{"id":20474,"date":"2023-05-17T16:07:10","date_gmt":"2023-05-17T15:07:10","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=20474"},"modified":"2023-05-17T16:31:04","modified_gmt":"2023-05-17T15:31:04","slug":"independent-expertise-of-electronic-voting-systems","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/","title":{"rendered":"Independent expertise of electronic voting systems"},"content":{"rendered":"\n<h1 style=\"text-align: justify;\">Introduction<\/h1>\n<h2 style=\"text-align: justify;\">Definition of electronic voting<\/h2>\n<p style=\"text-align: justify;\">Electronic voting is a <strong>dematerialised<\/strong>, <strong>self-counting <\/strong>voting system in which voters use electronic devices to record their votes.<\/p>\n<p style=\"text-align: justify;\">The system can be <strong>used remotely<\/strong> via <strong>internet voting<\/strong>, or in person where voters can visit polling stations equipped with voting machines.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\">History of electronic voting in France<\/h2>\n<h3 style=\"text-align: justify;\">The first traces date back to&#8230;1969!<\/h3>\n<p style=\"text-align: justify;\">The French Minister of the Interior, Raymond Marcellin, had the use of 100% <strong>mechanical <\/strong>voting machines authorised<a href=\"#_edn1\" name=\"_ednref1\">[i]<\/a>. Due to major breakdown and the failure to reduce fraud, these machines fell into disuse, but the amendment made to the electoral code remained.<\/p>\n<h3 style=\"text-align: justify;\">Use in professional elections<\/h3>\n<p style=\"text-align: justify;\">In the <strong>2018 <\/strong>French public sector professional elections,<strong> 5.15 million public employees <\/strong>were asked to vote using an electronic voting solution.<\/p>\n<p style=\"text-align: justify;\">In <strong>2022<\/strong>, <strong>5.6 million public employees <\/strong>in the three branches of the civil service are called upon to vote for their union representatives in the representative bodies. The ballot took place from the 1<sup>st<\/sup> to the 8<sup>th<\/sup> of December 2022. This was precedent in several respects, including the generalisation of electronic voting in the civil service and the establishment of new bodies for social dialogue<a href=\"#_edn2\" name=\"_ednref2\">[ii]<\/a>.<\/p>\n<h3 style=\"text-align: justify;\">Experiments underway for voting by French citizens abroad<\/h3>\n<p style=\"text-align: justify;\">For the 2017 elections, the Ministry of Foreign Affairs and International Development had developed an <strong>online voting <\/strong>platform <strong>for French citizens living abroad to participate in the legislative elections<\/strong>.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\">Types of voting in French organisations<\/h2>\n<p style=\"text-align: justify;\">Since 2018 in the French <strong>private sector<\/strong>, it became compulsory for companies with more than 11 employees to hold elections for members of the staff delegation within the <strong>social and economic committees <\/strong>(<strong>CSE<\/strong>), by secret ballot<a href=\"#_edn3\" name=\"_ednref3\"><\/a><\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\">In all cases, the employer should inform the workforce <strong>every four years <\/strong>(<em>unless the industry agreement provides for a shorter period of <\/em>between two and four years) by posting notices of the elections.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\">How electronic voting works in the context of professional elections<\/h2>\n<p>\u00a0<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-20476 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/05\/EN1.png\" alt=\"\" width=\"945\" height=\"543\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/05\/EN1.png 945w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/05\/EN1-332x191.png 332w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/05\/EN1-68x39.png 68w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/05\/EN1-120x70.png 120w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/05\/EN1-768x441.png 768w\" sizes=\"auto, (max-width: 945px) 100vw, 945px\" \/><\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\">Prior to the vote, the employer must <strong>call the professional elections<\/strong> specifying the date, place, and voting method (paper, electronic, or hybrid).<\/p>\n<p style=\"text-align: justify;\">The organisation of elections is generally based on one or more <strong>centralised polling stations <\/strong>and regional polling stations, depending on the volume of votes and voters. The polling station members are <strong>trained<\/strong>, the solution is <strong>assessed, <\/strong>and <strong>test elections <\/strong>are held.<\/p>\n<p style=\"text-align: justify;\">Once the solution has been <strong>validated <\/strong>it goes into <strong>production<\/strong>, and<strong> the election can begin<\/strong>:<\/p>\n<ol style=\"text-align: justify;\">\n<li>The <strong>electoral lists <\/strong>are drawn up and unions or employees can check and report any errors or omissions.<\/li>\n<li>Candidates can <strong>campaign <\/strong>to the voters and present their program.<\/li>\n<li>On the day of the <strong>opening of the vote<\/strong>, the solution is <strong>sealed <\/strong>using private encryption keys, where 1\/3 is held by the corporate administration and 2\/3 by the trade unions.<\/li>\n<li>Voters then<strong> vote according to the <\/strong>designated <strong>timetable<\/strong>, the polling stations monitor the counting of votes and assist the voters, the supervision unit monitors the process and manages any incidents, and the provider company is mobilised if necessary.<\/li>\n<li><strong>On the closing <\/strong>day of <strong>the elections<\/strong>, the integrity of the ballot box (urn) is checked, and the unsealing is carried out by the administration and the trade unions.<\/li>\n<li>The <strong>counting of <\/strong>the votes is then carried out under the control of the centralising polling stations.<\/li>\n<li>The <strong>results of <\/strong>the elections should be communicated to the voters, publicly displayed, and sent to the labour inspector (<em>\u201cInspecteur du travail\u201d<\/em>).<\/li>\n<li>The ballot box is <strong>sealed <\/strong>again, and the entire solution <em>(including copies of source and executable programs, voting materials, vote count, results and backup files and files that keep track of interventions on the system<\/em>) is<strong> archived under seal<\/strong> for a minimum of 2 years.<\/li>\n<li>In the event of a <strong>dispute<\/strong>, an appeal may be lodged with the labour inspector or the district court.<\/li>\n<\/ol>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h1 style=\"text-align: justify;\">What are the opportunities and risks in electronic voting?<\/h1>\n<h2 style=\"text-align: justify;\">Opportunities<\/h2>\n<h3 style=\"text-align: justify;\">Ease of implementation of the ballot<\/h3>\n<p style=\"text-align: justify;\">Electronic voting is <strong>generally more efficient to implement than paper voting<\/strong>, requiring less manual work for preparation (printing of propaganda posters, logistics, etc.), counting and reporting of results. This leads to a reduction in costs and an improvement in the efficiency of the electoral process.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h3 style=\"text-align: justify;\">Reducing the carbon footprint<\/h3>\n<p style=\"text-align: justify;\">Electronic voting greatly reduces the dependence on paper printing for electoral lists, propaganda documents, and especially ballot papers. It also drastically reduces travel depending on the geographical organisation of the company.<\/p>\n<p style=\"text-align: justify;\">According to a study by Kercia<a href=\"#_edn4\" name=\"_ednref4\">[iv]<\/a>, the carbon footprint of a postal vote is more than twice that of an electronic vote.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h3 style=\"text-align: justify;\">Maximising participation and elected bodies with a broader electoral base<\/h3>\n<p style=\"text-align: justify;\">Electronic voting allows for greater <strong>voter participation.<\/strong><\/p>\n<p style=\"text-align: justify;\">A study conducted in Switzerland in 2011 showed that turnout <strong>increased by 2.2%<\/strong><a href=\"#_edn5\" name=\"_ednref5\">[v]<\/a> in cantons that implemented e-voting compared to those that did not use this method. Similarly, a study in Estonia in 2014 found that the use of e-voting <strong>increased voter turnout by 3-4%<\/strong><a href=\"#_edn6\" name=\"_ednref6\">[vi]<\/a><strong>.<\/strong><\/p>\n<p style=\"text-align: justify;\">Voters can vote remotely <strong>without having to physically travel <\/strong>to the polling station. This can increase voter turnout, especially in the context of the widespread use of remote work post-COVID-19.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h3 style=\"text-align: justify;\">Agreements with a stronger democratic basis<\/h3>\n<p style=\"text-align: justify;\">E-voting can help to <strong>strengthen social dialogue <\/strong>due to wider outreach and greater accessibility for voter participation. The results of elections are more convincing by increasing the participation in the polls.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\">Risks<\/h2>\n<h3 style=\"text-align: justify;\">Alteration of results<\/h3>\n<p style=\"text-align: justify;\">Electronic voting systems can be vulnerable to attacks such as the <strong>usurpation <\/strong>of voter <strong>accounts<\/strong>, <strong>multiple votes by the same voter in the same election<\/strong>, or the <strong>compromise of ballots<\/strong>.<\/p>\n<h3 style=\"text-align: justify;\">Protection of personal data<\/h3>\n<p style=\"text-align: justify;\">The implementation of e-voting platforms should consider the <strong>risk of excessive collection of sensitive personal data <\/strong>such as voters&#8217; political opinions.<\/p>\n<p style=\"text-align: justify;\">Voters&#8217; personal information may also be stored on vulnerable servers, exposing this data to the <strong>risk of compromised voting secrecy or data leakage<\/strong>.<\/p>\n<h3 style=\"text-align: justify;\">Transparency of voting operations<\/h3>\n<p style=\"text-align: justify;\">It can be difficult for each stakeholder to understand how votes are recorded and how the results are tabulated, leading to <strong>mistrust of the solution and the election<\/strong> <strong>results.<\/strong><\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\">These risks must be considered and mitigated in order to drastically reduce the probability of occurrence and\/or their impact on the smooth running of the elections.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h1 style=\"text-align: justify;\">How to comply with the regulations?<\/h1>\n<h2 style=\"text-align: justify;\">CNIL deliberation 2019-053 of 25 April 2019<\/h2>\n<p>\u00a0<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-20478 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/05\/EN2.png\" alt=\"\" width=\"601\" height=\"357\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/05\/EN2.png 601w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/05\/EN2-322x191.png 322w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/05\/EN2-66x39.png 66w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/05\/EN2-120x70.png 120w\" sizes=\"auto, (max-width: 601px) 100vw, 601px\" \/><\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\">The <strong>CNIL<\/strong> (<em>National Commission for Information Technology and Civil Liberties<\/em>)<strong> deliberation n\u00b02019-053 of 25 April 2019<\/strong><a href=\"#_edn7\" name=\"_ednref7\">[vii]<\/a> simplifies and clarifies the texts of 2010 and 2018. The process is as follows:<\/p>\n<ol style=\"text-align: justify;\">\n<li>Choice of <strong>security level <\/strong>(1, 2 or 3) according to a questionnaire provided by the CNIL<a href=\"#_edn8\" name=\"_ednref8\">[viii]<\/a>.<\/li>\n<li>Implementation of a <strong>test voting platform <\/strong>(iso-production) prior to the elections, with support from the independent expert in the event of questions relating to the conformity of the technical and organisational choices to be made.<\/li>\n<li><strong>Independent assessment of the <\/strong>solution to evaluate the compliance of the solution with the security objectives: depending on the defined risk level, the security objectives are more or less strict. These are cumulative, e.g., if a risk level of 3 is defined, the objectives of levels 1, 2 and 3 must be met.<\/li>\n<\/ol>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\">Decree 2011-595 (public sector)<\/h2>\n<p style=\"text-align: justify;\">A regulation has been added to the CNIL deliberation 2019-053 for the <strong>public service <\/strong>and certain parastatal sector companies<a href=\"#_edn9\" name=\"_ednref9\">[ix]<\/a> :<\/p>\n<p>\u00a0<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-20480 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/05\/EN3.png\" alt=\"\" width=\"601\" height=\"415\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/05\/EN3.png 601w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/05\/EN3-277x191.png 277w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/05\/EN3-56x39.png 56w\" sizes=\"auto, (max-width: 601px) 100vw, 601px\" \/><\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: justify;\">In addition to the CNIL security objectives, <strong>18 articles <\/strong>composing this decree must be respected and checked by the independent expert. The control points include for example:<\/p>\n<ul style=\"text-align: justify;\">\n<li><em>\u201cAt least 2\/3 of the keys are allocated to the list delegates and at least 1 key is allocated to the president of the polling station or his representative.\u201d<\/em><\/li>\n<li><em>\u201cThe sealing is carried out by the combination of at least 2 encryption keys, including the one of the president of the polling station or his representative and the one of at least one list delegate\u201d <\/em><\/li>\n<li><em>\u201cA process ensures that the voters\u2019 list is only modified by the addition of a ballot electronical paper, which is issued by an authenticated voter casting the vote.\u201d<\/em><\/li>\n<li><em>&#8220;Each voter shall be provided at least fifteen days before the first day of the election with a means of authentication enabling him or her to participate in the election &#8211; the confidentiality of this means of authentication shall be guaranteed\u201d<\/em><\/li>\n<li><em>&#8220;A process ensures that the electronic ballot box (urn) is only modified by the vote of an authenticated voter\u201d<\/em><\/li>\n<\/ul>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\">Independent expertise<\/h2>\n<h3 style=\"text-align: justify;\">Obligation<\/h3>\n<p style=\"text-align: center;\"><em>&#8220;<strong>Any data controller <\/strong>implementing an electronic voting system, in particular via the Internet, <strong>must have its solution assessed by an independent expert<\/strong>, whether the voting solution is managed internally or provided by a service provider.&#8221; &#8211; CNIL Deliberation 2019-053<\/em><\/p>\n<h3 style=\"text-align: justify;\">Modalities<\/h3>\n<h4 style=\"text-align: justify;\">When?<\/h4>\n<p style=\"text-align: justify;\">This expertise must be carried out:<\/p>\n<ul style=\"text-align: justify;\">\n<li><strong>Prior to the implementation of <\/strong>the electronic voting system<\/li>\n<li>In the event of a design <strong>change to <\/strong>the existing electronic voting system<\/li>\n<li>For <strong>every new election <\/strong>using the electronic voting system, even if it has already been audited<\/li>\n<\/ul>\n<h4 style=\"text-align: justify;\">By whom?<\/h4>\n<p style=\"text-align: justify;\">By an independent expert, who must:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Be an IT (Information Technology) <strong>specialist in security<\/strong><\/li>\n<li><strong>Not having an interest in the company <\/strong>that created the voting solution or in the organisation responsible for processing<\/li>\n<li>If possible,<strong> have experience <\/strong>in analysing voting systems, having assessed the voting systems of at least two different providers.<\/li>\n<\/ul>\n<h4 style=\"text-align: justify;\">Why?<\/h4>\n<p style=\"text-align: justify;\">To ensure <strong>compliance with the fundamental principles <\/strong>governing electoral operations:<\/p>\n<ul style=\"text-align: justify;\">\n<li>The secrecy of the ballot<\/li>\n<li>The personal and free nature of voting<\/li>\n<li>The sincerity of the electoral operations<\/li>\n<li>Effective monitoring of the vote by the electoral commission<\/li>\n<li>A posteriori control by the election judge<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h3 style=\"text-align: justify;\">Typical working approach<\/h3>\n<p style=\"text-align: justify;\">Our vision of independent expertise is illustrated by the main steps described in this chapter.<\/p>\n<h4 style=\"text-align: justify;\">Initialisation and framing<\/h4>\n<p style=\"text-align: justify;\">To initiate the mission, a kick-off meeting is organised with the project contacts.<\/p>\n<p style=\"text-align: justify;\">The purpose of this meeting is to introduce the <strong>teams<\/strong>, define the <strong>milestones<\/strong> and project <strong>schedule<\/strong>, specify the service <strong>monitoring <\/strong>procedures, the <strong>communication <\/strong>procedures between the parties (encryption of exchanges, etc.), collect the existing <strong>documentation<\/strong>, and set up the <strong>committee procedure<\/strong>.<\/p>\n<h4 style=\"text-align: justify;\">Audit of the solution and expert support<\/h4>\n<p style=\"text-align: justify;\">This central phase of the assessment is based on a theoretical and practical analysis:<\/p>\n<ul style=\"text-align: justify;\">\n<li><strong>Control of project documentation and <\/strong>specifications\n<ul>\n<li>From the &#8220;paper&#8221; phase onwards, it is necessary to ensure that all the points of compliance are present and in line with the regulations in force: <em>technologies used and updates of the latter, hosting of the solution, physical security, architecture and high availability, partitioning between ballots, sealing and encryption techniques, means of compiling, correlating, communicating and deleting electoral lists, voter authentication scheme, etc.<\/em><\/li>\n<\/ul>\n<\/li>\n<li><strong>Support in expertise and safety advice<\/strong>\n<ul>\n<li>This involves providing ad hoc expertise on subjects relating to the legal and regulatory framework during the design and implementation phase of the solution and processes (g., <em>choice of authentication factors, process for storing sealing keys, etc<\/em><em>.<\/em>).<\/li>\n<\/ul>\n<\/li>\n<li><strong>Technical audit of the solution<\/strong>\n<ul>\n<li><strong>Architecture review <\/strong>to check the compliance of physical and logical partitioning, security of flows, hosting, high availability, etc.<\/li>\n<li><strong>Audit of the organisation and processes <\/strong>such as sealing, authentication communication, archiving, etc.<\/li>\n<li><strong>Technical configuration review of the key servers of <\/strong>the solution<\/li>\n<li>Audit of the <strong>source code <\/strong>and <strong>encryption mechanisms<\/strong> of the solution based, among other security frameworks, on the RGS<a href=\"#_edn10\" name=\"_ednref10\">[x]<\/a> (<em>R\u00e9f\u00e9rentiel G\u00e9n\u00e9ral de S\u00e9curit\u00e9<\/em>)<\/li>\n<li><strong>Black-box and grey-box penetration testing <\/strong>of voting portals and the supervision back-office<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<h4 style=\"text-align: justify;\">Observation of test elections<\/h4>\n<p style=\"text-align: justify;\">This phase aims to simulate an election to check the correct application of the protocol and the processes verified beforehand on field:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Validation of the compliance<strong> monitoring <\/strong>process\n<ul>\n<li>In this step, the aim is to verify that the technique used for the verification of the non-alteration of the system (fingerprinting) works.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Checks on the solution on field<\/strong>\n<ul>\n<li>It is a matter of ensuring, in vivo, that all the points mentioned in terms of security and regulations are in place, for example through the analysis of application and system logs, or &#8220;random&#8221; checks: presence of temporary files containing sensitive information, capacity to collect data, etc.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Expertise support during the voting process and assistance in adapting procedures in case of unforeseen events<\/strong><\/li>\n<\/ul>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h4 style=\"text-align: justify;\">Accompaniment during the actual election<\/h4>\n<p style=\"text-align: justify;\">The same checks as during the test elections are carried out, and specifically:<\/p>\n<ul style=\"text-align: justify;\">\n<li>System <strong>integrity check<\/strong>: Fingerprinting of essential system components (libraries, code, encryption libraries, etc.) and comparison of the fingerprints with those obtained beforehand.<\/li>\n<li>Compliance with the <strong>regulatory framework<\/strong>: sealing process, access, and use of encryption\/decryption keys, counting process, etc.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h1 style=\"text-align: justify;\">What are the pitfalls and how can they be avoided?<\/h1>\n<h2 style=\"text-align: justify;\">Limited access to systems<\/h2>\n<p style=\"text-align: justify;\">The <strong>high expertise market <\/strong>context of voting solutions may make vendors <strong>reluctant to share confidential information <\/strong>about their technology, such as <strong>source code<\/strong>, in the interests of <strong>industrial secrecy, which <\/strong>may limit the ability of experts to assess system compliance.<\/p>\n<p style=\"text-align: justify;\">In order to avoid this pitfall, it is essential to implement <strong>regular communication <\/strong>and <strong>full transparency <\/strong>of the actions of the independent expert. <strong>Guarantees <\/strong>must be provided for the protection of the confidentiality of the data collected and processed via <strong>processes and an IS certified by SMSI or II 901<\/strong><a href=\"#_edn11\" name=\"_ednref11\">[xi]<\/a> (French norm for \u201c<em>Restricted Distribution\u201d<\/em> classified information).<\/p>\n<p style=\"text-align: justify;\">Furthermore, we recommend that independent experts are <strong>flexible in their organisation, for <\/strong>example by agreeing to consult the source code exclusively on the provider&#8217;s premises.<\/p>\n<p style=\"text-align: justify;\">Finally, it should be recalled that CNIL deliberation 2019-053 requires the service provider to make available &#8220;the source code corresponding to the version of the software actually implemented &#8221; to the independent expert.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\">Distrust of trade unions and voters<\/h2>\n<p style=\"text-align: justify;\">Trade unions and voters can legitimately question <strong>the independence of <\/strong>the expert and the <strong>guarantees provided by the expertise<\/strong>, leading to <strong>mistrust of <\/strong>the electronic voting solution.<\/p>\n<p style=\"text-align: justify;\">These fears are well-founded and must be <strong>addressed <\/strong>through <strong>transparency and the <\/strong>provision of <strong>factual <\/strong>and <strong>verifiable evidence <\/strong>for each observation reported during the assessment.<\/p>\n<p style=\"text-align: justify;\">Furthermore, no findings should be ambiguous, conditional, or omitted.<\/p>\n<p style=\"text-align: justify;\">Finally, it is essential to present the <strong>limits <\/strong>of the expertise exercise, and the logical impossibility of providing a 100% guarantee that the system cannot be attacked.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h2 style=\"text-align: justify;\">Interpretation of the regulations<\/h2>\n<p style=\"text-align: justify;\">The available <strong>regulations <\/strong>are not always <strong>clear <\/strong>and explicit, including<\/p>\n<ul style=\"text-align: justify;\">\n<li><strong>Non-standard architectures <\/strong>are not subject to specific rules\n<ul>\n<li><em>Ex: An architecture based on an IS straddling the SaaS (Software as a Service) solution publisher and the employer&#8217;s IS<\/em><\/li>\n<\/ul>\n<\/li>\n<li>Some <strong>terms <\/strong>may be <strong>ambiguous<\/strong>\n<ul>\n<li><em>g.: &#8220;A voter&#8217;s vote must be an atomic operation&#8221; &#8211; atomicity being a functional rather than a technical notion, e.g., Internet communication protocols do not allow the entire ballot to be contained in a single network packet<\/em><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">The application of <strong>security standards and frameworks <\/strong>(such as RGS), direct consultation with the <strong>CNIL<\/strong>, and the implementation of a <strong>solution that responds to the risk <\/strong>in substance are all ways of remedying this pitfall.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<h1 style=\"text-align: justify;\">Conclusion and recommendations<\/h1>\n<p style=\"text-align: justify;\">To make <strong>the most of the independent expertise <\/strong>and to <strong>factualise <\/strong>it, we recommend <strong>combining the regulatory compliance approach with a risk-oriented approach<\/strong>, based on the technical audit (penetration tests, configuration reviews, etc.) in a logic of practical and <strong>pragmatic securing <\/strong>of the solution <strong>within the regulatory framework<\/strong>.<\/p>\n<p style=\"text-align: justify;\">This exercise can only be carried out effectively and efficiently if <strong>all <\/strong>project <strong>stakeholders, <\/strong>including the publisher and trade unions, are <strong>involved <\/strong>and <strong>made aware of the project <\/strong>as early as the design phase.<\/p>\n<p style=\"text-align: justify;\">Finally, it is necessary to bear in mind that e-voting is a constantly <strong>evolving technology<\/strong>. It is likely that new methods and technologies will emerge in the future, leading to an <strong>evolution of the regulations<\/strong>. Therefore, <strong>technical and regulatory monitoring <\/strong>is and will remain an essential subject for election organisers, publishers, and independent expertise companies alike.<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\"><em>For any information or quotation <\/em><em>request<\/em><em> on the subject of the independent expertise of electronic voting systems, we invite you to contact us via the following form: <\/em><a href=\"https:\/\/www.wavestone.com\/fr\/contact\/\">https:\/\/www.wavestone.com\/fr\/contact<em>\/<\/em><\/a><\/p>\n<p style=\"text-align: justify;\">\u00a0<\/p>\n<p style=\"text-align: justify;\"><strong>We wish you every success in organising your professional elections!<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>\u00a0<\/strong><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ednref1\" name=\"_edn1\">[i]<\/a><a href=\"https:\/\/www.legifrance.gouv.fr\/jorf\/id\/JORFTEXT000000511691\/\"> https:\/\/www.legifrance.gouv.fr\/jorf\/id\/JORFTEXT000000511691\/ <\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ednref2\" name=\"_edn2\">[ii]<\/a><a href=\"https:\/\/www.economie.gouv.fr\/elections-professionnelles-2022-quelques-minutes-pour-quatre-annees\">h ttps:\/\/www.economie.gouv.fr\/elections-professionnelles-2022-quelques-minutes-pour-quatre-annees <\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ednref3\" name=\"_edn3\">[iii]<\/a><a href=\"https:\/\/fr.wikipedia.org\/wiki\/Comit%C3%A9_social_et_%C3%A9conomique\"> https:\/\/fr.wikipedia.org\/wiki\/Comit%C3%A9_social_et_%C3%A9conomique <\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ednref4\" name=\"_edn4\">[iv]<\/a><a href=\"https:\/\/www.kercia.com\/vote-electronique\">h ttps:\/\/www.kercia.com\/vote-electronique <\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ednref5\" name=\"_edn5\">[v]<\/a><a href=\"https:\/\/www.admin.ch\/gov\/fr\/accueil\/documentation\/communiques.msg-id-37639.html\">h ttps:\/\/www.admin.ch\/gov\/fr\/accueil\/documentation\/communiques.msg-id-37639.html <\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ednref6\" name=\"_edn6\">[vi]<\/a><a href=\"https:\/\/www.smartmatic.com\/fr\/actualites\/article\/lestonie-atteint-des-taux-records-de-vote-par-internet-grace-a-une-nouvelle-technologie\/\">h ttps:\/\/www.smartmatic.com\/fr\/actualites\/article\/lestonie-atteint-des-taux-records-de-vote-par-internet-grace-a-une-nouvelle-technologie\/ <\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ednref7\" name=\"_edn7\">[vii]<\/a><a href=\"https:\/\/www.legifrance.gouv.fr\/jorf\/id\/JORFTEXT000038661239\"> https:\/\/www.legifrance.gouv.fr\/jorf\/id\/JORFTEXT000038661239 <\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ednref8\" name=\"_edn8\">[viii]<\/a><a href=\"https:\/\/www.cnil.fr\/fr\/securite-des-systemes-de-vote-par-internet-la-cnil-actualise-sa-recommandation-de-2010\"> https:\/\/www.cnil.fr\/fr\/securite-des-systemes-de-vote-par-internet-la-cnil-actualise-sa-recommandation-de-2010 <\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ednref9\" name=\"_edn9\">[ix]<\/a><a href=\"https:\/\/www.legifrance.gouv.fr\/loda\/id\/JORFTEXT000024079803\/\"> https:\/\/www.legifrance.gouv.fr\/loda\/id\/JORFTEXT000024079803\/ <\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ednref10\" name=\"_edn10\">[x]<\/a><a href=\"https:\/\/www.ssi.gouv.fr\/entreprise\/reglementation\/confiance-numerique\/le-referentiel-general-de-securite-rgs\/\"> https:\/\/www.ssi.gouv.fr\/entreprise\/reglementation\/confiance-numerique\/le-referentiel-general-de-securite-rgs\/ <\/a><\/p>\n<p style=\"text-align: justify;\"><a href=\"#_ednref11\" name=\"_edn11\">[xi]<\/a><a href=\"https:\/\/www.ssi.gouv.fr\/guide\/recommandations-pour-les-architectures-des-systemes-dinformation-sensibles-ou-diffusion-restreinte\/\"> https:\/\/www.ssi.gouv.fr\/guide\/recommandations-pour-les-architectures-des-systemes-dinformation-sensibles-ou-diffusion-restreinte\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction Definition of electronic voting Electronic voting is a dematerialised, self-counting voting system in which voters use electronic devices to record their votes. The system can be used remotely via internet voting, or in person where voters can visit polling&#8230;<\/p>\n","protected":false},"author":1418,"featured_media":20471,"comment_status":"open","ping_status":"closed","sticky":true,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3922,3271,3273],"tags":[3738,4265],"coauthors":[3902],"class_list":["post-20474","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-deep-dive-en","category-digital-compliance-en","category-ethical-hacking-indicent-response-en","tag-digital-compliance","tag-e-vote-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Independent expertise of electronic voting systems - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Independent expertise of electronic voting systems - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Introduction Definition of electronic voting Electronic voting is a dematerialised, self-counting voting system in which voters use electronic devices to record their votes. The system can be used remotely via internet voting, or in person where voters can visit polling...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-17T15:07:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-17T15:31:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/05\/fond.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Bilal Benseddiq\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bilal Benseddiq\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/\"},\"author\":{\"name\":\"Bilal Benseddiq\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/66dda0a265d60d65e7a8a3e373ccd8b6\"},\"headline\":\"Independent expertise of electronic voting systems\",\"datePublished\":\"2023-05-17T15:07:10+00:00\",\"dateModified\":\"2023-05-17T15:31:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/\"},\"wordCount\":2676,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/05\/fond.jpg\",\"keywords\":[\"Digital compliance\",\"E-vote\"],\"articleSection\":[\"Deep-dive\",\"Digital Compliance\",\"Ethical Hacking &amp; Incident Response\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/\",\"name\":\"Independent expertise of electronic voting systems - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/05\/fond.jpg\",\"datePublished\":\"2023-05-17T15:07:10+00:00\",\"dateModified\":\"2023-05-17T15:31:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/05\/fond.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/05\/fond.jpg\",\"width\":1080,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Independent expertise of electronic voting systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/66dda0a265d60d65e7a8a3e373ccd8b6\",\"name\":\"Bilal Benseddiq\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/bilal-benseddiq\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Independent expertise of electronic voting systems - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/","og_locale":"en_US","og_type":"article","og_title":"Independent expertise of electronic voting systems - RiskInsight","og_description":"Introduction Definition of electronic voting Electronic voting is a dematerialised, self-counting voting system in which voters use electronic devices to record their votes. The system can be used remotely via internet voting, or in person where voters can visit polling...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/","og_site_name":"RiskInsight","article_published_time":"2023-05-17T15:07:10+00:00","article_modified_time":"2023-05-17T15:31:04+00:00","og_image":[{"width":1080,"height":720,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/05\/fond.jpg","type":"image\/jpeg"}],"author":"Bilal Benseddiq","twitter_misc":{"Written by":"Bilal Benseddiq","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/"},"author":{"name":"Bilal Benseddiq","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/66dda0a265d60d65e7a8a3e373ccd8b6"},"headline":"Independent expertise of electronic voting systems","datePublished":"2023-05-17T15:07:10+00:00","dateModified":"2023-05-17T15:31:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/"},"wordCount":2676,"commentCount":0,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/05\/fond.jpg","keywords":["Digital compliance","E-vote"],"articleSection":["Deep-dive","Digital Compliance","Ethical Hacking &amp; Incident Response"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/","name":"Independent expertise of electronic voting systems - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/05\/fond.jpg","datePublished":"2023-05-17T15:07:10+00:00","dateModified":"2023-05-17T15:31:04+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/05\/fond.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2023\/05\/fond.jpg","width":1080,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2023\/05\/independent-expertise-of-electronic-voting-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Independent expertise of electronic voting systems"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/66dda0a265d60d65e7a8a3e373ccd8b6","name":"Bilal Benseddiq","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/bilal-benseddiq\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/20474","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1418"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=20474"}],"version-history":[{"count":3,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/20474\/revisions"}],"predecessor-version":[{"id":20490,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/20474\/revisions\/20490"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/20471"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=20474"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=20474"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=20474"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=20474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}