{"id":72,"date":"2023-10-30T08:52:06","date_gmt":"2023-10-30T08:52:06","guid":{"rendered":"http:\/\/ebc.paulainc.ca\/?page_id=72"},"modified":"2024-06-19T16:03:23","modified_gmt":"2024-06-19T16:03:23","slug":"compliance-security","status":"publish","type":"page","link":"https:\/\/ebc.paulainc.ca\/fr\/a-propos-de\/conformite-securite\/","title":{"rendered":"Conformit\u00e9 et s\u00e9curit\u00e9"},"content":{"rendered":"<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile media-max-505\"><div class=\"wp-block-media-text__content\">\n<h2 class=\"wp-block-heading\" style=\"font-size:35px\">La plateforme propri\u00e9taire d\u2019EBC repose essentiellement sur la v\u00e9rification de la conformit\u00e9.<\/h2>\n\n\n\n<p class=\"mb-0\">Les programmes d\u2019EBC mettent \u00e0 profit de nouvelles technologies et de nouveaux partenaires pour assurer la s\u00e9curit\u00e9 de la Banque et de ses clients.<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1012\" height=\"346\" src=\"http:\/\/ebc.paulainc.ca\/wp-content\/uploads\/2023\/11\/logo-compliance@2x.png\" alt=\"\" class=\"wp-image-939 size-full\" srcset=\"https:\/\/ebc.paulainc.ca\/wp-content\/uploads\/2023\/11\/logo-compliance@2x.png 1012w, https:\/\/ebc.paulainc.ca\/wp-content\/uploads\/2023\/11\/logo-compliance@2x-300x103.png 300w, https:\/\/ebc.paulainc.ca\/wp-content\/uploads\/2023\/11\/logo-compliance@2x-768x263.png 768w\" sizes=\"auto, (max-width: 1012px) 100vw, 1012px\" \/><\/figure><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer md-none\"><\/div>\n\n\n\n<div class=\"wp-block-group pt-0 pb-0 has-white-background-color has-background\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile media-more\"><div class=\"wp-block-media-text__content\">\n<h3 class=\"wp-block-heading\">Cadre de r\u00e9glementation efficace<\/h3>\n\n\n\n<p class=\"mb-5\">Le programme de lutte contre le blanchiment d\u2019argent d\u2019EBC a des effets dissuasifs, d\u00e9tecte et signale les activit\u00e9s dont on soup\u00e7onne qu\u2019elles dissimulent le blanchiment d\u2019argent et le financement d\u2019activit\u00e9s terroristes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Logiciel exclusif \u00e0 EBC<\/h3>\n\n\n\n<p class=\"mb-5\">Le logiciel exclusif d\u2019EBC est essentiel pour faciliter les pratiques exemplaires en mati\u00e8re de connaissance du client, de diligence raisonnable et prudente et de processus de surveillance efficace des transactions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Gouvernance sans faille<\/h3>\n\n\n\n<p>Le conseil d\u2019administration d\u2019EBC supervise ses programmes de conformit\u00e9 r\u00e9glementaire et de gestion des risques et veille \u00e0 ce que son cadre de contr\u00f4le interne soit efficace \u00e0 l\u2019\u00e9chelle de l\u2019entreprise.<\/p>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"http:\/\/ebc.paulainc.ca\/wp-content\/uploads\/2024\/01\/Image20231212160013-1-1024x576.jpg\" alt=\"\" class=\"wp-image-1652 size-full\" srcset=\"https:\/\/ebc.paulainc.ca\/wp-content\/uploads\/2024\/01\/Image20231212160013-1-1024x576.jpg 1024w, https:\/\/ebc.paulainc.ca\/wp-content\/uploads\/2024\/01\/Image20231212160013-1-300x169.jpg 300w, https:\/\/ebc.paulainc.ca\/wp-content\/uploads\/2024\/01\/Image20231212160013-1-768x432.jpg 768w, https:\/\/ebc.paulainc.ca\/wp-content\/uploads\/2024\/01\/Image20231212160013-1-1536x864.jpg 1536w, https:\/\/ebc.paulainc.ca\/wp-content\/uploads\/2024\/01\/Image20231212160013-1-2048x1152.jpg 2048w, https:\/\/ebc.paulainc.ca\/wp-content\/uploads\/2024\/01\/Image20231212160013-1-18x10.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:60px\" aria-hidden=\"true\" class=\"wp-block-spacer md-none\"><\/div>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<h2 class=\"wp-block-heading title-section\">Les r\u00e9f\u00e9rences de confiance<\/h2>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-4 credentials maxw-1097 mx-auto wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.dev-54ta5gq-tltbk66ludseo.ca-1.platformsh.site\/wp-content\/uploads\/2023\/11\/Frame-Clip-Content.png\" alt=\"\"\/><figcaption class=\"wp-element-caption\">SOC 2 Type II<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.dev-54ta5gq-tltbk66ludseo.ca-1.platformsh.site\/wp-content\/uploads\/2023\/11\/Logo_2_desk_version_size-1.png\" alt=\"\"\/><figcaption class=\"wp-element-caption\">Loi californienne sur la protection de la vie priv\u00e9e des consommateurs (CCPA)<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.dev-54ta5gq-tltbk66ludseo.ca-1.platformsh.site\/wp-content\/uploads\/2023\/11\/GDPR-e1672263252689-1.png\" alt=\"\"\/><figcaption class=\"wp-element-caption\">R\u00e8glement g\u00e9n\u00e9ral sur la protection des donn\u00e9es<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.dev-54ta5gq-tltbk66ludseo.ca-1.platformsh.site\/wp-content\/uploads\/2023\/11\/Logo-GLBA-lg-1.png\" alt=\"\"\/><figcaption class=\"wp-element-caption\">Loi Gramm-Leach-Bliley (GLBA)<\/figcaption><\/figure>\n<\/figure>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-cover\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-0 has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"1217\" height=\"655\" class=\"wp-block-cover__image-background wp-image-982\" alt=\"\" src=\"http:\/\/ebc.paulainc.ca\/wp-content\/uploads\/2023\/11\/low-angle-shot-texas-capitol-building-blue-beautiful-sky-austin-city-texas-1-1.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/ebc.paulainc.ca\/wp-content\/uploads\/2023\/11\/low-angle-shot-texas-capitol-building-blue-beautiful-sky-austin-city-texas-1-1.jpg 1217w, https:\/\/ebc.paulainc.ca\/wp-content\/uploads\/2023\/11\/low-angle-shot-texas-capitol-building-blue-beautiful-sky-austin-city-texas-1-1-300x161.jpg 300w, https:\/\/ebc.paulainc.ca\/wp-content\/uploads\/2023\/11\/low-angle-shot-texas-capitol-building-blue-beautiful-sky-austin-city-texas-1-1-1024x551.jpg 1024w, https:\/\/ebc.paulainc.ca\/wp-content\/uploads\/2023\/11\/low-angle-shot-texas-capitol-building-blue-beautiful-sky-austin-city-texas-1-1-768x413.jpg 768w\" sizes=\"auto, (max-width: 1217px) 100vw, 1217px\" \/><div class=\"wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained\">\n<h2 class=\"wp-block-heading has-text-align-left title-section title-light\">S\u00e9curisation d\u00e8s la conception<\/h2>\n\n\n  <div id=\"vtabs-block_2d08a3f8d2554f07564dd5141262db70\" class=\"vtabs d-flex\">\n\n      <ul class=\"vtabs-name\">\n                  <li data-tab=\"tab-1\">Gestion des menaces<\/li>\n                  <li data-tab=\"tab-2\">S\u00e9curit\u00e9 des donn\u00e9es<\/li>\n                  <li data-tab=\"tab-3\">S\u00e9curit\u00e9 des produits<\/li>\n                  <li data-tab=\"tab-4\">Vie priv\u00e9e<\/li>\n              <\/ul>\n\n      <div class=\"vtabs-content\">\n                  <div id=\"tab-1\" class=\"vtab d-none\">\n          <div class=\"init-content\"><p><strong><span style=\"color: #faa519;\">Test de p\u00e9n\u00e9tration<br \/>\n<\/span><\/strong>Une entreprise ind\u00e9pendante sp\u00e9cialis\u00e9e en tests de p\u00e9n\u00e9tration est engag\u00e9e chaque ann\u00e9e pour \u00e9valuer la s\u00e9curit\u00e9 de nos r\u00e9seaux, de nos applications Web et de notre suite d\u2019API.<\/p>\n<p><span style=\"color: #faa519;\"><strong>Analyse des vuln\u00e9rabilit\u00e9s<br \/>\n<\/strong><\/span>Nous balayons et corrigeons r\u00e9guli\u00e8rement les vuln\u00e9rabilit\u00e9s afin de limiter le risque associ\u00e9 aux vecteurs d\u2019attaque.<\/p>\n<p><span style=\"color: #faa519;\"><strong>Logiciel de d\u00e9tection et r\u00e9ponse des terminaux (EDR)<br \/>\n<\/strong><\/span>Chaque poste de travail est s\u00e9curis\u00e9 par un logiciel EDR de haut niveau surveill\u00e9 par notre \u00e9quipe de la s\u00e9curit\u00e9 de l\u2019information et un groupe de recherche de menaces actives.<\/p>\n<\/div>\n          <\/div>\n                  <div id=\"tab-2\" class=\"vtab d-none\">\n          <div class=\"init-content\"><p><span style=\"color: #faa519;\"><strong>Donn\u00e9es chiffr\u00e9es au repos<br \/>\n<\/strong><\/span>EBC utilise le chiffrement des cha\u00eenes pour prot\u00e9ger vos donn\u00e9es, m\u00eame lorsqu\u2019elles sont au repos. Cela comprend les donn\u00e9es de production et les sauvegardes.<\/p>\n<p><span style=\"color: #faa519;\"><strong>Donn\u00e9es chiffr\u00e9es en transit<br \/>\n<\/strong><\/span>Nous utilisons des algorithmes cryptographiques modernes et non d\u00e9pr\u00e9ci\u00e9s pour s\u00e9curiser les donn\u00e9es en mouvement.<\/p>\n<\/div>\n          <\/div>\n                  <div id=\"tab-3\" class=\"vtab d-none\">\n          <div class=\"init-content\"><p><span style=\"color: #faa519;\"><strong>Authentification multifactorielle (AMF)<br \/>\n<\/strong><\/span>Nous utilisons l\u2019AMF \u00e0 tous les points d\u2019entr\u00e9e de nos syst\u00e8mes critiques. Les politiques d\u2019acc\u00e8s conditionnel sont appliqu\u00e9es pour s\u2019assurer que les connexions r\u00e9ussies proviennent uniquement d\u2019appareils et d\u2019emplacements approuv\u00e9s.<\/p>\n<p><span style=\"color: #faa519;\"><strong>Authentification unique (SSO)<br \/>\n<\/strong><\/span>Nous utilisons l\u2019authentification unique \u00e0 l\u2019interne pour contr\u00f4ler la gestion des identit\u00e9s et des acc\u00e8s. <span style=\"font-weight: 400;\">Les clients d\u2019EBC peuvent \u00e9galement activer l\u2019authentification unique dans nos environnements EBC \u00e0 l\u2019aide du protocole SAML.<\/span><\/p>\n<p><span style=\"color: #faa519;\"><strong><b>Contr\u00f4le d\u2019acc\u00e8s bas\u00e9 sur les r\u00f4les (RBAC)<br \/>\n<\/b><\/strong><\/span><span style=\"font-weight: 400;\">Le RBAC granulaire est grav\u00e9 dans nos syst\u00e8mes pour s\u2019assurer que les utilisateurs et les administrateurs fonctionnent selon le principe du droit d\u2019acc\u00e8s minimal. <\/span><\/p>\n<p><span style=\"color: #faa519;\"><strong><b>Journaux d\u2019audit<br \/>\n<\/b><\/strong><\/span><span style=\"font-weight: 400;\">Nous tenons des journaux d\u2019audit d\u00e9taill\u00e9s pour vous fournir des renseignements lorsque vous en avez besoin.<\/span><\/p>\n<p><span style=\"color: #faa519;\"><strong><b>Contr\u00f4le d\u2019acc\u00e8s bas\u00e9 sur IP<br \/>\n<\/b><\/strong><\/span><span style=\"font-weight: 400;\">L\u2019acc\u00e8s aux plateformes d\u2019EBC est limit\u00e9 aux IP autoris\u00e9es afin de restreindre davantage l\u2019acc\u00e8s aux donn\u00e9es sensibles de nos clients.<\/span><\/p>\n<p><span style=\"color: #faa519;\"><strong><b>S\u00e9gr\u00e9gation de la production<br \/>\n<\/b><\/strong><\/span><span style=\"font-weight: 400;\">L\u2019environnement de production est s\u00e9par\u00e9 des environnements d\u2019essai et de d\u00e9veloppement.<\/span><\/p>\n<\/div>\n          <\/div>\n                  <div id=\"tab-4\" class=\"vtab d-none\">\n          <div class=\"init-content\"><p><span style=\"color: #faa519;\"><strong>Politique de la protection de la vie priv\u00e9e<br \/>\n<\/strong><\/span>Nous prenons la vie priv\u00e9e au s\u00e9rieux. Consultez notre politique de la protection de la vie priv\u00e9e pour mieux comprendre comment nos processus font valoir vos droits.<\/p>\n<p><span style=\"color: #faa519;\"><strong>Politique de conservation des donn\u00e9es<br \/>\n<\/strong><\/span>Les donn\u00e9es sont conserv\u00e9es pendant la dur\u00e9e minimale requise par les exigences r\u00e9glementaires et contractuelles.<\/p>\n<p><span style=\"color: #faa519;\"><strong>Addenda relatif au traitement des donn\u00e9es<br \/>\n<\/strong><\/span>Les donn\u00e9es de nos syst\u00e8mes sont prot\u00e9g\u00e9es par des contr\u00f4les de s\u00e9curit\u00e9 et de protection des renseignements personnels rigoureux. Vous pouvez demander notre accord de traitement des donn\u00e9es pour examen.<\/p>\n<\/div>\n          <\/div>\n        \n      <\/div>\n\n      <div class=\"mob-vtabs-content d-none\">\n                <div class=\"mob-vtab-content\">\n          <div class=\"vtab-title\"><h3 class=\"mb-0\">Gestion des menaces<\/h3><\/div>\n          <div id=\"tab-1\" class=\"vtab pb-1\">\n           <p><strong><span style=\"color: #faa519;\">Test de p\u00e9n\u00e9tration<br \/>\n<\/span><\/strong>Une entreprise ind\u00e9pendante sp\u00e9cialis\u00e9e en tests de p\u00e9n\u00e9tration est engag\u00e9e chaque ann\u00e9e pour \u00e9valuer la s\u00e9curit\u00e9 de nos r\u00e9seaux, de nos applications Web et de notre suite d\u2019API.<\/p>\n<p><span style=\"color: #faa519;\"><strong>Analyse des vuln\u00e9rabilit\u00e9s<br \/>\n<\/strong><\/span>Nous balayons et corrigeons r\u00e9guli\u00e8rement les vuln\u00e9rabilit\u00e9s afin de limiter le risque associ\u00e9 aux vecteurs d\u2019attaque.<\/p>\n<p><span style=\"color: #faa519;\"><strong>Logiciel de d\u00e9tection et r\u00e9ponse des terminaux (EDR)<br \/>\n<\/strong><\/span>Chaque poste de travail est s\u00e9curis\u00e9 par un logiciel EDR de haut niveau surveill\u00e9 par notre \u00e9quipe de la s\u00e9curit\u00e9 de l\u2019information et un groupe de recherche de menaces actives.<\/p>\n          <\/div>\n        <\/div>\n                <div class=\"mob-vtab-content\">\n          <div class=\"vtab-title\"><h3 class=\"mb-0\">S\u00e9curit\u00e9 des donn\u00e9es<\/h3><\/div>\n          <div id=\"tab-2\" class=\"vtab pb-1\">\n           <p><span style=\"color: #faa519;\"><strong>Donn\u00e9es chiffr\u00e9es au repos<br \/>\n<\/strong><\/span>EBC utilise le chiffrement des cha\u00eenes pour prot\u00e9ger vos donn\u00e9es, m\u00eame lorsqu\u2019elles sont au repos. Cela comprend les donn\u00e9es de production et les sauvegardes.<\/p>\n<p><span style=\"color: #faa519;\"><strong>Donn\u00e9es chiffr\u00e9es en transit<br \/>\n<\/strong><\/span>Nous utilisons des algorithmes cryptographiques modernes et non d\u00e9pr\u00e9ci\u00e9s pour s\u00e9curiser les donn\u00e9es en mouvement.<\/p>\n          <\/div>\n        <\/div>\n                <div class=\"mob-vtab-content\">\n          <div class=\"vtab-title\"><h3 class=\"mb-0\">S\u00e9curit\u00e9 des produits<\/h3><\/div>\n          <div id=\"tab-3\" class=\"vtab pb-1\">\n           <p><span style=\"color: #faa519;\"><strong>Authentification multifactorielle (AMF)<br \/>\n<\/strong><\/span>Nous utilisons l\u2019AMF \u00e0 tous les points d\u2019entr\u00e9e de nos syst\u00e8mes critiques. Les politiques d\u2019acc\u00e8s conditionnel sont appliqu\u00e9es pour s\u2019assurer que les connexions r\u00e9ussies proviennent uniquement d\u2019appareils et d\u2019emplacements approuv\u00e9s.<\/p>\n<p><span style=\"color: #faa519;\"><strong>Authentification unique (SSO)<br \/>\n<\/strong><\/span>Nous utilisons l\u2019authentification unique \u00e0 l\u2019interne pour contr\u00f4ler la gestion des identit\u00e9s et des acc\u00e8s. <span style=\"font-weight: 400;\">Les clients d\u2019EBC peuvent \u00e9galement activer l\u2019authentification unique dans nos environnements EBC \u00e0 l\u2019aide du protocole SAML.<\/span><\/p>\n<p><span style=\"color: #faa519;\"><strong><b>Contr\u00f4le d\u2019acc\u00e8s bas\u00e9 sur les r\u00f4les (RBAC)<br \/>\n<\/b><\/strong><\/span><span style=\"font-weight: 400;\">Le RBAC granulaire est grav\u00e9 dans nos syst\u00e8mes pour s\u2019assurer que les utilisateurs et les administrateurs fonctionnent selon le principe du droit d\u2019acc\u00e8s minimal. <\/span><\/p>\n<p><span style=\"color: #faa519;\"><strong><b>Journaux d\u2019audit<br \/>\n<\/b><\/strong><\/span><span style=\"font-weight: 400;\">Nous tenons des journaux d\u2019audit d\u00e9taill\u00e9s pour vous fournir des renseignements lorsque vous en avez besoin.<\/span><\/p>\n<p><span style=\"color: #faa519;\"><strong><b>Contr\u00f4le d\u2019acc\u00e8s bas\u00e9 sur IP<br \/>\n<\/b><\/strong><\/span><span style=\"font-weight: 400;\">L\u2019acc\u00e8s aux plateformes d\u2019EBC est limit\u00e9 aux IP autoris\u00e9es afin de restreindre davantage l\u2019acc\u00e8s aux donn\u00e9es sensibles de nos clients.<\/span><\/p>\n<p><span style=\"color: #faa519;\"><strong><b>S\u00e9gr\u00e9gation de la production<br \/>\n<\/b><\/strong><\/span><span style=\"font-weight: 400;\">L\u2019environnement de production est s\u00e9par\u00e9 des environnements d\u2019essai et de d\u00e9veloppement.<\/span><\/p>\n          <\/div>\n        <\/div>\n                <div class=\"mob-vtab-content\">\n          <div class=\"vtab-title\"><h3 class=\"mb-0\">Vie priv\u00e9e<\/h3><\/div>\n          <div id=\"tab-4\" class=\"vtab pb-1\">\n           <p><span style=\"color: #faa519;\"><strong>Politique de la protection de la vie priv\u00e9e<br \/>\n<\/strong><\/span>Nous prenons la vie priv\u00e9e au s\u00e9rieux. Consultez notre politique de la protection de la vie priv\u00e9e pour mieux comprendre comment nos processus font valoir vos droits.<\/p>\n<p><span style=\"color: #faa519;\"><strong>Politique de conservation des donn\u00e9es<br \/>\n<\/strong><\/span>Les donn\u00e9es sont conserv\u00e9es pendant la dur\u00e9e minimale requise par les exigences r\u00e9glementaires et contractuelles.<\/p>\n<p><span style=\"color: #faa519;\"><strong>Addenda relatif au traitement des donn\u00e9es<br \/>\n<\/strong><\/span>Les donn\u00e9es de nos syst\u00e8mes sont prot\u00e9g\u00e9es par des contr\u00f4les de s\u00e9curit\u00e9 et de protection des renseignements personnels rigoureux. Vous pouvez demander notre accord de traitement des donn\u00e9es pour examen.<\/p>\n          <\/div>\n        <\/div>\n        \n      <\/div>\n  <\/div>\n\n<\/div><\/div>\n\n\n\n<div style=\"height:90px\" aria-hidden=\"true\" class=\"wp-block-spacer md-none\"><\/div>\n\n\n\n<div class=\"wp-block-group contact-us pt-0 pb-0\"><div class=\"wp-block-group__inner-container is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-media-text has-media-on-the-right is-stacked-on-mobile\"><div class=\"wp-block-media-text__content\">\n<h2 class=\"wp-block-heading\">Des questions ?<\/h2>\n\n\n\n<p>Nous sommes heureux de r\u00e9pondre \u00e0 toutes vos questions de s\u00e9curit\u00e9.<\/p>\n\n\n\n<div class=\"wp-block-buttons mt-4 is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"\/fr\/nous-contacter\/\">Nous contacter<\/a><\/div>\n<\/div>\n<\/div><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"552\" height=\"466\" src=\"http:\/\/ebc.paulainc.ca\/wp-content\/uploads\/2023\/12\/attachment.png\" alt=\"\" class=\"wp-image-1201 size-full\" srcset=\"https:\/\/ebc.paulainc.ca\/wp-content\/uploads\/2023\/12\/attachment.png 552w, https:\/\/ebc.paulainc.ca\/wp-content\/uploads\/2023\/12\/attachment-300x253.png 300w\" sizes=\"auto, (max-width: 552px) 100vw, 552px\" \/><\/figure><\/div>\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>EBC\u2019s proprietary platform is built with compliance verification at its core. Leveraging new technologies and partners to keep the Bank and our customers safe. Effective Regulatory Framework EBC\u2019s Anti-Money Laundering (AML) program deters, detects, and reports suspected money laundering and terrorist financing activity. Proprietary Software EBC\u2019s proprietary software is core to facilitating &#8220;Know Your Customer&#8221; [&hellip;]<\/p>","protected":false},"author":2,"featured_media":1650,"parent":68,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-72","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Compliance &amp; Security - EBC<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Compliance &amp; Security - EBC\" \/>\n<meta property=\"og:description\" content=\"EBC\u2019s proprietary platform is built with compliance verification at its core. Leveraging new technologies and partners to keep the Bank and our customers safe. Effective Regulatory Framework EBC\u2019s Anti-Money Laundering (AML) program deters, detects, and reports suspected money laundering and terrorist financing activity. Proprietary Software EBC\u2019s proprietary software is core to facilitating &#8220;Know Your Customer&#8221; [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ebc.paulainc.ca\/fr\/a-propos-de\/conformite-securite\/\" \/>\n<meta property=\"og:site_name\" content=\"EBC\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-19T16:03:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ebc.paulainc.ca\/wp-content\/uploads\/2021\/08\/Insights-cover-image-1-1024x731.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"731\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ebc.paulainc.ca\/fr\/a-propos-de\/conformite-securite\/\",\"url\":\"https:\/\/ebc.paulainc.ca\/fr\/a-propos-de\/conformite-securite\/\",\"name\":\"Compliance &amp; Security - EBC\",\"isPartOf\":{\"@id\":\"https:\/\/ebc.paulainc.ca\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ebc.paulainc.ca\/fr\/a-propos-de\/conformite-securite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ebc.paulainc.ca\/fr\/a-propos-de\/conformite-securite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ebc.paulainc.ca\/wp-content\/uploads\/2024\/01\/boveda-banco-representacion-3d-abierta-cajas-deposito-interior-web.png\",\"datePublished\":\"2023-10-30T08:52:06+00:00\",\"dateModified\":\"2024-06-19T16:03:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ebc.paulainc.ca\/fr\/a-propos-de\/conformite-securite\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ebc.paulainc.ca\/fr\/a-propos-de\/conformite-securite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\/\/ebc.paulainc.ca\/fr\/a-propos-de\/conformite-securite\/#primaryimage\",\"url\":\"https:\/\/ebc.paulainc.ca\/wp-content\/uploads\/2024\/01\/boveda-banco-representacion-3d-abierta-cajas-deposito-interior-web.png\",\"contentUrl\":\"https:\/\/ebc.paulainc.ca\/wp-content\/uploads\/2024\/01\/boveda-banco-representacion-3d-abierta-cajas-deposito-interior-web.png\",\"width\":1744,\"height\":912},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ebc.paulainc.ca\/fr\/a-propos-de\/conformite-securite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ebc.paulainc.ca\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Who We Are\",\"item\":\"https:\/\/ebc.paulainc.ca\/en\/about\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Compliance &amp; Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ebc.paulainc.ca\/en\/#website\",\"url\":\"https:\/\/ebc.paulainc.ca\/en\/\",\"name\":\"EBC\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ebc.paulainc.ca\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Compliance &amp; Security - EBC","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_CA","og_type":"article","og_title":"Compliance &amp; Security - EBC","og_description":"EBC\u2019s proprietary platform is built with compliance verification at its core. Leveraging new technologies and partners to keep the Bank and our customers safe. Effective Regulatory Framework EBC\u2019s Anti-Money Laundering (AML) program deters, detects, and reports suspected money laundering and terrorist financing activity. Proprietary Software EBC\u2019s proprietary software is core to facilitating &#8220;Know Your Customer&#8221; [&hellip;]","og_url":"https:\/\/ebc.paulainc.ca\/fr\/a-propos-de\/conformite-securite\/","og_site_name":"EBC","article_modified_time":"2024-06-19T16:03:23+00:00","og_image":[{"width":1024,"height":731,"url":"https:\/\/ebc.paulainc.ca\/wp-content\/uploads\/2021\/08\/Insights-cover-image-1-1024x731.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ebc.paulainc.ca\/fr\/a-propos-de\/conformite-securite\/","url":"https:\/\/ebc.paulainc.ca\/fr\/a-propos-de\/conformite-securite\/","name":"Compliance &amp; Security - EBC","isPartOf":{"@id":"https:\/\/ebc.paulainc.ca\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ebc.paulainc.ca\/fr\/a-propos-de\/conformite-securite\/#primaryimage"},"image":{"@id":"https:\/\/ebc.paulainc.ca\/fr\/a-propos-de\/conformite-securite\/#primaryimage"},"thumbnailUrl":"https:\/\/ebc.paulainc.ca\/wp-content\/uploads\/2024\/01\/boveda-banco-representacion-3d-abierta-cajas-deposito-interior-web.png","datePublished":"2023-10-30T08:52:06+00:00","dateModified":"2024-06-19T16:03:23+00:00","breadcrumb":{"@id":"https:\/\/ebc.paulainc.ca\/fr\/a-propos-de\/conformite-securite\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ebc.paulainc.ca\/fr\/a-propos-de\/conformite-securite\/"]}]},{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/ebc.paulainc.ca\/fr\/a-propos-de\/conformite-securite\/#primaryimage","url":"https:\/\/ebc.paulainc.ca\/wp-content\/uploads\/2024\/01\/boveda-banco-representacion-3d-abierta-cajas-deposito-interior-web.png","contentUrl":"https:\/\/ebc.paulainc.ca\/wp-content\/uploads\/2024\/01\/boveda-banco-representacion-3d-abierta-cajas-deposito-interior-web.png","width":1744,"height":912},{"@type":"BreadcrumbList","@id":"https:\/\/ebc.paulainc.ca\/fr\/a-propos-de\/conformite-securite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ebc.paulainc.ca\/en\/"},{"@type":"ListItem","position":2,"name":"Who We Are","item":"https:\/\/ebc.paulainc.ca\/en\/about\/"},{"@type":"ListItem","position":3,"name":"Compliance &amp; Security"}]},{"@type":"WebSite","@id":"https:\/\/ebc.paulainc.ca\/en\/#website","url":"https:\/\/ebc.paulainc.ca\/en\/","name":"EBC","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ebc.paulainc.ca\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"}]}},"_links":{"self":[{"href":"https:\/\/ebc.paulainc.ca\/fr\/wp-json\/wp\/v2\/pages\/72","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ebc.paulainc.ca\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ebc.paulainc.ca\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ebc.paulainc.ca\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ebc.paulainc.ca\/fr\/wp-json\/wp\/v2\/comments?post=72"}],"version-history":[{"count":88,"href":"https:\/\/ebc.paulainc.ca\/fr\/wp-json\/wp\/v2\/pages\/72\/revisions"}],"predecessor-version":[{"id":1777,"href":"https:\/\/ebc.paulainc.ca\/fr\/wp-json\/wp\/v2\/pages\/72\/revisions\/1777"}],"up":[{"embeddable":true,"href":"https:\/\/ebc.paulainc.ca\/fr\/wp-json\/wp\/v2\/pages\/68"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ebc.paulainc.ca\/fr\/wp-json\/wp\/v2\/media\/1650"}],"wp:attachment":[{"href":"https:\/\/ebc.paulainc.ca\/fr\/wp-json\/wp\/v2\/media?parent=72"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}