{"id":4573,"date":"2022-05-16T10:24:49","date_gmt":"2022-05-16T08:24:49","guid":{"rendered":"https:\/\/www.isis.be\/conditions-dutilisation-des-technologies-utilisees\/"},"modified":"2023-08-22T15:29:52","modified_gmt":"2023-08-22T13:29:52","slug":"conditions-dutilisation-des-technologies-utilisees","status":"publish","type":"page","link":"https:\/\/www.isis.be\/nl\/conditions-dutilisation-des-technologies-utilisees\/","title":{"rendered":"Conditions d&#8217;utilisation des technologies utilis\u00e9es"},"content":{"rendered":"\n<p><strong>Retrouvez ci-dessous les conditions d&#8217;utilisation des technologies utilis\u00e9es par ISIS pour le d\u00e9veloppement et la gestion des logiciels et applications livr\u00e9s.<\/strong><\/p>\n\n<h3 class=\"wp-block-heading\">D\u00e9veloppement<\/h3>\n\n<p>4D &#8211;&nbsp;<a href=\"https:\/\/be-fr.4d.com\/license-0\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/be-fr.4d.com\/license-0<\/a><\/p>\n\n<p>PostgreSQL &#8211;&nbsp;<a href=\"https:\/\/tldrlegal.com\/license\/postgresql-license-(postgresql)\">https:\/\/tldrlegal.com\/license\/postgresql-license-(postgresql)<\/a><\/p>\n\n<p>MariaDB &#8211;&nbsp;<a href=\"https:\/\/mariadb.com\/sites\/default\/files\/tnc\/EnterpriseSubscriptionAgmt_EU_October2017.pdf\">https:\/\/mariadb.com\/sites\/default\/files\/tnc\/EnterpriseSubscriptionAgmt_EU_October2017.pdf<\/a><\/p>\n\n<p>Python &#8211;&nbsp;<a href=\"https:\/\/docs.python.org\/3\/license.html\">https:\/\/docs.python.org\/3\/license.html<\/a><\/p>\n\n<p>RabbitMQ &#8211;&nbsp;<a href=\"https:\/\/www.rabbitmq.com\/mpl.html\">https:\/\/www.rabbitmq.com\/mpl.html<\/a><\/p>\n\n<p>PHP &#8211;&nbsp;<a href=\"https:\/\/secure.php.net\/license\/index.php\">https:\/\/secure.php.net\/license\/index.php<\/a><\/p>\n\n<p>Slim &#8211;&nbsp;<a href=\"https:\/\/github.com\/slimphp\/Slim\/blob\/3.x\/LICENSE.md\">https:\/\/github.com\/slimphp\/Slim\/blob\/3.x\/LICENSE.md<\/a><\/p>\n\n<p>jQuery &#8211;&nbsp;<a href=\"https:\/\/jquery.org\/license\/\">https:\/\/jquery.org\/license\/<\/a><\/p>\n\n<p>Kendo UI Web \u2013 Mobile &#8211;&nbsp;<a href=\"https:\/\/www.telerik.com\/about\/terms-of-use\">https:\/\/www.telerik.com\/about\/terms-of-use<\/a><\/p>\n\n<p>Java &#8211;&nbsp;<a href=\"https:\/\/www.oracle.com\/legal\/terms.html\">https:\/\/www.oracle.com\/legal\/terms.html<\/a><\/p>\n\n<p>cURL &#8211;&nbsp;<a href=\"https:\/\/curl.haxx.se\/docs\/copyright.html\">https:\/\/curl.haxx.se\/docs\/copyright.html<\/a><\/p>\n\n<p>Webservice check TVA &#8211;&nbsp;<a href=\"http:\/\/ec.europa.eu\/taxation_customs\/vies\/disclaimer.html\">http:\/\/ec.europa.eu\/taxation_customs\/vies\/disclaimer.html<\/a><\/p>\n\n<p>Google Maps Platform &#8211;&nbsp;<a href=\"https:\/\/cloud.google.com\/maps-platform\/terms\/?hl=fr\">https:\/\/cloud.google.com\/maps-platform\/terms\/?hl=fr<\/a><\/p>\n\n<p>Google Sheets API &#8211;&nbsp;<a href=\"https:\/\/developers.google.com\/terms\/site-terms\">https:\/\/developers.google.com\/terms\/site-terms<\/a><\/p>\n\n<p>Powershell (creation de zip dans le composant XLSX) &#8211;&nbsp;<a href=\"https:\/\/docs.microsoft.com\/fr-fr\/powershell\/scripting\/powershell-scripting?view=powershell-6\">https:\/\/docs.microsoft.com\/fr-fr\/powershell\/scripting\/powershell-scripting?view=powershell-6<\/a><\/p>\n\n<h3 class=\"wp-block-heading\">H\u00e9bergement<\/h3>\n\n<p>Linux CentOS v7 &#8211;&nbsp;<a href=\"https:\/\/www.centos.org\/legal\/trademarks\/\">https:\/\/www.centos.org\/legal\/trademarks\/<\/a><\/p>\n\n<p>Httpd (apache) &#8211;&nbsp;<a href=\"https:\/\/httpd.apache.org\/docs\/2.4\/license.html\">https:\/\/httpd.apache.org\/docs\/2.4\/license.html<\/a><\/p>\n\n<p>Postfix &#8211;&nbsp;<a href=\"https:\/\/opensource.org\/licenses\/ibmpl.php\">https:\/\/opensource.org\/licenses\/ibmpl.php<\/a><\/p>\n\n<p>vsFTPd &#8211;&nbsp;<a href=\"https:\/\/www.gnu.org\/licenses\/old-licenses\/gpl-2.0.fr.html\">https:\/\/www.gnu.org\/licenses\/old-licenses\/gpl-2.0.fr.html<\/a><\/p>\n\n<p>OpenSSL &#8211;&nbsp;<a href=\"https:\/\/www.apache.org\/licenses\/LICENSE-2.0\">https:\/\/www.apache.org\/licenses\/LICENSE-2.0<\/a>&nbsp;et&nbsp;<a href=\"https:\/\/www.openssl.org\/source\/license.html\">https:\/\/www.openssl.org\/source\/license.html<\/a><\/p>\n\n<p>Cron (sous centOS) &#8211;&nbsp;<a href=\"https:\/\/github.com\/robfig\/cron\/blob\/master\/LICENSE\">https:\/\/github.com\/robfig\/cron\/blob\/master\/LICENSE<\/a><\/p>\n\n<p>Let\u2019s Encrypt &#8211;&nbsp;<a href=\"https:\/\/letsencrypt.org\/repository\/\">https:\/\/letsencrypt.org\/repository\/<\/a><\/p>\n\n<p>Fail2ban &#8211;&nbsp;<a href=\"https:\/\/www.gnu.org\/licenses\/old-licenses\/gpl-2.0.fr.html\">https:\/\/www.gnu.org\/licenses\/old-licenses\/gpl-2.0.fr.html<\/a><\/p>\n\n<h3 class=\"wp-block-heading\">Cloud<\/h3>\n\n<p>Google Cloud Platform &#8211;&nbsp;<a href=\"https:\/\/cloud.google.com\/terms\/\">https:\/\/cloud.google.com\/terms\/<\/a><\/p>\n\n<p>OVH &#8211;&nbsp;<a href=\"https:\/\/www.ovh.com\/fr\/support\/documents_legaux\/conditions%20generales%20de%20service.pdf\">https:\/\/www.ovh.com\/fr\/support\/documents_legaux\/conditions%20generales%20de%20service.pdf<\/a><a href=\"https:\/\/www.ovh.com\/fr\/support\/documents_legaux\/conditions%20generales%20de%20service.pdf\"><\/a><\/p>\n\n<p>Fail2ban &#8211;&nbsp;<a href=\"https:\/\/www.gnu.org\/licenses\/old-licenses\/gpl-2.0.fr.html\">https:\/\/www.gnu.org\/licenses\/old-licenses\/gpl-2.0.fr.html<\/a><\/p>\n\n<h3 class=\"wp-block-heading\">Drivers<\/h3>\n\n<p>ZINT (generation de codes-barre\/qr code) &#8211;\u00a0<a href=\"https:\/\/www.gnu.org\/licenses\/gpl-3.0.html\">https:\/\/www.gnu.org\/licenses\/gpl-3.0.fr.html<\/a><\/p>\n\n<p>Fail2ban &#8211;&nbsp;<a href=\"https:\/\/www.gnu.org\/licenses\/old-licenses\/gpl-2.0.fr.html\">https:\/\/www.gnu.org\/licenses\/old-licenses\/gpl-2.0.fr.html<\/a><\/p>\n\n<h3 class=\"wp-block-heading\">Softwares<\/h3>\n\n<p>PDFCreator &#8211;&nbsp;<a href=\"https:\/\/www.pdfforge.org\/pdfcreator\/license\">https:\/\/www.pdfforge.org\/pdfcreator\/license<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Retrouvez ci-dessous les conditions d&#8217;utilisation des technologies utilis\u00e9es par ISIS pour le d\u00e9veloppement et la\u2026 <a href=\"https:\/\/www.isis.be\/nl\/conditions-dutilisation-des-technologies-utilisees\/\">Lire plus<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"textpage.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-4573","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Conditions d&#039;utilisation des technologies utilis\u00e9es | ISIS Verviers<\/title>\n<meta name=\"description\" content=\"Conditions d&#039;utilisation des technologies utilis\u00e9es par ISIS pour le d\u00e9veloppement et la gestion des logiciels et applications livr\u00e9s.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.isis.be\/nl\/conditions-dutilisation-des-technologies-utilisees\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Conditions d&#039;utilisation des technologies utilis\u00e9es | ISIS Verviers\" \/>\n<meta property=\"og:description\" content=\"Conditions d&#039;utilisation des technologies utilis\u00e9es par ISIS pour le d\u00e9veloppement et la gestion des logiciels et applications livr\u00e9s.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.isis.be\/nl\/conditions-dutilisation-des-technologies-utilisees\/\" \/>\n<meta property=\"og:site_name\" content=\"Isis\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-22T13:29:52+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minuut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.isis.be\/nl\/conditions-dutilisation-des-technologies-utilisees\/\",\"url\":\"https:\/\/www.isis.be\/nl\/conditions-dutilisation-des-technologies-utilisees\/\",\"name\":\"Conditions d'utilisation des technologies utilis\u00e9es | ISIS Verviers\",\"isPartOf\":{\"@id\":\"https:\/\/www.isis.be\/nl\/#website\"},\"datePublished\":\"2022-05-16T08:24:49+00:00\",\"dateModified\":\"2023-08-22T13:29:52+00:00\",\"description\":\"Conditions d'utilisation des technologies utilis\u00e9es par ISIS pour le d\u00e9veloppement et la gestion des logiciels et applications livr\u00e9s.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.isis.be\/nl\/conditions-dutilisation-des-technologies-utilisees\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.isis.be\/nl\/conditions-dutilisation-des-technologies-utilisees\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.isis.be\/nl\/conditions-dutilisation-des-technologies-utilisees\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Onthaal\",\"item\":\"https:\/\/www.isis.be\/nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Conditions d&rsquo;utilisation des technologies utilis\u00e9es\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.isis.be\/nl\/#website\",\"url\":\"https:\/\/www.isis.be\/nl\/\",\"name\":\"Isis\",\"description\":\"We make IT easier\",\"publisher\":{\"@id\":\"https:\/\/www.isis.be\/nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.isis.be\/nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.isis.be\/nl\/#organization\",\"name\":\"Isis Informatique\",\"url\":\"https:\/\/www.isis.be\/nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\/\/www.isis.be\/nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.isis.be\/wp-content\/uploads\/2022\/08\/logo-neg-nobg-equisis-2-1.png\",\"contentUrl\":\"https:\/\/www.isis.be\/wp-content\/uploads\/2022\/08\/logo-neg-nobg-equisis-2-1.png\",\"width\":1361,\"height\":302,\"caption\":\"Isis Informatique\"},\"image\":{\"@id\":\"https:\/\/www.isis.be\/nl\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Conditions d'utilisation des technologies utilis\u00e9es | ISIS Verviers","description":"Conditions d'utilisation des technologies utilis\u00e9es par ISIS pour le d\u00e9veloppement et la gestion des logiciels et applications livr\u00e9s.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.isis.be\/nl\/conditions-dutilisation-des-technologies-utilisees\/","og_locale":"nl_NL","og_type":"article","og_title":"Conditions d'utilisation des technologies utilis\u00e9es | ISIS Verviers","og_description":"Conditions d'utilisation des technologies utilis\u00e9es par ISIS pour le d\u00e9veloppement et la gestion des logiciels et applications livr\u00e9s.","og_url":"https:\/\/www.isis.be\/nl\/conditions-dutilisation-des-technologies-utilisees\/","og_site_name":"Isis","article_modified_time":"2023-08-22T13:29:52+00:00","twitter_card":"summary_large_image","twitter_misc":{"Geschatte leestijd":"1 minuut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.isis.be\/nl\/conditions-dutilisation-des-technologies-utilisees\/","url":"https:\/\/www.isis.be\/nl\/conditions-dutilisation-des-technologies-utilisees\/","name":"Conditions d'utilisation des technologies utilis\u00e9es | ISIS Verviers","isPartOf":{"@id":"https:\/\/www.isis.be\/nl\/#website"},"datePublished":"2022-05-16T08:24:49+00:00","dateModified":"2023-08-22T13:29:52+00:00","description":"Conditions d'utilisation des technologies utilis\u00e9es par ISIS pour le d\u00e9veloppement et la gestion des logiciels et applications livr\u00e9s.","breadcrumb":{"@id":"https:\/\/www.isis.be\/nl\/conditions-dutilisation-des-technologies-utilisees\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.isis.be\/nl\/conditions-dutilisation-des-technologies-utilisees\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.isis.be\/nl\/conditions-dutilisation-des-technologies-utilisees\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Onthaal","item":"https:\/\/www.isis.be\/nl\/"},{"@type":"ListItem","position":2,"name":"Conditions d&rsquo;utilisation des technologies utilis\u00e9es"}]},{"@type":"WebSite","@id":"https:\/\/www.isis.be\/nl\/#website","url":"https:\/\/www.isis.be\/nl\/","name":"Isis","description":"We make IT easier","publisher":{"@id":"https:\/\/www.isis.be\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.isis.be\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/www.isis.be\/nl\/#organization","name":"Isis Informatique","url":"https:\/\/www.isis.be\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/www.isis.be\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/www.isis.be\/wp-content\/uploads\/2022\/08\/logo-neg-nobg-equisis-2-1.png","contentUrl":"https:\/\/www.isis.be\/wp-content\/uploads\/2022\/08\/logo-neg-nobg-equisis-2-1.png","width":1361,"height":302,"caption":"Isis Informatique"},"image":{"@id":"https:\/\/www.isis.be\/nl\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.isis.be\/nl\/wp-json\/wp\/v2\/pages\/4573","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.isis.be\/nl\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.isis.be\/nl\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.isis.be\/nl\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.isis.be\/nl\/wp-json\/wp\/v2\/comments?post=4573"}],"version-history":[{"count":1,"href":"https:\/\/www.isis.be\/nl\/wp-json\/wp\/v2\/pages\/4573\/revisions"}],"predecessor-version":[{"id":5867,"href":"https:\/\/www.isis.be\/nl\/wp-json\/wp\/v2\/pages\/4573\/revisions\/5867"}],"wp:attachment":[{"href":"https:\/\/www.isis.be\/nl\/wp-json\/wp\/v2\/media?parent=4573"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}