ran\u00e7on de 17\u2009000 $ US \u00e0 un pirate informatique qui avait infect\u00e9 le syst\u00e8me de l\u2019\u00e9tablissement. &nbsp;<\/p>\n<p>Et plus t\u00f4t en janvier, le Hurley Medical Center, situ\u00e9 \u00e0 Flint (Michigan), a aussi \u00e9t\u00e9 victime d\u2019une cyberattaque ayant paralys\u00e9 les services alimentaires de l\u2019h\u00f4pital. D\u2019apr\u00e8s <em>MLive Media Group<\/em> , les documents et courriels obtenus en vertu de la loi sur l\u2019acc\u00e8s \u00e0 l\u2019information am\u00e9ricaine ont permis de conclure que \u00ab\u2009le d\u00eener a \u00e9t\u00e9 retard\u00e9 parce que des plateaux r\u00e9guliers ont \u00e9t\u00e9 envoy\u00e9s et que les infirmi\u00e8res ont d\u00fb voir eux-m\u00eames \u00e0 la gestion des di\u00e8tes particuli\u00e8res.\u2009\u00bb Certains patients n\u2019ont \u00e9t\u00e9 servis que vers 16 h.<\/p>\n<p>L\u2019attaque du centre Hurley s\u2019est finalement r\u00e9v\u00e9l\u00e9 \u00eatre une protestation du collectif Anonymous en r\u00e9ponse \u00e0 la crise de l\u2019eau contamin\u00e9e de Flint plut\u00f4t qu\u2019une r\u00e9elle demande de ran\u00e7on. L\u2019incident a tout de m\u00eame permis de d\u00e9montrer qu\u2019en cas de paralysie du syst\u00e8me, les services alimentaires sont tr\u00e8s vuln\u00e9rables.&nbsp;<\/p>\n<p>Selon les experts, m\u00eame s\u2019il est impossible de pr\u00e9venir compl\u00e8tement les attaques, les organisations peuvent en limiter les cons\u00e9quences, et \u00e9viter de payer une ran\u00e7on, en sauvegardant et en prot\u00e9geant les donn\u00e9es, en faisant affaire avec des fournisseurs s\u00e9rieux, en expliquant les risques \u00e0 leur personnel et en se dotant d\u2019un bon plan d\u2019intervention.<\/p>\n<p>Pour ce faire, il faut d\u00e9terminer les effets qu\u2019une attaque pourrait avoir et cr\u00e9er un plan qui garantit que, en cas de d\u00e9faillance du syst\u00e8me, les patients seront nourris selon leurs besoins (allergies, di\u00e8tes th\u00e9rapeutiques, texture adapt\u00e9e).<\/p>\n<p>Le personnel doit aussi recevoir une formation sur la cybers\u00e9curit\u00e9 : hame\u00e7onnage, ouverture de pi\u00e8ces jointes inconnues, connexion d\u2019appareils externes sur le syst\u00e8me de l\u2019\u00e9tablissement, etc.<\/p>\n<p>Si vous n\u2019avez pas encore \u00e9t\u00e9 la cible de pirates informatiques, cela ne saurait tarder. Ainsi, vous devez tout faire pour prot\u00e9ger les renseignements m\u00e9dicaux de votre client\u00e8le et \u00e9viter l\u2019acc\u00e8s \u00e0 vos syst\u00e8mes.<\/p>\n<h3>Violation de donn\u00e9es et relations publiques<\/h3>\n<p>En cas d\u2019atteinte \u00e0 la protection des donn\u00e9es, on doit intervenir imm\u00e9diatement. On peut alors se servir des m\u00e9dias sociaux pour r\u00e9pandre rapidement la nouvelle. Il faut cependant s\u2019assurer de contr\u00f4ler le message. Voici les recommandations de sp\u00e9cialistes des relations publiques :<\/p>\n<p>R\u00e9agir de fa\u00e7on rapide et honn\u00eate. Pr\u00e9sentez des excuses et exposez votre plan d\u2019action.<\/p>\n<p>Cr\u00e9er un centre d\u2019\u00e9change d\u2019information. Ce site permettra de r\u00e9pondre aux besoins des clients tout en d\u00e9tournant les commentaires n\u00e9gatifs de vos plateformes de m\u00e9dias sociaux.<\/p>\n<p>Garder les choses simples. Veillez \u00e0 ce que toutes les communications soient claires et concises et ne puissent pas porter \u00e0 confusion.<\/p>\n<h3>L\u2019avantage d\u2019EMV<\/h3>\n<p>Les transactions par carte de cr\u00e9dit ou de d\u00e9bit, par exemple dans les caf\u00e9t\u00e9rias ou les kiosques, peuvent mener \u00e0 la compromission des donn\u00e9es. N\u00e9anmoins, la technologie EMV (Europay Mastercard Visa) contribue \u00e0 diminuer ce risque.&nbsp;<\/p>\n<p>En 2007, le Canada a acc\u00e9l\u00e9r\u00e9 l\u2019ajout de puces aux cartes de cr\u00e9dit, ce qui a permis de r\u00e9duire grandement les pertes li\u00e9es aux fraudes. Les \u00c9tats-Unis embo\u00eetent \u00e0 pr\u00e9sent le pas.<\/p>\n<p>Il est \u00e0 noter que l\u2019utilisation de lecteurs de cartes \u00e0 puces (EMV) n\u2019est pas obligatoire pour la vente au d\u00e9tail. N\u00e9anmoins, ceux qui n\u2019en ont pas risquent d\u2019\u00eatre tenus responsables des transactions frauduleuses.&nbsp;<\/p>\n<h3>Cibles des voleurs<\/h3>\n<p>D\u2019apr\u00e8s les <em>TI du secteur de la sant\u00e9<\/em> , voici les principaux renseignements convoit\u00e9s par les pirates informatiques (dans l\u2019ordre) :<\/p>\n<p>1. Dossier m\u00e9dical du patient.<\/p>\n<p>2. Donn\u00e9es de facturation du patient.<\/p>\n<p>3. Information relative aux essais cliniques et autres \u00e9tudes.<\/p>\n<p>4. Renseignements personnels des employ\u00e9s.<\/p>","protected":false},"excerpt":{"rendered":"<p>Many common foodservice software tools contain patient information you need to protect from hackers Nearly 90 percent of healthcare providers have been hit by data breaches in the last two years, according to the Ponemon Institute, a security research firm based in Traverse City, Michigan.&nbsp; That\u2019s no surprise, given the extensive nature of electronic medical [&hellip;]<\/p>\n","protected":false},"author":19,"featured_media":27036,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[69,111],"tags":[],"class_list":["post-25885","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-running-your-business","category-healthcare"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.9 (Yoast SEO v27.0) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Safeguarding Healthcare Foodservice Data | Gordon Food Service<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gfs.ca\/fr-ca\/ideas\/proteger-les-donnees-des-services-alimentaires\/\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Safeguarding Healthcare Foodservice Data\" \/>\n<meta property=\"og:description\" content=\"Many common foodservice software tools contain patient information you need to protect from hackers Nearly 90 percent of healthcare providers have been hit by data breaches in the last two years, according to the Ponemon Institute, a security research firm based in Traverse City, Michigan.&nbsp; That\u2019s no surprise, given the extensive nature of electronic medical [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gfs.ca\/fr-ca\/ideas\/proteger-les-donnees-des-services-alimentaires\/\" \/>\n<meta property=\"og:site_name\" content=\"Gordon Food Service\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/GordonFoodService\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-12-27T16:12:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-31T13:39:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gfs.ca\/wp-content\/uploads\/2023\/01\/DataBreeches_IC_Header_2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"695\" \/>\n\t<meta property=\"og:image:height\" content=\"375\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cody Rivers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cody.rivers@gfs.com\" \/>\n<meta name=\"twitter:site\" content=\"@GFSDelivers\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cody Rivers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimation du temps de lecture\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Safeguarding Healthcare Foodservice Data | Gordon Food Service","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gfs.ca\/fr-ca\/ideas\/proteger-les-donnees-des-services-alimentaires\/","og_locale":"fr_CA","og_type":"article","og_title":"Safeguarding Healthcare Foodservice Data","og_description":"Many common foodservice software tools contain patient information you need to protect from hackers Nearly 90 percent of healthcare providers have been hit by data breaches in the last two years, according to the Ponemon Institute, a security research firm based in Traverse City, Michigan.&nbsp; That\u2019s no surprise, given the extensive nature of electronic medical [&hellip;]","og_url":"https:\/\/gfs.ca\/fr-ca\/ideas\/proteger-les-donnees-des-services-alimentaires\/","og_site_name":"Gordon Food Service","article_publisher":"https:\/\/www.facebook.com\/GordonFoodService\/","article_published_time":"2017-12-27T16:12:59+00:00","article_modified_time":"2023-01-31T13:39:55+00:00","og_image":[{"width":695,"height":375,"url":"https:\/\/gfs.ca\/wp-content\/uploads\/2023\/01\/DataBreeches_IC_Header_2.jpg","type":"image\/jpeg"}],"author":"Cody Rivers","twitter_card":"summary_large_image","twitter_creator":"@cody.rivers@gfs.com","twitter_site":"@GFSDelivers","twitter_misc":{"\u00c9crit par":"Cody Rivers","Estimation du temps de lecture":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gfs.ca\/fr-ca\/ideas\/proteger-les-donnees-des-services-alimentaires\/#article","isPartOf":{"@id":"https:\/\/gfs.ca\/fr-ca\/ideas\/proteger-les-donnees-des-services-alimentaires\/"},"author":{"name":"Cody Rivers","@id":"https:\/\/gfs.ca\/en-ca\/#\/schema\/person\/ac2dd585b10d08ce15daca230d897374"},"headline":"Safeguarding Healthcare Foodservice Data","datePublished":"2017-12-27T16:12:59+00:00","dateModified":"2023-01-31T13:39:55+00:00","mainEntityOfPage":{"@id":"https:\/\/gfs.ca\/fr-ca\/ideas\/proteger-les-donnees-des-services-alimentaires\/"},"wordCount":951,"publisher":{"@id":"https:\/\/gfs.ca\/en-ca\/#organization"},"image":{"@id":"https:\/\/gfs.ca\/fr-ca\/ideas\/proteger-les-donnees-des-services-alimentaires\/#primaryimage"},"thumbnailUrl":"https:\/\/gfs.ca\/wp-content\/uploads\/2023\/01\/DataBreeches_IC_Header_2.jpg","articleSection":["Running Your Business","Senior Living &amp; Healthcare"],"inLanguage":"fr-CA"},{"@type":["WebPage","CollectionPage"],"@id":"https:\/\/gfs.ca\/fr-ca\/ideas\/proteger-les-donnees-des-services-alimentaires\/","url":"https:\/\/gfs.ca\/fr-ca\/ideas\/proteger-les-donnees-des-services-alimentaires\/","name":"Safeguarding Healthcare Foodservice Data | Gordon Food Service","isPartOf":{"@id":"https:\/\/gfs.ca\/en-ca\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gfs.ca\/fr-ca\/ideas\/proteger-les-donnees-des-services-alimentaires\/#primaryimage"},"image":{"@id":"https:\/\/gfs.ca\/fr-ca\/ideas\/proteger-les-donnees-des-services-alimentaires\/#primaryimage"},"thumbnailUrl":"https:\/\/gfs.ca\/wp-content\/uploads\/2023\/01\/DataBreeches_IC_Header_2.jpg","datePublished":"2017-12-27T16:12:59+00:00","dateModified":"2023-01-31T13:39:55+00:00","breadcrumb":{"@id":"https:\/\/gfs.ca\/fr-ca\/ideas\/proteger-les-donnees-des-services-alimentaires\/#breadcrumb"},"inLanguage":"fr-CA"},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/gfs.ca\/fr-ca\/ideas\/proteger-les-donnees-des-services-alimentaires\/#primaryimage","url":"https:\/\/gfs.ca\/wp-content\/uploads\/2023\/01\/DataBreeches_IC_Header_2.jpg","contentUrl":"https:\/\/gfs.ca\/wp-content\/uploads\/2023\/01\/DataBreeches_IC_Header_2.jpg","width":695,"height":375},{"@type":"BreadcrumbList","@id":"https:\/\/gfs.ca\/fr-ca\/ideas\/proteger-les-donnees-des-services-alimentaires\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gfs.ca\/en-ca\/"},{"@type":"ListItem","position":2,"name":"Safeguarding Healthcare Foodservice Data"}]},{"@type":"WebSite","@id":"https:\/\/gfs.ca\/en-ca\/#website","url":"https:\/\/gfs.ca\/en-ca\/","name":"Service alimentaire Gordon","description":"","publisher":{"@id":"https:\/\/gfs.ca\/en-ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gfs.ca\/en-ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/gfs.ca\/en-ca\/#organization","name":"Service alimentaire Gordon","url":"https:\/\/gfs.ca\/en-ca\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/gfs.ca\/en-ca\/#\/schema\/logo\/image\/","url":"https:\/\/gfs.ca\/wp-content\/uploads\/2025\/11\/GFS-EN-Logo-og-image.png","contentUrl":"https:\/\/gfs.ca\/wp-content\/uploads\/2025\/11\/GFS-EN-Logo-og-image.png","width":1200,"height":630,"caption":"Gordon Food Service"},"image":{"@id":"https:\/\/gfs.ca\/en-ca\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/GordonFoodService\/","https:\/\/x.com\/GFSDelivers","https:\/\/www.instagram.com\/gordonfoodservice\/","https:\/\/www.linkedin.com\/company\/gordon-food-service\/"]},{"@type":"Person","@id":"https:\/\/gfs.ca\/en-ca\/#\/schema\/person\/ac2dd585b10d08ce15daca230d897374","name":"Cody Rivers","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/gfs.ca\/en-ca\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a9b81a7281ffd8fc2d52ce39faf1be6f131db67bdc3ed5914928324e202f21f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a9b81a7281ffd8fc2d52ce39faf1be6f131db67bdc3ed5914928324e202f21f7?s=96&d=mm&r=g","caption":"Cody Rivers"},"sameAs":["https:\/\/x.com\/cody.rivers@gfs.com"]}]}},"_links":{"self":[{"href":"https:\/\/gfs.ca\/fr-ca\/wp-json\/wp\/v2\/posts\/25885","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gfs.ca\/fr-ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gfs.ca\/fr-ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gfs.ca\/fr-ca\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/gfs.ca\/fr-ca\/wp-json\/wp\/v2\/comments?post=25885"}],"version-history":[{"count":0,"href":"https:\/\/gfs.ca\/fr-ca\/wp-json\/wp\/v2\/posts\/25885\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gfs.ca\/fr-ca\/wp-json\/wp\/v2\/media\/27036"}],"wp:attachment":[{"href":"https:\/\/gfs.ca\/fr-ca\/wp-json\/wp\/v2\/media?parent=25885"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gfs.ca\/fr-ca\/wp-json\/wp\/v2\/categories?post=25885"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gfs.ca\/fr-ca\/wp-json\/wp\/v2\/tags?post=25885"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}