{"id":26284,"date":"2024-11-22T20:37:30","date_gmt":"2024-11-22T19:37:30","guid":{"rendered":"https:\/\/www.richter.ca\/?post_type=busadv&#038;p=26284"},"modified":"2024-12-11T23:35:56","modified_gmt":"2024-12-11T22:35:56","slug":"verification-diligente-des-technologies-de-linformation-ti","status":"publish","type":"busadv","link":"https:\/\/www.richter.ca\/fr\/services-conseils-aux-entreprises\/verification-diligente-des-technologies-de-linformation-ti\/","title":{"rendered":"V\u00e9rification diligente des technologies de l&rsquo;information (TI)"},"content":{"rendered":"<div class=\"bl-wysiwyg animaenter wrapper\">\n    <p>Lorsqu\u2019on envisage une acquisition, la v\u00e9rification diligente des TI est un processus crucial qui peut avoir une incidence importante sur le succ\u00e8s de la transaction, particuli\u00e8rement dans l\u2019environnement d\u2019affaires d\u2019aujourd\u2019hui ax\u00e9 sur la technologie.<\/p>\n<h2><span style=\"font-size: 24px\">En quoi consiste-t-elle?<\/span><\/h2>\n<p>La v\u00e9rification diligente des TI est ax\u00e9e sur la r\u00e9alisation d\u2019une \u00e9valuation approfondie de l\u2019infrastructure technologique, des syst\u00e8mes, des logiciels et de la strat\u00e9gie globale en mati\u00e8re de TI de l\u2019entreprise cible. Le processus est essentiel pour plusieurs raisons\u00a0:<\/p>\n<ol>\n<li><strong>Att\u00e9nuation des risques\u00a0:<\/strong> Les syst\u00e8mes de TI sont souvent au c\u0153ur des activit\u00e9s d\u2019une entreprise. L\u2019\u00e9valuation de l\u2019environnement de TI de l\u2019entreprise cible aide \u00e0 cerner les risques potentiels, comme les syst\u00e8mes d\u00e9suets, les vuln\u00e9rabilit\u00e9s en mati\u00e8re de cybers\u00e9curit\u00e9 ou les enjeux de conformit\u00e9, qui pourraient entra\u00eener des enjeux co\u00fbteux apr\u00e8s l\u2019acquisition.<\/li>\n<li><strong>Faisabilit\u00e9 de l\u2019int\u00e9gration\u00a0:<\/strong> Il est essentiel de comprendre la compatibilit\u00e9 entre les syst\u00e8mes de TI de l\u2019entreprise acqu\u00e9reuse et ceux de l\u2019entreprise cible pour assurer une int\u00e9gration harmonieuse. Les incompatibilit\u00e9s peuvent entra\u00eener des retards, une augmentation des co\u00fbts ou des perturbations op\u00e9rationnelles.<\/li>\n<li><strong>\u00c9valuation des co\u00fbts\u00a0:<\/strong> La v\u00e9rification diligente des TI fournit une image claire de l\u2019investissement n\u00e9cessaire pour mettre \u00e0 niveau ou maintenir la technologie de l\u2019entreprise cible. Cette information est essentielle pour \u00e9valuer avec pr\u00e9cision le co\u00fbt r\u00e9el de l\u2019acquisition.<\/li>\n<li><strong>R\u00e9alisation de la valeur\u00a0:<\/strong> Le processus de v\u00e9rification diligente aide \u00e0 cerner les occasions o\u00f9 les TI peuvent cr\u00e9er de la valeur apr\u00e8s l\u2019acquisition, notamment par l\u2019optimisation des syst\u00e8mes, l\u2019automatisation des processus ou l\u2019exploitation de l\u2019analyse des donn\u00e9es. Ces possibilit\u00e9s peuvent bonifier la proposition de valeur globale de la transaction.<\/li>\n<li><strong>Cybers\u00e9curit\u00e9 et protection des donn\u00e9es\u00a0:<\/strong> L\u2019\u00e9valuation de la posture de cybers\u00e9curit\u00e9 et des pratiques en mati\u00e8re de protection des donn\u00e9es de l\u2019entreprise cible est essentielle pour \u00e9viter de possibles manquements, responsabilit\u00e9s juridiques ou dommages \u00e0 la r\u00e9putation.<\/li>\n<\/ol>\n<p>En r\u00e9sum\u00e9, la v\u00e9rification diligente des TI est une composante essentielle du processus d\u2019acquisition, qui aide \u00e0 identifier les risques, \u00e0 assurer une int\u00e9gration harmonieuse et \u00e0 cerner les possibilit\u00e9s de cr\u00e9ation de valeur. N\u00e9gliger cette \u00e9tape peut entra\u00eener des d\u00e9fis, des enjeux ou impr\u00e9vus qui pourraient nuire au succ\u00e8s de l\u2019acquisition.<\/p>\n<h2><span style=\"font-size: 24px\">L\u2019approche Richter<\/span><\/h2>\n<p>Notre approche personnalis\u00e9e est con\u00e7ue pour vous donner une compr\u00e9hension compl\u00e8te de l\u2019environnement des TI de l\u2019entreprise cible et met l\u2019accent sur ce qui suit\u00a0:<\/p>\n<table style=\"width: 100%;border-collapse: collapse;background-color: #625e4c\">\n<tbody>\n<tr>\n<td style=\"width: 33.3333%\">Capacit\u00e9 op\u00e9rationnelle li\u00e9e aux TI<\/td>\n<td style=\"width: 33.3333%\">Capacit\u00e9 technique li\u00e9e aux TI<\/td>\n<td style=\"width: 33.3333%\">\u00c9valuation des vuln\u00e9rabilit\u00e9s et tests d\u2019intrusion<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 33.3333%;vertical-align: top\">Ces domaines d\u2019int\u00e9r\u00eat sont moins techniques, mais ils sont essentiels au maintien des op\u00e9rations TI quotidiennes supportant les activit\u00e9s \u00a0d\u2019affaires.<\/p>\n<p>Ils comprennent notamment ce qui suit\u00a0:<\/p>\n<ul>\n<li>Personnel TI<\/li>\n<li>Produits et services (support\u00e9s par les TI)<\/li>\n<li>Processus de d\u00e9veloppement de logiciels<\/li>\n<li>Documentation des processus TI<\/li>\n<li>Logiciels et services utilis\u00e9s<\/li>\n<li>Conformit\u00e9 et ententes contractuelles<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 33.3333%;vertical-align: top\">Ces domaines d\u2019int\u00e9r\u00eat sont plus techniques et sont tout aussi essentiels au maintien des op\u00e9rations TI quotidiennes supportant les activit\u00e9s\u00a0 d\u2019affaires.<\/p>\n<p>Ils comprennent notamment ce qui suit\u00a0:<\/p>\n<ul>\n<li>Mat\u00e9riel informatique<\/li>\n<li>Infrastructure et s\u00e9curit\u00e9 du r\u00e9seau<\/li>\n<li>Sauvegarde et r\u00e9cup\u00e9ration<\/li>\n<li>Cybers\u00e9curit\u00e9<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 33.3333%;vertical-align: top\">Les tests de s\u00e9curit\u00e9 hautement techniques (\u00e9valuation des vuln\u00e9rabilit\u00e9s et tests d\u2019intrusion) peuvent r\u00e9v\u00e9ler des risques qu\u2019un pirate informatique serait en mesure d\u2019exploiter.<\/p>\n<p>Notre \u00e9quipe peut \u00e9valuer ce qui suit\u00a0:<\/p>\n<ul>\n<li>Serveurs Web et applications<\/li>\n<li>R\u00e9seaux internes et externes<\/li>\n<li>R\u00e9seaux sans fil<\/li>\n<li>Composantes d\u2019infrastructure essentielles (administrateurs de domaine, Active Directory, syst\u00e8me DNS, protocole DHCP, RPV)<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-size: 24px\">La diff\u00e9rence Richter\u00a0\u2013 V\u00e9rification diligente int\u00e9gr\u00e9e<\/span><\/h2>\n<p>Richter offre un soutien complet en mati\u00e8re de v\u00e9rification diligente afin de r\u00e9pondre aux besoins diversifi\u00e9s de transactions de plus en plus complexes. En plus de la v\u00e9rification diligente des TI, notre approche interfonctionnelle comprend ce qui suit\u00a0:<\/p>\n<ul>\n<li>V\u00e9rification diligente financi\u00e8re\u00a0: Analyse de la performance financi\u00e8re, de la situation financi\u00e8re et des perspectives d\u2019une acquisition cible.<\/li>\n<li>V\u00e9rification diligente des ressources humaines\u00a0: Examen du capital humain d\u2019une acquisition cible, y compris les talents, la r\u00e9mun\u00e9ration, la culture, la structure organisationnelle, l\u2019effectif, et les politiques et processus de ressources humaines.<\/li>\n<li>V\u00e9rification diligente en fiscalit\u00e9\u00a0: Examen du contexte fiscal d\u2019une acquisition cible pour d\u00e9terminer s\u2019il existe des risques fiscaux.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-25085 size-full\" src=\"https:\/\/richterca.tor1.digitaloceanspaces.com\/wp-content\/uploads\/2024\/05\/27145349\/vlt_commercial_due_diligence_graphic2_f_700px.png\" alt=\"V\u00e9rification diligente int\u00e9gr\u00e9e - graphique : TI, RH, Fiscalit\u00e9, Affaires, Finances\" width=\"696\" height=\"688\" srcset=\"https:\/\/richterca.tor1.digitaloceanspaces.com\/wp-content\/uploads\/2024\/05\/27145349\/vlt_commercial_due_diligence_graphic2_f_700px.png 696w, https:\/\/richterca.tor1.digitaloceanspaces.com\/wp-content\/uploads\/2024\/05\/27145349\/vlt_commercial_due_diligence_graphic2_f_700px-600x593.png 600w, https:\/\/richterca.tor1.digitaloceanspaces.com\/wp-content\/uploads\/2024\/05\/27145349\/vlt_commercial_due_diligence_graphic2_f_700px-50x50.png 50w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/p>\n<\/div>\n\n<div class=\"experts-carousel\">\n    <div class=\"wrapper\">\n                <div class=\"tt-cta\">\n            <h2>EXPERTS CL\u00c9S<\/h2>            <a href=\"https:\/\/www.richter.ca\/fr\/nos-experts\/\" class=\"arrow-l\">Afficher tout<\/a>\n        <\/div>\n    <\/div>\n                <div class=\"experts wrapper slickCarouselCustom\">\n                    <a tabindex=\"-1\" class=\"carousel-item\" href=\"https:\/\/www.richter.ca\/fr\/nos-experts\/raymond-vankrimpen\/\">\n                <div class=\"image\">\n                                        <img decoding=\"async\" src=\"https:\/\/richterca.tor1.digitaloceanspaces.com\/wp-content\/uploads\/2018\/06\/raymond_vankrimpen_site-web-740-x-640-px.webp\" alt=\"\">\n                    <div class=\"content\">\n                        <h3>Raymond Vankrimpen<\/h3>\n                        <div class=\"ql\">CISA, CISM, CISSP, CRISC, QSA<\/div>\n                    <\/div>\n                <\/div>\n            <\/a>\n                    <a tabindex=\"-1\" class=\"carousel-item\" href=\"https:\/\/www.richter.ca\/fr\/nos-experts\/david-greenham\/\">\n                <div class=\"image\">\n                                        <img decoding=\"async\" src=\"https:\/\/richterca.tor1.digitaloceanspaces.com\/wp-content\/uploads\/2019\/05\/david_greenham_site-web-740-x-640-px.webp\" alt=\"\">\n                    <div class=\"content\">\n                        <h3>David Greenham<\/h3>\n                        <div class=\"ql\">CISSP, CCSP, CISM, CISA, SCF, QSA, SABSA SCF, ISO 27001 Lead Auditor<\/div>\n                    <\/div>\n                <\/div>\n            <\/a>\n                <\/div>\n    <\/div>\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"featured_media":0,"template":"","busadv-category":[],"class_list":["post-26284","busadv","type-busadv","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>V\u00e9rification diligente des technologies de l&#039;information (TI) - Richter<\/title>\n<meta name=\"description\" content=\"La v\u00e9rification diligente des TI est ax\u00e9e sur la r\u00e9alisation d\u2019une \u00e9valuation approfondie de l\u2019infrastructure technologique, des syst\u00e8mes\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"V\u00e9rification diligente des technologies de l&#039;information (TI) - Richter\" \/>\n<meta property=\"og:description\" content=\"La v\u00e9rification diligente des TI est ax\u00e9e sur la r\u00e9alisation d\u2019une \u00e9valuation approfondie de l\u2019infrastructure technologique, des syst\u00e8mes\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.www.richter.ca\/fr\/services-conseils-aux-entreprises\/verification-diligente-des-technologies-de-linformation-ti\/\" \/>\n<meta property=\"og:site_name\" content=\"Richter\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Richtercanada\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-11T22:35:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/richterca.tor1.digitaloceanspaces.com\/wp-content\/uploads\/2018\/08\/share-og.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1008\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@richtercanada\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.www.richter.ca\/fr\/services-conseils-aux-entreprises\/verification-diligente-des-technologies-de-linformation-ti\/\",\"url\":\"https:\/\/www.www.richter.ca\/fr\/services-conseils-aux-entreprises\/verification-diligente-des-technologies-de-linformation-ti\/\",\"name\":\"V\u00e9rification diligente des technologies de l'information (TI) - Richter\",\"isPartOf\":{\"@id\":\"https:\/\/www.www.richter.ca\/#website\"},\"datePublished\":\"2024-11-22T19:37:30+00:00\",\"dateModified\":\"2024-12-11T22:35:56+00:00\",\"description\":\"La v\u00e9rification diligente des TI est ax\u00e9e sur la r\u00e9alisation d\u2019une \u00e9valuation approfondie de l\u2019infrastructure technologique, des syst\u00e8mes\",\"breadcrumb\":{\"@id\":\"https:\/\/www.www.richter.ca\/fr\/services-conseils-aux-entreprises\/verification-diligente-des-technologies-de-linformation-ti\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.www.richter.ca\/fr\/services-conseils-aux-entreprises\/verification-diligente-des-technologies-de-linformation-ti\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.www.richter.ca\/fr\/services-conseils-aux-entreprises\/verification-diligente-des-technologies-de-linformation-ti\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Richter\",\"item\":\"https:\/\/www.richter.ca\/fr\/accueil\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"V\u00e9rification diligente des technologies de l&#8217;information (TI)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.www.richter.ca\/#website\",\"url\":\"https:\/\/www.www.richter.ca\/\",\"name\":\"Richter\",\"description\":\"Un site utilisant WordPress\",\"publisher\":{\"@id\":\"https:\/\/www.www.richter.ca\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.www.richter.ca\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.www.richter.ca\/#organization\",\"name\":\"Richter\",\"url\":\"https:\/\/www.www.richter.ca\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.www.richter.ca\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.richter.ca\/wp-content\/uploads\/2018\/08\/logo.png\",\"contentUrl\":\"https:\/\/www.richter.ca\/wp-content\/uploads\/2018\/08\/logo.png\",\"width\":128,\"height\":24,\"caption\":\"Richter\"},\"image\":{\"@id\":\"https:\/\/www.www.richter.ca\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Richtercanada\/\",\"https:\/\/x.com\/richtercanada\",\"https:\/\/www.instagram.com\/richtercanada\",\"https:\/\/www.linkedin.com\/company\/richter\/?trk=hb_tab_compy_id_255303\"],\"address\":[{\"@type\":\"PostalAddress\",\"addressLocality\":\"Montreal, QC, Canada\",\"postalCode\":\"H3A 0G6\",\"streetAddress\":\"1981 McGill College, #1100 The Richter Tower\"},{\"@type\":\"PostalAddress\",\"addressLocality\":\"Toronto, ON, Canada\",\"postalCode\":\"M5J 2T3\",\"streetAddress\":\"181 Bay St. #3510 Bay Wellington Tower\"},{\"@type\":\"PostalAddress\",\"addressLocality\":\"Chicago, IL, United States\",\"postalCode\":\"60606\",\"streetAddress\":\"200 South Wacker, #3100\"}],\"contactPoint\":[{\"@type\":\"ContactPoint\",\"telephone\":\"+1-514-934-3400\",\"contactType\":\"Montreal office\"},{\"@type\":\"ContactPoint\",\"telephone\":\"+1-416-488-2345\",\"contactType\":\"Toronto office\"},{\"@type\":\"ContactPoint\",\"telephone\":\"+1-312-828-0800\",\"contactType\":\"Chicago office\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"V\u00e9rification diligente des technologies de l'information (TI) - Richter","description":"La v\u00e9rification diligente des TI est ax\u00e9e sur la r\u00e9alisation d\u2019une \u00e9valuation approfondie de l\u2019infrastructure technologique, des syst\u00e8mes","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"fr_FR","og_type":"article","og_title":"V\u00e9rification diligente des technologies de l'information (TI) - Richter","og_description":"La v\u00e9rification diligente des TI est ax\u00e9e sur la r\u00e9alisation d\u2019une \u00e9valuation approfondie de l\u2019infrastructure technologique, des syst\u00e8mes","og_url":"https:\/\/www.www.richter.ca\/fr\/services-conseils-aux-entreprises\/verification-diligente-des-technologies-de-linformation-ti\/","og_site_name":"Richter","article_publisher":"https:\/\/www.facebook.com\/Richtercanada\/","article_modified_time":"2024-12-11T22:35:56+00:00","og_image":[{"width":1920,"height":1008,"url":"https:\/\/richterca.tor1.digitaloceanspaces.com\/wp-content\/uploads\/2018\/08\/share-og.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@richtercanada","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.www.richter.ca\/fr\/services-conseils-aux-entreprises\/verification-diligente-des-technologies-de-linformation-ti\/","url":"https:\/\/www.www.richter.ca\/fr\/services-conseils-aux-entreprises\/verification-diligente-des-technologies-de-linformation-ti\/","name":"V\u00e9rification diligente des technologies de l'information (TI) - Richter","isPartOf":{"@id":"https:\/\/www.www.richter.ca\/#website"},"datePublished":"2024-11-22T19:37:30+00:00","dateModified":"2024-12-11T22:35:56+00:00","description":"La v\u00e9rification diligente des TI est ax\u00e9e sur la r\u00e9alisation d\u2019une \u00e9valuation approfondie de l\u2019infrastructure technologique, des syst\u00e8mes","breadcrumb":{"@id":"https:\/\/www.www.richter.ca\/fr\/services-conseils-aux-entreprises\/verification-diligente-des-technologies-de-linformation-ti\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.www.richter.ca\/fr\/services-conseils-aux-entreprises\/verification-diligente-des-technologies-de-linformation-ti\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.www.richter.ca\/fr\/services-conseils-aux-entreprises\/verification-diligente-des-technologies-de-linformation-ti\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Richter","item":"https:\/\/www.richter.ca\/fr\/accueil\/"},{"@type":"ListItem","position":2,"name":"V\u00e9rification diligente des technologies de l&#8217;information (TI)"}]},{"@type":"WebSite","@id":"https:\/\/www.www.richter.ca\/#website","url":"https:\/\/www.www.richter.ca\/","name":"Richter","description":"Un site utilisant WordPress","publisher":{"@id":"https:\/\/www.www.richter.ca\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.www.richter.ca\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.www.richter.ca\/#organization","name":"Richter","url":"https:\/\/www.www.richter.ca\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.www.richter.ca\/#\/schema\/logo\/image\/","url":"https:\/\/www.richter.ca\/wp-content\/uploads\/2018\/08\/logo.png","contentUrl":"https:\/\/www.richter.ca\/wp-content\/uploads\/2018\/08\/logo.png","width":128,"height":24,"caption":"Richter"},"image":{"@id":"https:\/\/www.www.richter.ca\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Richtercanada\/","https:\/\/x.com\/richtercanada","https:\/\/www.instagram.com\/richtercanada","https:\/\/www.linkedin.com\/company\/richter\/?trk=hb_tab_compy_id_255303"],"address":[{"@type":"PostalAddress","addressLocality":"Montreal, QC, Canada","postalCode":"H3A 0G6","streetAddress":"1981 McGill College, #1100 The Richter Tower"},{"@type":"PostalAddress","addressLocality":"Toronto, ON, Canada","postalCode":"M5J 2T3","streetAddress":"181 Bay St. #3510 Bay Wellington Tower"},{"@type":"PostalAddress","addressLocality":"Chicago, IL, United States","postalCode":"60606","streetAddress":"200 South Wacker, #3100"}],"contactPoint":[{"@type":"ContactPoint","telephone":"+1-514-934-3400","contactType":"Montreal office"},{"@type":"ContactPoint","telephone":"+1-416-488-2345","contactType":"Toronto office"},{"@type":"ContactPoint","telephone":"+1-312-828-0800","contactType":"Chicago office"}]}]}},"_links":{"self":[{"href":"https:\/\/www.richter.ca\/fr\/wp-json\/wp\/v2\/busadv\/26284","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.richter.ca\/fr\/wp-json\/wp\/v2\/busadv"}],"about":[{"href":"https:\/\/www.richter.ca\/fr\/wp-json\/wp\/v2\/types\/busadv"}],"wp:attachment":[{"href":"https:\/\/www.richter.ca\/fr\/wp-json\/wp\/v2\/media?parent=26284"}],"wp:term":[{"taxonomy":"busadv-category","embeddable":true,"href":"https:\/\/www.richter.ca\/fr\/wp-json\/wp\/v2\/busadv-category?post=26284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}