{"id":9673,"date":"2025-12-22T17:26:59","date_gmt":"2025-12-22T16:26:59","guid":{"rendered":"https:\/\/evidency.io\/qu-est-ce-qu-un-ntp-network-time-protocole\/"},"modified":"2026-02-06T10:10:11","modified_gmt":"2026-02-06T09:10:11","slug":"what-is-ntp-network-time-protocole","status":"publish","type":"post","link":"https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/","title":{"rendered":"What role does NTP (Network Time Protocol) play in the security of electronic data?"},"content":{"rendered":"<p><strong>Key points on NTP Protocol<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The <strong>NTP protocol<\/strong> is a technical mechanism designed to synchronise the clocks of computer systems within a network.<\/li>\n\n\n\n<li>This shared time reference becomes decisive where the <strong>date and time of an event are relied upon for evidential purposes.<\/strong><\/li>\n\n\n\n<li>As NTP may be subject to alteration, the reliability of a timestamped element must be reinforced through the issuance of a <strong>timestamp token delivered by an eIDAS-qualified trust service provider<\/strong>.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"titre1\">What is NTP (Network Time Protocol)?<\/h2>\n\n\n\n<p>The <strong>NTP protocol <\/strong>refers to a standardised mechanism for <strong>time synchronisation between computer systems connected to a network<\/strong>, enabling separate machines to share a common time reference despite the natural drift of their internal clocks.<\/p>\n\n\n\n<p>Its role is to correct these discrepancies by <strong>aligning local clocks with universal time servers<\/strong>, in order to preserve a coherent time base, compatible with operational and security requirements.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Definition of NTP<\/h3>\n\n\n\n<p>From a technical standpoint, NTP is a network protocol that <strong>compares a system\u2019s local time with a reference server <\/strong>and then <strong>adjusts the clock to correct any time difference<\/strong>.<\/p>\n\n\n\n<p>It relies on a <strong>hierarchical structure known as stratum<\/strong>, at the top of which sit highly precise time sources such as atomic clocks or GPS signals. These sources feed intermediate servers, which then distribute the time to client systems.<\/p>\n\n\n\n<p>Each exchange makes it possible to <strong>estimate the time difference and network delay<\/strong>, allowing the computer\u2019s clock to be adjusted gradually. This mechanism is intended to ensure consistent time synchronisation across systems.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Why is time synchronisation essential?<\/h3>\n\n\n\n<p>Time synchronisation underpins the operations of information systems that rely on automated exchanges and traceability mechanisms.<\/p>\n\n\n\n<p>A shared time reference makes it possible to order events, reconstruct sequences of actions and use technical logs in a reliable manner.<\/p>\n\n\n\n<p>By contrast, when clocks are not synchronised, incident analysis becomes more difficult and time-based security mechanisms are weakened.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"titre2\">How does the NTP protocol work?<\/h2>\n\n\n\n<p>The NTP protocol operates through regular exchanges between client systems and time servers in order to assess and then correct any time differences.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Hierarchical architecture of time servers (stratum)<\/h3>\n\n\n\n<p>NTP is based on a hierarchical structure organised into levels, known as stratum, which defines how the time reference is produced and then distributed across networks.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Stratum 0:<\/strong> highly precise reference time sources that are not directly accessible over the network (atomic clocks, GPS signals).<\/li>\n\n\n\n<li><strong>Stratum 1:<\/strong> servers directly connected to a stratum 0 source. In the United Kingdom, the National Physical Laboratory (NPL) maintains the national time scale, UTC(NPL), and operates reference time services that disseminate the legal time.<\/li>\n\n\n\n<li><strong>Stratum 2 and above: <\/strong>intermediate servers and end clients that synchronise with higher-level servers in order to relay time at scale.<\/li>\n<\/ul>\n\n\n\n<p>This hierarchy makes it possible to distribute a shared time reference while controlling the load on primary sources and ensuring a controlled dissemination of time.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">NTP exchanges and system clock adjustment<\/h3>\n\n\n\n<p>When a client queries an NTP server, several messages are exchanged to estimate both the time difference and the network transmission delay.<\/p>\n\n\n\n<p>The system then calculates the necessary adjustment, with millisecond-level precision.<\/p>\n\n\n\n<p>This correction is applied gradually to avoid abrupt changes to system time and to preserve application stability.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"titre3\">What are the limitations and vulnerabilities of the NTP protocol?<\/h2>\n\n\n\n<p>While NTP provides a well-established technical foundation for time synchronisation, it nevertheless has inherent limitations that can be an issue if the time reference becomes a matter of security or evidence.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Risks of time manipulation<\/h3>\n\n\n\n<p>NTP may be exposed to manipulation scenarios aimed at <strong>altering a system\u2019s reference time<\/strong>.<\/p>\n\n\n\n<p><strong>Spoofing attacks or the injection of a rogue time server<\/strong> may cause a client to accept an incorrect time, advanced or delayed.<\/p>\n\n\n\n<p>An intentionally introduced time drift then affects the dating of events, alters the chronological order of recorded actions, and undermines the reliability of the system\u2019s digital traceability.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Impacts on cybersecurity<\/h3>\n\n\n\n<p>Any alteration to time synchronisation has direct consequences for security mechanisms.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Inconsistent event logs make <strong>incident analysis and alert correlation within monitoring systems more difficult<\/strong>.<\/li>\n\n\n\n<li>Time-dependent mechanisms, such as <a href=\"https:\/\/evidency.io\/en\/qualified-timestamping\/\">qualified timestamping<\/a> and electronic seals and signatures, may thus <strong>lose their internal consistency<\/strong>.<\/li>\n<\/ul>\n\n\n\n<p>In a litigation or audit context, such discrepancies make it harder to establish a reliable chronology, thereby weakening the evidential weight of timestamped data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"titre4\">Why is the NTP protocol fundamental to electronic timestamping?<\/h2>\n\n\n\n<p>Electronic timestamping relies on the ability to associate a certain date and time with digital data or documents.<\/p>\n\n\n\n<p>In this respect, NTP acts as a technical link that helps ensure the temporal accuracy of the systems that generate or rely on such timestamps.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Timestamping relies on a reliable time source<\/h3>\n\n\n\n<p>For a timestamp to be usable, the systems that generate it must rely on a <strong>shared time reference<\/strong>. NTP aligns the clocks of application servers and technical infrastructures on the same time base, which is necessary to <strong>avoid discrepancies in dating<\/strong>. This synchronisation provides a <strong>consistent internal timeline<\/strong>, which is required for a timestamp to have legal effect under eIDAS.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">NTP as a technical component, not an evidential guarantee<\/h3>\n\n\n\n<p>NTP provides the technical foundation required for time synchronisation. It aligns system clocks, but on its own it does not guarantee the integrity of the process, nor does it prevent the time reference from being altered.<\/p>\n\n\n\n<p>For a timestamp to have legal effect, it must be generated within a <strong>controlled and traceable framework<\/strong> that can be relied upon in the event of a dispute. This is the role of a <a href=\"https:\/\/evidency.io\/en\/checklist-cto-how-to-choose-qualified-trust-service-provider\/\">trust service provider<\/a>, such as Evidency, which secures the time source, seals the timestamp and <strong>ensures its admissibility in accordance with the eIDAS framework<\/strong>.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">How does NTP help build a chain of trust?<\/h3>\n\n\n\n<p>Using NTP helps keep time consistent across all servers involved in generating timestamps. This ensures that timestamps are based on the same stable time reference, reducing discrepancies between systems.<\/p>\n\n\n\n<p>By providing this continuous time consistency, NTP supports the <strong>reliability of date-related information<\/strong>. It therefore contributes to a <strong>temporal chain of trust<\/strong> on which timestamping mechanisms with higher legal requirements can be built.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"titre5\">Practical business implications: data security and traceability<\/h2>\n\n\n\n<p>Poor clock synchronisation can trigger a cascade of issues across information systems. Misaligned clocks undermine the analysis of security incidents by making it difficult to accurately reconstruct events or to correctly order records within a database. Such time discrepancies can, for example, lead to the <strong>invalidation of an <a href=\"https:\/\/evidency.io\/en\/guide-electronic-signature\/\">electronic signature<\/a><\/strong>. This, in turn, weakens an evidential file or creates a <strong>risk of non-compliance during audits<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"titre6\">Why trust Evidency\u2019s timestamping services?<\/h2>\n\n\n\n<p>Evidency is an <strong>eIDAS-qualified trust service provider<\/strong>, accredited by ANSSI. This status is based on the use of secure, audited and reliable time sources, built into an infrastructure designed to <strong>prevent any tampering with the time reference<\/strong>.<\/p>\n\n\n\n<p>As a result, each timestamp token issued by Evidency constitutes legally enforceable evidence and benefits from a <strong>presumption of reliability<\/strong>. If a timestamp is challenged, the burden of proof lies with the party disputing it.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>The NTP protocol provides a shared time reference across information systems, which is necessary for consistency and traceability. However, NTP alone is only a technical foundation. It does not, by itself, meet the legal standards required for electronic evidence. Where date and time are relied upon as evidence, their integrity must be demonstrable. This is why timestamps should be issued by an <a href=\"https:\/\/evidency.io\/en\/trust-service-provider-tsp-definition\/\">eIDAS-qualified trust service provider<\/a>, capable of delivering time evidence that can withstand audit and legal scrutiny.<\/p>\n\n\n\n<div style=\"height:45px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-background wp-element-button\" href=\"https:\/\/evidency.io\/en\/contact-evidency\/\" style=\"background-color:#0c0171\">Contact us for more information on our Qualified Timestamping solution<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:44px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div style=\"height:54px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<p><strong><em>Disclaimer<\/em><\/strong><\/p>\n\n\n\n<p><em>The opinions, presentations, figures and estimates set forth on the website including in the blog are for informational purposes only and should not be construed as legal advice. For legal advice you should contact a legal professional in your jurisdiction.<\/em><\/p>\n\n\n\n<p><em>The use of any content on this website, including in this blog, for any commercial purposes, including resale, is prohibited, unless permission is first obtained from Evidency. Request for permission should state the purpose and the extent of the reproduction. For non-commercial purposes, all material in this publication may be freely quoted or reprinted, but acknowledgement is required, together with a link to this website.<\/em><\/p>\n<\/div>\n<\/div>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Key points on NTP Protocol What is NTP (Network Time Protocol)? The NTP protocol refers to a standardised mechanism for time synchronisation between computer systems connected to a network, enabling separate machines to share a common time reference despite the natural drift of their internal clocks. Its role is to correct these discrepancies by aligning [&hellip;]<\/p>\n","protected":false},"author":246879328,"featured_media":10458,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[6426,6410],"tags":[],"ppma_author":[6458],"class_list":["post-9673","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-electronic-seal","category-timestamping","author-marine-yborra"],"acf":{"profil":"","bio":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>NTP protocol: definition and practical guide<\/title>\n<meta name=\"description\" content=\"Understand the purpose of the NTP protocol, how it enables time synchronisation across networks, and why it is fundamental to the security of electronic data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NTP protocol: definition and practical guide\" \/>\n<meta property=\"og:description\" content=\"Understand the purpose of the NTP protocol, how it enables time synchronisation across networks, and why it is fundamental to the security of electronic data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/\" \/>\n<meta property=\"og:site_name\" content=\"Evidency\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-22T16:26:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-06T09:10:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/evidency.io\/wp-content\/uploads\/2025\/12\/network-time-protocol-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"950\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Marine Yborra\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nicolas Peigner\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/\"},\"author\":{\"name\":\"Nicolas Peigner\",\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/person\/c4fba2cace4e9303d552b60ebdc0618d\"},\"headline\":\"What role does NTP (Network Time Protocol) play in the security of electronic data?\",\"datePublished\":\"2025-12-22T16:26:59+00:00\",\"dateModified\":\"2026-02-06T09:10:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/\"},\"wordCount\":1352,\"publisher\":{\"@id\":\"https:\/\/evidency.io\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2025\/12\/network-time-protocol-1.webp\",\"articleSection\":[\"Electronic seal\",\"Timestamping\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/\",\"url\":\"https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/\",\"name\":\"NTP protocol: definition and practical guide\",\"isPartOf\":{\"@id\":\"https:\/\/evidency.io\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2025\/12\/network-time-protocol-1.webp\",\"datePublished\":\"2025-12-22T16:26:59+00:00\",\"dateModified\":\"2026-02-06T09:10:11+00:00\",\"description\":\"Understand the purpose of the NTP protocol, how it enables time synchronisation across networks, and why it is fundamental to the security of electronic data.\",\"breadcrumb\":{\"@id\":\"https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/#primaryimage\",\"url\":\"https:\/\/evidency.io\/wp-content\/uploads\/2025\/12\/network-time-protocol-1.webp\",\"contentUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2025\/12\/network-time-protocol-1.webp\",\"width\":950,\"height\":500,\"caption\":\"network time protocol ntp d\u00e9finition\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Evidency\",\"item\":\"https:\/\/evidency.io\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What role does NTP (Network Time Protocol) play in the security of electronic data?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/evidency.io\/en\/#website\",\"url\":\"https:\/\/evidency.io\/en\/\",\"name\":\"Evidency\",\"description\":\"Sp\u00e9cialiste de la preuve num\u00e9rique\",\"publisher\":{\"@id\":\"https:\/\/evidency.io\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/evidency.io\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/evidency.io\/en\/#organization\",\"name\":\"Evidency\",\"url\":\"https:\/\/evidency.io\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/evidency.io\/wp-content\/uploads\/2024\/09\/header-logo.svg\",\"contentUrl\":\"https:\/\/evidency.io\/wp-content\/uploads\/2024\/09\/header-logo.svg\",\"width\":275,\"height\":58,\"caption\":\"Evidency\"},\"image\":{\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/evidency-io\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/person\/c4fba2cace4e9303d552b60ebdc0618d\",\"name\":\"Nicolas Peigner\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/evidency.io\/en\/#\/schema\/person\/image\/a071e9b393d0615a4fc88b28477f483e\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e715d858349a05f43035c04618d0dd510a10a05de09616ec2dac22d1fc3f8c1b?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e715d858349a05f43035c04618d0dd510a10a05de09616ec2dac22d1fc3f8c1b?s=96&d=identicon&r=g\",\"caption\":\"Nicolas Peigner\"},\"description\":\"Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus aliquet dolor vel molestie pellentesque. Curabitur vitae condimentum lectus, ac laoreet magna. Nullam eu tortor odio.\",\"url\":\"https:\/\/evidency.io\/author\/nicolas2805\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NTP protocol: definition and practical guide","description":"Understand the purpose of the NTP protocol, how it enables time synchronisation across networks, and why it is fundamental to the security of electronic data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/","og_locale":"en_US","og_type":"article","og_title":"NTP protocol: definition and practical guide","og_description":"Understand the purpose of the NTP protocol, how it enables time synchronisation across networks, and why it is fundamental to the security of electronic data.","og_url":"https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/","og_site_name":"Evidency","article_published_time":"2025-12-22T16:26:59+00:00","article_modified_time":"2026-02-06T09:10:11+00:00","og_image":[{"width":950,"height":500,"url":"https:\/\/evidency.io\/wp-content\/uploads\/2025\/12\/network-time-protocol-1.webp","type":"image\/webp"}],"author":"Marine Yborra","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Nicolas Peigner","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/#article","isPartOf":{"@id":"https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/"},"author":{"name":"Nicolas Peigner","@id":"https:\/\/evidency.io\/en\/#\/schema\/person\/c4fba2cace4e9303d552b60ebdc0618d"},"headline":"What role does NTP (Network Time Protocol) play in the security of electronic data?","datePublished":"2025-12-22T16:26:59+00:00","dateModified":"2026-02-06T09:10:11+00:00","mainEntityOfPage":{"@id":"https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/"},"wordCount":1352,"publisher":{"@id":"https:\/\/evidency.io\/en\/#organization"},"image":{"@id":"https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/#primaryimage"},"thumbnailUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2025\/12\/network-time-protocol-1.webp","articleSection":["Electronic seal","Timestamping"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/","url":"https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/","name":"NTP protocol: definition and practical guide","isPartOf":{"@id":"https:\/\/evidency.io\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/#primaryimage"},"image":{"@id":"https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/#primaryimage"},"thumbnailUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2025\/12\/network-time-protocol-1.webp","datePublished":"2025-12-22T16:26:59+00:00","dateModified":"2026-02-06T09:10:11+00:00","description":"Understand the purpose of the NTP protocol, how it enables time synchronisation across networks, and why it is fundamental to the security of electronic data.","breadcrumb":{"@id":"https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/#primaryimage","url":"https:\/\/evidency.io\/wp-content\/uploads\/2025\/12\/network-time-protocol-1.webp","contentUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2025\/12\/network-time-protocol-1.webp","width":950,"height":500,"caption":"network time protocol ntp d\u00e9finition"},{"@type":"BreadcrumbList","@id":"https:\/\/evidency.io\/en\/what-is-ntp-network-time-protocole\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Evidency","item":"https:\/\/evidency.io\/en\/"},{"@type":"ListItem","position":2,"name":"What role does NTP (Network Time Protocol) play in the security of electronic data?"}]},{"@type":"WebSite","@id":"https:\/\/evidency.io\/en\/#website","url":"https:\/\/evidency.io\/en\/","name":"Evidency","description":"Sp\u00e9cialiste de la preuve num\u00e9rique","publisher":{"@id":"https:\/\/evidency.io\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/evidency.io\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/evidency.io\/en\/#organization","name":"Evidency","url":"https:\/\/evidency.io\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evidency.io\/en\/#\/schema\/logo\/image\/","url":"https:\/\/evidency.io\/wp-content\/uploads\/2024\/09\/header-logo.svg","contentUrl":"https:\/\/evidency.io\/wp-content\/uploads\/2024\/09\/header-logo.svg","width":275,"height":58,"caption":"Evidency"},"image":{"@id":"https:\/\/evidency.io\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/evidency-io\/"]},{"@type":"Person","@id":"https:\/\/evidency.io\/en\/#\/schema\/person\/c4fba2cace4e9303d552b60ebdc0618d","name":"Nicolas Peigner","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/evidency.io\/en\/#\/schema\/person\/image\/a071e9b393d0615a4fc88b28477f483e","url":"https:\/\/secure.gravatar.com\/avatar\/e715d858349a05f43035c04618d0dd510a10a05de09616ec2dac22d1fc3f8c1b?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e715d858349a05f43035c04618d0dd510a10a05de09616ec2dac22d1fc3f8c1b?s=96&d=identicon&r=g","caption":"Nicolas Peigner"},"description":"Lorem ipsum dolor sit amet, consectetur adipiscing elit. Phasellus aliquet dolor vel molestie pellentesque. Curabitur vitae condimentum lectus, ac laoreet magna. Nullam eu tortor odio.","url":"https:\/\/evidency.io\/author\/nicolas2805\/"}]}},"modified_by":"Nicolas Peigner","authors":[{"term_id":6458,"user_id":0,"is_guest":1,"slug":"marine-yborra","display_name":"Marine Yborra","avatar_url":{"url":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Marine-1.webp","url2x":"https:\/\/evidency.io\/wp-content\/uploads\/2026\/01\/Marine-1.webp"},"author_category":"1","first_name":"Marine","description_complete":"<p>Marine Yborra is the Chief Marketing Officer at Evidency, where she leads the company\u2019s marketing strategy. With over twenty years of international experience in both B2B and B2C environments, she has developed strong expertise in brand strategy, positioning, and activation. Her career, spanning diverse sectors and business models, gives her a unique ability to make complex, high-value solutions accessible and relevant to demanding markets.<\/p>\r\n\r\n<p>At Evidency, Marine is responsible for defining and communicating the company\u2019s value proposition to legal professionals, businesses, and organisations operating in regulated industries. She drives initiatives to raise awareness of Evidency\u2019s role as a Qualified Trust Service Provider (QTSP), ensuring that its solutions, ranging from qualified timestamping and electronic seals to long-term compliant archiving, are clearly understood and widely adopted. She translates regulatory and technical topics into actionable insights, helping professionals ensure the authenticity, integrity, and legal validity of their digital evidence.<\/p>","domaine_dexpertise":"<ul>\r\n \t<li>Communication and digital strategy<\/li>\r\n \t<li>Digital transformation<\/li>\r\n \t<li>B2B and B2C<\/li>\r\n<\/ul>","last_name":"Yborra","user_url":"","job_title":"CMO","linkedin":"https:\/\/www.linkedin.com\/in\/marine-yborra-marketing\/","description":"Marine is the Chief Marketing Officer at Evidency. A specialist in branding and brand activation, she has international experience in both B2B and B2C."}],"_links":{"self":[{"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/posts\/9673","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/users\/246879328"}],"replies":[{"embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/comments?post=9673"}],"version-history":[{"count":3,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/posts\/9673\/revisions"}],"predecessor-version":[{"id":11380,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/posts\/9673\/revisions\/11380"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/media\/10458"}],"wp:attachment":[{"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/media?parent=9673"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/categories?post=9673"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/tags?post=9673"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/evidency.io\/en\/wp-json\/wp\/v2\/ppma_author?post=9673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}