{"id":14781,"date":"2019-03-07T09:10:09","date_gmt":"2019-03-07T17:10:09","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/03\/07\/news-8530\/"},"modified":"2019-03-07T09:10:09","modified_gmt":"2019-03-07T17:10:09","slug":"news-8530","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2019\/03\/07\/news-8530\/","title":{"rendered":"The not-so-definitive guide to cybersecurity and data privacy laws"},"content":{"rendered":"<p><strong>Credit to Author: davidruiz| Date: Thu, 07 Mar 2019 16:00:00 +0000<\/strong><\/p>\n<p>US cybersecurity and data privacy laws are, to put it lightly, a mess.<\/p>\n<p>Years of piecemeal legislation, Supreme Court decisions, and government surveillance crises, along with repeated corporate failures to protect user data, have created a legal landscape that is, for the American public and American businesses, confusing, complicated, and downright annoying.<\/p>\n<p>Businesses are expected to comply with data privacy laws based on the data\u2019s type. For instance, there\u2019s a law protecting health and medical information, another law protecting information belonging to children, and another law protecting video rental records. (Seriously, there is.) Confusingly, though, some of those laws only apply to certain types of <em>businesses<\/em>, rather than just certain types of <em>data<\/em>.<\/p>\n<p>Law enforcement agencies and the intelligence community, on the other hand, are expected to comply with a different framework that sometimes separates data based on \u201ccontent\u201d and \u201cnon-content.\u201d For instance, there\u2019s a law protecting phone call conversations, but another law protects the actual numbers dialed on the keypad.<\/p>\n<p>And even when data appears similar, its protections may differ. GPS location data might, for example, receive a different protection if it is held with a cell phone provider versus whether it was willfully uploaded through an online location \u201ccheck-in\u201d service or through a fitness app that lets users share jogging routes.<\/p>\n<p>Congress could streamline this disjointed network by passing comprehensive federal data privacy legislation; however, questions remain about regulatory enforcement and whether states\u2019 individual data privacy laws will be either respected or steamrolled in the process.<\/p>\n<p>To better understand the current field, Malwarebytes is launching a limited blog series about data privacy and cybersecurity laws in the United States. We will cover business compliance, sectoral legislation, government surveillance, and upcoming federal legislation.<\/p>\n<p>Below is our first blog in the series. It explores data privacy compliance in the United States today from the perspective of a startup.<\/p>\n<h3><strong>A startup\u2019s tale\u2014data privacy laws abound <\/strong><\/h3>\n<p>Every year, countless individuals travel to Silicon Valley to join the 21<sup>st<\/sup> century Gold Rush, staking claims not along the coastline, but up and down Sand Hill Road, where striking it rich means bringing in some serious venture capital financing.<\/p>\n<p>But before any fledgling startup can become the next Facebook, Uber, Google, or Airbnb, it must comply with a wide, sometimes-dizzying array of data privacy laws.<\/p>\n<p>Luckily, there are data privacy lawyers to help.<\/p>\n<p>We spoke with D. Reed Freeman Jr., the cybersecurity and privacy practice co-chair at the Washington, D.C.-based law firm Wilmer Cutler Pickering Hale and Dorr about what a hypothetical, data-collecting startup would need to become compliant with current US data privacy laws. What does its roadmap look like?<\/p>\n<p>Our hypothetical startup\u2014let\u2019s call it Spuri.us\u2014is based in San Francisco and focused entirely on a US market. The company developed an app that collects users\u2019 data to improve the app\u2019s performance and, potentially, deliver targeted ads in the future.<\/p>\n<p>This is not an exhaustive list of every data privacy law that a company must consider for data privacy compliance in the US. Instead, it is a snapshot, providing information and answers to potentially some of the most common questions today.<\/p>\n<h3><strong>Spuri.us\u2019 online privacy policy <\/strong><\/h3>\n<p>To kick off data privacy compliance on the right foot, Freeman said the startup needs to write and post a clear and truthful privacy policy online, as defined in the 2004 <a href=\"https:\/\/consumercal.org\/about-cfc\/cfc-education-foundation\/california-online-privacy-protection-act-caloppa-3\/\" target=\"_blank\" rel=\"noopener\">California Online Privacy Protection Act<\/a>.<\/p>\n<p>The law requires businesses and commercial website operators that collect personally identifiable information to post a clear, easily-accessible privacy policy online. These privacy policies must detail the types of information collected from users, the types of information that may be shared with third parties, the effective date of the privacy policy, and the process\u2014if any\u2014for a user to review and request changes to their collected information.<\/p>\n<p>Privacy policies must also include information about how a company responds to \u201cDo Not Track\u201d requests, which are web browser settings meant to prevent a user from being tracked online. The efficacy of these settings is debated, and Apple <a href=\"https:\/\/www.computerworld.com\/article\/3338086\/why-apple-is-disabling-safari-s-do-not-track-feature.html\" target=\"_blank\" rel=\"noopener\">recently decommissioned the feature in its Safari browser<\/a>.<\/p>\n<p>Freeman said companies don\u2019t need to worry about honoring \u201cDo Not Track\u201d requests as much as they should worry about complying with the law.<\/p>\n<p>\u201cIt\u2019s okay to say \u2018We don\u2019t,\u2019\u201d Freeman said, \u201cbut you have to say something.\u201d<\/p>\n<p>The law covers more than what to say in a privacy policy. It also covers how prominently a company must display it. According to the law, privacy policies must be \u201cconspicuously posted\u201d on a website.<\/p>\n<p>More than 10 years ago, Google tried to test that interpretation and later backed down. Following a 2007 <a href=\"https:\/\/bits.blogs.nytimes.com\/2008\/05\/30\/is-google-violating-a-california-privacy-law\/?ref=technology\" target=\"_blank\" rel=\"noopener\">New York Times report<\/a> that revealed that the company\u2019s privacy policy was at least two clicks away from the home page, multiple privacy rights organizations sent a letter to then-CEO Eric Schmidt, urging the company to more proactively comply.<\/p>\n<p>\u201cGoogle&#8217;s reluctance to post a link to its privacy policy on its homepage is alarming,\u201d <a href=\"https:\/\/epic.org\/privacy\/ftc\/google\/Google_Letter060308.pdf\" target=\"_blank\" rel=\"noopener\">the letter said<\/a>, which was signed by the American Civil Liberties Union, Center for Digital Democracy, and Electronic Frontier Foundation. \u201cWe urge you to comply with the California Online Privacy Protection Act and the widespread practice for commercial web sites as soon as possible.\u201d<\/p>\n<p>The letter worked. Today, users can click the \u201cPrivacy\u201d link on the search giant\u2019s home page.<\/p>\n<h3><strong>What About COPPA and HIPAA? <\/strong><\/h3>\n<p>Spuri.us, like any nimble Silicon Valley startup, is ready to pivot. At one point in its growth, it considered becoming a health tracking and fitness app, meaning it would collect users\u2019 heart rates, sleep regimens, water intake, exercise routines, and even their GPS location for selected jogging and cycling routes. Spuri.us also once considered pivoting into mobile gaming, developing an app that isn\u2019t made for children, but could still be downloaded onto children\u2019s devices and played by kids.<\/p>\n<p>Spuri.us\u2019 founder is familiar with at least two federal data privacy laws\u2014the Health Insurance Portability and Accountability Act (<a href=\"https:\/\/www.hhs.gov\/hipaa\/index.html\" target=\"_blank\" rel=\"noopener\">HIPAA<\/a>), which regulates medical information, and the Children\u2019s Online Privacy Protection Act (<a href=\"https:\/\/www.ftc.gov\/enforcement\/rules\/rulemaking-regulatory-reform-proceedings\/childrens-online-privacy-protection-rule\" target=\"_blank\" rel=\"noopener\">COPPA<\/a>), which regulates information belonging to children.<\/p>\n<p>Spuri.us\u2019 founder wants to know: If her company stars collecting health-related information, will it need to comply with HIPAA?<\/p>\n<p>Not so, Freeman said.<\/p>\n<p>\u201cHIPAA, the way it\u2019s laid out, doesn\u2019t cover all medical information,\u201d Freeman said. \u201cThat is a common misunderstanding.\u201d<\/p>\n<p>Instead, Freeman said, HIPAA only applies to three types of businesses: health care providers (like doctors, clinics, dentists, and pharmacies), health plans (like health insurance companies and HMOs), and health care clearinghouses (like billing services that process nonstandard health care information).<\/p>\n<p>Without fitting any of those descriptions, Spuri.us doesn\u2019t have to worry about HIPAA compliance.<\/p>\n<p>As for complying with COPPA, Freeman called the law \u201ccomplicated\u201d and \u201cvery hard to comply with.\u201d Attached to a massive omnibus bill at the close of the 1998 legislative session, COPPA is a law that \u201cnobody knew was there until it passed,\u201d Freeman said.<\/p>\n<p>That said, COPPA\u2019s scope is easy to understand.<\/p>\n<p>\u201cSome things are simple,\u201d Freeman said. \u201cYou are regulated by Congress and obliged to comply with its byzantine requirements if your website is either directed to children under the age of 13, or you have actual knowledge that you\u2019re collecting information from children under the age of 13.\u201d<\/p>\n<p>That begs the question: What is a website directed to children? According to Freeman, the Federal Trade Commission <a href=\"https:\/\/www.ftc.gov\/tips-advice\/business-center\/guidance\/complying-coppa-frequently-asked-questions#Web%20sites%20and%20online\" target=\"_blank\" rel=\"noopener\">created a rule that helps answer that question<\/a>.<\/p>\n<p>\u201cThings like animations on the site, language that looks like it&#8217;s geared towards children, a variety of factors that are intuitive are taken into account,\u201d Freeman said.<\/p>\n<p>Other factors include a website\u2019s subject matter, its music, the age of its models, the display of \u201cchild-oriented activities,\u201d and the presence of any child celebrities.<\/p>\n<p>Because Spuri.us is not making a child-targeted app, and it does not knowingly collect information from children under the age of 13, it does not have to comply with COPPA.<\/p>\n<h3><strong>A quick note on GDPR<\/strong><\/h3>\n<p>No concern about data privacy compliance is complete without bringing up the European Union\u2019s <a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/05\/gdpr-causes-a-flood-of-new-policies\/\" target=\"_blank\" rel=\"noopener\">General Data Protection Regulation (GDPR)<\/a>. Passed in 2016 and having taken effect last year, GDPR regulates how companies collect, store, use, and share EU citizens\u2019 personal information online. On the day GDPR took effect, countless Americans received email after email about updated privacy policies, often from companies that were founded in the United States.<\/p>\n<p>Spuri.us\u2019 founder is worried. She might have EU users but she isn\u2019t certain. Do those users force her to become GDPR compliant?<\/p>\n<p>\u201cThat\u2019s a common misperception,\u201d Freeman said. He said one section of GDPR explains this topic, which he called \u201cextraterritorial application.\u201d Or, to put it a little more clearly, Freeman said: \u201cIf you\u2019re a US company, when does GDPR reach out and grab you?\u201d<\/p>\n<p>GDPR affects companies around the world depending on three factors. First, whether the company is established within the EU, either through employees, offices, or equipment. Second, whether the company directly markets or communicates to EU residents. Third, whether the company monitors the behavior of EU residents.<\/p>\n<p>\u201cNumber three is what trips people up,\u201d Freeman said. He said that US websites and apps\u2014including those operated by companies without a physical EU presence\u2014must still comply with GDPR if they specifically track users\u2019 behavior that takes place in the EU.<\/p>\n<p>\u201cIf you have an analytics service or network, or pixels on your website, or you drop cookies on EU residents\u2019 machines that tracks their behavior,\u201d that could all count as monitoring the behavior of EU residents, Freeman said.<\/p>\n<p>Because those services are rather common, Freeman said many companies have already found a solution. Rather than dismantling an entire analytics operation, companies can instead capture the IP addresses of users visiting their websites. The companies then perform a reverse geolocation lookup. If the companies find any IP addresses associated with an EU location, they screen out the users behind those addresses to prevent online tracking.<\/p>\n<p>Asked whether this setup has been proven to protect against GDPR regulators, Freeman instead said that these steps showcase an understanding and a concern for the law. That concern, he said, should hold up against scrutiny.<\/p>\n<p>\u201cIf you\u2019re a startup and an EU regulator initiates an investigation, and you show you\u2019ve done everything you can to avoid tracking\u2014that you get it, you know the law\u2014my hope would be that most reasonable regulators would not take a Draconian action against you,\u201d Freeman said. \u201cYou\u2019ve done the best you can to avoid the thing that is regulated, which is the track.\u201d<\/p>\n<h3><strong>A data breach law for every state<\/strong><\/h3>\n<p>Spuri.us has a clearly-posted privacy policy. It knows about HIPAA and COPPA and it has a plan for GDPR. Everything is going well\u2026until it isn\u2019t.<\/p>\n<p>Spuri.us suffers a data breach.<\/p>\n<p>Depending on which data was taken from Spuri.us and who it referred to, the startup will need to comply with the many requirements laid out in California\u2019s <a href=\"https:\/\/leginfo.legislature.ca.gov\/faces\/codes_displaySection.xhtml?lawCode=CIV&amp;sectionNum=1798.82\" target=\"_blank\" rel=\"noopener\">data breach notification law<\/a>. There are rules on when the law is triggered, what counts as a breach, who to notify, and what to tell them.<\/p>\n<p>The law protects Californians\u2019 \u201cpersonal information,\u201d which it defines as a <em>combination<\/em> of information. For instance, a first and last name <em>plus<\/em> a Social Security number count as personal information. So do a first initial and last name plus a driver\u2019s license number, or a first and last name plus any past medical insurance claims, or medical diagnoses. A Californian\u2019s username and associated password also qualify as \u201cpersonal information,\u201d according to the law.<\/p>\n<p>The law also defines a breach as any \u201cunauthorized acquisition\u201d of personal information data. So, a rogue threat actor accessing a database? Not a breach. That same threat actor downloading the information from the database? Breach.<\/p>\n<p>In California, once a company discovers a data breach, it next has to notify the affected individuals. These notifications must include details on which type of personal information was taken, a description of the breach, contact information for the company, and, if the company was actually the source of the breach, an offer for free identity theft prevention services for at least one year.<\/p>\n<p>The law is particularly strict on these notifications to customers and individuals impacted. There are rules on font size and requirements for which subheadings to include in every notice: \u201cWhat Happened,\u201d \u201cWhat Information Was Involved,\u201d \u201cWhat We Are Doing,\u201d \u201cWhat You Can Do,\u201d and \u201cMore Information.\u201d<\/p>\n<p>After Spuri.us sends out its bevy of notices, it could still have a lot more to do.<\/p>\n<p>As of April 2018, <a href=\"http:\/\/www.governing.com\/topics\/mgmt\/sl-alabama-data-breach-notification.html\" target=\"_blank\" rel=\"noopener\">every single US state has its own data breach notification law<\/a>. These laws, which can sometimes overlap, still include important differences, Freeman said.<\/p>\n<p>\u201cSome states require you to notify affected consumers. Some require you to notify the state\u2019s Attorney General,\u201d Freeman said. \u201cSome require you to notify credit bureaus.\u201d<\/p>\n<p>For example, Florida\u2019s law requires that, if more than 1,000 residents are affected, the company must notify all nationwide consumer reporting agencies. Utah\u2019s law, on the other hand, only requires notifications if, after an investigation, the company finds that identity theft or fraud occurred, or likely occurred. And Iowa has one of the few state laws that protects both electronic and paper records.<\/p>\n<p>Of all the data compliance headaches, this one might be the most time-consuming for Spuri.us.<\/p>\n<p>In the meantime, Freeman said, taking a proactive approach\u2014like posting the accurate and truthful privacy policy and being upfront and honest with users about business practices\u2014will put the startup at a clear advantage.<\/p>\n<p>\u201cIf they start out knowing those things on the privacy side and just in the USA,\u201d Freeman said, \u201cthat\u2019s a great start that puts them ahead of a lot of other startups.\u201d<\/p>\n<p>Stay tuned for our second blog in the series, which will cover the current fight for comprehensive data privacy legislation in the United States.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/03\/not-definitive-guide-cybersecurity-data-privacy-laws\/\">The not-so-definitive guide to cybersecurity and data privacy laws<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/03\/not-definitive-guide-cybersecurity-data-privacy-laws\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: davidruiz| Date: Thu, 07 Mar 2019 16:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2019\/03\/not-definitive-guide-cybersecurity-data-privacy-laws\/' title='The not-so-definitive guide to cybersecurity and data privacy laws'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/03\/shutterstock_1068817685.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>In the first blog for Malwarebytes Labs&#8217; cybersecurity and data privacy law series, we tackle US data privacy compliance from a startup&#8217;s perspective. GDPR, COPPA, HIPAA\u2014it&#8217;s all here. <\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/privacy-security-world\/\" rel=\"category tag\">Privacy<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/california-online-privacy-protection\/\" rel=\"tag\">California Online Privacy Protection<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/california-online-privacy-protection-act\/\" rel=\"tag\">California Online Privacy Protection Act<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/childrens-online-privacy-protect-act\/\" rel=\"tag\">Childrens Online Privacy Protect Act<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/coppa\/\" rel=\"tag\">COPPA<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cybersecurity\/\" rel=\"tag\">cybersecurity<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cybersecurity-compliance\/\" rel=\"tag\">cybersecurity compliance<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cybersecurity-laws\/\" rel=\"tag\">cybersecurity laws<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-breach\/\" rel=\"tag\">data breach<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-breach-notification\/\" rel=\"tag\">data breach notification<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-breach-notification-law\/\" rel=\"tag\">data breach notification law<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-privacy\/\" rel=\"tag\">Data privacy<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-privacy-compliance\/\" rel=\"tag\">data privacy compliance<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/data-privacy-laws\/\" rel=\"tag\">data privacy laws<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/do-not-track\/\" rel=\"tag\">Do Not Track<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/eu\/\" rel=\"tag\">EU<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/european-union\/\" rel=\"tag\">European Union<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/gdpr\/\" rel=\"tag\">gdpr<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/general-data-protection-regulation\/\" rel=\"tag\">General Data Protection Regulation<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/google\/\" rel=\"tag\">Google<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/health-insurance-portability-and-accessibility\/\" rel=\"tag\">Health Insurance Portability and Accessibility<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hipaa\/\" rel=\"tag\">HIPAA<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/legal\/\" rel=\"tag\">legal<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/privacy\/\" rel=\"tag\">privacy<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/privacy-policy\/\" rel=\"tag\">privacy policy<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/startup\/\" rel=\"tag\">startup<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2019\/03\/not-definitive-guide-cybersecurity-data-privacy-laws\/' title='The not-so-definitive guide to cybersecurity and data privacy laws'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2019\/03\/not-definitive-guide-cybersecurity-data-privacy-laws\/\">The not-so-definitive guide to cybersecurity and data privacy laws<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[21169,21170,21171,21172,4500,21173,21174,11172,21175,21176,11063,21177,21178,20888,7598,3037,12116,12210,1670,21179,18118,19180,5897,18883,10497,16156],"class_list":["post-14781","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-california-online-privacy-protection","tag-california-online-privacy-protection-act","tag-childrens-online-privacy-protect-act","tag-coppa","tag-cybersecurity","tag-cybersecurity-compliance","tag-cybersecurity-laws","tag-data-breach","tag-data-breach-notification","tag-data-breach-notification-law","tag-data-privacy","tag-data-privacy-compliance","tag-data-privacy-laws","tag-do-not-track","tag-eu","tag-european-union","tag-gdpr","tag-general-data-protection-regulation","tag-google","tag-health-insurance-portability-and-accessibility","tag-hipaa","tag-legal","tag-privacy","tag-privacy-policy","tag-security-world","tag-startup"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14781","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14781"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14781\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14781"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14781"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14781"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}