{"id":1806,"date":"2019-10-03T12:55:37","date_gmt":"2019-10-03T11:55:37","guid":{"rendered":"https:\/\/www.calligo.io\/iapp-privacy-security-risk-2019-what-we-learnt\/"},"modified":"2024-01-18T14:42:32","modified_gmt":"2024-01-18T14:42:32","slug":"iapp-privacy-security-risk-2019-what-we-learnt","status":"publish","type":"post","link":"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/","title":{"rendered":"IAPP: Privacy. Security. Risk. 2019 \u2013 What we learnt"},"content":{"rendered":"\n<p>Last week, Calligo exhibited at IAPP\u2019s annual Privacy. Security. Risk 2019&nbsp;in Las Vegas, Nevada. PSR is noticeably the most significant event in the privacy industry; attracting privacy professionals across the globe to discuss the latest data privacy news, trends, tech and issues.<\/p>\n\n\n\n<p>Over two days, keynotes and panels explored how privacy and technology must work together simultaneously, discussing topics such as building privacy programmes to accommodate a wide range of data privacy laws such as GDPR and CCPA (California Consumer Privacy Act), Privacy by Design, as well as bridging the gap between privacy and security.<\/p>\n\n\n\n<p><strong>What did we learn?<\/strong><br>Data Protection Officers<\/p>\n\n\n\n<p>This topic came up repeatedly, and is a subject close to our hearts \u2013 appointing a Data Protection Officer.<\/p>\n\n\n\n<p>Currently, under GDPR, articles 37-39 state that if your business is a public authority or if your business handles and processes large quantities of personal data, you are required to appoint a DPO. However, many companies are either not appointing someone at all, or they\u2019re struggling to find an external candidate due to the expense of hiring the right skillset. And, not to forget arguably the most common mistake companies are making \u2013 appointing the wrong person internally.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>We have seen many businesses appoint someone internally, on top of an existing position, to act as their DPO. This isn\u2019t always wise.<\/p>\n\n\n\n<p>J. Trevor. Hughes,\u00a0President &amp; CEO of IAPP<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>A DPO needs to tick several boxes, which are rarely possible for an internal appointment:<\/p>\n\n\n\n<p>A DPO is a very technical and multi-faceted role, and one that has evolved quickly in recent years and that few have experience in<br>A DPO needs the latest knowledge of data privacy and GDPR, as well as being able to advise on the data protection and Infosecurity.<br>A DPO must act independently, with no conflict of interest with any other data or privacy-based role, so cannot hold a role in IT, security, HR, finance or legal for example.<br>A DPO must have access to the highest management levels<\/p>\n\n\n\n<p>To avoid these issues, organizations are increasingly outsourcing their DPOs. Our Data Protection Officer as a Service (DPOaas) provides companies access to independent privacy consultants who will monitor your compliance, conduct audits and represent your organization to data subjects and regulators.<\/p>\n\n\n\n<p><strong>CCPA<\/strong><\/p>\n\n\n\n<p>Another hot topic during the event was unsurprisingly the introduction of CCPA. With similar implications as GDPR, CCPA will radically transform how businesses across the USA and beyond handle Californians\u2019 personal data. Also, despite having well over a year to prepare for its arrival on the 1st of January 2020, many businesses are falling short.<\/p>\n\n\n\n<p>Seemingly mainly because of a lack of understanding or awareness of the status of the Californian privacy law itself, organizations are struggling to come to terms with its nuances and requirements, such as data consent, opts-ins\/outs and consumer access requests.<\/p>\n\n\n\n<p>And whilst businesses play catch-up, another stream of conversation that followed was \u201cwhat\u2019s next?\u201d Privacy does not stop with the GDPR and CCPA, and with proposed privacy laws from many more US states and countries, what will the next new round of obligations look like? And how will businesses prepare?<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Bridging the gap between privacy professionals and Infosecurity<\/p>\n\n\n\n<p>A subject that many privacy professionals can relate to \u2013 being able to understand and be understood by IT and Infosec teams.<\/p>\n\n\n\n<p>As privacy laws evolve, they are driving an ever-increasing technical agenda. For example, GDPR\u2019s Privacy by Design requirements are not an issue of legislation, but of technical oversight. Performing these obligations therefore naturally requires privacy professionals and their counterparts in technology and security to co-operate.<\/p>\n\n\n\n<p>Unfortunately, both sides tend to speak a different language. Some words have completely different meanings on both sides of the fence. For example, to a privacy professional, the word \u201censure\u201d implies a guarantee that a certain action will be taken, but the same word to a security professional means that there will be vague oversight of a situation. These are far from the same thing! Unsurprisingly, the split lexicon of the two teams can lead to misunderstandings that have substantial commercial and reputational impacts on the business.<\/p>\n\n\n\n<p>Calligo\u2019s&nbsp;Jennifer Wu, Privacy Consultant, even presented on this topic on the Little Big Stage during PSR. Jennifer highlighted the common mistakes both sides are making and how it\u2019s hindering Privacy by Design. She also made recommendations on how to avoid these issues, and how Privacy teams and IT \/ Infosec teams need to build a better working relationship, which depends on speaking the same language.<\/p>\n\n\n\n<p>If you missed Jennifer\u2019s presentation or would like to discover how to understand or be understood by your CISO and CIO, our ebook \u201cThe Privacy Rosetta Stone\u201d provides real-life case studies on three businesses who encountered this language barrier, the impacts it had on their businesses, and how they fixed the problem. It also includes top tips on how to identify a good and bad Privacy and Technical relationship and how to create your own Rosetta Stone.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Calligo exhibited at IAPP\u2019s annual Privacy. Security. Risk 2019 in Las Vegas, Nevada. Here is what we learnt about upcoming privacy trends.<\/p>\n","protected":false},"author":33,"featured_media":1807,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[142,140,141,121],"tags":[],"post_format_type":[40],"class_list":["post-1806","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-governance","category-data-privacy-glossary","category-data-protection","category-glossary"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IAPP: Privacy. Security. Risk. 2019 \u2013 What we learnt | Calligo<\/title>\n<meta name=\"description\" content=\"Calligo exhibited at IAPP\u2019s annual Privacy. Security. Risk 2019 in Las Vegas, Nevada. Here is what we learnt about upcoming privacy trends.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IAPP: Privacy. Security. Risk. 2019 \u2013 What we learnt | Calligo\" \/>\n<meta property=\"og:description\" content=\"Calligo exhibited at IAPP\u2019s annual Privacy. Security. Risk 2019 in Las Vegas, Nevada. Here is what we learnt about upcoming privacy trends.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/\" \/>\n<meta property=\"og:site_name\" content=\"Calligo\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-03T11:55:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-18T14:42:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/Trevor-Hughes-IAPP-DPO-1-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Brendan Walsh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@calligocloud\" \/>\n<meta name=\"twitter:site\" content=\"@calligocloud\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brendan Walsh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/\"},\"author\":{\"name\":\"Brendan Walsh\",\"@id\":\"https:\/\/www.calligo.io\/#\/schema\/person\/e2e0283a3e6c3a237a10e012c081755f\"},\"headline\":\"IAPP: Privacy. Security. Risk. 2019 \u2013 What we learnt\",\"datePublished\":\"2019-10-03T11:55:37+00:00\",\"dateModified\":\"2024-01-18T14:42:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/\"},\"wordCount\":838,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.calligo.io\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/Trevor-Hughes-IAPP-DPO-1-1.png\",\"articleSection\":[\"Data Governance\",\"Data Privacy\",\"Data Protection\",\"Glossary\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/\",\"url\":\"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/\",\"name\":\"IAPP: Privacy. Security. Risk. 2019 \u2013 What we learnt | Calligo\",\"isPartOf\":{\"@id\":\"https:\/\/www.calligo.io\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/Trevor-Hughes-IAPP-DPO-1-1.png\",\"datePublished\":\"2019-10-03T11:55:37+00:00\",\"dateModified\":\"2024-01-18T14:42:32+00:00\",\"description\":\"Calligo exhibited at IAPP\u2019s annual Privacy. Security. Risk 2019 in Las Vegas, Nevada. Here is what we learnt about upcoming privacy trends.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/#primaryimage\",\"url\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/Trevor-Hughes-IAPP-DPO-1-1.png\",\"contentUrl\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/Trevor-Hughes-IAPP-DPO-1-1.png\",\"width\":612,\"height\":426},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.calligo.io\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IAPP: Privacy. Security. Risk. 2019 \u2013 What we learnt\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.calligo.io\/#website\",\"url\":\"https:\/\/www.calligo.io\/\",\"name\":\"Calligo\",\"description\":\"Building value through data\",\"publisher\":{\"@id\":\"https:\/\/www.calligo.io\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.calligo.io\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.calligo.io\/#organization\",\"name\":\"Calligo\",\"url\":\"https:\/\/www.calligo.io\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.calligo.io\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/calligo-og.jpg\",\"contentUrl\":\"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/calligo-og.jpg\",\"width\":1200,\"height\":630,\"caption\":\"Calligo\"},\"image\":{\"@id\":\"https:\/\/www.calligo.io\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/calligocloud\",\"https:\/\/www.linkedin.com\/company\/calligo-limited\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.calligo.io\/#\/schema\/person\/e2e0283a3e6c3a237a10e012c081755f\",\"name\":\"Brendan Walsh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.calligo.io\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/299d5b23f0682aabb1a2347ddf8b95df04b22cfec378aea17a8f7395c74b2bc8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/299d5b23f0682aabb1a2347ddf8b95df04b22cfec378aea17a8f7395c74b2bc8?s=96&d=mm&r=g\",\"caption\":\"Brendan Walsh\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IAPP: Privacy. Security. Risk. 2019 \u2013 What we learnt | Calligo","description":"Calligo exhibited at IAPP\u2019s annual Privacy. Security. Risk 2019 in Las Vegas, Nevada. Here is what we learnt about upcoming privacy trends.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/","og_locale":"en_GB","og_type":"article","og_title":"IAPP: Privacy. Security. Risk. 2019 \u2013 What we learnt | Calligo","og_description":"Calligo exhibited at IAPP\u2019s annual Privacy. Security. Risk 2019 in Las Vegas, Nevada. Here is what we learnt about upcoming privacy trends.","og_url":"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/","og_site_name":"Calligo","article_published_time":"2019-10-03T11:55:37+00:00","article_modified_time":"2024-01-18T14:42:32+00:00","og_image":[{"width":612,"height":426,"url":"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/Trevor-Hughes-IAPP-DPO-1-1.png","type":"image\/png"}],"author":"Brendan Walsh","twitter_card":"summary_large_image","twitter_creator":"@calligocloud","twitter_site":"@calligocloud","twitter_misc":{"Written by":"Brendan Walsh","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/#article","isPartOf":{"@id":"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/"},"author":{"name":"Brendan Walsh","@id":"https:\/\/www.calligo.io\/#\/schema\/person\/e2e0283a3e6c3a237a10e012c081755f"},"headline":"IAPP: Privacy. Security. Risk. 2019 \u2013 What we learnt","datePublished":"2019-10-03T11:55:37+00:00","dateModified":"2024-01-18T14:42:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/"},"wordCount":838,"commentCount":0,"publisher":{"@id":"https:\/\/www.calligo.io\/#organization"},"image":{"@id":"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/#primaryimage"},"thumbnailUrl":"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/Trevor-Hughes-IAPP-DPO-1-1.png","articleSection":["Data Governance","Data Privacy","Data Protection","Glossary"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/","url":"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/","name":"IAPP: Privacy. Security. Risk. 2019 \u2013 What we learnt | Calligo","isPartOf":{"@id":"https:\/\/www.calligo.io\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/#primaryimage"},"image":{"@id":"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/#primaryimage"},"thumbnailUrl":"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/Trevor-Hughes-IAPP-DPO-1-1.png","datePublished":"2019-10-03T11:55:37+00:00","dateModified":"2024-01-18T14:42:32+00:00","description":"Calligo exhibited at IAPP\u2019s annual Privacy. Security. Risk 2019 in Las Vegas, Nevada. Here is what we learnt about upcoming privacy trends.","breadcrumb":{"@id":"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/#primaryimage","url":"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/Trevor-Hughes-IAPP-DPO-1-1.png","contentUrl":"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/Trevor-Hughes-IAPP-DPO-1-1.png","width":612,"height":426},{"@type":"BreadcrumbList","@id":"https:\/\/www.calligo.io\/insights\/glossary\/iapp-privacy-security-risk-2019-what-we-learnt\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.calligo.io\/"},{"@type":"ListItem","position":2,"name":"IAPP: Privacy. Security. Risk. 2019 \u2013 What we learnt"}]},{"@type":"WebSite","@id":"https:\/\/www.calligo.io\/#website","url":"https:\/\/www.calligo.io\/","name":"Calligo","description":"Building value through data","publisher":{"@id":"https:\/\/www.calligo.io\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.calligo.io\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.calligo.io\/#organization","name":"Calligo","url":"https:\/\/www.calligo.io\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.calligo.io\/#\/schema\/logo\/image\/","url":"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/calligo-og.jpg","contentUrl":"https:\/\/www.calligo.io\/wp-content\/uploads\/2023\/04\/calligo-og.jpg","width":1200,"height":630,"caption":"Calligo"},"image":{"@id":"https:\/\/www.calligo.io\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/calligocloud","https:\/\/www.linkedin.com\/company\/calligo-limited\/"]},{"@type":"Person","@id":"https:\/\/www.calligo.io\/#\/schema\/person\/e2e0283a3e6c3a237a10e012c081755f","name":"Brendan Walsh","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.calligo.io\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/299d5b23f0682aabb1a2347ddf8b95df04b22cfec378aea17a8f7395c74b2bc8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/299d5b23f0682aabb1a2347ddf8b95df04b22cfec378aea17a8f7395c74b2bc8?s=96&d=mm&r=g","caption":"Brendan Walsh"}}]}},"_links":{"self":[{"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/posts\/1806","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/comments?post=1806"}],"version-history":[{"count":0,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/posts\/1806\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/media\/1807"}],"wp:attachment":[{"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/media?parent=1806"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/categories?post=1806"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/tags?post=1806"},{"taxonomy":"post_format_type","embeddable":true,"href":"https:\/\/www.calligo.io\/wp-json\/wp\/v2\/post_format_type?post=1806"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}