{"id":190082,"date":"2024-04-24T05:02:46","date_gmt":"2024-04-24T12:02:46","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=190082"},"modified":"2024-04-24T05:02:46","modified_gmt":"2024-04-24T12:02:46","slug":"quelle-est-la-difference-entre-fraude-a-lidentite-et-vol-didentite","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/quelle-est-la-difference-entre-fraude-a-lidentite-et-vol-didentite\/","title":{"rendered":"Comment faire la diff\u00e9rence entre fraude \u00e0 l&#8217;identit\u00e9 et vol d&#8217;identit\u00e9?"},"content":{"rendered":"<p><span data-contrast=\"auto\">Quelle est la diff\u00e9rence entre fraude \u00e0 l&#8217;identit\u00e9 et vol d&#8217;identit\u00e9? La diff\u00e9rence est subtile, \u00e0 tel point que ces deux termes sont parfois employ\u00e9s de mani\u00e8re interchangeable. Bien que ces techniques puissent toutes les deux ponctionner votre portefeuille, elles sont diff\u00e9rentes et le fait de conna\u00eetre la distinction entre les deux peut vous aider \u00e0 comprendre ce qui est en jeu.<\/span><\/p>\n<p><span data-contrast=\"auto\">Commen\u00e7ons par une vue d&#8217;ensemble et quelques exemples de chaque technique.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">La fraude \u00e0 l&#8217;identit\u00e9, c&#8217;est\u2026<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Lorsque quelqu&#8217;un vole ou utilise abusivement vos renseignements personnels pour exploiter un ou plusieurs comptes que vous poss\u00e9dez d\u00e9j\u00e0.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Exemples\u00a0:\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Un criminel met la main sur les donn\u00e9es de votre carte de d\u00e9bit \u00e0 la suite d&#8217;une violation de donn\u00e9es et effectue des achats avec votre compte bancaire.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Un criminel acc\u00e8de \u00e0 l&#8217;un de vos comptes par le biais d&#8217;une attaque d&#8217;hame\u00e7onnage et utilise abusivement les fonds ou l&#8217;acc\u00e8s associ\u00e9 \u00e0 ce compte.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h2><b><span data-contrast=\"auto\">Le vol d&#8217;identit\u00e9, c&#8217;est\u2026<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Lorsque quelqu&#8217;un utilise vos renseignements personnels pour ouvrir et utiliser abusivement de nouveaux comptes ou services en votre nom, ou \u00e9ventuellement pour usurper votre identit\u00e9 d&#8217;une autre mani\u00e8re.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Exemples\u00a0:\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Un criminel utilise vos renseignements personnels pour ouvrir une nouvelle ligne de cr\u00e9dit \u00e0 votre nom aupr\u00e8s d&#8217;un d\u00e9taillant et effectue ensuite des achats avec cette ligne de cr\u00e9dit.\u00a0<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"2\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Un criminel utilise votre num\u00e9ro de s\u00e9curit\u00e9 sociale pour cr\u00e9er un permis de conduire \u00e0 son effigie, mais avec votre nom et vos renseignements personnels.<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Il existe donc cette diff\u00e9rence subtile que nous avons mentionn\u00e9e. La fraude \u00e0 l&#8217;identit\u00e9 consiste \u00e0 utiliser abusivement un compte existant. Le vol d&#8217;identit\u00e9 est le vol de vos renseignements personnels, qui sont ensuite utilis\u00e9s pour usurper votre identit\u00e9 d&#8217;une mani\u00e8re ou d&#8217;une autre, par exemple en ouvrant de nouveaux comptes \u00e0 votre nom.<\/span><\/p>\n<p><span data-contrast=\"auto\">Au-del\u00e0 de ces d\u00e9finitions et de ces sc\u00e9narios, quelques exemples concrets mettent \u00e9galement les diff\u00e9rences en perspective.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">La fraude \u00e0 l&#8217;identit\u00e9 dans l&#8217;actualit\u00e9<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Les cas de fraude \u00e0 l&#8217;identit\u00e9 ne font pas toujours les gros titres, mais cela ne veut pas dire que vous n&#8217;en entendrez pas parler de diff\u00e9rentes mani\u00e8res.<\/span><\/p>\n<p><span data-contrast=\"auto\">Vous pourrez notamment en prendre connaissance par le biais d&#8217;articles sur des violations de donn\u00e9es, o\u00f9 des pirates informatiques volent des noms, adresses courriel et donn\u00e9es de paiement d&#8217;entreprises ou d&#8217;organisations.<\/span><span data-contrast=\"auto\"> Ces donn\u00e9es peuvent alors se retrouver entre les mains d&#8217;un fraudeur, qui acc\u00e8de ensuite \u00e0 ces comptes pour d\u00e9rober des fonds ou effectuer des achats.<\/span><\/p>\n<p><span data-contrast=\"auto\">\u00c0 plus petite \u00e9chelle, vous connaissez peut-\u00eatre quelqu&#8217;un qui a d\u00fb demander une nouvelle carte de cr\u00e9dit ou de d\u00e9bit parce que la sienne avait \u00e9t\u00e9 compromise, peut-\u00eatre \u00e0 la suite d&#8217;une violation ou en <\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/how-to-spot-fake-login-pages?path=blogs\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">effectuant par erreur un paiement sur un site Web non s\u00e9curis\u00e9 ou en visitant une fausse page de connexion dans le cadre d&#8217;une attaque d&#8217;hame\u00e7onnage<\/span><\/a><span data-contrast=\"auto\">.\u00a0Ces situations peuvent \u00e9galement donner lieu \u00e0 des fraudes.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"auto\">Rep\u00e9rer les cas de fraude \u00e0 l&#8217;identit\u00e9 et de vol d&#8217;identit\u00e9 (et les pr\u00e9venir)<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Cela commence g\u00e9n\u00e9ralement par une remarque allant de \u00ab\u00a0C&#8217;est bizarre\u2026\u00a0\u00bb \u00e0 \u00ab\u00a0Oh non!\u00a0\u00bb. Il peut s&#8217;agir d&#8217;un pr\u00e9l\u00e8vement \u00e9trange sur votre relev\u00e9 de carte de cr\u00e9dit, d&#8217;un courrier d&#8217;un agent de recouvrement ou d&#8217;un relev\u00e9 d&#8217;un compte que vous n&#8217;avez jamais ouvert, pour ne citer que quelques exemples.<\/span><\/p>\n<p><span data-contrast=\"auto\">Je vous propose donc quelques articles de blog r\u00e9cents qui vous aideront \u00e0 rep\u00e9rer toutes sortes de d\u00e9lits li\u00e9s \u00e0 l&#8217;identit\u00e9 et qui vous fourniront des conseils pour \u00e9viter d&#8217;en \u00eatre victimes\u00a0:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><a href=\"https:\/\/www.mcafee.com\/blogs\/consumer-cyber-awareness\/top-signs-of-identity-theft\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Top Signs of Identity Theft<\/span><\/a><span data-contrast=\"none\"> (Principaux signes de vol d&#8217;identit\u00e9)<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><a href=\"https:\/\/www.mcafee.com\/blogs\/consumer-cyber-awareness\/can-thieves-steal-identities-with-only-a-name-and-address\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Can Thieves Steal Identities with Only a Name and Address?<\/span><\/a><span data-contrast=\"none\"> (Les voleurs peuvent-ils voler des identit\u00e9s avec seulement un nom et une adresse?)<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"3\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><a href=\"https:\/\/www.mcafee.com\/blogs\/consumer-cyber-awareness\/quizzes-and-other-identity-theft-schemes-to-avoid-on-social-media\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">Quizzes and Other Identity Theft Schemes to Avoid on\u00a0Social Media<\/span><\/a><span data-contrast=\"none\"> (Quiz et autres stratag\u00e8mes de vol d&#8217;identit\u00e9 \u00e0 \u00e9viter sur les m\u00e9dias sociaux)<\/span><span data-ccp-props=\"{&quot;134233279&quot;:true,&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/li>\n<\/ul>\n<h2><b><span data-contrast=\"auto\">Restez vigilant<\/span><\/b><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">Si la fraude \u00e0 l&#8217;identit\u00e9 et le vol d&#8217;identit\u00e9 pr\u00e9sentent des diff\u00e9rences, ces deux techniques ont n\u00e9anmoins quelques points communs : vous pouvez prendre des mesures pour les pr\u00e9venir et pour en limiter l&#8217;impact si vous \u00eates confront\u00e9 \u00e0 l&#8217;une ou l&#8217;autre de ces pratiques.<\/span><\/p>\n<p><span data-contrast=\"auto\">Les articles cit\u00e9s ci-dessus vous donneront des d\u00e9tails, mais la vigilance est la premi\u00e8re r\u00e8gle \u00e0 appliquer pour rester en s\u00e9curit\u00e9. V\u00e9rifiez r\u00e9guli\u00e8rement vos comptes et vos rapports de solvabilit\u00e9 et examinez attentivement ce qui s&#8217;y passe. Pensez \u00e0 vous prot\u00e9ger gr\u00e2ce \u00e0 un logiciel de protection de l&#8217;identit\u00e9 <\/span><span data-contrast=\"auto\">et signalez tout ce qui vous semble \u00e9trange ou carr\u00e9ment louche \u00e0 l&#8217;entreprise ou \u00e0 l&#8217;institution en question.\u00a0<\/span> <span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quelle est la diff\u00e9rence entre fraude \u00e0 l&#8217;identit\u00e9 et vol d&#8217;identit\u00e9? La diff\u00e9rence est subtile, \u00e0 tel point que ces&#8230;<\/p>\n","protected":false},"author":1408,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[13927,13933],"tags":[16293,16291,16292],"coauthors":[16267],"class_list":["post-190082","post","type-post","status-publish","format-standard","hentry","category-privacy-identity-protection","category-tips-tricks","tag-fraude-a-lidentite-fr-ca","tag-vol-didentite-fr-ca","tag-vol-didentite-ou-fraude-a-lidentite-fr-ca"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Comment faire la diff\u00e9rence entre fraude \u00e0 l&#039;identit\u00e9 et vol d&#039;identit\u00e9 | Blog McAfee<\/title>\n<meta name=\"description\" content=\"Conna\u00eetre la distinction entre la fraude \u00e0 l&#039;identit\u00e9 et le vol d&#039;identit\u00e9 peut vous aider \u00e0 comprendre ce qui est en jeu.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comment faire la diff\u00e9rence entre fraude \u00e0 l&#039;identit\u00e9 et vol d&#039;identit\u00e9 | Blog McAfee\" \/>\n<meta property=\"og:description\" content=\"Conna\u00eetre la distinction entre la fraude \u00e0 l&#039;identit\u00e9 et le vol d&#039;identit\u00e9 peut vous aider \u00e0 comprendre ce qui est en jeu.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/quelle-est-la-difference-entre-fraude-a-lidentite-et-vol-didentite\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog McAfee\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-24T12:02:46+00:00\" \/>\n<meta name=\"author\" content=\"Amy Bunn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Amy Bunn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/quelle-est-la-difference-entre-fraude-a-lidentite-et-vol-didentite\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/quelle-est-la-difference-entre-fraude-a-lidentite-et-vol-didentite\/\"},\"author\":{\"name\":\"Amy Bunn\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3\"},\"headline\":\"Comment faire la diff\u00e9rence entre fraude \u00e0 l&#8217;identit\u00e9 et vol d&#8217;identit\u00e9?\",\"datePublished\":\"2024-04-24T12:02:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/quelle-est-la-difference-entre-fraude-a-lidentite-et-vol-didentite\/\"},\"wordCount\":842,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#organization\"},\"keywords\":[\"Fraude \u00e0 l'identit\u00e9\",\"vol d'identit\u00e9\",\"vol d'identit\u00e9 ou fraude \u00e0 l'identit\u00e9\"],\"articleSection\":[\"Protection de la confidentialit\u00e9 et de l\u2019identit\u00e9\",\"Conseils et astuces en mati\u00e8re de s\u00e9curit\u00e9\"],\"inLanguage\":\"fr-CA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/quelle-est-la-difference-entre-fraude-a-lidentite-et-vol-didentite\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/quelle-est-la-difference-entre-fraude-a-lidentite-et-vol-didentite\/\",\"name\":\"Comment faire la diff\u00e9rence entre fraude \u00e0 l'identit\u00e9 et vol d'identit\u00e9 | Blog McAfee\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#website\"},\"datePublished\":\"2024-04-24T12:02:46+00:00\",\"description\":\"Conna\u00eetre la distinction entre la fraude \u00e0 l'identit\u00e9 et le vol d'identit\u00e9 peut vous aider \u00e0 comprendre ce qui est en jeu.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/quelle-est-la-difference-entre-fraude-a-lidentite-et-vol-didentite\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/quelle-est-la-difference-entre-fraude-a-lidentite-et-vol-didentite\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/quelle-est-la-difference-entre-fraude-a-lidentite-et-vol-didentite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protection de la confidentialit\u00e9 et de l\u2019identit\u00e9\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Comment faire la diff\u00e9rence entre fraude \u00e0 l&#8217;identit\u00e9 et vol d&#8217;identit\u00e9?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/\",\"name\":\"Blog McAfee\",\"description\":\"Actualit\u00e9s concernant la s\u00e9curit\u00e9 Internet\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3\",\"name\":\"Amy Bunn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/person\/image\/b58be83668cf2b1de7fb5b8a222bb835\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg\",\"caption\":\"Amy Bunn\"},\"description\":\"Amy Bunn is head of communications at McAfee and has worked in technology and cybersecurity for over 15 years. During this time, Amy has witnessed the changing technology landscape and the critical role that online protection plays today. Amy believes that families and individuals around the world should be free to enjoy all the benefits and advantages that the internet and technology afford and is passionate about making this a reality by discussing the very latest in cybersecurity tips and advice, which, when combined with robust online protection, can help empower people to live their life online with total confidence.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/author\/amy-bunn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Comment faire la diff\u00e9rence entre fraude \u00e0 l'identit\u00e9 et vol d'identit\u00e9 | Blog McAfee","description":"Conna\u00eetre la distinction entre la fraude \u00e0 l'identit\u00e9 et le vol d'identit\u00e9 peut vous aider \u00e0 comprendre ce qui est en jeu.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_CA","og_type":"article","og_title":"Comment faire la diff\u00e9rence entre fraude \u00e0 l'identit\u00e9 et vol d'identit\u00e9 | Blog McAfee","og_description":"Conna\u00eetre la distinction entre la fraude \u00e0 l'identit\u00e9 et le vol d'identit\u00e9 peut vous aider \u00e0 comprendre ce qui est en jeu.","og_url":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/quelle-est-la-difference-entre-fraude-a-lidentite-et-vol-didentite\/","og_site_name":"Blog McAfee","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2024-04-24T12:02:46+00:00","author":"Amy Bunn","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Amy Bunn","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/quelle-est-la-difference-entre-fraude-a-lidentite-et-vol-didentite\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/quelle-est-la-difference-entre-fraude-a-lidentite-et-vol-didentite\/"},"author":{"name":"Amy Bunn","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3"},"headline":"Comment faire la diff\u00e9rence entre fraude \u00e0 l&#8217;identit\u00e9 et vol d&#8217;identit\u00e9?","datePublished":"2024-04-24T12:02:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/quelle-est-la-difference-entre-fraude-a-lidentite-et-vol-didentite\/"},"wordCount":842,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#organization"},"keywords":["Fraude \u00e0 l'identit\u00e9","vol d'identit\u00e9","vol d'identit\u00e9 ou fraude \u00e0 l'identit\u00e9"],"articleSection":["Protection de la confidentialit\u00e9 et de l\u2019identit\u00e9","Conseils et astuces en mati\u00e8re de s\u00e9curit\u00e9"],"inLanguage":"fr-CA"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/quelle-est-la-difference-entre-fraude-a-lidentite-et-vol-didentite\/","url":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/quelle-est-la-difference-entre-fraude-a-lidentite-et-vol-didentite\/","name":"Comment faire la diff\u00e9rence entre fraude \u00e0 l'identit\u00e9 et vol d'identit\u00e9 | Blog McAfee","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#website"},"datePublished":"2024-04-24T12:02:46+00:00","description":"Conna\u00eetre la distinction entre la fraude \u00e0 l'identit\u00e9 et le vol d'identit\u00e9 peut vous aider \u00e0 comprendre ce qui est en jeu.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/quelle-est-la-difference-entre-fraude-a-lidentite-et-vol-didentite\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/quelle-est-la-difference-entre-fraude-a-lidentite-et-vol-didentite\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/quelle-est-la-difference-entre-fraude-a-lidentite-et-vol-didentite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/"},{"@type":"ListItem","position":2,"name":"Protection de la confidentialit\u00e9 et de l\u2019identit\u00e9","item":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/"},{"@type":"ListItem","position":3,"name":"Comment faire la diff\u00e9rence entre fraude \u00e0 l&#8217;identit\u00e9 et vol d&#8217;identit\u00e9?"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#website","url":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/","name":"Blog McAfee","description":"Actualit\u00e9s concernant la s\u00e9curit\u00e9 Internet","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/person\/15fadfbc1716a6a3d88e22ed09e95fe3","name":"Amy Bunn","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/person\/image\/b58be83668cf2b1de7fb5b8a222bb835","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/Amy-Bunn-96x96.jpeg","caption":"Amy Bunn"},"description":"Amy Bunn is head of communications at McAfee and has worked in technology and cybersecurity for over 15 years. During this time, Amy has witnessed the changing technology landscape and the critical role that online protection plays today. Amy believes that families and individuals around the world should be free to enjoy all the benefits and advantages that the internet and technology afford and is passionate about making this a reality by discussing the very latest in cybersecurity tips and advice, which, when combined with robust online protection, can help empower people to live their life online with total confidence.","url":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/author\/amy-bunn\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/posts\/190082","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/users\/1408"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/comments?post=190082"}],"version-history":[{"count":4,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/posts\/190082\/revisions"}],"predecessor-version":[{"id":190086,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/posts\/190082\/revisions\/190086"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/media?parent=190082"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/categories?post=190082"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/tags?post=190082"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/coauthors?post=190082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}