{"id":13001,"date":"2013-08-05T10:33:35","date_gmt":"2013-08-05T10:33:35","guid":{"rendered":"https:\/\/www.hiig.de\/?p=13001"},"modified":"2019-02-26T12:05:11","modified_gmt":"2019-02-26T11:05:11","slug":"review-of-the-workshop-cloud-computing-and-the-eu-draft-general-data-protection-regulation","status":"publish","type":"post","link":"https:\/\/www.hiig.de\/en\/review-of-the-workshop-cloud-computing-and-the-eu-draft-general-data-protection-regulation\/","title":{"rendered":"Review of the Workshop: \u00bbCloud Computing and the EU Draft General Data Protection Regulation\u00ab"},"content":{"rendered":"<p>About 30 legal practitioners, computer scientists and social scientists came together to attend the interdisciplinary workshop \u00bb<a title=\"Cloud Computing and EU Data Protection Regulation\" href=\"https:\/\/www.hiig.de\/en\/events\/cloud-computing-and-eu-data-protection-regulation-2\/\">Cloud Computing and the EU Draft General Data Protection Regulation. Standards, Design Considerations, and Operations Recommendations for Privacy-friendly Cloud Computing<\/a>\u00ab held on the premises of Humboldt University, Berlin (HU) on 26 July 2013 ahead of the <a href=\"http:\/\/www.ietf.org\/meeting\/87\/\">87th Meeting of the Internet Engineering Task Force<\/a> (IETF) which is currently in progress. Jointly organised by the Alexander von Humboldt Institute for Internet and Society (HIIG), the HU, and Cisco as part of the \u00bb<a title=\"Global Privacy Governance\" href=\"https:\/\/www.hiig.de\/en\/project\/lead-project-internet-and-privacy-2\/\" target=\"_blank\" rel=\"noopener\">Global Privacy Governance<\/a>\u00ab project, the aim was to gain a common, interdisciplinary understanding of privacy and data protection, particularly from the point of view of balancing legal requirements with the means of technical implementation.\u00a0The purpose of the workshop was to draw up a number of specific \u00bbOperational Privacy\u00ab requirements pertaining to Cloud Computing.<\/p>\n<h3>Session 1: Nicolas Dubois and Caspar Bowden<\/h3>\n<p>During the first workshop session, Nicolas Dubois from the EU Commission presented the latter\u2019s proposals for reforming the European Data Protection regulations: data protection is to be updated in line with the Charter of Fundamental rights in order to meet the challenges of technical development. Apart from introducing Privacy by Design and Privacy by Default into the General Data Protection Regulation, the focus will be on such other measures as revising the obligations of data processors with regard to risk management and the need to include standard contractual clauses on data security and support for binding corporate rules (BCR). Backed up with sound evidence, Caspar Bowden, the former privacy consultant at Microsoft\u2018s European branch, not only criticised the past ignorance displayed by European institutions in matters relating to undercover surveillance measures conducted by intelligence services, whose existence has been an open secret for a long time, but also showed that European citizens and organisations are entirely at the mercy of these measures according to the provisions of the US Foreign Intelligence Surveillance Act (FISA), for instance. Instead of protecting their citizens, European countries and the EU Commission were biased towards the interests of industrial companies, particularly those of US American cloud-computing providers. The least that Europe could do under the circumstances is to develop a cloud infrastructure of its own.<\/p>\n<p>The discussion that followed on from this talk dealt mainly with the possibilities and limitations of legal restrictions as well as certain time aspects: How long would it take to build our own cloud infrastructure? For how long are encoded data safe? For what period of time are data retained?<\/p>\n<h3>Session 2: Alexander Dix and Alissa Cooper<\/h3>\n<p>Dr. Alexander Dix, Berlin\u2019s Commissioner for Data Protection and Freedom of Information, opened the second session with a talk on the legal demands made on technical standardisation, which has hitherto focused on data processors being able to set their own standards. This practice lowers the level of security and has to be overturned, he said. Dix also called for an international convention to regulate what secret services are allowed to do on the Internet, and what not. To wind up his talk, he drew attention to the <a href=\"https:\/\/www.datenschutz-berlin.de\/infothek-und-service\/veroeffentlichungen\/beschluesse-dsk\/\">Resolution of the Conference of Federal and State Data Protection Commissioners dated 24 July 2013<\/a>, according to which the authorities will not issue any new licence for the transfer of data to the USA under the terms of the Safe Harbour Agreement. Alissa Cooper from the Center of Democracy and Technology subsequently presented the <a href=\"https:\/\/tools.ietf.org\/html\/rfc6973\" target=\"_blank\" rel=\"noopener\">RFC 6973 \u00bbPrivacy Considerations for Internet Protocols\u00ab<\/a> that were completed shortly before the workshop commenced. Based on the IETF\u2018s goals for devising technical protocols for Internet communication, she kicked off with the very limited extent to which privacy supervision could be deployed within the framework of the IETF, explaining that data security is primarily a political problem, whereas the IETF is only concerned with technical matters.<\/p>\n<p>The subsequent discussion revolved primarily around the question of who should standardise what in terms of privacy and data protection, and how they should go about it. The general consensus was that technicians have since turned their attention to this topic instead of just discussing the safety aspects.<\/p>\n<h3>Session 3: Fred Baker, Gunter Van de Velde and J\u00f6rg Pohle<\/h3>\n<p>Fred Baker, a Cisco fellow and former Chairman of the IETF, opened the third session with a preview of proposed Internet requirements for \u00bbOperational Privacy\u00ab. Of the two threats to privacy. as identified by Baker \u2013 what people disseminate about themselves and what can be gleaned from their conduct and their relationship to other people \u2013 the latter poses the greater risk. So technological advancement should aim at providing those affected with different options that are both comprehensible and designed to facilitate the choice between spreading or withholding particulars. In his capacity as Chairman of the IETF\u2019s \u00bbOperational Security Working Group\u00ab, Gunter Van de Velde proceeded to outline the working group\u2019s mission, pointing out that the draft that had been put forward for an RFC was not so much a documentation of best current practices, in his opinion, but constituted more of a problem analysis \u2013 a \u00bbtaxonomy and problem statement\u00ab. <a href=\"https:\/\/docs.google.com\/a\/internetundgesellschaft.de\/file\/d\/0B4we_S6b7SNCb2d2cVpRczUyYkU\/edit\">The draft<\/a> itself was then introduced by the person who wrote this review, J\u00f6rg Pohle from the HIIG, who made special mention of the data security protection targets, by way of a guideline.<\/p>\n<p>This was followed by a discussion about the inter-relationship between the law and technology in implementing privacy and data protection requirements and about particularly vital individual demands, such as the call for an independent supervisory structure.<\/p>\n<h3>Operational Privacy Outlook<\/h3>\n<p>Although the workshop failed to achieve its ambitious aim to define clear \u00bbOperational Privacy\u00ab requirements specifically for Cloud Computing activities, it can still be considered a success: firstly because it established a common understanding of the problem and secondly because this preliminary work, coupled with the outcome of the discussions at the workshop, forms a good basis for drawing up a \u00bbtaxonomy and problem statement\u00ab on \u00bboperational privacy\u00ab, which can then be passed on the IETF\u2019s \u00bbOperational Security Working Group\u00ab level, possibly with a view to producing a document on best current practices in the longer term.<\/p>\n<div class=\"shariff shariff-align-flex-start shariff-widget-align-flex-start\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.hiig.de%2Fen%2Freview-of-the-workshop-cloud-computing-and-the-eu-draft-general-data-protection-regulation%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button bluesky shariff-nocustomcolor\" style=\"background-color:#84c4ff\"><a href=\"https:\/\/bsky.app\/intent\/compose?text=Review%20of%20the%20Workshop%3A%20%C2%BBCloud%20Computing%20and%20the%20EU%20Draft%20General%20Data%20Protection%20Regulation%C2%AB https%3A%2F%2Fwww.hiig.de%2Fen%2Freview-of-the-workshop-cloud-computing-and-the-eu-draft-general-data-protection-regulation%2F  via @hiigberlin.bsky.social\" title=\"Share on Bluesky\" aria-label=\"Share on Bluesky\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0085ff; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"20\" height=\"20\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\"><path class=\"st0\" d=\"M4.89,3.12c2.07,1.55,4.3,4.71,5.11,6.4.82-1.69,3.04-4.84,5.11-6.4,1.49-1.12,3.91-1.99,3.91.77,0,.55-.32,4.63-.5,5.3-.64,2.3-2.99,2.89-5.08,2.54,3.65.62,4.58,2.68,2.57,4.74-3.81,3.91-5.48-.98-5.9-2.23-.08-.23-.11-.34-.12-.25,0-.09-.04.02-.12.25-.43,1.25-2.09,6.14-5.9,2.23-2.01-2.06-1.08-4.12,2.57-4.74-2.09.36-4.44-.23-5.08-2.54-.19-.66-.5-4.74-.5-5.3,0-2.76,2.42-1.89,3.91-.77h0Z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto shariff-nocustomcolor\" style=\"background-color:#a8a8a8\"><a href=\"mailto:?body=https%3A%2F%2Fwww.hiig.de%2Fen%2Freview-of-the-workshop-cloud-computing-and-the-eu-draft-general-data-protection-regulation%2F&subject=Review%20of%20the%20Workshop%3A%20%C2%BBCloud%20Computing%20and%20the%20EU%20Draft%20General%20Data%20Protection%20Regulation%C2%AB\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#999; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>About 30 legal practitioners, computer scientists and social scientists came together to attend the interdisciplinary workshop \u00bbCloud Computing and the EU Draft General Data Protection Regulation. Standards, Design Considerations, and Operations Recommendations for Privacy-friendly Cloud Computing\u00ab held on the premises of Humboldt University, Berlin (HU) on 26 July 2013 ahead of the 87th Meeting of&hellip;<\/p>\n","protected":false},"author":37,"featured_media":12960,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[115,224],"tags":[],"class_list":["post-13001","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-archive","category-policy-and-law"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Review of the Workshop: \u00bbCloud Computing and the EU Draft General Data Protection Regulation\u00ab &#8211; Digital Society Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hiig.de\/en\/review-of-the-workshop-cloud-computing-and-the-eu-draft-general-data-protection-regulation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Review of the Workshop: \u00bbCloud Computing and the EU Draft General Data Protection Regulation\u00ab &#8211; Digital Society Blog\" \/>\n<meta property=\"og:description\" content=\"About 30 legal practitioners, computer scientists and social scientists came together to attend the interdisciplinary workshop \u00bbCloud Computing and the EU Draft General Data Protection Regulation. Standards, Design Considerations, and Operations Recommendations for Privacy-friendly Cloud Computing\u00ab held on the premises of Humboldt University, Berlin (HU) on 26 July 2013 ahead of the 87th Meeting of&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hiig.de\/en\/review-of-the-workshop-cloud-computing-and-the-eu-draft-general-data-protection-regulation\/\" \/>\n<meta property=\"og:site_name\" content=\"HIIG\" \/>\n<meta property=\"article:published_time\" content=\"2013-08-05T10:33:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-02-26T11:05:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2013\/07\/programme_cloudComp-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2325\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"J\u00f6rg Pohle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"J\u00f6rg Pohle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Review of the Workshop: \u00bbCloud Computing and the EU Draft General Data Protection Regulation\u00ab &#8211; Digital Society Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hiig.de\/en\/review-of-the-workshop-cloud-computing-and-the-eu-draft-general-data-protection-regulation\/","og_locale":"en_US","og_type":"article","og_title":"Review of the Workshop: \u00bbCloud Computing and the EU Draft General Data Protection Regulation\u00ab &#8211; Digital Society Blog","og_description":"About 30 legal practitioners, computer scientists and social scientists came together to attend the interdisciplinary workshop \u00bbCloud Computing and the EU Draft General Data Protection Regulation. Standards, Design Considerations, and Operations Recommendations for Privacy-friendly Cloud Computing\u00ab held on the premises of Humboldt University, Berlin (HU) on 26 July 2013 ahead of the 87th Meeting of&hellip;","og_url":"https:\/\/www.hiig.de\/en\/review-of-the-workshop-cloud-computing-and-the-eu-draft-general-data-protection-regulation\/","og_site_name":"HIIG","article_published_time":"2013-08-05T10:33:35+00:00","article_modified_time":"2019-02-26T11:05:11+00:00","og_image":[{"width":2325,"height":1000,"url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2013\/07\/programme_cloudComp-1.png","type":"image\/png"}],"author":"J\u00f6rg Pohle","twitter_card":"summary_large_image","twitter_misc":{"Written by":"J\u00f6rg Pohle","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hiig.de\/en\/review-of-the-workshop-cloud-computing-and-the-eu-draft-general-data-protection-regulation\/#article","isPartOf":{"@id":"https:\/\/www.hiig.de\/en\/review-of-the-workshop-cloud-computing-and-the-eu-draft-general-data-protection-regulation\/"},"author":{"name":"J\u00f6rg Pohle","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/883f00acb41cf66e00fc2332fdfd44dd"},"headline":"Review of the Workshop: \u00bbCloud Computing and the EU Draft General Data Protection Regulation\u00ab","datePublished":"2013-08-05T10:33:35+00:00","dateModified":"2019-02-26T11:05:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hiig.de\/en\/review-of-the-workshop-cloud-computing-and-the-eu-draft-general-data-protection-regulation\/"},"wordCount":1022,"commentCount":3,"publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"image":{"@id":"https:\/\/www.hiig.de\/en\/review-of-the-workshop-cloud-computing-and-the-eu-draft-general-data-protection-regulation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","articleSection":["Application archive","Policy and Law"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hiig.de\/en\/review-of-the-workshop-cloud-computing-and-the-eu-draft-general-data-protection-regulation\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hiig.de\/en\/review-of-the-workshop-cloud-computing-and-the-eu-draft-general-data-protection-regulation\/","url":"https:\/\/www.hiig.de\/en\/review-of-the-workshop-cloud-computing-and-the-eu-draft-general-data-protection-regulation\/","name":"Review of the Workshop: \u00bbCloud Computing and the EU Draft General Data Protection Regulation\u00ab &#8211; Digital Society Blog","isPartOf":{"@id":"https:\/\/www.hiig.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hiig.de\/en\/review-of-the-workshop-cloud-computing-and-the-eu-draft-general-data-protection-regulation\/#primaryimage"},"image":{"@id":"https:\/\/www.hiig.de\/en\/review-of-the-workshop-cloud-computing-and-the-eu-draft-general-data-protection-regulation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","datePublished":"2013-08-05T10:33:35+00:00","dateModified":"2019-02-26T11:05:11+00:00","breadcrumb":{"@id":"https:\/\/www.hiig.de\/en\/review-of-the-workshop-cloud-computing-and-the-eu-draft-general-data-protection-regulation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hiig.de\/en\/review-of-the-workshop-cloud-computing-and-the-eu-draft-general-data-protection-regulation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/en\/review-of-the-workshop-cloud-computing-and-the-eu-draft-general-data-protection-regulation\/#primaryimage","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","width":2325,"height":1000},{"@type":"BreadcrumbList","@id":"https:\/\/www.hiig.de\/en\/review-of-the-workshop-cloud-computing-and-the-eu-draft-general-data-protection-regulation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hiig.de\/en\/"},{"@type":"ListItem","position":2,"name":"Review of the Workshop: \u00bbCloud Computing and the EU Draft General Data Protection Regulation\u00ab"}]},{"@type":"WebSite","@id":"https:\/\/www.hiig.de\/#website","url":"https:\/\/www.hiig.de\/","name":"HIIG","description":"Alexander von Humboldt Institute for Internet and Society","publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hiig.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hiig.de\/#organization","name":"HIIG","url":"https:\/\/www.hiig.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","width":320,"height":80,"caption":"HIIG"},"image":{"@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/883f00acb41cf66e00fc2332fdfd44dd","name":"J\u00f6rg Pohle"}]}},"_links":{"self":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/13001","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/users\/37"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/comments?post=13001"}],"version-history":[{"count":7,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/13001\/revisions"}],"predecessor-version":[{"id":56988,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/13001\/revisions\/56988"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media\/12960"}],"wp:attachment":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media?parent=13001"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/categories?post=13001"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/tags?post=13001"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}