{"id":2518,"date":"2025-09-24T14:38:47","date_gmt":"2025-09-24T12:38:47","guid":{"rendered":"https:\/\/www.oneytrust.com\/?p=2518"},"modified":"2025-09-24T14:38:47","modified_gmt":"2025-09-24T12:38:47","slug":"digital-identity-the-new-identity-card-for-the-digital-age","status":"publish","type":"post","link":"https:\/\/www.oneytrust.com\/ro\/digital-identity-the-new-identity-card-for-the-digital-age\/","title":{"rendered":"Digital identity: the new identity card for the digital age &#8211; Part 1"},"content":{"rendered":"<p>Digital identity is therefore becoming the backbone of the connected world. It condenses our personal data, our \u2018technical\u2019 fingerprints (device fingerprinting), our behaviours and our interactions. It is at once a recognition tool, a shield against fraud and a key to accessing services.<\/p>\n\n\n\n<p><strong>1 . Defining digital identity<\/strong>:<\/p>\n\n\n\n<p>Unlike civil identity, which is established and certified by the state, digital identity takes many forms. It is based on four main dimensions:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Declarative data<\/strong>: surname, first name, email address, telephone number, address. This information is provided voluntarily, but can be misused\/\u201cimitated\u201d.<\/li>\n\n\n\n<li><strong>Technical fingerprints<\/strong>: each connected device generates a unique signature (IP address, configuration, sensors, time zones, cookies). These signals, invisible to the naked eye, become valuable clues for recognising a user.<\/li>\n\n\n\n<li><strong>Behaviour<\/strong>: typing speed, connection times, location, frequency of service use. These elements are more difficult to falsify and constitute a behavioural signature that is almost biometric.<\/li>\n\n\n\n<li><strong>Social and economic interactions<\/strong>: history of contact, payment and browsing data use. This data builds a coherent narrative\u2026 or, conversely, reveals inconsistencies typical of fraudulent events.<\/li>\n<\/ul>\n\n\n\n<ol start=\"2\" class=\"wp-block-list\">\n<li><strong>An identity in flux<\/strong><\/li>\n<\/ol>\n\n\n\n<p>Unlike a national identity card, which is fixed at the time of issue, digital identity is dynamic. Every connection, every payment, every interaction enriches this digital portrait. This dynamic provides robustness \u2013 it is difficult to simulate a consistent digital life over time \u2013 but also raises ethical questions:<\/p>\n\n\n\n<p>How much data should be collected without infringing on privacy?<\/p>\n\n\n\n<p>How can we ensure that users retain control over their digital identity?<\/p>\n\n\n\n<p>What safeguards should be put in place to prevent widespread surveillance?<\/p>\n\n\n\n<p>The GDPR in Europe and the concept of \u2018self-sovereign identity\u2019 attempt to provide answers. But the balance between security, fluidity and respect for individual freedoms remains fragile.<\/p>\n\n\n\n<ol start=\"3\" class=\"wp-block-list\">\n<li><strong>Why has this concept become so important?<\/strong><\/li>\n<\/ol>\n\n\n\n<p>Two major trends explain its growing importance. .<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Widespread digitalisation<\/strong>: smartphones have become our universal access point. From public services to healthcare, everything is now digital. Initiatives such as France Identit\u00e9 and the European eIDAS 2.0 regulation aim to create digital identities that are recognised at national and supranational level.<\/li>\n\n\n\n<li><strong>A boom in 100% web-based crime<\/strong>: identity fraud is skyrocketing. The concept of \u2018synthetic identity\u2019 illustrates this trend. Fraudsters assemble pieces of real and invented data to create fake profiles capable of fooling traditional controls.<\/li>\n<\/ul>\n\n\n\n<p>In this context, the ability to assess the credibility of a digital identity is becoming strategic for banks, insurers, retailers and also for governments.<\/p>\n\n\n\n<p><strong>In a nutshell\u2026<\/strong><\/p>\n\n\n\n<p>Digital identity is constantly evolving: shaped by our usage, regulated by legislation, scrutinised for its security and commercial value. But this dynamic is not without its challenges. In the second part, we will address the multiple issues it raises \u2013 security, trust, sovereignty, inclusion \u2013 and the prospects that could redefine our relationship with identity by 2030.<\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Digital identity is therefore becoming the backbone of the connected world. It condenses our personal data, our \u2018technical\u2019 fingerprints (device fingerprinting), our behaviours and our interactions. It is at once a recognition tool, a shield against fraud and a key to accessing services. 1 . Defining digital identity: Unlike civil identity, which is established and&#8230;<\/p>","protected":false},"author":3,"featured_media":2519,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"footnotes":""},"categories":[6,1],"tags":[45,31,37,32,26,44,46],"class_list":["post-2518","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-expertise","category-general","tag-adn","tag-ecommerce","tag-fraude","tag-ia","tag-luttecontrelafraude","tag-securite","tag-technologie"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Digital identity: the new identity card for the digital age<\/title>\n<meta name=\"description\" content=\"In 2025, few tasks are carried out without the use of digital technology. Opening a bank account, applying for a job, ordering a product, registering for a training course, consulting medical results: behind each of these actions lies a key question \u2013 is the person behind the screen who they say they are?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.oneytrust.com\/ro\/digital-identity-the-new-identity-card-for-the-digital-age\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital identity: the new identity card for the digital age\" \/>\n<meta property=\"og:description\" content=\"In 2025, few tasks are carried out without the use of digital technology. Opening a bank account, applying for a job, ordering a product, registering for a training course, consulting medical results: behind each of these actions lies a key question \u2013 is the person behind the screen who they say they are?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.oneytrust.com\/ro\/digital-identity-the-new-identity-card-for-the-digital-age\/\" \/>\n<meta property=\"og:site_name\" content=\"Oneytrust\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-24T12:38:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Digital_Identity_Sept25.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1172\" \/>\n\t<meta property=\"og:image:height\" content=\"1172\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Julie Breton\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"Julie Breton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/\"},\"author\":{\"name\":\"Julie Breton\",\"@id\":\"https:\/\/www.oneytrust.com\/#\/schema\/person\/7468b32537747c2a80c28ba0064f7f4d\"},\"headline\":\"Digital identity: the new identity card for the digital age &#8211; Part 1\",\"datePublished\":\"2025-09-24T12:38:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/\"},\"wordCount\":464,\"publisher\":{\"@id\":\"https:\/\/www.oneytrust.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Digital_Identity_Sept25.png\",\"keywords\":[\"ADN\",\"ecommerce\",\"FRAUDE\",\"IA\",\"luttecontrelafraude\",\"s\u00e9curit\u00e9\",\"technologie\"],\"articleSection\":[\"Expertise\",\"General\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/\",\"url\":\"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/\",\"name\":\"Digital identity: the new identity card for the digital age\",\"isPartOf\":{\"@id\":\"https:\/\/www.oneytrust.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Digital_Identity_Sept25.png\",\"datePublished\":\"2025-09-24T12:38:47+00:00\",\"description\":\"In 2025, few tasks are carried out without the use of digital technology. Opening a bank account, applying for a job, ordering a product, registering for a training course, consulting medical results: behind each of these actions lies a key question \u2013 is the person behind the screen who they say they are?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/#primaryimage\",\"url\":\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Digital_Identity_Sept25.png\",\"contentUrl\":\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Digital_Identity_Sept25.png\",\"width\":1200,\"height\":1200,\"caption\":\"Empreinte num\u00e9rique d'un doigt sur un fond digital fonc\u00e9.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.oneytrust.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Digital identity: the new identity card for the digital age &#8211; Part 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.oneytrust.com\/#website\",\"url\":\"https:\/\/www.oneytrust.com\/\",\"name\":\"Oneytrust\",\"description\":\"Only Trusted Customers. Oneytrust provides fraud detection and identity validation for merchants and banks. Unique consortia data, unbeatable fraud scoring.\",\"publisher\":{\"@id\":\"https:\/\/www.oneytrust.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.oneytrust.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.oneytrust.com\/#organization\",\"name\":\"Oneytrust\",\"url\":\"https:\/\/www.oneytrust.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/www.oneytrust.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/04\/oneytrust-logo.svg\",\"contentUrl\":\"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/04\/oneytrust-logo.svg\",\"width\":171,\"height\":40,\"caption\":\"Oneytrust\"},\"image\":{\"@id\":\"https:\/\/www.oneytrust.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.oneytrust.com\/#\/schema\/person\/7468b32537747c2a80c28ba0064f7f4d\",\"name\":\"Julie Breton\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/www.oneytrust.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7d778d89a656901040a5cb3d84c274d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7d778d89a656901040a5cb3d84c274d6?s=96&d=mm&r=g\",\"caption\":\"Julie Breton\"},\"url\":\"https:\/\/www.oneytrust.com\/ro\/author\/julie-breton\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digital identity: the new identity card for the digital age","description":"In 2025, few tasks are carried out without the use of digital technology. Opening a bank account, applying for a job, ordering a product, registering for a training course, consulting medical results: behind each of these actions lies a key question \u2013 is the person behind the screen who they say they are?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.oneytrust.com\/ro\/digital-identity-the-new-identity-card-for-the-digital-age\/","og_locale":"ro_RO","og_type":"article","og_title":"Digital identity: the new identity card for the digital age","og_description":"In 2025, few tasks are carried out without the use of digital technology. Opening a bank account, applying for a job, ordering a product, registering for a training course, consulting medical results: behind each of these actions lies a key question \u2013 is the person behind the screen who they say they are?","og_url":"https:\/\/www.oneytrust.com\/ro\/digital-identity-the-new-identity-card-for-the-digital-age\/","og_site_name":"Oneytrust","article_published_time":"2025-09-24T12:38:47+00:00","og_image":[{"url":"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Digital_Identity_Sept25.png","width":1172,"height":1172,"type":"image\/png"}],"author":"Julie Breton","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"Julie Breton","Timp estimat pentru citire":"3 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/#article","isPartOf":{"@id":"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/"},"author":{"name":"Julie Breton","@id":"https:\/\/www.oneytrust.com\/#\/schema\/person\/7468b32537747c2a80c28ba0064f7f4d"},"headline":"Digital identity: the new identity card for the digital age &#8211; Part 1","datePublished":"2025-09-24T12:38:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/"},"wordCount":464,"publisher":{"@id":"https:\/\/www.oneytrust.com\/#organization"},"image":{"@id":"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/#primaryimage"},"thumbnailUrl":"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Digital_Identity_Sept25.png","keywords":["ADN","ecommerce","FRAUDE","IA","luttecontrelafraude","s\u00e9curit\u00e9","technologie"],"articleSection":["Expertise","General"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/","url":"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/","name":"Digital identity: the new identity card for the digital age","isPartOf":{"@id":"https:\/\/www.oneytrust.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/#primaryimage"},"image":{"@id":"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/#primaryimage"},"thumbnailUrl":"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Digital_Identity_Sept25.png","datePublished":"2025-09-24T12:38:47+00:00","description":"In 2025, few tasks are carried out without the use of digital technology. Opening a bank account, applying for a job, ordering a product, registering for a training course, consulting medical results: behind each of these actions lies a key question \u2013 is the person behind the screen who they say they are?","breadcrumb":{"@id":"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/#primaryimage","url":"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Digital_Identity_Sept25.png","contentUrl":"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Digital_Identity_Sept25.png","width":1200,"height":1200,"caption":"Empreinte num\u00e9rique d'un doigt sur un fond digital fonc\u00e9."},{"@type":"BreadcrumbList","@id":"https:\/\/www.oneytrust.com\/digital-identity-the-new-identity-card-for-the-digital-age\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.oneytrust.com\/"},{"@type":"ListItem","position":2,"name":"Digital identity: the new identity card for the digital age &#8211; Part 1"}]},{"@type":"WebSite","@id":"https:\/\/www.oneytrust.com\/#website","url":"https:\/\/www.oneytrust.com\/","name":"Oneytrust","description":"Only Trusted Customers. Oneytrust provides fraud detection and identity validation for merchants and banks. Unique consortia data, unbeatable fraud scoring.","publisher":{"@id":"https:\/\/www.oneytrust.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.oneytrust.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/www.oneytrust.com\/#organization","name":"Oneytrust","url":"https:\/\/www.oneytrust.com\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/www.oneytrust.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/04\/oneytrust-logo.svg","contentUrl":"https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/04\/oneytrust-logo.svg","width":171,"height":40,"caption":"Oneytrust"},"image":{"@id":"https:\/\/www.oneytrust.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.oneytrust.com\/#\/schema\/person\/7468b32537747c2a80c28ba0064f7f4d","name":"Julie Breton","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/www.oneytrust.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7d778d89a656901040a5cb3d84c274d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7d778d89a656901040a5cb3d84c274d6?s=96&d=mm&r=g","caption":"Julie Breton"},"url":"https:\/\/www.oneytrust.com\/ro\/author\/julie-breton\/"}]}},"taxonomy_info":{"category":[{"value":6,"label":"Expertise"},{"value":1,"label":"General"}],"post_tag":[{"value":45,"label":"ADN"},{"value":31,"label":"ecommerce"},{"value":37,"label":"FRAUDE"},{"value":32,"label":"IA"},{"value":26,"label":"luttecontrelafraude"},{"value":44,"label":"s\u00e9curit\u00e9"},{"value":46,"label":"technologie"}]},"featured_image_src_large":["https:\/\/www.oneytrust.com\/wp-content\/uploads\/2025\/09\/Etiquette_Linkedin_Digital_Identity_Sept25.png",1172,1172,false],"author_info":{"display_name":"Julie Breton","author_link":"https:\/\/www.oneytrust.com\/ro\/author\/julie-breton\/"},"comment_info":0,"category_info":[{"term_id":6,"name":"Expertise","slug":"expertise","term_group":0,"term_taxonomy_id":6,"taxonomy":"category","description":"","parent":0,"count":29,"filter":"raw","cat_ID":6,"category_count":29,"category_description":"","cat_name":"Expertise","category_nicename":"expertise","category_parent":0},{"term_id":1,"name":"General","slug":"general","term_group":0,"term_taxonomy_id":1,"taxonomy":"category","description":"","parent":0,"count":30,"filter":"raw","cat_ID":1,"category_count":30,"category_description":"","cat_name":"General","category_nicename":"general","category_parent":0}],"tag_info":[{"term_id":45,"name":"ADN","slug":"adn","term_group":0,"term_taxonomy_id":45,"taxonomy":"post_tag","description":"","parent":0,"count":4,"filter":"raw"},{"term_id":31,"name":"ecommerce","slug":"ecommerce","term_group":0,"term_taxonomy_id":31,"taxonomy":"post_tag","description":"","parent":0,"count":18,"filter":"raw"},{"term_id":37,"name":"FRAUDE","slug":"fraude","term_group":0,"term_taxonomy_id":37,"taxonomy":"post_tag","description":"","parent":0,"count":17,"filter":"raw"},{"term_id":32,"name":"IA","slug":"ia","term_group":0,"term_taxonomy_id":32,"taxonomy":"post_tag","description":"","parent":0,"count":8,"filter":"raw"},{"term_id":26,"name":"luttecontrelafraude","slug":"luttecontrelafraude","term_group":0,"term_taxonomy_id":26,"taxonomy":"post_tag","description":"","parent":0,"count":16,"filter":"raw"},{"term_id":44,"name":"s\u00e9curit\u00e9","slug":"securite","term_group":0,"term_taxonomy_id":44,"taxonomy":"post_tag","description":"","parent":0,"count":7,"filter":"raw"},{"term_id":46,"name":"technologie","slug":"technologie","term_group":0,"term_taxonomy_id":46,"taxonomy":"post_tag","description":"","parent":0,"count":6,"filter":"raw"}],"_links":{"self":[{"href":"https:\/\/www.oneytrust.com\/ro\/wp-json\/wp\/v2\/posts\/2518","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.oneytrust.com\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.oneytrust.com\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.oneytrust.com\/ro\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.oneytrust.com\/ro\/wp-json\/wp\/v2\/comments?post=2518"}],"version-history":[{"count":1,"href":"https:\/\/www.oneytrust.com\/ro\/wp-json\/wp\/v2\/posts\/2518\/revisions"}],"predecessor-version":[{"id":2520,"href":"https:\/\/www.oneytrust.com\/ro\/wp-json\/wp\/v2\/posts\/2518\/revisions\/2520"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.oneytrust.com\/ro\/wp-json\/wp\/v2\/media\/2519"}],"wp:attachment":[{"href":"https:\/\/www.oneytrust.com\/ro\/wp-json\/wp\/v2\/media?parent=2518"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.oneytrust.com\/ro\/wp-json\/wp\/v2\/categories?post=2518"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.oneytrust.com\/ro\/wp-json\/wp\/v2\/tags?post=2518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}