

{"id":33990,"date":"2017-04-01T10:50:30","date_gmt":"2017-04-01T08:50:30","guid":{"rendered":"https:\/\/gestions-hospitalieres.fr\/?p=33990"},"modified":"2018-03-06T12:07:15","modified_gmt":"2018-03-06T11:07:15","slug":"securite-systemes-dinformation-hospitaliers","status":"publish","type":"post","link":"https:\/\/www.ricom-web8.com\/gestions\/securite-systemes-dinformation-hospitaliers\/","title":{"rendered":"La s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information hospitaliers\u00a0"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Temps de lecture\u00a0: <\/span> <span class=\"rt-time\"> 2<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span><p>La s\u00e9curit\u00e9 des SI est \u00e0 l\u2019\u00e9vidence une d\u00e9marche qualit\u00e9 dans le domaine du SI \u00e0 laquelle les professionnels de sant\u00e9 doivent s\u2019acculturer. Cette culture de la s\u00e9curit\u00e9 des SIH prend le m\u00eame chemin que l\u2019implantation de la d\u00e9marche qualit\u00e9 dans les \u00e9tablissements de sant\u00e9, doucement et avec quelques ann\u00e9es de d\u00e9calage. La preuve en est que la fonction de responsable de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information (RSSI) n\u2019est apparue qu\u2019il y a dix\u00a0ans dans les \u00e9tablissements de sant\u00e9. On pense souvent que la s\u00e9curit\u00e9 est la mise en place d\u2019outils visant \u00e0 se pr\u00e9munir d\u2019attaques malveillantes sur les machines, mais cette vision est tr\u00e8s r\u00e9ductrice. La s\u00e9curit\u00e9 des SI est aussi et surtout notre capacit\u00e9 \u00e0 assurer en permanence la disponibilit\u00e9 et l\u2019int\u00e9grit\u00e9 des donn\u00e9es, quelles que soient les conditions. Quand cette d\u00e9marche sera comprise et int\u00e9gr\u00e9e par l\u2019ensemble des professionnels, en particulier dans un milieu aussi exigeant et hautement sensible que le secteur de la sant\u00e9, nous aurons franchi une grande \u00e9tape sur le sujet de la s\u00e9curit\u00e9 des SI, qui est sans conteste l\u2019affaire de tous.<\/p>\n<p>Pour favoriser la d\u00e9marche qualit\u00e9 du SI, les DSI et RSSI des h\u00f4pitaux disposent d\u00e9sormais d\u2019outils, d\u2019aides m\u00e9thodologiques ou de r\u00e8gles claires pour formaliser et mettre en \u0153uvre les actions n\u00e9cessaires\u2009: la politique g\u00e9n\u00e9rale de s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information de sant\u00e9 (PGSSI-S)<sup class=\"appel\" data-toggle=\"modal\" data-target=\"#notes\"> (1)<\/sup>, qui fixe le cadre de la s\u00e9curisation des SI de sant\u00e9, ou encore le guide d\u2019hygi\u00e8ne informatique r\u00e9cemment publi\u00e9 par l\u2019Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information<sup class=\"appel\" data-toggle=\"modal\" data-target=\"#notes\"> (2)<\/sup> en sont deux exemples. Il faut \u00e9galement noter que la certification des comptes ou la certification HAS des h\u00f4pitaux nous poussent tr\u00e8s fortement \u00e0 consolider les aspects SI, en particulier la s\u00e9curit\u00e9. Pour aller plus loin, le programme H\u00f4pital num\u00e9rique, reconduit en mars 2017 sous le nom \u00ab\u2009e-H\u00f4p 2.0\u2009\u00bb, int\u00e8gre des indicateurs forts de la s\u00e9curit\u00e9 des SI sur la fiabilit\u00e9, la disponibilit\u00e9 et la confidentialit\u00e9 des donn\u00e9es. Et la d\u00e9marche de certification HAS int\u00e8gre depuis sa V2010 un suivi des indicateurs du programme \u00ab\u2009H\u00f4pital num\u00e9rique\u2009\u00bb\u2009: la boucle est boucl\u00e9e\u2009!<\/p>\n<p>Il reste n\u00e9anmoins encore du chemin pour convaincre l\u2019ensemble des utilisateurs du SIH que les risques informatiques ne sont pas une pure parano\u00efa des informaticiens. Il suffit par exemple de parcourir les services d\u2019un h\u00f4pital pour constater qu\u2019il existe encore des petits papiers coll\u00e9s sur les \u00e9crans avec les identifiants et mots de passe utilisateurs\u2026 Or, le comportement des utilisateurs repr\u00e9sente la premi\u00e8re faille dans la s\u00e9curit\u00e9 d\u2019un syst\u00e8me d\u2019information.<\/p>\n<p>Enfin, n\u2019oublions pas que le d\u00e9veloppement des technologies de l\u2019information\u00a0et la transformation num\u00e9rique des \u00e9tablissements de sant\u00e9 se sont nettement acc\u00e9l\u00e9r\u00e9s et multiplient les usages possibles. Notons notamment les nouveaux besoins induits par les projets de t\u00e9l\u00e9m\u00e9decine. Cela s\u2019accompagne in\u00e9luctablement d\u2019un accroissement des menaces et risques d\u2019atteinte des syst\u00e8mes d\u2019information, c\u2019est-\u00e0-dire des processus de sant\u00e9 eux-m\u00eames. La s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information est donc une d\u00e9marche continue qui doit \u00eatre intensifi\u00e9e et syst\u00e9matiquement int\u00e9gr\u00e9e aux projets informatiques.<\/p>\n<script>function PlayerjsAsync(){} if(window[\"Playerjs\"]){PlayerjsAsync();}<\/script>","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Temps de lecture\u00a0: <\/span> <span class=\"rt-time\"> 2<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>La s\u00e9curit\u00e9 des SI est \u00e0 l\u2019\u00e9vidence une d\u00e9marche qualit\u00e9 dans le domaine du SI \u00e0 laquelle les professionnels de sant\u00e9 doivent s\u2019acculturer. Cette culture de la s\u00e9curit\u00e9 des SIH prend le m\u00eame chemin que l\u2019implantation de la d\u00e9marche qualit\u00e9 dans les \u00e9tablissements de sant\u00e9, doucement et avec quelques ann\u00e9es de d\u00e9calage. La preuve en est que la fonction de responsable de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information (RSSI) n\u2019est apparue&hellip; <\/p>\n","protected":false},"author":23133,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[26,2],"tags":[5453,1265,582,634],"class_list":["post-33990","post","type-post","status-publish","format-standard","hentry","category-dossier","category-gestions-hospitalieres","tag-e-hop-2-0","tag-hopital-numerique","tag-securite","tag-sih"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.8.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>La s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information hospitaliers\u00a0 - Gestions hospitali\u00e8res<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ricom-web8.com\/gestions\/securite-systemes-dinformation-hospitaliers\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information hospitaliers\u00a0 - Gestions hospitali\u00e8res\" \/>\n<meta property=\"og:description\" content=\"Temps de lecture\u00a0:  2 minutesLa s\u00e9curit\u00e9 des SI est \u00e0 l\u2019\u00e9vidence une d\u00e9marche qualit\u00e9 dans le domaine du SI \u00e0 laquelle les professionnels de sant\u00e9 doivent s\u2019acculturer. Cette culture de la s\u00e9curit\u00e9 des SIH prend le m\u00eame chemin que l\u2019implantation de la d\u00e9marche qualit\u00e9 dans les \u00e9tablissements de sant\u00e9, doucement et avec quelques ann\u00e9es de d\u00e9calage. La preuve en est que la fonction de responsable de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information (RSSI) n\u2019est apparue&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ricom-web8.com\/gestions\/securite-systemes-dinformation-hospitaliers\/\" \/>\n<meta property=\"og:site_name\" content=\"Gestions hospitali\u00e8res\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/gestionshospitalieres\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-01T08:50:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-03-06T11:07:15+00:00\" \/>\n<meta name=\"author\" content=\"Gestions hospitali\u00e8res\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@revue_GH\" \/>\n<meta name=\"twitter:site\" content=\"@revue_GH\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gestions hospitali\u00e8res\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/securite-systemes-dinformation-hospitaliers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/securite-systemes-dinformation-hospitaliers\/\"},\"author\":{\"name\":\"Gestions hospitali\u00e8res\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/person\/3ba9fe913190dfe9507feb621e902c1f\"},\"headline\":\"La s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information hospitaliers\u00a0\",\"datePublished\":\"2017-04-01T08:50:30+00:00\",\"dateModified\":\"2018-03-06T11:07:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/securite-systemes-dinformation-hospitaliers\/\"},\"wordCount\":595,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#organization\"},\"keywords\":[\"e-H\u00f4p 2.0\",\"h\u00f4pital num\u00e9rique\",\"s\u00e9curit\u00e9\",\"SIH\"],\"articleSection\":[\"dossier\",\"Gestions Hospitali\u00e8res\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.ricom-web8.com\/gestions\/securite-systemes-dinformation-hospitaliers\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/securite-systemes-dinformation-hospitaliers\/\",\"url\":\"https:\/\/www.ricom-web8.com\/gestions\/securite-systemes-dinformation-hospitaliers\/\",\"name\":\"La s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information hospitaliers\u00a0 - Gestions hospitali\u00e8res\",\"isPartOf\":{\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#website\"},\"datePublished\":\"2017-04-01T08:50:30+00:00\",\"dateModified\":\"2018-03-06T11:07:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/securite-systemes-dinformation-hospitaliers\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ricom-web8.com\/gestions\/securite-systemes-dinformation-hospitaliers\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/securite-systemes-dinformation-hospitaliers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.ricom-web8.com\/gestions\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information hospitaliers\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#website\",\"url\":\"https:\/\/www.ricom-web8.com\/gestions\/\",\"name\":\"Gestions hospitali\u00e8res\",\"description\":\"la revue des d\u00e9cideurs hospitaliers\",\"publisher\":{\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ricom-web8.com\/gestions\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#organization\",\"name\":\"Gestions hospitali\u00e8res\",\"url\":\"https:\/\/www.ricom-web8.com\/gestions\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2017\/02\/picto_Gif-GH-trans.png\",\"contentUrl\":\"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2017\/02\/picto_Gif-GH-trans.png\",\"width\":512,\"height\":512,\"caption\":\"Gestions hospitali\u00e8res\"},\"image\":{\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/gestionshospitalieres\/\",\"https:\/\/x.com\/revue_GH\",\"https:\/\/www.linkedin.com\/company\/gestions-hospitalieres?trk=top_nav_home\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/person\/3ba9fe913190dfe9507feb621e902c1f\",\"name\":\"Gestions hospitali\u00e8res\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1a0d93e6db5dbe7dac96bae4757d256f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1a0d93e6db5dbe7dac96bae4757d256f?s=96&d=mm&r=g\",\"caption\":\"Gestions hospitali\u00e8res\"},\"url\":\"https:\/\/www.ricom-web8.com\/gestions\/author\/benjamin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information hospitaliers\u00a0 - Gestions hospitali\u00e8res","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ricom-web8.com\/gestions\/securite-systemes-dinformation-hospitaliers\/","og_locale":"fr_FR","og_type":"article","og_title":"La s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information hospitaliers\u00a0 - Gestions hospitali\u00e8res","og_description":"Temps de lecture\u00a0:  2 minutesLa s\u00e9curit\u00e9 des SI est \u00e0 l\u2019\u00e9vidence une d\u00e9marche qualit\u00e9 dans le domaine du SI \u00e0 laquelle les professionnels de sant\u00e9 doivent s\u2019acculturer. Cette culture de la s\u00e9curit\u00e9 des SIH prend le m\u00eame chemin que l\u2019implantation de la d\u00e9marche qualit\u00e9 dans les \u00e9tablissements de sant\u00e9, doucement et avec quelques ann\u00e9es de d\u00e9calage. La preuve en est que la fonction de responsable de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information (RSSI) n\u2019est apparue&hellip;","og_url":"https:\/\/www.ricom-web8.com\/gestions\/securite-systemes-dinformation-hospitaliers\/","og_site_name":"Gestions hospitali\u00e8res","article_publisher":"https:\/\/www.facebook.com\/gestionshospitalieres\/","article_published_time":"2017-04-01T08:50:30+00:00","article_modified_time":"2018-03-06T11:07:15+00:00","author":"Gestions hospitali\u00e8res","twitter_card":"summary_large_image","twitter_creator":"@revue_GH","twitter_site":"@revue_GH","twitter_misc":{"\u00c9crit par":"Gestions hospitali\u00e8res","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ricom-web8.com\/gestions\/securite-systemes-dinformation-hospitaliers\/#article","isPartOf":{"@id":"https:\/\/www.ricom-web8.com\/gestions\/securite-systemes-dinformation-hospitaliers\/"},"author":{"name":"Gestions hospitali\u00e8res","@id":"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/person\/3ba9fe913190dfe9507feb621e902c1f"},"headline":"La s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information hospitaliers\u00a0","datePublished":"2017-04-01T08:50:30+00:00","dateModified":"2018-03-06T11:07:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ricom-web8.com\/gestions\/securite-systemes-dinformation-hospitaliers\/"},"wordCount":595,"commentCount":0,"publisher":{"@id":"https:\/\/www.ricom-web8.com\/gestions\/#organization"},"keywords":["e-H\u00f4p 2.0","h\u00f4pital num\u00e9rique","s\u00e9curit\u00e9","SIH"],"articleSection":["dossier","Gestions Hospitali\u00e8res"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.ricom-web8.com\/gestions\/securite-systemes-dinformation-hospitaliers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.ricom-web8.com\/gestions\/securite-systemes-dinformation-hospitaliers\/","url":"https:\/\/www.ricom-web8.com\/gestions\/securite-systemes-dinformation-hospitaliers\/","name":"La s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information hospitaliers\u00a0 - Gestions hospitali\u00e8res","isPartOf":{"@id":"https:\/\/www.ricom-web8.com\/gestions\/#website"},"datePublished":"2017-04-01T08:50:30+00:00","dateModified":"2018-03-06T11:07:15+00:00","breadcrumb":{"@id":"https:\/\/www.ricom-web8.com\/gestions\/securite-systemes-dinformation-hospitaliers\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ricom-web8.com\/gestions\/securite-systemes-dinformation-hospitaliers\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ricom-web8.com\/gestions\/securite-systemes-dinformation-hospitaliers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.ricom-web8.com\/gestions\/"},{"@type":"ListItem","position":2,"name":"La s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information hospitaliers\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.ricom-web8.com\/gestions\/#website","url":"https:\/\/www.ricom-web8.com\/gestions\/","name":"Gestions hospitali\u00e8res","description":"la revue des d\u00e9cideurs hospitaliers","publisher":{"@id":"https:\/\/www.ricom-web8.com\/gestions\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ricom-web8.com\/gestions\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.ricom-web8.com\/gestions\/#organization","name":"Gestions hospitali\u00e8res","url":"https:\/\/www.ricom-web8.com\/gestions\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/logo\/image\/","url":"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2017\/02\/picto_Gif-GH-trans.png","contentUrl":"https:\/\/gestions-hospitalieres.fr\/wp-content\/uploads\/2017\/02\/picto_Gif-GH-trans.png","width":512,"height":512,"caption":"Gestions hospitali\u00e8res"},"image":{"@id":"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/gestionshospitalieres\/","https:\/\/x.com\/revue_GH","https:\/\/www.linkedin.com\/company\/gestions-hospitalieres?trk=top_nav_home"]},{"@type":"Person","@id":"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/person\/3ba9fe913190dfe9507feb621e902c1f","name":"Gestions hospitali\u00e8res","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.ricom-web8.com\/gestions\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1a0d93e6db5dbe7dac96bae4757d256f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1a0d93e6db5dbe7dac96bae4757d256f?s=96&d=mm&r=g","caption":"Gestions hospitali\u00e8res"},"url":"https:\/\/www.ricom-web8.com\/gestions\/author\/benjamin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/posts\/33990","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/users\/23133"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/comments?post=33990"}],"version-history":[{"count":0,"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/posts\/33990\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/media?parent=33990"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/categories?post=33990"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ricom-web8.com\/gestions\/wp-json\/wp\/v2\/tags?post=33990"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}