{"id":198941,"date":"2024-08-19T06:24:03","date_gmt":"2024-08-19T13:24:03","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=198941"},"modified":"2025-05-13T22:02:41","modified_gmt":"2025-05-14T05:02:41","slug":"6-types-courants-de-vol-d-identite","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/6-types-courants-de-vol-d-identite\/","title":{"rendered":"Comment identifier les diff\u00e9rents types de vol d&#8217;identit\u00e9"},"content":{"rendered":"<p><span data-contrast=\"auto\">Le vol d&#8217;identit\u00e9 est une menace omnipr\u00e9sente dans l&#8217;\u00e8re num\u00e9rique actuelle, avec diff\u00e9rents types qui peuvent semer le chaos dans la vie des individus. En 2023, le Consumer Sentinel Network de la Federal Trade Commission a re\u00e7u plus de <\/span><a href=\"https:\/\/www.iii.org\/fact-statistic\/facts-statistics-identity-theft-and-cybercrime#:~:text=The%20Federal%20Trade%20Commission's%20(FTC,19%20percent%20for%20identity%20theft.\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">5,39\u00a0millions de signalements de consommateurs<\/span><\/a><span data-contrast=\"auto\">, dont 19 % concernaient un vol d&#8217;identit\u00e9.<\/span><\/p>\n<p><span data-contrast=\"auto\">Il est essentiel de comprendre les diff\u00e9rents types de vol d&#8217;identit\u00e9 pour prot\u00e9ger ses renseignements personnels et sa situation financi\u00e8re. Des tactiques insidieuses de la fraude aux nouveaux comptes aux cons\u00e9quences alarmantes du vol d&#8217;identit\u00e9 m\u00e9dicale, chaque m\u00e9thode pr\u00e9sente des risques et des d\u00e9fis distincts. Voici six\u00a0types de vol d&#8217;identit\u00e9 parmi les plus courants.\u00a0<\/span><\/p>\n<h2><b><span data-contrast=\"none\">Fraude aux nouveaux comptes<\/span><\/b><\/h2>\n<p><span data-contrast=\"none\">Utilisation des renseignements d&#8217;identification personnelle de quelqu&#8217;un d&#8217;autre pour obtenir des produits et des services en se servant de la bonne cote de cr\u00e9dit de cette personne. Cette fraude n\u00e9cessite souvent l&#8217;utilisation du num\u00e9ro de s\u00e9curit\u00e9 sociale de la victime. L&#8217;ouverture de nouveaux comptes de services publics, de t\u00e9l\u00e9phone portable et\/ou de carte de cr\u00e9dit constitue la forme la plus courante de fraude aux nouveaux comptes.<\/span><\/p>\n<h2><b><span data-contrast=\"none\">Prise de contr\u00f4le de comptes<\/span><\/b><\/h2>\n<p><span data-contrast=\"none\">Utilisation des num\u00e9ros de compte de quelqu&#8217;un d&#8217;autre, comme un num\u00e9ro de carte de cr\u00e9dit, pour obtenir des produits et des services \u00e0 l&#8217;aide des comptes existants de cette personne ou pour extraire des fonds du compte bancaire d&#8217;un individu.<\/span><\/p>\n<h2><b><span data-contrast=\"none\">Vol d&#8217;identit\u00e9 criminel<\/span><\/b><\/h2>\n<p><span data-contrast=\"none\">Quelqu&#8217;un commet un crime sous le nom d&#8217;une autre personne. L&#8217;escroc, pendant l&#8217;acte criminel ou lors de son arrestation, se fait passer pour la victime du vol d&#8217;identit\u00e9. Souvent, l&#8217;imposteur dispose d&#8217;une fausse carte d&#8217;identit\u00e9 comportant les renseignements de la victime, mais sa propre photo.<\/span><\/p>\n<h2><b><span data-contrast=\"none\">Vol d&#8217;identit\u00e9 m\u00e9dicale<\/span><\/b><\/h2>\n<p><span data-contrast=\"none\">Quelqu&#8217;un utilise le nom d&#8217;une personne et\/ou ses donn\u00e9es d&#8217;assurance, \u00e0 son insu ou sans son consentement, pour obtenir des services ou des biens m\u00e9dicaux, ou pour soumettre de fausses demandes de remboursement de biens ou de services m\u00e9dicaux. Le vol d&#8217;identit\u00e9 m\u00e9dicale se traduit souvent par des entr\u00e9es erron\u00e9es dans le dossier m\u00e9dical de la victime, ce qui peut conduire le personnel m\u00e9dical \u00e0 prendre des d\u00e9cisions inappropri\u00e9es, voire dangereuses pour la vie de la victime.<\/span><\/p>\n<h2><b><span data-contrast=\"none\">Vol d&#8217;identit\u00e9 commerciale<\/span><\/b><\/h2>\n<p><span data-contrast=\"none\">Utilisation du nom d&#8217;une entreprise pour obtenir un cr\u00e9dit ou m\u00eame facturer des produits et des services aux clients de cette entreprise. Les criminels qui commettent des vols d&#8217;identit\u00e9 commerciale sont souvent des employ\u00e9s ou des anciens collaborateurs ayant un acc\u00e8s direct \u00e0 la documentation op\u00e9rationnelle, qui maquillent les comptes de fa\u00e7on \u00e0 dissimuler leurs m\u00e9faits.<\/span><\/p>\n<h2><b><span data-contrast=\"none\">Clonage d&#8217;identit\u00e9<\/span><\/b><\/h2>\n<p><span data-contrast=\"none\">Ce type de vol englobe toutes les formes de vol d&#8217;identit\u00e9. Le voleur vit et fonctionne volontairement comme la victime. Il peut se cacher \u00e0 la vue de tous parce qu&#8217;il fuit la loi, se soustrait \u00e0 l&#8217;obligation de verser une pension alimentaire ou est atteint d&#8217;une maladie mentale.<\/span><\/p>\n<p><span data-contrast=\"none\">Il est important de respecter des mesures de s\u00e9curit\u00e9 de base pour prot\u00e9ger votre identit\u00e9. Pour prot\u00e9ger votre identit\u00e9 contre le vol, surveillez r\u00e9guli\u00e8rement vos comptes financiers pour d\u00e9tecter toute activit\u00e9 suspecte et signalez imm\u00e9diatement toute anomalie. Prot\u00e9gez vos renseignements personnels en \u00e9vitant de partager des donn\u00e9es sensibles sur des sites Web non s\u00e9curis\u00e9s ou sur des <\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/pourquoi-il-convient-de-faire-attention-lors-de-lutilisation-dun-reseau-wi-fi-public\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">r\u00e9seaux Wi-Fi non s\u00e9curis\u00e9s<\/span><\/a><span data-contrast=\"none\">. Utilisez des <\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/creer-des-mots-de-passe-forts-a-laide-dun-generateur-de-mot-de-passe\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">mots de passe forts et uniques<\/span><\/a><span data-contrast=\"none\"> pour chaque compte en ligne et activez l&#8217;<\/span><a href=\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/creer-des-mots-de-passe-forts-a-laide-dun-generateur-de-mot-de-passe\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">authentification multifacteur<\/span><\/a><span data-contrast=\"none\"> si possible. Enfin, soyez prudent face aux <\/span><a href=\"https:\/\/www.mcafee.com\/learn\/fr-ca\/exemples-de-courriels-dhameconnage-comment-reconnaitre-un-courriel-dhameconnage\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">tentatives d&#8217;hame\u00e7onnage<\/span><\/a><span data-contrast=\"none\"> et ne cliquez jamais sur des liens suspects et ne fournissez pas de renseignements personnels en r\u00e9ponse \u00e0 des communications non sollicit\u00e9es.<\/span><\/p>\n<p><span data-contrast=\"none\">Consultez notre article de blog sur <\/span><a href=\"https:\/\/www.mcafee.com\/learn\/fr-ca\/nettoyage-des-donnees-personnelles\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">les principaux signes de vol d&#8217;identit\u00e9<\/span><\/a><span data-contrast=\"none\"> pour obtenir des conseils suppl\u00e9mentaires sur ce qu&#8217;il faut faire si vous pensez \u00eatre expos\u00e9 \u00e0 un risque. Envisagez \u00e9galement d&#8217;opter pour un produit de protection contre le vol d&#8217;identit\u00e9, comme <\/span><a href=\"https:\/\/www.mcafee.com\/fr-fr\/identity-theft\/protection.html?path=blogs\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">McAfee+<\/span><\/a><span data-contrast=\"none\">, qui peut vous apporter une plus grande tranquillit\u00e9 d&#8217;esprit gr\u00e2ce \u00e0 une surveillance de l&#8217;identit\u00e9 et des alertes 24\u00a0h\/24 et 7\u00a0j\/7, ainsi qu&#8217;\u00e0 une couverture en cas de vol d&#8217;identit\u00e9 pouvant aller jusqu&#8217;\u00e0 2\u00a0millions de dollars.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335557856&quot;:16777215,&quot;335559738&quot;:5,&quot;335559739&quot;:5}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le vol d&#8217;identit\u00e9 est une menace omnipr\u00e9sente dans l&#8217;\u00e8re num\u00e9rique actuelle, avec diff\u00e9rents types qui peuvent semer le chaos dans&#8230;<\/p>\n","protected":false},"author":1407,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[13927],"tags":[16526,16291],"coauthors":[16371],"class_list":["post-198941","post","type-post","status-publish","format-standard","hentry","category-privacy-identity-protection","tag-protection-contre-le-vol-didentite-fr-ca","tag-vol-didentite-fr-ca"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Comment identifier les diff\u00e9rents types de vol d&#039;identit\u00e9 | Blog McAfee<\/title>\n<meta name=\"description\" content=\"Il est essentiel de comprendre les diff\u00e9rents types de vol d&#039;identit\u00e9 pour prot\u00e9ger ses renseignements personnels et sa situation financi\u00e8re.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_CA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Comment identifier les diff\u00e9rents types de vol d&#039;identit\u00e9 | Blog McAfee\" \/>\n<meta property=\"og:description\" content=\"Il est essentiel de comprendre les diff\u00e9rents types de vol d&#039;identit\u00e9 pour prot\u00e9ger ses renseignements personnels et sa situation financi\u00e8re.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/6-types-courants-de-vol-d-identite\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog McAfee\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-19T13:24:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-14T05:02:41+00:00\" \/>\n<meta name=\"author\" content=\"Jasdev Dhaliwal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jasdev Dhaliwal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/6-types-courants-de-vol-d-identite\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/6-types-courants-de-vol-d-identite\/\"},\"author\":{\"name\":\"Jasdev Dhaliwal\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f\"},\"headline\":\"Comment identifier les diff\u00e9rents types de vol d&#8217;identit\u00e9\",\"datePublished\":\"2024-08-19T13:24:03+00:00\",\"dateModified\":\"2025-05-14T05:02:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/6-types-courants-de-vol-d-identite\/\"},\"wordCount\":753,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#organization\"},\"keywords\":[\"protection contre le vol d'identit\u00e9\",\"vol d'identit\u00e9\"],\"articleSection\":[\"Protection de la confidentialit\u00e9 et de l\u2019identit\u00e9\"],\"inLanguage\":\"fr-CA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/6-types-courants-de-vol-d-identite\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/6-types-courants-de-vol-d-identite\/\",\"name\":\"Comment identifier les diff\u00e9rents types de vol d'identit\u00e9 | Blog McAfee\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#website\"},\"datePublished\":\"2024-08-19T13:24:03+00:00\",\"dateModified\":\"2025-05-14T05:02:41+00:00\",\"description\":\"Il est essentiel de comprendre les diff\u00e9rents types de vol d'identit\u00e9 pour prot\u00e9ger ses renseignements personnels et sa situation financi\u00e8re.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/6-types-courants-de-vol-d-identite\/#breadcrumb\"},\"inLanguage\":\"fr-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/6-types-courants-de-vol-d-identite\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/6-types-courants-de-vol-d-identite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protection de la confidentialit\u00e9 et de l\u2019identit\u00e9\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Comment identifier les diff\u00e9rents types de vol d&#8217;identit\u00e9\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/\",\"name\":\"Blog McAfee\",\"description\":\"Actualit\u00e9s concernant la s\u00e9curit\u00e9 Internet\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f\",\"name\":\"Jasdev Dhaliwal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-CA\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/person\/image\/25b6fc7c367684ebf6f6144e3dde58e6\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg\",\"caption\":\"Jasdev Dhaliwal\"},\"description\":\"Jasdev is a Director of Marketing at McAfee and a specialist in consumer security and online privacy. With over 10 years of security industry experience, he is a regular writer on the current security landscape and likes to educate others on how to keep themselves, their families, and their homes safe online.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/jasdhaliwal\/\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/fr-ca\/author\/jasdev-dhaliwal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Comment identifier les diff\u00e9rents types de vol d'identit\u00e9 | Blog McAfee","description":"Il est essentiel de comprendre les diff\u00e9rents types de vol d'identit\u00e9 pour prot\u00e9ger ses renseignements personnels et sa situation financi\u00e8re.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_CA","og_type":"article","og_title":"Comment identifier les diff\u00e9rents types de vol d'identit\u00e9 | Blog McAfee","og_description":"Il est essentiel de comprendre les diff\u00e9rents types de vol d'identit\u00e9 pour prot\u00e9ger ses renseignements personnels et sa situation financi\u00e8re.","og_url":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/6-types-courants-de-vol-d-identite\/","og_site_name":"Blog McAfee","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2024-08-19T13:24:03+00:00","article_modified_time":"2025-05-14T05:02:41+00:00","author":"Jasdev Dhaliwal","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Jasdev Dhaliwal","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/6-types-courants-de-vol-d-identite\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/6-types-courants-de-vol-d-identite\/"},"author":{"name":"Jasdev Dhaliwal","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f"},"headline":"Comment identifier les diff\u00e9rents types de vol d&#8217;identit\u00e9","datePublished":"2024-08-19T13:24:03+00:00","dateModified":"2025-05-14T05:02:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/6-types-courants-de-vol-d-identite\/"},"wordCount":753,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#organization"},"keywords":["protection contre le vol d'identit\u00e9","vol d'identit\u00e9"],"articleSection":["Protection de la confidentialit\u00e9 et de l\u2019identit\u00e9"],"inLanguage":"fr-CA"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/6-types-courants-de-vol-d-identite\/","url":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/6-types-courants-de-vol-d-identite\/","name":"Comment identifier les diff\u00e9rents types de vol d'identit\u00e9 | Blog McAfee","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#website"},"datePublished":"2024-08-19T13:24:03+00:00","dateModified":"2025-05-14T05:02:41+00:00","description":"Il est essentiel de comprendre les diff\u00e9rents types de vol d'identit\u00e9 pour prot\u00e9ger ses renseignements personnels et sa situation financi\u00e8re.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/6-types-courants-de-vol-d-identite\/#breadcrumb"},"inLanguage":"fr-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/6-types-courants-de-vol-d-identite\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/6-types-courants-de-vol-d-identite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/"},{"@type":"ListItem","position":2,"name":"Protection de la confidentialit\u00e9 et de l\u2019identit\u00e9","item":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/privacy-identity-protection\/"},{"@type":"ListItem","position":3,"name":"Comment identifier les diff\u00e9rents types de vol d&#8217;identit\u00e9"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#website","url":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/","name":"Blog McAfee","description":"Actualit\u00e9s concernant la s\u00e9curit\u00e9 Internet","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-CA"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/","logo":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f","name":"Jasdev Dhaliwal","image":{"@type":"ImageObject","inLanguage":"fr-CA","@id":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/#\/schema\/person\/image\/25b6fc7c367684ebf6f6144e3dde58e6","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg","caption":"Jasdev Dhaliwal"},"description":"Jasdev is a Director of Marketing at McAfee and a specialist in consumer security and online privacy. With over 10 years of security industry experience, he is a regular writer on the current security landscape and likes to educate others on how to keep themselves, their families, and their homes safe online.","sameAs":["https:\/\/www.linkedin.com\/in\/jasdhaliwal\/"],"url":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/author\/jasdev-dhaliwal\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/posts\/198941","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/users\/1407"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/comments?post=198941"}],"version-history":[{"count":5,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/posts\/198941\/revisions"}],"predecessor-version":[{"id":213225,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/posts\/198941\/revisions\/213225"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/media?parent=198941"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/categories?post=198941"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/tags?post=198941"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/fr-ca\/wp-json\/wp\/v2\/coauthors?post=198941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}