{"id":17392,"date":"2021-09-07T22:23:12","date_gmt":"2021-09-07T22:23:12","guid":{"rendered":"https:\/\/pragmandt.com\/data-and-information-security-policy\/"},"modified":"2024-01-29T16:22:02","modified_gmt":"2024-01-29T16:22:02","slug":"data-and-information-security-policy","status":"publish","type":"page","link":"https:\/\/pragmandt.com\/fr\/data-and-information-security-policy\/","title":{"rendered":"Data and Information Security Policy"},"content":{"rendered":"<p>[vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; background_color=&#8221;#f1f3f4&#8243; padding_top=&#8221;29&#8243; padding_bottom=&#8221;6&#8243; css=&#8221;.vc_custom_1629072987568{padding-top: 30px !important;padding-bottom: 30px !important;background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; z_index=&#8221;&#8221;][vc_column][vc_column_text]<\/p>\n<p style=\"text-align: left;\"><span style=\"font-size: 16pt; font-family: d-dincondensed;\"><span style=\"color: #000000;\">Data and Information Security Policy &gt;<\/span><\/span><\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; background_color=&#8221;#f1f3f4&#8243; padding_top=&#8221;29&#8243; padding_bottom=&#8221;29&#8243; css=&#8221;.vc_custom_1630945558037{padding-top: 80px !important;padding-bottom: 80px !important;background-image: url(http:\/\/pragmandt.com\/wp-content\/uploads\/2021\/08\/slider-2-1.jpg?id=15464) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; z_index=&#8221;&#8221;][vc_column][vc_single_image image=&#8221;15543&#8243; img_size=&#8221;full&#8221; qode_css_animation=&#8221;&#8221; css=&#8221;.vc_custom_1629992358596{padding-bottom: 5px !important;padding-left: 2px !important;}&#8221;][vc_column_text]<\/p>\n<h1><span style=\"color: #ffffff; font-family: d-dincondensed-bold;\"><span style=\"font-size: 65px;\">Data and Information Security Policy<\/span><\/span><\/h1>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; z_index=&#8221;&#8221; css=&#8221;.vc_custom_1630954723404{padding-top: 70px !important;padding-bottom: 70px !important;}&#8221;][vc_column][vc_column_text]<strong><span style=\"font-family: d-dincondensed;\">1. Introduction<\/span><\/strong><\/p>\n<p><span style=\"font-family: d-dincondensed;\">The Customers of PRAGMA may want to share very sensitive data and information (\u201cThe Data\u201d), from time to time.\u00a0 This data should be treated with a very high care, regardless of explicit mention of confidentiality.\u00a0 All PRAGMA employees must abide to this Policy, in direct relationship to their employment contract and confidentiality agreement.\u00a0 All PRAGMA collaborators (suppliers, subcontractors, consultants, etc.) that would eventually be in contact with the said Data must also abide to this Policy, in direct relationship to their involvement contract and confidentiality agreement.<\/span><\/p>\n<p><span style=\"font-family: d-dincondensed;\"><strong>This Policy is a strict code of conduct established by PRAGMA management (\u201cThe Management\u201d).\u00a0 A contravention to this code may be grounds for termination of employment or contract, without notice, and with possible legal action.<\/strong><\/span><\/p>\n<p>[\/vc_column_text][vc_separator type=&#8221;transparent&#8221; up=&#8221;15&#8243; down=&#8221;0&#8243;][vc_column_text]<strong><span style=\"font-family: d-dincondensed;\">2. NDA<\/span><\/strong><\/p>\n<p><span style=\"font-family: d-dincondensed;\">Normally, most Customers will request to sign an NDA before exchanging information. Before receiving the Data, it\u2019s important to ask if there\u2019s a signed NDA between the Customer and PRAGMA. <\/span><\/p>\n<p><span style=\"font-family: d-dincondensed;\">Regardless of a signed NDA, PRAGMA email signatures commit to basic confidentiality of information.<\/span>[\/vc_column_text][vc_separator type=&#8221;transparent&#8221; up=&#8221;15&#8243; down=&#8221;0&#8243;][vc_column_text]<strong><span style=\"font-family: d-dincondensed;\">3. Need-to-Know Basis<\/span><\/strong><\/p>\n<p><span style=\"font-family: d-dincondensed;\">Before a Customer is about to share the Data, it\u2019s important to ask if there\u2019s a \u201cneed to know\u201d in the first place.\u00a0 If possible, it\u2019s preferable to avoid to receive the Data.\u00a0 If possible, it\u2019s preferable to use alternate solutions.<\/span><\/p>\n<p>[\/vc_column_text][vc_separator type=&#8221;transparent&#8221; up=&#8221;15&#8243; down=&#8221;0&#8243;][vc_column_text]<strong><span style=\"font-family: d-dincondensed;\">4. Criticality of Disclosure<\/span><\/strong><\/p>\n<p><span style=\"font-family: d-dincondensed;\">If the Customer really needs to send the Data, then it\u2019s important to ask prior the degree of criticality.\u00a0 PRAGMA establishes the following degrees of criticality:<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"132\"><span style=\"font-family: d-dincondensed;\"><strong>Degree of Criticality<\/strong><\/span><\/td>\n<td width=\"207\"><span style=\"font-family: d-dincondensed;\"><strong>Description<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"132\"><span style=\"font-family: d-dincondensed;\">RESTRICTED<\/span><\/td>\n<td width=\"207\"><span style=\"font-family: d-dincondensed;\">Data can be shared with the email or link recipient, but shall not be propagated inside PRAGMA on file server or otherwise.<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"132\"><span style=\"font-family: d-dincondensed;\">INTERNAL<\/span><\/td>\n<td width=\"207\"><span style=\"font-family: d-dincondensed;\">Data can be shared internally at PRAGMA, on a need-to-know basis, under NDA and with precautions to use adequate sharing media.<\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"132\"><span style=\"font-family: d-dincondensed;\">LIMITED<\/span><\/td>\n<td width=\"207\"><span style=\"font-family: d-dincondensed;\">Data can be shared internally at PRAGMA and with the relevant subcontractors and suppliers, on a need-to-know basis, under NDA and with precautions to use adequate sharing media.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>[\/vc_column_text][vc_separator type=&#8221;transparent&#8221; up=&#8221;15&#8243; down=&#8221;0&#8243;][vc_column_text]<strong><span style=\"font-family: d-dincondensed;\">5. Workstation &amp; Sharing<\/span><\/strong><\/p>\n<p><span style=\"font-family: d-dincondensed;\">All PRAGMA employees and collaborators must make sure that their computers, operating systems and installed applications are configured such that no breach of security can happen.\u00a0 Screen sharing and remote-control technologies (ex: Teams, Zoom, Skype, TeamViewer, etc.) are tolerated for productivity reasons, but employees should limit the visual disclosure of the Data according to the Degree of Criticality.<\/span><\/p>\n<p>[\/vc_column_text][vc_separator type=&#8221;transparent&#8221; up=&#8221;15&#8243; down=&#8221;0&#8243;][vc_column_text]<strong><span style=\"font-family: d-dincondensed;\">6. Portable Media<\/span><\/strong><\/p>\n<p><span style=\"font-family: d-dincondensed;\">Customer Data should not stay on portable media (ex: USB sticks, external SSD drives) for a long period of time.\u00a0 After the need for portability, the data should be stored adequately on the file server of the company, depending on the Degree of Criticality.<\/span><\/p>\n<p>[\/vc_column_text][vc_separator type=&#8221;transparent&#8221; up=&#8221;15&#8243; down=&#8221;0&#8243;][vc_column_text]<strong><span style=\"font-family: d-dincondensed;\">7. Cloud<\/span><\/strong><\/p>\n<p><span style=\"font-family: d-dincondensed;\">If the Degree of Criticality allows it, Customer Data can be archived on PRAGMA\u2019s cloud system (Microsoft Sharepoint, OneDrive, Teams).<\/span><\/p>\n<p>[\/vc_column_text][vc_separator type=&#8221;transparent&#8221; up=&#8221;15&#8243; down=&#8221;0&#8243;][vc_column_text]<strong><span style=\"font-family: d-dincondensed;\">8. Software Code<\/span><\/strong><\/p>\n<p><span style=\"font-family: d-dincondensed;\">The software developed by PRAGMA and the third-party libraries it uses must not contain security breaches such as backdoors, \u201cEaster Eggs\u201d, malware or any other means of diverting Customer Data to an undeclared, unauthorized target destination or media.\u00a0 PRAGMA software products that are meant to run on Windows PC must not take benefit of any known weaknesses of Windows\u2019 operating system to implement or allow the security breaches described above.\u00a0 PRAGMA software products running on embedded CPU must not record Customer Data inside the embedded memory (Flash, EEPROM, etc.).<\/span><\/p>\n<p>[\/vc_column_text][vc_separator type=&#8221;transparent&#8221; up=&#8221;15&#8243; down=&#8221;0&#8243;][vc_column_text]<strong><span style=\"font-family: d-dincondensed;\">9. Disclosure of Incidents<\/span><\/strong><\/p>\n<p><span style=\"font-family: d-dincondensed;\">If a human error caused a possible breach of security in contravention with this Policy, the Management of PRAGMA should be made aware.\u00a0 The latter will assess the possible breach and if confirmed, will inform the Customer of the incident and the actions that were taken.<\/span><\/p>\n<p>[\/vc_column_text][vc_separator type=&#8221;transparent&#8221; up=&#8221;15&#8243; down=&#8221;0&#8243;][vc_column_text]<strong><span style=\"font-family: d-dincondensed;\">10. Destruction of Data<\/span><\/strong><\/p>\n<p><span style=\"font-family: d-dincondensed;\">Whenever a Customer is requesting the destruction of the Data, the Administration must be informed.\u00a0 Within 5 days, the Management should confirm the scope of destruction and reconfirm the Customer desire.\u00a0 Within 2 days of a Customer reconfirmation, the Data must be completely deleted from all media (server, USB sticks, cloud, etc.).\u00a0 An email confirmation must be provided afterwards to the Customer, with conform copy to the Management.<\/span><\/p>\n<p>[\/vc_column_text][vc_separator type=&#8221;transparent&#8221; up=&#8221;15&#8243; down=&#8221;0&#8243;][vc_column_text]<strong><span style=\"font-family: d-dincondensed;\">11. Right for Audit<\/span><\/strong><\/p>\n<p><span style=\"font-family: d-dincondensed;\">The Customer can request an audit on the respect of this Policy to their Data, if the Customer bears the related costs.\u00a0 Such audit can include the review of documentation, emails, media content, hacking tests (aka. Intrusive Testing), and more.\u00a0 The scope of audit, the dates, the individuals, the modus operandi and the costs would have to be agreed beforehand, with adequate notice to PRAGMA.<\/span><\/p>\n<p>[\/vc_column_text][vc_separator type=&#8221;transparent&#8221; up=&#8221;15&#8243; down=&#8221;0&#8243;][vc_column_text]<strong><span style=\"font-family: d-dincondensed;\">12. Policy Review<\/span><\/strong><\/p>\n<p><span style=\"font-family: d-dincondensed;\">This Policy must be reviewed every year, in January.<\/span>[\/vc_column_text][vc_separator type=&#8221;transparent&#8221; up=&#8221;15&#8243; down=&#8221;0&#8243;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; css=&#8221;.vc_custom_1629074907549{padding-top: 60px !important;padding-bottom: 60px !important;background-color: #0a0a0a !important;}&#8221; z_index=&#8221;&#8221;][vc_column width=&#8221;3\/4&#8243; css=&#8221;.vc_custom_1629074789712{padding-right: 30px !important;}&#8221;][vc_column_text]<\/p>\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<h2><span style=\"color: #ffffff; font-family: d-dincondensed;\">Ask an expert to download the brochure<\/span><\/h2>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][vc_separator type=&#8221;transparent&#8221; up=&#8221;15&#8243; down=&#8221;0&#8243;][vc_column_text]<\/p>\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\">\n<p><span style=\"color: #ffffff; font-size: 15pt; font-family: d-dincondensed;\">Phased-Array Is A Common Way To Define An Array Of Ultrasound Elements.<\/span><\/p>\n<\/div>\n<\/div>\n<p>[\/vc_column_text][\/vc_column][vc_column width=&#8221;1\/4&#8243;]<a  itemprop=\"url\" href=\"\" target=\"_self\"  class=\"qbutton  center default\" style=\"margin: 17px 0 0 0; \">DOWNLOAD THE BROCHURE<\/a>[\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; background_color=&#8221;#f1f3f4&#8243; padding_top=&#8221;29&#8243; padding_bottom=&#8221;6&#8243; css=&#8221;.vc_custom_1629072987568{padding-top: 30px !important;padding-bottom: 30px !important;background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; z_index=&#8221;&#8221;][vc_column][vc_column_text] Data and Information Security Policy &gt; [\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; background_color=&#8221;#f1f3f4&#8243; padding_top=&#8221;29&#8243; padding_bottom=&#8221;29&#8243; css=&#8221;.vc_custom_1630945558037{padding-top: 80px !important;padding-bottom:&#8230;<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"closed","template":"full_width.php","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-17392","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data and Information Security Policy - Pragma - NDT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pragmandt.com\/fr\/data-and-information-security-policy\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data and Information Security Policy - Pragma - NDT\" \/>\n<meta property=\"og:description\" content=\"[vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; background_color=&#8221;#f1f3f4&#8243; padding_top=&#8221;29&#8243; padding_bottom=&#8221;6&#8243; css=&#8221;.vc_custom_1629072987568{padding-top: 30px !important;padding-bottom: 30px !important;background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; z_index=&#8221;&#8221;][vc_column][vc_column_text] Data and Information Security Policy &gt; [\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; background_color=&#8221;#f1f3f4&#8243; padding_top=&#8221;29&#8243; padding_bottom=&#8221;29&#8243; css=&#8221;.vc_custom_1630945558037{padding-top: 80px !important;padding-bottom:...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pragmandt.com\/fr\/data-and-information-security-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Pragma - NDT\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-29T16:22:02+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/pragmandt.com\/fr\/data-and-information-security-policy\/\",\"url\":\"https:\/\/pragmandt.com\/fr\/data-and-information-security-policy\/\",\"name\":\"Data and Information Security Policy - Pragma - NDT\",\"isPartOf\":{\"@id\":\"https:\/\/pragmandt.com\/#website\"},\"datePublished\":\"2021-09-07T22:23:12+00:00\",\"dateModified\":\"2024-01-29T16:22:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/pragmandt.com\/fr\/data-and-information-security-policy\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/pragmandt.com\/fr\/data-and-information-security-policy\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/pragmandt.com\/fr\/data-and-information-security-policy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/pragmandt.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data and Information Security Policy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pragmandt.com\/#website\",\"url\":\"https:\/\/pragmandt.com\/\",\"name\":\"Pragma - NDT\",\"description\":\"Instrumental to your success\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pragmandt.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data and Information Security Policy - Pragma - NDT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pragmandt.com\/fr\/data-and-information-security-policy\/","og_locale":"fr_FR","og_type":"article","og_title":"Data and Information Security Policy - Pragma - NDT","og_description":"[vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; background_color=&#8221;#f1f3f4&#8243; padding_top=&#8221;29&#8243; padding_bottom=&#8221;6&#8243; css=&#8221;.vc_custom_1629072987568{padding-top: 30px !important;padding-bottom: 30px !important;background-color: #ffffff !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; z_index=&#8221;&#8221;][vc_column][vc_column_text] Data and Information Security Policy &gt; [\/vc_column_text][\/vc_column][\/vc_row][vc_row css_animation=&#8221;&#8221; row_type=&#8221;row&#8221; use_row_as_full_screen_section=&#8221;no&#8221; type=&#8221;grid&#8221; angled_section=&#8221;no&#8221; text_align=&#8221;left&#8221; background_image_as_pattern=&#8221;without_pattern&#8221; background_color=&#8221;#f1f3f4&#8243; padding_top=&#8221;29&#8243; padding_bottom=&#8221;29&#8243; css=&#8221;.vc_custom_1630945558037{padding-top: 80px !important;padding-bottom:...","og_url":"https:\/\/pragmandt.com\/fr\/data-and-information-security-policy\/","og_site_name":"Pragma - NDT","article_modified_time":"2024-01-29T16:22:02+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/pragmandt.com\/fr\/data-and-information-security-policy\/","url":"https:\/\/pragmandt.com\/fr\/data-and-information-security-policy\/","name":"Data and Information Security Policy - Pragma - NDT","isPartOf":{"@id":"https:\/\/pragmandt.com\/#website"},"datePublished":"2021-09-07T22:23:12+00:00","dateModified":"2024-01-29T16:22:02+00:00","breadcrumb":{"@id":"https:\/\/pragmandt.com\/fr\/data-and-information-security-policy\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pragmandt.com\/fr\/data-and-information-security-policy\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/pragmandt.com\/fr\/data-and-information-security-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pragmandt.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Data and Information Security Policy"}]},{"@type":"WebSite","@id":"https:\/\/pragmandt.com\/#website","url":"https:\/\/pragmandt.com\/","name":"Pragma - NDT","description":"Instrumental to your success","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pragmandt.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"}]}},"_links":{"self":[{"href":"https:\/\/pragmandt.com\/fr\/wp-json\/wp\/v2\/pages\/17392","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pragmandt.com\/fr\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pragmandt.com\/fr\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pragmandt.com\/fr\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/pragmandt.com\/fr\/wp-json\/wp\/v2\/comments?post=17392"}],"version-history":[{"count":1,"href":"https:\/\/pragmandt.com\/fr\/wp-json\/wp\/v2\/pages\/17392\/revisions"}],"predecessor-version":[{"id":17393,"href":"https:\/\/pragmandt.com\/fr\/wp-json\/wp\/v2\/pages\/17392\/revisions\/17393"}],"wp:attachment":[{"href":"https:\/\/pragmandt.com\/fr\/wp-json\/wp\/v2\/media?parent=17392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}