{"id":848,"date":"2011-11-03T16:17:56","date_gmt":"2011-11-03T15:17:56","guid":{"rendered":"http:\/\/www.solucominsight.fr\/?p=848"},"modified":"2019-12-31T12:23:36","modified_gmt":"2019-12-31T11:23:36","slug":"dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/","title":{"rendered":"D\u00e9mat\u00e9rialisation et signature \u00e9lectronique : vers l\u2019explosion des usages grand public ?"},"content":{"rendered":"<p>Les ann\u00e9es 2000 ont connu une r\u00e9elle frilosit\u00e9 de la part des entreprises quant \u00e0 l\u2019utilisation de la signature \u00e9lectronique, ces derni\u00e8res attendant pour se lancer quelques premiers succ\u00e8s de mise en \u0153uvre et une demande plus forte de la part de leurs clients.<\/p>\n<p>Forts de premiers projets r\u00e9ussis, les ann\u00e9es 2010 marquent une rupture en la mati\u00e8re, puisque l\u2019on voit alors se d\u00e9velopper rapidement l\u2019utilisation conjugu\u00e9e de la d\u00e9mat\u00e9rialisation et de la signature \u00e9lectronique \u00e0 destination du grand public. Cela s\u2019explique par \u00a0trois facteurs.<\/p>\n<h4>Un cadre r\u00e9glementaire aujourd\u2019hui ma\u00eetris\u00e9<\/h4>\n<p>En 2001, la l\u00e9gislation fran\u00e7aise institutionnalisait la signature \u00e9lectronique\u00a0 par les articles 1316-1 et 1316-4 du code civil et le d\u00e9cret <strong>n\u00b02001-272 du 30 mars 2001. Elle rendait alors la<\/strong> <strong>signature \u00e9lectronique \u00e9quivalente \u00e0 la signature papier<\/strong>, sous condition du respect des principes d\u2019identification fiable du signataire et d\u2019int\u00e9grit\u00e9 des donn\u00e9es. Pourtant, la frilosit\u00e9 l\u2019emportait, faute de retours d\u2019exp\u00e9rience suffisants dans l\u2019application de ce cadre juridique.<\/p>\n<p>Il faudra attendre 10 ans pour voir se d\u00e9ployer plus largement la signature \u00e9lectronique. Quelques jurisprudences, bien qu\u2019encore peu nombreuses, confortent les entreprises\u00a0: celle de d\u00e9cembre 2010, par exemple, concernant \u00a0la reconnaissance juridique de la notification \u00e9lectronique d&#8217;une demande de r\u00e9siliation (exemple d\u2019un abonnement t\u00e9l\u00e9phonique) portant une signature \u00e9lectronique (http:\/\/www.resilier.com).<\/p>\n<h4>Des premiers succ\u00e8s rassurants dans le B2B et les administrations<\/h4>\n<p>Ces derni\u00e8res ann\u00e9es, des projets plut\u00f4t B2B ont vu le jour. <strong>Les grandes entreprises ont mis en \u0153uvre des solutions de d\u00e9mat\u00e9rialisation et de signature \u00e9lectronique pour des usages professionnels<\/strong> (ex\u00a0: signature de remises r\u00e9glementaires pour les \u00e9tablissements financiers, signature d\u2019ordres de paiement pour les tr\u00e9soriers d\u2019entreprise, signature de contrats entre professionnels). Ces solutions s\u2019appuient sur l\u2019utilisation de certificats \u00e9lectroniques, preuve de l\u2019identit\u00e9 num\u00e9rique personnelle de son porteur, indispensable \u00e0 la signature \u00e9lectronique.<\/p>\n<p>D\u00e9j\u00e0 \u00e9prouv\u00e9es par les entreprises, ces solutions sont d\u00e9sormais matures et peuvent \u00eatre r\u00e9utilis\u00e9es pour de nouveaux usages destin\u00e9s au grand public.Le grand public est pr\u00eat\u00a0et demandeur\u00a0!<\/p>\n<p>Le grand public est aujourd\u2019hui habitu\u00e9 et enclin \u00e0 l\u2019achat de biens et de services sur internet, ainsi qu\u2019\u00e0 l\u2019utilisation de processus administratifs d\u00e9mat\u00e9rialis\u00e9s en ligne (Mon Service Public, d\u00e9claration des imp\u00f4ts, consultation de donn\u00e9es personnelles de sant\u00e9, facturation \u00e9lectronique des fournisseurs d\u2019\u00e9nergie et d\u2019internet\u2026).<\/p>\n<p>De plus, conscients des risques de fraude et d\u2019usurpation d\u2019identit\u00e9, le grand public est d\u00e8s lors sensibilis\u00e9 \u00e0 l\u2019utilisation de moyens de s\u00e9curit\u00e9 lors de transactions en ligne, tels que l\u2019envoi de code par SMS, l\u2019utilisation de carte bancaire virtuelle, de clavier num\u00e9rique, de certificat \u00e9lectronique, etc.<\/p>\n<p>Enfin, le grand public montre une app\u00e9tence de plus en plus forte pour l\u2019obtention de biens et de services rapidement, voire m\u00eame de fa\u00e7on imm\u00e9diate.<\/p>\n<p>Les banques fran\u00e7aises (BNP Paribas, LCL\u2026) participent fortement \u00e0 cet essor\u00a0; elles offrent, depuis plusieurs ann\u00e9es d\u00e9j\u00e0, la gestion en ligne des comptes bancaires (suivi de comptes, op\u00e9rations de virement\u2026)\u00a0; et plus r\u00e9cemment, elles proposent la souscription en ligne \u00e0 des services bancaires (ex\u00a0: livret d\u2019\u00e9pargne, pr\u00eat \u00e0 la consommation, assurance) \u00e0 leurs clients particuliers, gr\u00e2ce \u00e0 la signature \u00e9lectronique mise en \u0153uvre par l\u2019utilisation de certificats \u00e9lectroniques personnels. Cette \u00a0offre r\u00e9pond pleinement aux attentes du grand public.<\/p>\n<h4>Comment lever les derniers freins\u00a0?<\/h4>\n<p>Il reste aujourd\u2019hui un frein majeur\u00a0au d\u00e9veloppement de la signature \u00e9lectronique en France : la distribution et la gestion des \u00a0parcs de certificats pour le grand public.<\/p>\n<p>Des op\u00e9rateurs de t\u00e9l\u00e9phonie mobile (SFR en France, Turkcell en Turquie) ont ainsi cr\u00e9\u00e9 des partenariats avec des fournisseurs de puces SIM cryptographiques (Oberthur, Gemalto), afin de fournir \u00e0 leurs abonn\u00e9s des mobiles embarquant une solution de signature.<\/p>\n<p>Ces offres, reposant sur une <strong>collaboration entre op\u00e9rateurs mobiles et banques<\/strong>, permettent aux abonn\u00e9s d\u2019acc\u00e9der \u00e0 des services s\u00e9curis\u00e9s en ligne gr\u00e2ce \u00e0 leur mobile, tel que l\u2019achat en ligne et la banque en ligne, sans aucune transmission d\u2019informations bancaires.<\/p>\n<p>Par ailleurs, le gouvernement fran\u00e7ais renouvelle sa volont\u00e9 de d\u00e9velopper l\u2019usage du num\u00e9rique avec la pr\u00e9paration d\u2019un nouveau plan France Num\u00e9rique 2020, qui sera d\u00e9voil\u00e9 d\u2019ici 2012, avec la perspective d\u2019y voir s\u2019inscrire des projets concrets de confiance num\u00e9rique.<\/p>\n<p align=\"left\">Ces innovations et projets dans la confiance num\u00e9rique permettront certainement de lever les derniers freins quant \u00e0 la distribution et la reconnaissance des certificats \u00e9lectroniques.\u00a0 En effet, c\u2019est gr\u00e2ce \u00e0 la demande du grand public et l\u2019implication des grands acteurs du B2C et de l\u2019administration (G2C) que la signature \u00e9lectronique pourra d\u00e9coller\u00a0!<\/p>\n<div>\n<hr align=\"left\" size=\"1\" width=\"33%\" \/>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Les ann\u00e9es 2000 ont connu une r\u00e9elle frilosit\u00e9 de la part des entreprises quant \u00e0 l\u2019utilisation de la signature \u00e9lectronique, ces derni\u00e8res attendant pour se lancer quelques premiers succ\u00e8s de mise en \u0153uvre et une demande plus forte de la&#8230;<\/p>\n","protected":false},"author":23,"featured_media":6343,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[36,3224],"tags":[144,3305,192],"coauthors":[895],"class_list":["post-848","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-digital-identity","tag-identite","tag-identity-access-management","tag-signature-electronique"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>D\u00e9mat\u00e9rialisation et signature \u00e9lectronique : vers l\u2019explosion des usages grand public ? - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"D\u00e9mat\u00e9rialisation et signature \u00e9lectronique : vers l\u2019explosion des usages grand public ? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Les ann\u00e9es 2000 ont connu une r\u00e9elle frilosit\u00e9 de la part des entreprises quant \u00e0 l\u2019utilisation de la signature \u00e9lectronique, ces derni\u00e8res attendant pour se lancer quelques premiers succ\u00e8s de mise en \u0153uvre et une demande plus forte de la...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2011-11-03T15:17:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-31T11:23:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"573\" \/>\n\t<meta property=\"og:image:height\" content=\"214\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Clotilde Henriot\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Clotilde Henriot\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/\"},\"author\":{\"name\":\"Clotilde Henriot\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/e52da0161dcffbca5483d5d3c5ff96d7\"},\"headline\":\"D\u00e9mat\u00e9rialisation et signature \u00e9lectronique : vers l\u2019explosion des usages grand public ?\",\"datePublished\":\"2011-11-03T15:17:56+00:00\",\"dateModified\":\"2019-12-31T11:23:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/\"},\"wordCount\":835,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"keywords\":[\"identit\u00e9\",\"identity &amp; access management\",\"signature \u00e9lectronique\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Digital Identity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/\",\"name\":\"D\u00e9mat\u00e9rialisation et signature \u00e9lectronique : vers l\u2019explosion des usages grand public ? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"datePublished\":\"2011-11-03T15:17:56+00:00\",\"dateModified\":\"2019-12-31T11:23:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg\",\"width\":573,\"height\":214},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"D\u00e9mat\u00e9rialisation et signature \u00e9lectronique : vers l\u2019explosion des usages grand public ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/e52da0161dcffbca5483d5d3c5ff96d7\",\"name\":\"Clotilde Henriot\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/clotilde-henriot\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"D\u00e9mat\u00e9rialisation et signature \u00e9lectronique : vers l\u2019explosion des usages grand public ? - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/","og_locale":"en_US","og_type":"article","og_title":"D\u00e9mat\u00e9rialisation et signature \u00e9lectronique : vers l\u2019explosion des usages grand public ? - RiskInsight","og_description":"Les ann\u00e9es 2000 ont connu une r\u00e9elle frilosit\u00e9 de la part des entreprises quant \u00e0 l\u2019utilisation de la signature \u00e9lectronique, ces derni\u00e8res attendant pour se lancer quelques premiers succ\u00e8s de mise en \u0153uvre et une demande plus forte de la...","og_url":"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/","og_site_name":"RiskInsight","article_published_time":"2011-11-03T15:17:56+00:00","article_modified_time":"2019-12-31T11:23:36+00:00","og_image":[{"width":573,"height":214,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","type":"image\/jpeg"}],"author":"Clotilde Henriot","twitter_misc":{"Written by":"Clotilde Henriot","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/"},"author":{"name":"Clotilde Henriot","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/e52da0161dcffbca5483d5d3c5ff96d7"},"headline":"D\u00e9mat\u00e9rialisation et signature \u00e9lectronique : vers l\u2019explosion des usages grand public ?","datePublished":"2011-11-03T15:17:56+00:00","dateModified":"2019-12-31T11:23:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/"},"wordCount":835,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","keywords":["identit\u00e9","identity &amp; access management","signature \u00e9lectronique"],"articleSection":["Cybersecurity &amp; Digital Trust","Digital Identity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/","url":"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/","name":"D\u00e9mat\u00e9rialisation et signature \u00e9lectronique : vers l\u2019explosion des usages grand public ? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","datePublished":"2011-11-03T15:17:56+00:00","dateModified":"2019-12-31T11:23:36+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2012\/10\/Cybercriminalite.jpg","width":573,"height":214},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/2011\/11\/dematerialisation-et-signature-electronique-vers-lexplosion-des-usages-grand-public\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"D\u00e9mat\u00e9rialisation et signature \u00e9lectronique : vers l\u2019explosion des usages grand public ?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/e52da0161dcffbca5483d5d3c5ff96d7","name":"Clotilde Henriot","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/clotilde-henriot\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/848","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=848"}],"version-history":[{"count":6,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/848\/revisions"}],"predecessor-version":[{"id":6484,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/848\/revisions\/6484"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/6343"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=848"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=848"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=848"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=848"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}