{"id":534,"date":"2011-08-03T13:33:12","date_gmt":"2011-08-03T12:33:12","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=534"},"modified":"2019-12-31T12:26:23","modified_gmt":"2019-12-31T11:26:23","slug":"cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/","title":{"rendered":"La guerre des r\u00e9glementations aura-t-elle raison du cloud computing?"},"content":{"rendered":"<p><em>[Article r\u00e9dig\u00e9 en collaboration avec G\u00e9r\u00f4me Billois]<\/em><\/p>\n<p>Une nouvelle bataille juridique s\u2019ouvre entre les \u00c9tats-Unis et l\u2019Europe. En jeu cette fois-ci, le Cloud Computing. L\u2019\u2019affiche\u00a0? USA Patriot Act Vs. Directive Europ\u00e9enne de protection des donn\u00e9es \u00e0 caract\u00e8re personnel.<\/p>\n<p>D\u2019un c\u00f4t\u00e9, l\u2019USA Patriot Act. V\u00e9ritable \u00e9pouvantail de l\u2019externalisation et fer de lance de la lutte antiterroriste US, il autorise les \u00e9coutes et la capture de donn\u00e9es par les autorit\u00e9s am\u00e9ricaines, avec un encadrement judiciaire permettant de le faire \u00e0 l\u2019insu de leur propri\u00e9taire\u2026 Il constitue l\u2019argument le plus pr\u00e9cieux des opposants de l\u2019h\u00e9bergement de donn\u00e9es aux Etats-Unis.<\/p>\n<p>De l\u2019autre, la Directive europ\u00e9enne pour la protection des donn\u00e9es \u00e0 caract\u00e8re personnel. M\u00e8re europ\u00e9enne de la Loi Informatique et Libert\u00e9s fran\u00e7aise, elle encadre fortement le traitement de donn\u00e9es en dehors de fronti\u00e8res de l\u2019Union et, plus g\u00e9n\u00e9ralement, leur acc\u00e8s non l\u00e9gitime et non autoris\u00e9 par le responsable de traitement. Bien plus, elle\u00a0le rend p\u00e9nalement responsable de tout acc\u00e8s tiers non signal\u00e9 aux propri\u00e9taires des donn\u00e9es.<\/p>\n<p>Au centre, Microsoft. Le g\u00e9ant de Redmond consent des efforts importants pour \u00eatre en conformit\u00e9 avec les r\u00e9glementations sur les donn\u00e9es \u00e0 caract\u00e8re personnel. En particulier, leur adh\u00e9sion aux principes du<a href=\"http:\/\/www.cnil.fr\/vos-responsabilites\/le-transfert-de-donnees-a-letranger\/safe-harbor\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Safe Harbor<\/a> , qui, en d\u00e9pit de certaines limites, constitue une garantie jug\u00e9e suffisante par l\u2019Europe pour que soit autoris\u00e9 le transfert de donn\u00e9es \u00e0 caract\u00e8re personnel vers une entreprise am\u00e9ricaine. D\u2019autre part la mise en place d\u2019un Cloud europ\u00e9en, aux serveurs d\u00e9di\u00e9s et localis\u00e9s strictement au sein des fronti\u00e8res de l\u2019Union ensuite, offre une solution simple pour la conformit\u00e9.<\/p>\n<p>A l\u2019origine de la bataille, une conf\u00e9rence d\u00e9di\u00e9e au lancement d\u2019Office 365. Le directeur Royaume-Uni de Microsoft a alors reconnu tout haut ce que bon nombre de sp\u00e9cialistes du secteur murmuraient d\u00e9j\u00e0\u00a0: son si\u00e8ge social \u00e9tant domicili\u00e9 aux Etats-Unis, Microsoft est soumis au droit national\u2026 et doit donc appliquer l\u2019USA Patriot Act y compris sur le sol europ\u00e9en.<\/p>\n<p>Et ceci est vrai pour l\u2019ensemble des fournisseurs am\u00e9ricains de services de Cloud computing\u00a0! Ils pourraient ainsi \u00eatre amen\u00e9s \u00e0 communiquer aux autorit\u00e9s am\u00e9ricaines des donn\u00e9es de leurs clients europ\u00e9ens, en dehors de tout cadre l\u00e9gal national ou communautaire.<\/p>\n<p>Cette transparence soudaine signe-t-elle le d\u00e9but de la fin du Cloud computing\u00a0<em>made in<\/em> USA ? ou s\u2019agit-il d\u2019une opportunit\u00e9 de croissance inesp\u00e9r\u00e9e pour les fournisseurs europ\u00e9ens\u00a0? Doit-on s\u2019attendre \u00e0 une migration massive des premiers vers les seconds\u00a0?<\/p>\n<p>Ce qui est v\u00e9cu comme une ing\u00e9rence am\u00e9ricaine sur le terrain l\u00e9gislatif communautaire est aujourd\u2019hui examin\u00e9 par la Commission Europ\u00e9enne, qui s\u2019est saisie du sujet.<\/p>\n<p>Sans pr\u00e9juger en rien des conclusions des d\u00e9bats d\u2019ores et d\u00e9j\u00e0 tr\u00e8s anim\u00e9s sur le sujet, cette bataille m\u00e9rite d\u2019\u00eatre suivie avec attention.\u00a0 Et permet de rappeler l\u2019importance d\u2019une analyse de risques, y compris juridiques, avant tout recours \u00e0 un fournisseur externe&#8230;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[Article r\u00e9dig\u00e9 en collaboration avec G\u00e9r\u00f4me Billois] Une nouvelle bataille juridique s\u2019ouvre entre les \u00c9tats-Unis et l\u2019Europe. En jeu cette fois-ci, le Cloud Computing. L\u2019\u2019affiche\u00a0? USA Patriot Act Vs. Directive Europ\u00e9enne de protection des donn\u00e9es \u00e0 caract\u00e8re personnel. D\u2019un c\u00f4t\u00e9,&#8230;<\/p>\n","protected":false},"author":120,"featured_media":6343,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3223,36],"tags":[80,3119,81,78],"coauthors":[967],"class_list":["post-534","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security","category-cybersecurity-digital-trust","tag-cloud","tag-cloud-security","tag-protection-des-donnees","tag-reglementation"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>La guerre des r\u00e9glementations aura-t-elle raison du cloud computing? - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La guerre des r\u00e9glementations aura-t-elle raison du cloud computing? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"[Article r\u00e9dig\u00e9 en collaboration avec G\u00e9r\u00f4me Billois] Une nouvelle bataille juridique s\u2019ouvre entre les \u00c9tats-Unis et l\u2019Europe. En jeu cette fois-ci, le Cloud Computing. L\u2019\u2019affiche\u00a0? USA Patriot Act Vs. Directive Europ\u00e9enne de protection des donn\u00e9es \u00e0 caract\u00e8re personnel. D\u2019un c\u00f4t\u00e9,...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2011-08-03T12:33:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T11:26:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"573\" \/>\n\t<meta property=\"og:image:height\" content=\"214\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Marianne Benichou\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marianne Benichou\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/\"},\"author\":{\"name\":\"Marianne Benichou\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/1ea0d262e777b748dd507570b97597ea\"},\"headline\":\"La guerre des r\u00e9glementations aura-t-elle raison du cloud computing?\",\"datePublished\":\"2011-08-03T12:33:12+00:00\",\"dateModified\":\"2019-12-31T11:26:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/\"},\"wordCount\":560,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"keywords\":[\"Cloud\",\"Cloud security\",\"protection des donn\u00e9es\",\"R\u00e8glementation\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/\",\"name\":\"La guerre des r\u00e9glementations aura-t-elle raison du cloud computing? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"datePublished\":\"2011-08-03T12:33:12+00:00\",\"dateModified\":\"2019-12-31T11:26:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"width\":573,\"height\":214},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La guerre des r\u00e9glementations aura-t-elle raison du cloud computing?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/1ea0d262e777b748dd507570b97597ea\",\"name\":\"Marianne Benichou\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/marianne-benichou\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La guerre des r\u00e9glementations aura-t-elle raison du cloud computing? - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/","og_locale":"en_US","og_type":"article","og_title":"La guerre des r\u00e9glementations aura-t-elle raison du cloud computing? - RiskInsight","og_description":"[Article r\u00e9dig\u00e9 en collaboration avec G\u00e9r\u00f4me Billois] Une nouvelle bataille juridique s\u2019ouvre entre les \u00c9tats-Unis et l\u2019Europe. En jeu cette fois-ci, le Cloud Computing. L\u2019\u2019affiche\u00a0? USA Patriot Act Vs. Directive Europ\u00e9enne de protection des donn\u00e9es \u00e0 caract\u00e8re personnel. D\u2019un c\u00f4t\u00e9,...","og_url":"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/","og_site_name":"RiskInsight","article_published_time":"2011-08-03T12:33:12+00:00","article_modified_time":"2019-12-31T11:26:23+00:00","og_image":[{"width":573,"height":214,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","type":"image\/jpeg"}],"author":"Marianne Benichou","twitter_misc":{"Written by":"Marianne Benichou","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/"},"author":{"name":"Marianne Benichou","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/1ea0d262e777b748dd507570b97597ea"},"headline":"La guerre des r\u00e9glementations aura-t-elle raison du cloud computing?","datePublished":"2011-08-03T12:33:12+00:00","dateModified":"2019-12-31T11:26:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/"},"wordCount":560,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","keywords":["Cloud","Cloud security","protection des donn\u00e9es","R\u00e8glementation"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/","url":"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/","name":"La guerre des r\u00e9glementations aura-t-elle raison du cloud computing? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","datePublished":"2011-08-03T12:33:12+00:00","dateModified":"2019-12-31T11:26:23+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","width":573,"height":214},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/08\/cloud-computing-la-guerre-des-reglementations-aura-t-elle-raison\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"La guerre des r\u00e9glementations aura-t-elle raison du cloud computing?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/1ea0d262e777b748dd507570b97597ea","name":"Marianne Benichou","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/marianne-benichou\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/534","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/120"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=534"}],"version-history":[{"count":14,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/534\/revisions"}],"predecessor-version":[{"id":12482,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/534\/revisions\/12482"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6343"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=534"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=534"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=534"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=534"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}