{"id":895,"date":"2024-12-23T16:10:07","date_gmt":"2024-12-23T15:10:07","guid":{"rendered":"https:\/\/staging.threatproof.com\/duree-dutilisation\/"},"modified":"2025-01-27T16:32:30","modified_gmt":"2025-01-27T15:32:30","slug":"duree-dutilisation","status":"publish","type":"page","link":"https:\/\/staging.threatproof.com\/fr\/duree-dutilisation\/","title":{"rendered":"Conditions d&rsquo;utilisation"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>1. Acceptation des conditions<\/strong><br>En acc\u00e9dant au site web de Threatproof et en l\u2019utilisant, vous acceptez d\u2019\u00eatre li\u00e9 par ces conditions d\u2019utilisation. Si vous n\u2019\u00eates pas d\u2019accord avec une partie de ces conditions, veuillez ne pas utiliser le site web.<\/p>\n\n\n\n<p><strong>2. Utilisation du contenu<\/strong><br>Tout le contenu pr\u00e9sent sur le site web de Threatproof, y compris les textes, images, vid\u00e9os et fichiers t\u00e9l\u00e9chargeables, est fourni \u00e0 titre informatif uniquement.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Vous ne pouvez pas modifier, reproduire, distribuer ou exploiter tout contenu sans l&rsquo;autorisation explicite de Threatproof.<\/li>\n<\/ul>\n\n\n\n<p><strong>3. Utilisation des informations<\/strong><br>Vous vous engagez \u00e0 ne pas participer \u00e0 des activit\u00e9s qui :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Violent les lois ou r\u00e9glementations en vigueur.<\/li>\n\n\n\n<li>Nuisent, menacent ou harc\u00e8lent d&rsquo;autres utilisateurs.<\/li>\n\n\n\n<li>Tentent d&rsquo;obtenir un acc\u00e8s non autoris\u00e9 au site ou \u00e0 ses syst\u00e8mes.<\/li>\n\n\n\n<li>Perturbent ou interf\u00e8rent avec le fonctionnement du site web.<\/li>\n<\/ul>\n\n\n\n<p><strong>4. Confidentialit\u00e9 et protection des donn\u00e9es<\/strong><br>Threatproof respecte votre vie priv\u00e9e. Veuillez consulter notre Politique de confidentialit\u00e9 distincte pour obtenir des d\u00e9tails sur la mani\u00e8re dont nous collectons, utilisons et prot\u00e9geons vos informations personnelles.<\/p>\n\n\n\n<p><strong>5. D\u00e9claration de non-responsabilit\u00e9<\/strong><br>Le contenu du site web de Threatproof est fourni \u00ab\u00a0tel quel\u00a0\u00bb, sans aucune garantie ou assurance. Nous ne garantissons pas l&rsquo;exactitude, l&rsquo;exhaustivit\u00e9 ou la fiabilit\u00e9 des informations.<\/p>\n\n\n\n<p><strong>6. Limitation de responsabilit\u00e9<\/strong><br>Threatproof ne peut \u00eatre tenu responsable des dommages directs, indirects, accessoires ou cons\u00e9cutifs r\u00e9sultant de votre utilisation du site web ou de votre confiance dans son contenu.<\/p>\n\n\n\n<p><strong>7. Droits de propri\u00e9t\u00e9 intellectuelle<\/strong><br>Tous les droits de propri\u00e9t\u00e9 intellectuelle li\u00e9s au site web et \u00e0 son contenu sont la propri\u00e9t\u00e9 de Threatproof ou de ses conc\u00e9dants de licence.<\/p>\n\n\n\n<p><strong>8. Modifications des conditions<\/strong><br>Threatproof se r\u00e9serve le droit de modifier ces conditions d&rsquo;utilisation \u00e0 tout moment. Les conditions mises \u00e0 jour seront publi\u00e9es sur le site web.<\/p>\n\n\n\n<p><strong>9. Loi applicable<\/strong><br>Ces conditions d&rsquo;utilisation sont r\u00e9gies par la loi anglaise.<\/p>\n\n\n\n<p><strong>10. Contactez-nous<\/strong><br>Si vous avez des questions ou des pr\u00e9occupations concernant nos conditions d&rsquo;utilisation, veuillez nous contacter \u00e0 l&rsquo;adresse <a>info@threatproof.com<\/a>.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>1. Acceptation des conditionsEn acc\u00e9dant au site web de Threatproof et en l\u2019utilisant, vous acceptez d\u2019\u00eatre li\u00e9 par ces conditions d\u2019utilisation. Si vous n\u2019\u00eates pas d\u2019accord avec une partie de ces conditions, veuillez ne pas utiliser le site web. 2. Utilisation du contenuTout le contenu pr\u00e9sent sur le site web de Threatproof, y compris les [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"class_list":["post-895","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Conditions d&#039;utilisation - Threatproof<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/staging.threatproof.com\/fr\/duree-dutilisation\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Conditions d&#039;utilisation - Threatproof\" \/>\n<meta property=\"og:description\" content=\"1. Acceptation des conditionsEn acc\u00e9dant au site web de Threatproof et en l\u2019utilisant, vous acceptez d\u2019\u00eatre li\u00e9 par ces conditions d\u2019utilisation. Si vous n\u2019\u00eates pas d\u2019accord avec une partie de ces conditions, veuillez ne pas utiliser le site web. 2. Utilisation du contenuTout le contenu pr\u00e9sent sur le site web de Threatproof, y compris les [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/staging.threatproof.com\/fr\/duree-dutilisation\/\" \/>\n<meta property=\"og:site_name\" content=\"Threatproof\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-27T15:32:30+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/staging.threatproof.com\\\/fr\\\/duree-dutilisation\\\/\",\"url\":\"https:\\\/\\\/staging.threatproof.com\\\/fr\\\/duree-dutilisation\\\/\",\"name\":\"Conditions d'utilisation - Threatproof\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/staging.threatproof.com\\\/fr\\\/#website\"},\"datePublished\":\"2024-12-23T15:10:07+00:00\",\"dateModified\":\"2025-01-27T15:32:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/staging.threatproof.com\\\/fr\\\/duree-dutilisation\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/staging.threatproof.com\\\/fr\\\/duree-dutilisation\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/staging.threatproof.com\\\/fr\\\/duree-dutilisation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/staging.threatproof.com\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Conditions d&rsquo;utilisation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/staging.threatproof.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/staging.threatproof.com\\\/fr\\\/\",\"name\":\"Threatproof\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/staging.threatproof.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Conditions d'utilisation - Threatproof","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/staging.threatproof.com\/fr\/duree-dutilisation\/","og_locale":"fr_FR","og_type":"article","og_title":"Conditions d'utilisation - Threatproof","og_description":"1. Acceptation des conditionsEn acc\u00e9dant au site web de Threatproof et en l\u2019utilisant, vous acceptez d\u2019\u00eatre li\u00e9 par ces conditions d\u2019utilisation. Si vous n\u2019\u00eates pas d\u2019accord avec une partie de ces conditions, veuillez ne pas utiliser le site web. 2. Utilisation du contenuTout le contenu pr\u00e9sent sur le site web de Threatproof, y compris les [&hellip;]","og_url":"https:\/\/staging.threatproof.com\/fr\/duree-dutilisation\/","og_site_name":"Threatproof","article_modified_time":"2025-01-27T15:32:30+00:00","twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/staging.threatproof.com\/fr\/duree-dutilisation\/","url":"https:\/\/staging.threatproof.com\/fr\/duree-dutilisation\/","name":"Conditions d'utilisation - Threatproof","isPartOf":{"@id":"https:\/\/staging.threatproof.com\/fr\/#website"},"datePublished":"2024-12-23T15:10:07+00:00","dateModified":"2025-01-27T15:32:30+00:00","breadcrumb":{"@id":"https:\/\/staging.threatproof.com\/fr\/duree-dutilisation\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/staging.threatproof.com\/fr\/duree-dutilisation\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/staging.threatproof.com\/fr\/duree-dutilisation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/staging.threatproof.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Conditions d&rsquo;utilisation"}]},{"@type":"WebSite","@id":"https:\/\/staging.threatproof.com\/fr\/#website","url":"https:\/\/staging.threatproof.com\/fr\/","name":"Threatproof","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/staging.threatproof.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/staging.threatproof.com\/fr\/wp-json\/wp\/v2\/pages\/895","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/staging.threatproof.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/staging.threatproof.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/staging.threatproof.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/staging.threatproof.com\/fr\/wp-json\/wp\/v2\/comments?post=895"}],"version-history":[{"count":7,"href":"https:\/\/staging.threatproof.com\/fr\/wp-json\/wp\/v2\/pages\/895\/revisions"}],"predecessor-version":[{"id":1316,"href":"https:\/\/staging.threatproof.com\/fr\/wp-json\/wp\/v2\/pages\/895\/revisions\/1316"}],"wp:attachment":[{"href":"https:\/\/staging.threatproof.com\/fr\/wp-json\/wp\/v2\/media?parent=895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}