{"id":5067,"date":"2024-10-04T10:00:00","date_gmt":"2024-10-04T10:00:00","guid":{"rendered":"https:\/\/educap.io\/?p=5067"},"modified":"2024-09-25T15:12:24","modified_gmt":"2024-09-25T15:12:24","slug":"cybersecurite-scolaire-proteger-les-donnees-des-eleves","status":"publish","type":"post","link":"https:\/\/educap.io\/en\/cybersecurite-scolaire-proteger-les-donnees-des-eleves\/","title":{"rendered":"Cybers\u00e9curit\u00e9 scolaire : prot\u00e9ger les donn\u00e9es des \u00e9l\u00e8ves"},"content":{"rendered":"<figure class=\"wp-block-image size-large is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"586\" src=\"https:\/\/educap.io\/wp-content\/uploads\/2024\/09\/Designer-8-1024x586.jpeg\" alt=\"\" class=\"wp-image-5068\" style=\"width:566px;height:auto\" srcset=\"https:\/\/educap.io\/wp-content\/uploads\/2024\/09\/Designer-8-1024x586.jpeg 1024w, https:\/\/educap.io\/wp-content\/uploads\/2024\/09\/Designer-8-300x172.jpeg 300w, https:\/\/educap.io\/wp-content\/uploads\/2024\/09\/Designer-8-768x439.jpeg 768w, https:\/\/educap.io\/wp-content\/uploads\/2024\/09\/Designer-8.jpeg 1100w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>\u00c0 l\u2019\u00e8re du num\u00e9rique, les \u00e9coles se tournent de plus en plus vers des solutions digitales pour faciliter l\u2019apprentissage et la gestion administrative. Mais avec cette transition digitale, la question de la <strong>cybers\u00e9curit\u00e9<\/strong> devient cruciale, en particulier pour prot\u00e9ger les donn\u00e9es sensibles des \u00e9l\u00e8ves. Comment les \u00e9tablissements scolaires peuvent-ils garantir la s\u00e9curit\u00e9 des informations tout en profitant des avantages du num\u00e9rique ? Dans cet article, nous explorerons les <strong>risques<\/strong>, les <strong>mesures de protection<\/strong>, et l\u2019importance d\u2019une strat\u00e9gie de cybers\u00e9curit\u00e9 adapt\u00e9e au milieu scolaire.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">1. Les risques de la cybercriminalit\u00e9 dans les \u00e9coles<\/h4>\n\n\n\n<p>Les \u00e9tablissements scolaires, tout comme les entreprises, ne sont pas \u00e0 l&rsquo;abri des <strong>cyberattaques<\/strong>. Leurs bases de donn\u00e9es contiennent des informations sensibles : identit\u00e9s des \u00e9l\u00e8ves, r\u00e9sultats scolaires, informations m\u00e9dicales et familiales. Ces donn\u00e9es peuvent \u00eatre cibl\u00e9es par des <strong>pirates informatiques<\/strong> pour diverses raisons : vol d&rsquo;identit\u00e9, ran\u00e7on (ransomware) ou exploitation frauduleuse.<\/p>\n\n\n\n<p><strong>Exemple :<\/strong><br>Plusieurs \u00e9coles ont \u00e9t\u00e9 victimes d&rsquo;attaques par ransomware. Les pirates bloquent l&rsquo;acc\u00e8s aux donn\u00e9es et exigent une ran\u00e7on pour les restituer. Ces attaques perturbent non seulement le bon fonctionnement de l&rsquo;\u00e9cole, mais exposent aussi les informations priv\u00e9es des \u00e9l\u00e8ves et du personnel.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2. Prot\u00e9ger les donn\u00e9es sensibles : les bonnes pratiques<\/h4>\n\n\n\n<p>Pour minimiser les risques, il est essentiel que les \u00e9tablissements scolaires adoptent des <strong>mesures de s\u00e9curit\u00e9<\/strong> strictes. Voici quelques pratiques incontournables pour prot\u00e9ger les donn\u00e9es des \u00e9l\u00e8ves.<\/p>\n\n\n\n<p><strong>a) Sensibilisation du personnel et des \u00e9l\u00e8ves<\/strong><br>La formation est le premier rempart contre les cyberattaques. Il est crucial que les enseignants, le personnel administratif et m\u00eame les \u00e9l\u00e8ves soient form\u00e9s aux <strong>bonnes pratiques<\/strong> en mati\u00e8re de s\u00e9curit\u00e9 num\u00e9rique : utilisation de mots de passe forts, mise \u00e0 jour r\u00e9guli\u00e8re des logiciels, reconnaissance des e-mails de phishing.<\/p>\n\n\n\n<p><strong>b) Mise en place de logiciels de s\u00e9curit\u00e9<\/strong><br>L\u2019installation de <strong>pare-feu<\/strong>, de <strong>logiciels antivirus<\/strong> et de syst\u00e8mes de d\u00e9tection des intrusions est indispensable. Ces outils permettent de rep\u00e9rer et bloquer toute tentative d\u2019acc\u00e8s non autoris\u00e9 aux syst\u00e8mes informatiques de l\u2019\u00e9cole.<\/p>\n\n\n\n<p><strong>c) Sauvegarde r\u00e9guli\u00e8re des donn\u00e9es<\/strong><br>Les \u00e9tablissements doivent mettre en place des <strong>protocoles de sauvegarde<\/strong> r\u00e9guli\u00e8re des donn\u00e9es. Cela permet de restaurer rapidement les informations en cas de cyberattaque ou de panne.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">3. S\u00e9curisation des acc\u00e8s et des communications<\/h4>\n\n\n\n<p>L&rsquo;un des points critiques de la cybers\u00e9curit\u00e9 scolaire est la <strong>gestion des acc\u00e8s<\/strong> aux syst\u00e8mes. Les \u00e9l\u00e8ves, les enseignants et les administrateurs n&rsquo;ont pas tous besoin des m\u00eames niveaux d\u2019acc\u00e8s. Une <strong>gestion des identit\u00e9s<\/strong> et des acc\u00e8s bien pens\u00e9e permet de limiter les risques.<\/p>\n\n\n\n<p><strong>Exemple de solution :<\/strong><br>L\u2019utilisation d\u2019un syst\u00e8me d\u2019authentification \u00e0 deux facteurs (2FA) est une mesure simple mais tr\u00e8s efficace pour s\u00e9curiser les connexions aux plateformes scolaires. Ainsi, m\u00eame si un mot de passe est compromis, un pirate aura du mal \u00e0 acc\u00e9der aux donn\u00e9es sans une deuxi\u00e8me forme d&rsquo;identification.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">4. Respect des r\u00e9glementations en vigueur<\/h4>\n\n\n\n<p>Les \u00e9coles doivent aussi se conformer aux lois et r\u00e8glements en mati\u00e8re de protection des donn\u00e9es, comme le <strong>RGPD<\/strong> (R\u00e8glement g\u00e9n\u00e9ral sur la protection des donn\u00e9es) en Europe. Cela implique, entre autres, d&rsquo;obtenir le <strong>consentement des parents<\/strong> avant de collecter des informations sur les \u00e9l\u00e8ves et de garantir que ces donn\u00e9es sont trait\u00e9es de mani\u00e8re s\u00e9curis\u00e9e et confidentielle.<\/p>\n\n\n\n<p><strong>Bon \u00e0 savoir :<\/strong><br>Le non-respect des r\u00e9glementations peut entra\u00eener des amendes importantes, mais aussi nuire \u00e0 la r\u00e9putation de l\u2019\u00e9tablissement.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">5. Les avantages d\u2019une cybers\u00e9curit\u00e9 renforc\u00e9e<\/h4>\n\n\n\n<p>Adopter une politique de cybers\u00e9curit\u00e9 efficace pr\u00e9sente de nombreux avantages. En prot\u00e9geant les donn\u00e9es des \u00e9l\u00e8ves, les \u00e9tablissements :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Renforcent la <strong>confiance des parents<\/strong> et des parties prenantes.<\/li>\n\n\n\n<li>Garantissent un environnement d\u2019apprentissage serein, sans interruption due \u00e0 des cyberattaques.<\/li>\n\n\n\n<li>Assurent une <strong>conformit\u00e9 l\u00e9gale<\/strong> avec les r\u00e9glementations en vigueur.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Conclusion<\/h4>\n\n\n\n<p>\u00c0 l\u2019\u00e8re num\u00e9rique, la cybers\u00e9curit\u00e9 scolaire est un enjeu incontournable. Prot\u00e9ger les donn\u00e9es des \u00e9l\u00e8ves et des enseignants doit \u00eatre une priorit\u00e9 pour chaque \u00e9tablissement. En adoptant des <strong>mesures de s\u00e9curit\u00e9 adapt\u00e9es<\/strong>, en formant le personnel et les \u00e9l\u00e8ves, et en respectant les r\u00e9glementations, les \u00e9coles peuvent tirer parti des avantages du digital tout en assurant la protection de leurs informations sensibles.<\/p>\n\n\n\n<p><strong>Vous souhaitez s\u00e9curiser les donn\u00e9es de votre \u00e9tablissement scolaire ? D\u00e9couvrez comment notre plateforme Educap.io peut vous aider \u00e0 renforcer votre cybers\u00e9curit\u00e9.<\/strong><br><strong>\ud83d\udc49 <a href=\"https:\/\/educap.io\/en\/\">Contactez-nous d\u00e8s maintenant !<\/a><\/strong><\/p>","protected":false},"excerpt":{"rendered":"<p>\u00c0 l\u2019\u00e8re du num\u00e9rique, les \u00e9coles se tournent de plus en plus vers des solutions digitales pour faciliter l\u2019apprentissage et la gestion administrative. Mais avec cette transition digitale, la question de la cybers\u00e9curit\u00e9 devient cruciale, en particulier pour prot\u00e9ger les donn\u00e9es sensibles des \u00e9l\u00e8ves. Comment les \u00e9tablissements scolaires peuvent-ils garantir la s\u00e9curit\u00e9 des informations tout [&hellip;]<\/p>","protected":false},"author":9,"featured_media":5068,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-5067","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybers\u00e9curit\u00e9 scolaire : prot\u00e9ger les donn\u00e9es des \u00e9l\u00e8ves - Educap<\/title>\n<meta name=\"description\" content=\"D\u00e9couvrez comment prot\u00e9ger les donn\u00e9es des \u00e9l\u00e8ves \u00e0 l&#039;\u00e8re num\u00e9rique gr\u00e2ce \u00e0 des solutions de cybers\u00e9curit\u00e9 scolaire adapt\u00e9es aux \u00e9tablissements scolaires. Sensibilisation, logiciels de s\u00e9curit\u00e9, gestion des acc\u00e8s et conformit\u00e9 RGPD sont essentiels pour \u00e9viter les cyberattaques\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/educap.io\/en\/cybersecurite-scolaire-proteger-les-donnees-des-eleves\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybers\u00e9curit\u00e9 scolaire : prot\u00e9ger les donn\u00e9es des \u00e9l\u00e8ves - Educap\" \/>\n<meta property=\"og:description\" content=\"D\u00e9couvrez comment prot\u00e9ger les donn\u00e9es des \u00e9l\u00e8ves \u00e0 l&#039;\u00e8re num\u00e9rique gr\u00e2ce \u00e0 des solutions de cybers\u00e9curit\u00e9 scolaire adapt\u00e9es aux \u00e9tablissements scolaires. Sensibilisation, logiciels de s\u00e9curit\u00e9, gestion des acc\u00e8s et conformit\u00e9 RGPD sont essentiels pour \u00e9viter les cyberattaques\" \/>\n<meta property=\"og:url\" content=\"https:\/\/educap.io\/en\/cybersecurite-scolaire-proteger-les-donnees-des-eleves\/\" \/>\n<meta property=\"og:site_name\" content=\"Educap\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/educap.io\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-04T10:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-25T15:12:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/educap.io\/wp-content\/uploads\/2024\/09\/Designer-8.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1100\" \/>\n\t<meta property=\"og:image:height\" content=\"629\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Julie CENTI\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julie CENTI\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/educap.io\/cybersecurite-scolaire-proteger-les-donnees-des-eleves\/\",\"url\":\"https:\/\/educap.io\/cybersecurite-scolaire-proteger-les-donnees-des-eleves\/\",\"name\":\"Cybers\u00e9curit\u00e9 scolaire : prot\u00e9ger les donn\u00e9es des \u00e9l\u00e8ves - Educap\",\"isPartOf\":{\"@id\":\"https:\/\/educap.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/educap.io\/cybersecurite-scolaire-proteger-les-donnees-des-eleves\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/educap.io\/cybersecurite-scolaire-proteger-les-donnees-des-eleves\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/educap.io\/wp-content\/uploads\/2024\/09\/Designer-8.jpeg\",\"datePublished\":\"2024-10-04T10:00:00+00:00\",\"dateModified\":\"2024-09-25T15:12:24+00:00\",\"author\":{\"@id\":\"https:\/\/educap.io\/#\/schema\/person\/4dffe41e9714c247c451c98157113d60\"},\"description\":\"D\u00e9couvrez comment prot\u00e9ger les donn\u00e9es des \u00e9l\u00e8ves \u00e0 l'\u00e8re num\u00e9rique gr\u00e2ce \u00e0 des solutions de cybers\u00e9curit\u00e9 scolaire adapt\u00e9es aux \u00e9tablissements scolaires. Sensibilisation, logiciels de s\u00e9curit\u00e9, gestion des acc\u00e8s et conformit\u00e9 RGPD sont essentiels pour \u00e9viter les cyberattaques\",\"breadcrumb\":{\"@id\":\"https:\/\/educap.io\/cybersecurite-scolaire-proteger-les-donnees-des-eleves\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/educap.io\/cybersecurite-scolaire-proteger-les-donnees-des-eleves\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/educap.io\/cybersecurite-scolaire-proteger-les-donnees-des-eleves\/#primaryimage\",\"url\":\"https:\/\/educap.io\/wp-content\/uploads\/2024\/09\/Designer-8.jpeg\",\"contentUrl\":\"https:\/\/educap.io\/wp-content\/uploads\/2024\/09\/Designer-8.jpeg\",\"width\":1100,\"height\":629},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/educap.io\/cybersecurite-scolaire-proteger-les-donnees-des-eleves\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/educap.io\/fr_fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybers\u00e9curit\u00e9 scolaire : prot\u00e9ger les donn\u00e9es des \u00e9l\u00e8ves\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/educap.io\/#website\",\"url\":\"https:\/\/educap.io\/\",\"name\":\"Educap\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/educap.io\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/educap.io\/#\/schema\/person\/4dffe41e9714c247c451c98157113d60\",\"name\":\"Julie CENTI\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/educap.io\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f6ee0f918680eebf0bf9c06fdceae83423496df35825a3bb0ef85fc06548d5a1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f6ee0f918680eebf0bf9c06fdceae83423496df35825a3bb0ef85fc06548d5a1?s=96&d=mm&r=g\",\"caption\":\"Julie CENTI\"},\"url\":\"https:\/\/educap.io\/en\/author\/emna-benfraj\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybers\u00e9curit\u00e9 scolaire : prot\u00e9ger les donn\u00e9es des \u00e9l\u00e8ves - Educap","description":"D\u00e9couvrez comment prot\u00e9ger les donn\u00e9es des \u00e9l\u00e8ves \u00e0 l'\u00e8re num\u00e9rique gr\u00e2ce \u00e0 des solutions de cybers\u00e9curit\u00e9 scolaire adapt\u00e9es aux \u00e9tablissements scolaires. Sensibilisation, logiciels de s\u00e9curit\u00e9, gestion des acc\u00e8s et conformit\u00e9 RGPD sont essentiels pour \u00e9viter les cyberattaques","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/educap.io\/en\/cybersecurite-scolaire-proteger-les-donnees-des-eleves\/","og_locale":"en_US","og_type":"article","og_title":"Cybers\u00e9curit\u00e9 scolaire : prot\u00e9ger les donn\u00e9es des \u00e9l\u00e8ves - Educap","og_description":"D\u00e9couvrez comment prot\u00e9ger les donn\u00e9es des \u00e9l\u00e8ves \u00e0 l'\u00e8re num\u00e9rique gr\u00e2ce \u00e0 des solutions de cybers\u00e9curit\u00e9 scolaire adapt\u00e9es aux \u00e9tablissements scolaires. Sensibilisation, logiciels de s\u00e9curit\u00e9, gestion des acc\u00e8s et conformit\u00e9 RGPD sont essentiels pour \u00e9viter les cyberattaques","og_url":"https:\/\/educap.io\/en\/cybersecurite-scolaire-proteger-les-donnees-des-eleves\/","og_site_name":"Educap","article_publisher":"https:\/\/www.facebook.com\/educap.io","article_published_time":"2024-10-04T10:00:00+00:00","article_modified_time":"2024-09-25T15:12:24+00:00","og_image":[{"width":1100,"height":629,"url":"https:\/\/educap.io\/wp-content\/uploads\/2024\/09\/Designer-8.jpeg","type":"image\/jpeg"}],"author":"Julie CENTI","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Julie CENTI","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/educap.io\/cybersecurite-scolaire-proteger-les-donnees-des-eleves\/","url":"https:\/\/educap.io\/cybersecurite-scolaire-proteger-les-donnees-des-eleves\/","name":"Cybers\u00e9curit\u00e9 scolaire : prot\u00e9ger les donn\u00e9es des \u00e9l\u00e8ves - Educap","isPartOf":{"@id":"https:\/\/educap.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/educap.io\/cybersecurite-scolaire-proteger-les-donnees-des-eleves\/#primaryimage"},"image":{"@id":"https:\/\/educap.io\/cybersecurite-scolaire-proteger-les-donnees-des-eleves\/#primaryimage"},"thumbnailUrl":"https:\/\/educap.io\/wp-content\/uploads\/2024\/09\/Designer-8.jpeg","datePublished":"2024-10-04T10:00:00+00:00","dateModified":"2024-09-25T15:12:24+00:00","author":{"@id":"https:\/\/educap.io\/#\/schema\/person\/4dffe41e9714c247c451c98157113d60"},"description":"D\u00e9couvrez comment prot\u00e9ger les donn\u00e9es des \u00e9l\u00e8ves \u00e0 l'\u00e8re num\u00e9rique gr\u00e2ce \u00e0 des solutions de cybers\u00e9curit\u00e9 scolaire adapt\u00e9es aux \u00e9tablissements scolaires. Sensibilisation, logiciels de s\u00e9curit\u00e9, gestion des acc\u00e8s et conformit\u00e9 RGPD sont essentiels pour \u00e9viter les cyberattaques","breadcrumb":{"@id":"https:\/\/educap.io\/cybersecurite-scolaire-proteger-les-donnees-des-eleves\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/educap.io\/cybersecurite-scolaire-proteger-les-donnees-des-eleves\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/educap.io\/cybersecurite-scolaire-proteger-les-donnees-des-eleves\/#primaryimage","url":"https:\/\/educap.io\/wp-content\/uploads\/2024\/09\/Designer-8.jpeg","contentUrl":"https:\/\/educap.io\/wp-content\/uploads\/2024\/09\/Designer-8.jpeg","width":1100,"height":629},{"@type":"BreadcrumbList","@id":"https:\/\/educap.io\/cybersecurite-scolaire-proteger-les-donnees-des-eleves\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/educap.io\/fr_fr\/"},{"@type":"ListItem","position":2,"name":"Cybers\u00e9curit\u00e9 scolaire : prot\u00e9ger les donn\u00e9es des \u00e9l\u00e8ves"}]},{"@type":"WebSite","@id":"https:\/\/educap.io\/#website","url":"https:\/\/educap.io\/","name":"Educap","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/educap.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/educap.io\/#\/schema\/person\/4dffe41e9714c247c451c98157113d60","name":"Julie CENTI","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/educap.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f6ee0f918680eebf0bf9c06fdceae83423496df35825a3bb0ef85fc06548d5a1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f6ee0f918680eebf0bf9c06fdceae83423496df35825a3bb0ef85fc06548d5a1?s=96&d=mm&r=g","caption":"Julie CENTI"},"url":"https:\/\/educap.io\/en\/author\/emna-benfraj\/"}]}},"_links":{"self":[{"href":"https:\/\/educap.io\/en\/wp-json\/wp\/v2\/posts\/5067","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/educap.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/educap.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/educap.io\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/educap.io\/en\/wp-json\/wp\/v2\/comments?post=5067"}],"version-history":[{"count":1,"href":"https:\/\/educap.io\/en\/wp-json\/wp\/v2\/posts\/5067\/revisions"}],"predecessor-version":[{"id":5069,"href":"https:\/\/educap.io\/en\/wp-json\/wp\/v2\/posts\/5067\/revisions\/5069"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/educap.io\/en\/wp-json\/wp\/v2\/media\/5068"}],"wp:attachment":[{"href":"https:\/\/educap.io\/en\/wp-json\/wp\/v2\/media?parent=5067"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/educap.io\/en\/wp-json\/wp\/v2\/categories?post=5067"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/educap.io\/en\/wp-json\/wp\/v2\/tags?post=5067"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}