{"id":26830,"date":"2025-09-02T08:11:00","date_gmt":"2025-09-02T06:11:00","guid":{"rendered":"https:\/\/www.jalios.com\/fr\/?p=26830"},"modified":"2025-11-19T16:34:39","modified_gmt":"2025-11-19T15:34:39","slug":"souverainete-numerique","status":"publish","type":"post","link":"https:\/\/www.jalios.com\/fr\/blog\/souverainete-numerique\/","title":{"rendered":"Souverainet\u00e9 num\u00e9rique\u202f: ce qu&rsquo;il faut savoir"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26830\" class=\"elementor elementor-26830\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fc2b044 e-flex e-con-boxed e-con e-parent\" data-id=\"fc2b044\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-975450c elementor-widget elementor-widget-text-editor\" data-id=\"975450c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La souverainet\u00e9 num\u00e9rique d\u00e9signe \u00ab\u202fla capacit\u00e9 d\u2019un \u00c9tat et, par extension, des organisations qui y op\u00e8rent \u00e0 agir dans le cyberespace et \u00e0 y faire respecter ses propres r\u00e8gles\u202f\u00bb (<a href=\"https:\/\/www.sciencespo.fr\/public\/chaire-numerique\/dossiers-de-recherche\/cloud-souverain\/\" target=\"_blank\" rel=\"noopener\">Sciences Po<\/a>). En clair\u202f: <strong>qui contr\u00f4le, stocke, chiffre, mon\u00e9tise et d\u00e9cide l\u2019usage de vos donn\u00e9es\u202f ? <\/strong><\/p><p>Depuis le\u202fU.S.\u202fCloud Act, le gouvernement des Etats-Unis peut contraindre tout\u202facteur am\u00e9ricain\u202f\u00e0 remettre des informations, m\u00eame h\u00e9berg\u00e9es hors des \u00c9tats\u2011Unis. Pour les entreprises europ\u00e9ennes, ce texte repr\u00e9sente une menace r\u00e9elle pour la protection des donn\u00e9es. \u00c0 Bruxelles, cette d\u00e9pendance \u00e0 un\u202facteur am\u00e9ricain\u202fest d\u00e9sormais jug\u00e9e strat\u00e9gique\u202f: la nouvelle commissaire appelle \u00e0 <strong><a href=\"https:\/\/www.jalios.com\/fr\/presse\/tribune-souverainete-numerique-une-troisieme-voie-utile-soffre-aux-entreprises\/\">prioriser l\u2019ind\u00e9pendance num\u00e9rique<\/a> dans les domaines critiques.<\/strong><\/p><p>L\u2019enjeu d\u00e9passe la conformit\u00e9 RGPD\u202f: il touche la comp\u00e9titivit\u00e9, la r\u00e9silience du\u202fsyst\u00e8me d\u2019information\u202fet, in fine, la confiance des clients. \u00c0 l\u2019horizon 2025, deux textes renforcent encore la pression\u202f: la\u202f<strong>directive europ\u00e9enne\u202fNIS2<\/strong>, qui exige de fortes garanties de\u202f<a href=\"https:\/\/www.jalios.com\/fr\/a-propos\/securite\/\">cybers\u00e9curit\u00e9<\/a>\u202fpour 18\u202fsecteurs critiques, et la <strong>r\u00e9vision du cadre SecNumCloud<\/strong>, label fran\u00e7ais de \u00ab\u202fcloud de confiance\u202f\u00bb d\u00e9livr\u00e9 par l\u2019ANSSI.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2d4afe elementor-widget elementor-widget-heading\" data-id=\"d2d4afe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Pourquoi les entreprises doivent se mobiliser d\u00e8s maintenant<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f31b05 elementor-widget elementor-widget-text-editor\" data-id=\"4f31b05\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>R\u00e9duire les risques juridiques et financiers.<\/strong> Entre RGPD, NIS2 et ISO27001, les sanctions pour manquement \u00e0 la\u202fs\u00e9curit\u00e9\u202fdes donn\u00e9es peuvent d\u00e9passer 4\u202f% du chiffre d\u2019affaires mondial. Se pr\u00e9parer \u00e9vite de subir audits et amendes tout en rassurant partenaires, r\u00e9gulateurs et investisseurs.<\/li><li><strong>Prot\u00e9ger l\u2019innovation et la propri\u00e9t\u00e9 intellectuelle.<\/strong> Les donn\u00e9es clients, logs IIoT ou algorithmes d\u2019IA constituent un capital \u00e0 forte valeur. Les exposer \u00e0 une juridiction extra\u2011territoriale Cloud\u202fAct ou lois chinoises de cybers\u00e9curit\u00e9 revient \u00e0 prendre le risque d\u2019un transfert forc\u00e9 ou d\u2019une surveillance commerciale.<\/li><li><strong>Gagner un avantage marketing.<\/strong> Revendiquer une\u202fsolution fran\u00e7aise\u202fou \u00ab\u202f<a href=\"https:\/\/www.jalios.com\/fr\/blog\/souverainete-collaboration-tendances\/\">solution souveraine<\/a>\u202f\u00bb devient un argument d\u00e9cisif\u202f: 78\u202f% des d\u00e9cideurs IT europ\u00e9ens d\u00e9clarent privil\u00e9gier un prestataire labellis\u00e9 SecNumCloud ou ISO27001 pour leurs nouveaux projets, selon l\u2019<\/li><li><strong>Anticiper les exigences \u00e0 venir.<\/strong> NIS2 impose un plan de gestion de crise, des audits r\u00e9guliers, l\u2019authentification multifactorielle et le chiffrement de bout en bout. Les entreprises qui se mettent en conformit\u00e9 aujourd\u2019hui disposeront d\u2019un\u202fsyst\u00e8me d\u2019information\u202fplus agile.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-471e0e1 elementor-widget elementor-widget-heading\" data-id=\"471e0e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Digital Workplace\u202f: le maillon faible ou la colonne vert\u00e9brale de votre souverainet\u00e9\u202f?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b607d92 elementor-widget elementor-widget-text-editor\" data-id=\"b607d92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La Digital Workplace (messagerie, bureautique, visio, partage documentaire) concentre souvent 80\u202f% du trafic interne. Or, la plupart des organisations s\u2019appuient sur <a href=\"https:\/\/www.jalios.com\/fr\/blog\/jalios-vs-microsoft-2025\/\">Microsoft\u202f365<\/a> ou Google\u202fWorkspace deux\u202facteurs am\u00e9ricains\u202fdirectement soumis au\u202fCloud\u202fAct.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3ce289b elementor-widget elementor-widget-heading\" data-id=\"3ce289b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">\u202fComprendre l\u2019exposition de la souverainet\u00e9 num\u00e9rique<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f28cc34 elementor-widget elementor-widget-text-editor\" data-id=\"f28cc34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Cloud<\/strong><strong>\u202fAct et Patriot<\/strong><strong>\u202fAct<\/strong>\u202f: un mandat am\u00e9ricain suffit pour exiger la remise de vos fichiers OneDrive ou Gmail, m\u00eame h\u00e9berg\u00e9s dans un datacenter europ\u00e9en.<\/li><li><strong>Acteurs chinois en expansion<\/strong>\u202f: Alibaba\u202fCloud ou Huawei\u202fCloud proposent des offres agressives en Europe, mais restent soumis \u00e0 la loi chinoise sur le renseignement, qui pr\u00e9voit la coop\u00e9ration obligatoire avec P\u00e9kin.<br \/>Ces deux angles morts contredisent le principe de \u00ab\u202fcloud de confiance\u202f\u00bb voulu par l\u2019UE.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-33b7733 elementor-widget elementor-widget-heading\" data-id=\"33b7733\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">\u202fDes mesures concr\u00e8tes pour une Digital Workplace souveraine<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-90f7499 elementor-widget elementor-widget-text-editor\" data-id=\"90f7499\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><strong>Choisir une plateforme cloud qualifi\u00e9e SecNumCloud et\/ou ISO27001<\/strong>. La certification v\u00e9rifie chiffrement, tra\u00e7abilit\u00e9, r\u00e9versibilit\u00e9 et localisation exclusive des donn\u00e9es en\u202fEurope.<\/li><li><strong>Imposer le \u201cchiffrement<\/strong><strong>\u202fz<\/strong><strong>\u00e9ro\u2011connaissance<\/strong><strong>\u201d<\/strong>\u202f: seul le client d\u00e9tient les cl\u00e9s. M\u00eame un fournisseur SaaS ne peut d\u00e9chiffrer.<\/li><li><strong>Mettre en place une gouvernance multi\u2011cloud<\/strong>\u202f: r\u00e9partition des charges entre un\u202fcloud souverain\u202fpour les donn\u00e9es sensibles et, si n\u00e9cessaire, un fournisseur global pour la scalabilit\u00e9.<\/li><li><strong>Clauses contractuelles renforc\u00e9es<\/strong>\u202f: s\u00e9paration des r\u00f4les d\u2019administration, audit de code source, conservation dans l\u2019UE, indemnit\u00e9s en cas d\u2019acc\u00e8s extrajudiciaire.<\/li><li><strong>Surveillance continue<\/strong> via tableaux de bord NIS2, journaux d\u2019acc\u00e8s et score de\u202fcybers\u00e9curit\u00e9\u202fen temps r\u00e9el.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13e7e7f elementor-widget elementor-widget-heading\" data-id=\"13e7e7f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Jalios Workplace, une\u202fsolution fran\u00e7aise\u202fet souveraine<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a59fab elementor-widget elementor-widget-text-editor\" data-id=\"4a59fab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Jalios propose une Digital Workplace 100% fran\u00e7aise, h\u00e9berg\u00e9e dans des datacenters fran\u00e7ais. L\u2019\u00e9diteur int\u00e8gre plus de\u202f100 connecteurs\u202f tout en garantissant \u202fl\u2019interop\u00e9rabilit\u00e9 sans compromettre la\u202f<a href=\"https:\/\/www.jalios.com\/fr\/top-blog\/jalios-rejoint-le-programme-etincelles-une-reconnaissance-de-son-ambition-et-de-son-role-strategique\/\">souverainet\u00e9 num\u00e9rique<\/a>. Les clients peuvent opter pour un h\u00e9bergement SaaS ou On-Premise.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f31128 elementor-widget elementor-widget-heading\" data-id=\"1f31128\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">R\u00e9capitulatif\u202f: les points \u00e0 retenir<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10c4e3c elementor-widget elementor-widget-text-editor\" data-id=\"10c4e3c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La\u202fsouverainet\u00e9 num\u00e9rique\u202fn\u2019est ni un slogan ni un luxe, mais une exigence de\u202fs\u00e9curit\u00e9, de comp\u00e9titivit\u00e9 et de conformit\u00e9. Elle commence par la ma\u00eetrise de vos donn\u00e9es, se poursuit par des choix techniques lucides (cloud de confiance, ISO27001) et s\u2019inscrit dans un cadre\u202feurop\u00e9en\u202fen pleine \u00e9volution (RGPD,\u202fdirective europ\u00e9enne\u202fNIS2).<\/p><p>Pour les entreprises, trois messages cl\u00e9s\u202f\u00e0 retenir :<\/p><ul><li><strong>D\u00e9finition et cadre<\/strong>\u202f: la souverainet\u00e9 num\u00e9rique vise \u00e0 contr\u00f4ler l\u2019h\u00e9bergement, l\u2019usage et la gouvernance de la donn\u00e9e pour \u00e9chapper aux lois extra\u2011territoriales.<\/li><li><strong>Int\u00e9r\u00eat business<\/strong>\u202f: une organisation souveraine r\u00e9duit ses risques, valorise sa marque, accro\u00eet sa r\u00e9silience et peut, demain, mon\u00e9tiser ses actifs num\u00e9riques en toute confiance.<\/li><li><strong>Mise en \u0153uvre dans la Digital Workplace<\/strong>\u202f: privil\u00e9gier une\u202fsolution souveraine\u202fcomme Jalios\u202fWorkplace.<\/li><\/ul><p>En pla\u00e7ant la souverainet\u00e9 num\u00e9rique au c\u0153ur de votre strat\u00e9gie\u202ftech, vous r\u00e9pondez aux imp\u00e9ratifs de\u202fcybers\u00e9curit\u00e9\u202ftout en ouvrant le champ de l\u2019innovation.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4824e2ae e-con-full e-flex e-con e-child\" data-id=\"4824e2ae\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3c4f21bb elementor-widget elementor-widget-heading\" data-id=\"3c4f21bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">D\u00e9couvrez Jalios Workplace<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-277daacf elementor-widget elementor-widget-text-editor\" data-id=\"277daacf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ed18a25 elementor-widget elementor-widget-text-editor\" data-id=\"ed18a25\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>Pour offrir la\u00a0<strong>meilleure exp\u00e9rience collaborateur<\/strong>\u00a0: coh\u00e9rente, utile et personnalis\u00e9e. Disponible en compl\u00e9ment de Microsoft 365 ou en version\u00a0<strong>souveraine<\/strong>\u00a0et m\u00eame en r\u00e9gion\u00a0<strong>SecNumCloud<\/strong>.<\/p><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-730caa1a elementor-align-left elementor-widget elementor-widget-button\" data-id=\"730caa1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/eu1.hubs.ly\/H0cD2SB0\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">R\u00e9server une d\u00e9mo<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>La souverainet\u00e9 num\u00e9rique d\u00e9signe \u00ab\u202fla capacit\u00e9 d\u2019un \u00c9tat et, par extension, des organisations qui y op\u00e8rent \u00e0 agir dans le cyberespace et \u00e0 y faire respecter ses propres r\u00e8gles\u202f\u00bb (Sciences Po). En clair\u202f: qui contr\u00f4le, stocke, chiffre, mon\u00e9tise et d\u00e9cide l\u2019usage de vos donn\u00e9es\u202f ? Depuis le\u202fU.S.\u202fCloud Act, le gouvernement des Etats-Unis peut contraindre tout\u202facteur [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":26831,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[51,86],"tags":[77],"class_list":["post-26830","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-articles","tag-souverainete"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.jalios.com\/fr\/wp-json\/wp\/v2\/posts\/26830","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.jalios.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.jalios.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.jalios.com\/fr\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jalios.com\/fr\/wp-json\/wp\/v2\/comments?post=26830"}],"version-history":[{"count":13,"href":"https:\/\/www.jalios.com\/fr\/wp-json\/wp\/v2\/posts\/26830\/revisions"}],"predecessor-version":[{"id":28105,"href":"https:\/\/www.jalios.com\/fr\/wp-json\/wp\/v2\/posts\/26830\/revisions\/28105"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.jalios.com\/fr\/wp-json\/wp\/v2\/media\/26831"}],"wp:attachment":[{"href":"https:\/\/www.jalios.com\/fr\/wp-json\/wp\/v2\/media?parent=26830"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.jalios.com\/fr\/wp-json\/wp\/v2\/categories?post=26830"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.jalios.com\/fr\/wp-json\/wp\/v2\/tags?post=26830"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}