{"id":432,"date":"2025-11-15T22:21:10","date_gmt":"2025-11-15T22:21:10","guid":{"rendered":"https:\/\/family-office-advisory.com\/wiki\/protocoles-de-securite-et-de-risque-pour-la-famille\/"},"modified":"2025-11-16T22:16:30","modified_gmt":"2025-11-16T22:16:30","password":"","slug":"protocoles-de-securite-et-de-risque-pour-la-famille","status":"publish","type":"docs","link":"https:\/\/family-office-advisory.com\/fr\/wiki\/protocoles-de-securite-et-de-risque-pour-la-famille\/","title":{"rendered":"Protocoles de s\u00e9curit\u00e9 et de risque pour la famille"},"content":{"rendered":"\n<h2 class=\"wp-block-heading highlight\" id=\"h-family-security-amp-risk-protocols\"><span class=\"highlight\">Protocoles de s\u00e9curit\u00e9 et de risque pour la famille<\/span><\/h2>\n\n<p>Les <span class=\"highlight\">protocoles de s\u00e9curit\u00e9 et de risque familiaux<\/span> \u00e9tablissent des mesures de protection qui prot\u00e8gent les familles UHNW des menaces physiques, num\u00e9riques, op\u00e9rationnelles et de r\u00e9putation. Compte tenu de leur visibilit\u00e9, de leur richesse et de leur mobilit\u00e9 mondiale, les familles sont davantage expos\u00e9es aux attaques cibl\u00e9es, \u00e0 l&rsquo;ing\u00e9nierie sociale, \u00e0 l&rsquo;usurpation d&rsquo;identit\u00e9, aux risques d&rsquo;enl\u00e8vement, \u00e0 la cybercriminalit\u00e9 et aux menaces d&rsquo;initi\u00e9s. Un cadre de s\u00e9curit\u00e9 structur\u00e9 r\u00e9duit les vuln\u00e9rabilit\u00e9s tout en permettant des op\u00e9rations s\u00fbres et efficaces.  <\/p>\n\n<h2 class=\"wp-block-heading highlight\" id=\"h-context-amp-importance\"><span class=\"highlight\">Contexte et importance<\/span><\/h2>\n\n<p>Les family offices doivent g\u00e9rer les risques personnels et ceux li\u00e9s \u00e0 l&rsquo;entreprise. Il s&rsquo;agit notamment des menaces li\u00e9es \u00e0 l&rsquo;exposition publique, \u00e0 l&rsquo;activit\u00e9 en ligne, aux voyages, aux environnements politiques, aux actifs de grande valeur, au personnel domestique et aux relations avec les conseillers et les fournisseurs. Sans protocoles de s\u00e9curit\u00e9 clairs, les familles s&rsquo;exposent \u00e0 des pertes financi\u00e8res, \u00e0 des atteintes \u00e0 leur r\u00e9putation, \u00e0 des violations de la vie priv\u00e9e et \u00e0 des dangers physiques. Une strat\u00e9gie de s\u00e9curit\u00e9 compl\u00e8te int\u00e8gre les personnes, les processus et la technologie \u00e0 travers tous les points de contact.   <\/p>\n\n<h2 class=\"wp-block-heading highlight\" id=\"h-core-security-components\"><span class=\"highlight\">Composants de s\u00e9curit\u00e9 de base<\/span><\/h2>\n\n<ul class=\"wp-block-list\">\n<li><strong class=\"highlight\">S\u00e9curit\u00e9 physique :<\/strong> Protection des r\u00e9sidences, alarmes, contr\u00f4le d&rsquo;acc\u00e8s, chambres fortes et personnel de s\u00e9curit\u00e9.<\/li>\n\n\n\n<li><strong class=\"highlight\">S\u00e9curit\u00e9 num\u00e9rique :<\/strong> Contr\u00f4les de cybers\u00e9curit\u00e9, outils de communication s\u00e9curis\u00e9s, protection de l&rsquo;identit\u00e9 et gestion des appareils.<\/li>\n\n\n\n<li><strong class=\"highlight\">Gestion des risques li\u00e9s aux voyages :<\/strong> Planification avant le voyage, analyse des risques g\u00e9ographiques, transport s\u00e9curis\u00e9 et protocoles d&rsquo;urgence.<\/li>\n\n\n\n<li><strong class=\"highlight\">Gestion de la vie priv\u00e9e :<\/strong> Limites \u00e0 l&rsquo;exposition publique, lignes directrices pour les m\u00e9dias sociaux et surveillance de la r\u00e9putation.<\/li>\n\n\n\n<li><strong class=\"highlight\">S\u00e9curit\u00e9 des fournisseurs et du personnel :<\/strong> V\u00e9rification des ant\u00e9c\u00e9dents, accords de confidentialit\u00e9 et surveillance du comportement.<\/li>\n\n\n\n<li><strong class=\"highlight\">R\u00e9ponse aux crises :<\/strong> Proc\u00e9dures en cas d&rsquo;enl\u00e8vement, d&rsquo;extorsion, de cyber-fraude, d&rsquo;urgence m\u00e9dicale et de catastrophe naturelle.<\/li>\n\n\n\n<li><strong class=\"highlight\">Couverture d&rsquo;assurance :<\/strong> Kidnap &amp; ransom (K&amp;R), cyber-assurance, assurance voyage et protection de la responsabilit\u00e9 civile.<\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading highlight\" id=\"h-family-security-protocols\"><span class=\"highlight\">Protocoles de s\u00e9curit\u00e9 familiale<\/span><\/h2>\n\n<p>Les protocoles d\u00e9finissent les comportements requis et les r\u00e8gles de prise de d\u00e9cision pour tous les membres de la famille dans les contextes num\u00e9riques, physiques et op\u00e9rationnels.<\/p>\n\n<ul class=\"wp-block-list\">\n<li><strong>R\u00e8gles de contr\u00f4le d&rsquo;acc\u00e8s :<\/strong> Listes d&rsquo;acc\u00e8s approuv\u00e9es pour les propri\u00e9t\u00e9s, les v\u00e9hicules et les syst\u00e8mes s\u00e9curis\u00e9s.<\/li>\n\n\n\n<li><strong>Lignes directrices pour les m\u00e9dias sociaux :<\/strong> Restrictions concernant la publication de lieux, de plans de voyage et d&rsquo;informations personnelles sensibles.<\/li>\n\n\n\n<li><strong>Normes de communication :<\/strong> Utilisation d&rsquo;outils de messagerie crypt\u00e9s, de courriels s\u00e9curis\u00e9s et d&rsquo;appareils approuv\u00e9s.<\/li>\n\n\n\n<li><strong>Proc\u00e9dures de voyage :<\/strong> \u00c9valuation des risques li\u00e9s \u00e0 la destination, arrangements s\u00e9curis\u00e9s pour la prise en charge et enregistrement en temps r\u00e9el.<\/li>\n\n\n\n<li><strong>Pratiques de traitement des donn\u00e9es :<\/strong> Restrictions concernant le partage de documents ou d&rsquo;informations sensibles en dehors des canaux approuv\u00e9s.<\/li>\n\n\n\n<li><strong>Politiques relatives aux visiteurs et aux vendeurs :<\/strong> Contr\u00f4les d&rsquo;identification, r\u00e8gles d&rsquo;escorte et zones d&rsquo;acc\u00e8s restreint.<\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading highlight\" id=\"h-implementation-amp-best-practices\"><span class=\"highlight\">Mise en \u0153uvre et bonnes pratiques<\/span><\/h2>\n\n<ul class=\"wp-block-list\">\n<li><strong>Effectuez une \u00e9valuation des risques de s\u00e9curit\u00e9 :<\/strong> \u00c9valuez les menaces qui p\u00e8sent sur les r\u00e9sidences, les itin\u00e9raires de voyage, les activit\u00e9s en ligne et l&rsquo;exposition du public.<\/li>\n\n\n\n<li><strong>Faites appel \u00e0 des entreprises de s\u00e9curit\u00e9 professionnelles :<\/strong> Faites appel \u00e0 des sp\u00e9cialistes pour la protection physique, la cybersurveillance et la r\u00e9ponse aux crises.<\/li>\n\n\n\n<li><strong>Cr\u00e9ez un plan d&rsquo;urgence familial :<\/strong> Indiquez les arbres de communication, les points de rassemblement et les contacts m\u00e9dicaux.<\/li>\n\n\n\n<li><strong>\u00c9tablir des protocoles de confidentialit\u00e9 :<\/strong> des accords de confidentialit\u00e9 pour le personnel, les fournisseurs et les sous-traitants.<\/li>\n\n\n\n<li><strong>Installez des syst\u00e8mes de surveillance :<\/strong> Cam\u00e9ras, syst\u00e8mes d&rsquo;alarme, d\u00e9tection des cybermenaces et outils de suivi des d\u00e9placements.<\/li>\n\n\n\n<li><strong>Formez les membres de votre famille :<\/strong> S\u00e9ances d&rsquo;information sur la cybers\u00e9curit\u00e9, la prise de conscience de la situation et les comportements s\u00e9curitaires.<\/li>\n\n\n\n<li><strong>Auditer r\u00e9guli\u00e8rement :<\/strong> Examinez les syst\u00e8mes de s\u00e9curit\u00e9, les journaux, l&rsquo;acc\u00e8s des fournisseurs et le respect des politiques.<\/li>\n\n\n\n<li><strong>Testez les simulations de crise :<\/strong> Effectuez des exercices pour les cyberincidents, les urgences m\u00e9dicales et les menaces physiques.<\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading highlight\" id=\"h-common-challenges\"><span class=\"highlight\">D\u00e9fis communs<\/span><\/h2>\n\n<ul class=\"wp-block-list\">\n<li>Les membres de la famille s&rsquo;opposent aux protocoles de s\u00e9curit\u00e9 en raison des d\u00e9sagr\u00e9ments qu&rsquo;ils subissent.<\/li>\n\n\n\n<li>Une visibilit\u00e9 importante qui accro\u00eet l&rsquo;exposition aux menaces.<\/li>\n\n\n\n<li>Risques d&rsquo;initi\u00e9s de la part du personnel, des fournisseurs ou des connaissances.<\/li>\n\n\n\n<li>Faibles habitudes en mati\u00e8re d&rsquo;hygi\u00e8ne num\u00e9rique (mauvais mots de passe, appareils non s\u00e9curis\u00e9s).<\/li>\n\n\n\n<li>L&rsquo;application des r\u00e8gles n&rsquo;est pas coh\u00e9rente d&rsquo;un endroit \u00e0 l&rsquo;autre.<\/li>\n\n\n\n<li>Manque de visibilit\u00e9 en temps r\u00e9el sur les d\u00e9placements ou les \u00e9v\u00e9nements \u00e0 risque.<\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading highlight\" id=\"h-see-also\"><span class=\"highlight\">Voir aussi<\/span><\/h2>\n\n<ul class=\"wp-block-list\">\n<li><a href=\"\/wiki\/cybersecurity-and-data-privacy-controls\">Contr\u00f4les de la cybers\u00e9curit\u00e9 et de la confidentialit\u00e9 des donn\u00e9es<\/a><\/li>\n\n\n\n<li><a href=\"\/wiki\/concierge-real-assets-and-lifestyle-administration\">Concierge, administration des biens immobiliers et du style de vie<\/a><\/li>\n\n\n\n<li><a href=\"\/wiki\/travel-risk-management\">Gestion des risques li\u00e9s aux voyages<\/a><\/li>\n\n\n\n<li><a href=\"\/wiki\/family-governance\">Gouvernance familiale<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/family-office-advisory.com\/wiki\/crisis-management-framework\/\">Cadre de gestion des crises<\/a><\/li>\n<\/ul>\n\n<h2 class=\"wp-block-heading highlight\" id=\"h-references\"><span class=\"highlight\">R\u00e9f\u00e9rences<\/span><\/h2>\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.pinkerton.com\/solutions\/family-offices\/\" target=\"_blank\" rel=\"noopener\">Pinkerton &#8211; S\u00e9curit\u00e9 des entreprises familiales<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.controlrisks.com\/\" target=\"_blank\" rel=\"noopener\">Control Risks &#8211; Conseil en mati\u00e8re de s\u00e9curit\u00e9 et de risques<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.kroll.com\/en\/services\/security-risk-management\" target=\"_blank\" rel=\"noopener\">Kroll &#8211; Gestion des risques de s\u00e9curit\u00e9<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.deloitte.com\/global\/en\/services\/risk.html\" target=\"_blank\" rel=\"noopener\">Deloitte &#8211; Conseil en mati\u00e8re de risques<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.enisa.europa.eu\/\" target=\"_blank\" rel=\"noopener\">ENISA &#8211; Agence europ\u00e9enne pour la cybers\u00e9curit\u00e9<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Protocoles de s\u00e9curit\u00e9 et de risque pour la famille Les protocoles de s\u00e9curit\u00e9 et de risque familiaux \u00e9tablissent des mesures [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"doc_category":[63],"doc_tag":[],"class_list":["post-432","docs","type-docs","status-publish","hentry","doc_category-operations-et-infrastructures"],"year_month":"2026-04","word_count":885,"total_views":0,"reactions":{"happy":0,"normal":0,"sad":0},"author_info":{"name":"admin","author_nicename":"email_t1xzty82","author_url":"https:\/\/family-office-advisory.com\/fr\/author\/email_t1xzty82\/"},"doc_category_info":[{"term_name":"Op\u00e9rations et infrastructures","term_url":"https:\/\/family-office-advisory.com\/fr\/wiki-category\/operations-et-infrastructures\/"}],"doc_tag_info":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Protocoles de s\u00e9curit\u00e9 et de risque pour la famille - Family Office Advisory<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/family-office-advisory.com\/fr\/wiki\/protocoles-de-securite-et-de-risque-pour-la-famille\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protocoles de s\u00e9curit\u00e9 et de risque pour la famille\" \/>\n<meta property=\"og:description\" content=\"Protocoles de s\u00e9curit\u00e9 et de risque pour la famille Les protocoles de s\u00e9curit\u00e9 et de risque familiaux \u00e9tablissent des mesures [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/family-office-advisory.com\/fr\/wiki\/protocoles-de-securite-et-de-risque-pour-la-famille\/\" \/>\n<meta property=\"og:site_name\" content=\"Family Office Advisory\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-16T22:16:30+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/wiki\\\/protocoles-de-securite-et-de-risque-pour-la-famille\\\/\",\"url\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/wiki\\\/protocoles-de-securite-et-de-risque-pour-la-famille\\\/\",\"name\":\"Protocoles de s\u00e9curit\u00e9 et de risque pour la famille - Family Office Advisory\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/#website\"},\"datePublished\":\"2025-11-15T22:21:10+00:00\",\"dateModified\":\"2025-11-16T22:16:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/wiki\\\/protocoles-de-securite-et-de-risque-pour-la-famille\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/wiki\\\/protocoles-de-securite-et-de-risque-pour-la-famille\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/wiki\\\/protocoles-de-securite-et-de-risque-pour-la-famille\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/accueil\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Knowledge Base\",\"item\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/wiki\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Protocoles de s\u00e9curit\u00e9 et de risque pour la famille\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/\",\"name\":\"Family Office Advisory\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/family-office-advisory.com\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Protocoles de s\u00e9curit\u00e9 et de risque pour la famille - Family Office Advisory","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/family-office-advisory.com\/fr\/wiki\/protocoles-de-securite-et-de-risque-pour-la-famille\/","og_locale":"fr_FR","og_type":"article","og_title":"Protocoles de s\u00e9curit\u00e9 et de risque pour la famille","og_description":"Protocoles de s\u00e9curit\u00e9 et de risque pour la famille Les protocoles de s\u00e9curit\u00e9 et de risque familiaux \u00e9tablissent des mesures [&hellip;]","og_url":"https:\/\/family-office-advisory.com\/fr\/wiki\/protocoles-de-securite-et-de-risque-pour-la-famille\/","og_site_name":"Family Office Advisory","article_modified_time":"2025-11-16T22:16:30+00:00","twitter_card":"summary_large_image","twitter_misc":{"Dur\u00e9e de lecture estim\u00e9e":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/family-office-advisory.com\/fr\/wiki\/protocoles-de-securite-et-de-risque-pour-la-famille\/","url":"https:\/\/family-office-advisory.com\/fr\/wiki\/protocoles-de-securite-et-de-risque-pour-la-famille\/","name":"Protocoles de s\u00e9curit\u00e9 et de risque pour la famille - Family Office Advisory","isPartOf":{"@id":"https:\/\/family-office-advisory.com\/fr\/#website"},"datePublished":"2025-11-15T22:21:10+00:00","dateModified":"2025-11-16T22:16:30+00:00","breadcrumb":{"@id":"https:\/\/family-office-advisory.com\/fr\/wiki\/protocoles-de-securite-et-de-risque-pour-la-famille\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/family-office-advisory.com\/fr\/wiki\/protocoles-de-securite-et-de-risque-pour-la-famille\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/family-office-advisory.com\/fr\/wiki\/protocoles-de-securite-et-de-risque-pour-la-famille\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/family-office-advisory.com\/fr\/accueil\/"},{"@type":"ListItem","position":2,"name":"Knowledge Base","item":"https:\/\/family-office-advisory.com\/fr\/wiki\/"},{"@type":"ListItem","position":3,"name":"Protocoles de s\u00e9curit\u00e9 et de risque pour la famille"}]},{"@type":"WebSite","@id":"https:\/\/family-office-advisory.com\/fr\/#website","url":"https:\/\/family-office-advisory.com\/fr\/","name":"Family Office Advisory","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/family-office-advisory.com\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"}]}},"knowledge_base_info":[],"knowledge_base_slug":[],"_links":{"self":[{"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/docs\/432","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/docs"}],"about":[{"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/types\/docs"}],"author":[{"embeddable":true,"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/comments?post=432"}],"version-history":[{"count":1,"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/docs\/432\/revisions"}],"predecessor-version":[{"id":433,"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/docs\/432\/revisions\/433"}],"wp:attachment":[{"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/media?parent=432"}],"wp:term":[{"taxonomy":"doc_category","embeddable":true,"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/doc_category?post=432"},{"taxonomy":"doc_tag","embeddable":true,"href":"https:\/\/family-office-advisory.com\/fr\/wp-json\/wp\/v2\/doc_tag?post=432"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}