{"version":"1.0","provider_name":"Numeum","provider_url":"https:\/\/numeum.fr\/en\/","author_name":"scratch","author_url":"https:\/\/numeum.fr\/en\/author\/hunault1-2\/","title":"Attacks on information systems: What case law teaches us - Numeum","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"9boayiV2zc\"><a href=\"https:\/\/numeum.fr\/en\/breaches-of-information-systems-what-jurisprudence-we-know\/\">Attacks on information systems: What case law teaches us<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/numeum.fr\/en\/breaches-of-information-systems-what-jurisprudence-we-know\/embed\/#?secret=9boayiV2zc\" width=\"600\" height=\"338\" title=\"&#8220;Attacks on information systems: What case law teaches us&#8221; &#8212; Numeum\" data-secret=\"9boayiV2zc\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/numeum.fr\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Attacks on information systems (IS) represent a major risk for companies and their customers. How does case law apply to breaches of automated data processing systems (ADPS), and what are the real legal consequences? During this conference, we will discuss : Penalties applied in the event of fraudulent access to or maintenance of a STAD &hellip; Continued"}