{"id":15592,"date":"2014-02-03T00:21:11","date_gmt":"2014-02-02T22:21:11","guid":{"rendered":"https:\/\/www.hiig.de\/?p=15592"},"modified":"2018-06-26T18:58:35","modified_gmt":"2018-06-26T16:58:35","slug":"law-cyber-security-and-critical-information-infrastructure-protection","status":"publish","type":"post","link":"https:\/\/www.hiig.de\/en\/law-cyber-security-and-critical-information-infrastructure-protection\/","title":{"rendered":"Law, Cybersecurity and Critical Information Infrastructure Protection"},"content":{"rendered":"<h3><span style=\"line-height: 1.714285714; font-size: 1rem;\">Beckstrom\u2019s Law of Cybersecurity<\/span><\/h3>\n<p>There is a new law in the field of Cybersecurity. Rod Beckstrom presented <a href=\"http:\/\/dld-conference.com\/articles\/its-a-mad-mad-mad-cyber-world\">Beckstrom&#8217;s Law of Cybersecurity<\/a> at this year&#8217;s DLD14 conference in Munich.\u00a0Thereafter the following shall apply:<\/p>\n<ol>\n<li>Anything attached to a network can be hacked.<\/li>\n<li>Everything is being attached to networks.<\/li>\n<li>Everything is vulnerable<\/li>\n<\/ol>\n<p>The list of eponymous laws is already long. The list of laws related to the Internet is still growing. Another example for such a law is Matcalfe\u2019s law that states a telecommunication network\u2019s value increases proportionally with the square of number of connected system-users. Also a model of network related laws are the <a href=\"http:\/\/en.wikipedia.org\/wiki\/Shoshana_Zuboff#Zuboff.27s_Laws\">Zuboff&#8217;s laws<\/a>, one of it says every digital application that can be used for surveillance and control will be used for surveillance and control. Among the most well known is Moore\u2019s law according to which the number of transistors soldered onto a microchip would double regularly. Due to their very nature, such laws can little be more as a rule of thumb; at least they have to be considered <a href=\"http:\/\/www.edge.org\/response-detail\/25543\">partly as obsolete<\/a>. Though, in the area of data protection and privacy such regularities have to be taken seriously. In many cases data security is of no less importance.<\/p>\n<p>Beckstrom\u2019s law spells out that an absolute state of cybersecurity is not to be achieved. That assumed for a working hypothesis, the challenge remains of how to develop relative security and safety. Particularly controversial is the precise design of security architecture for critical information infrastructures &#8211; on a legal, political and technical level.<\/p>\n<p>To begin with, cybersecurity incorporates the areas of cybercrime, cyber espionage and cyber war. Information security is a big subset of cybersecurity. Another important subset is <a href=\"http:\/\/www.google.de\/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=1&amp;cad=rja&amp;ved=0CDAQFjAA&amp;url=http%3A%2F%2Fwww.swp-berlin.org%2Ffileadmin%2Fcontents%2Fproducts%2Fstudien%2F2012_S15_bdk.pdf&amp;ei=Ai_pUqfEGcbtswb1kYCgBA&amp;usg=AFQjCNG-_ps6jor-i0TCHwU4p8T8x83hww&amp;bvm=bv.60157871,d.Yms\">cybersecurity policy<\/a>. Worldwide, national governments as well as the European Union have given high priority to the topic. Against the background of the German national cybersecurity strategy set out in February 2011, the Federal Government has recently fixed in the coalition agreement its intention to pass a IT security bill. The European Union presented in 2013 a European strategy for cybersecurity consisting of a directive of network and information security in its core part.<\/p>\n<p>The strategy documents as well as the legislative proposals aim at the protection of so-called critical (information) infrastructures in particular. Infrastructures are termed \u2018critical\u2019 as they are organisations and facilities of great importance to society. Consequently, the failure or impairment of which would result in serious supply shortages, considerable disruption of public safety, or other dramatic consequences. By <a href=\"https:\/\/www.bsi.bund.de\/DE\/Themen\/KritischeInfrastrukturen\/kritischeinfrastrukturen_node.html\">information infrastructures<\/a> both is meant the sector of information and communications technology (ICT) itself as well as infrastructures based on ICT in other sectors.<\/p>\n<h3>Problems of legal, political and technical nature<\/h3>\n<p>There are many problems to be solved in critical information infrastructure protection. The spectrum can only roughly be pointed out here. The debate on protection of critical information infrastructures can be pretty much hold free of ideology though since in every \u00a0type of society, information and communications technologies represent the central nervous system \u00a0of social and economic life. It is a constitutional task of the state protecting (critical) civil networks and information. Among others, projects at European level are based on the legislative competence of the Harmonisation of the Internal Market.<\/p>\n<p>The range of problem-solving approaches range from a defensive-preventive strategy of creating resilient ICT structures in a mode of self-regulation of the largely private infrastructure operators to technically <a href=\"http:\/\/www.google.de\/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=2&amp;cad=rja&amp;ved=0CDMQFjAB&amp;url=http%3A%2F%2Fwww.it-rechts-praxis.de%2Ffiles%2FEntnetzung_Gaycken_Karger_MMR_2011.pdf&amp;ei=efzoUvbrOIHdswbG8IGwCg&amp;usg=AFQjCNHP_TNMqe2dOExbLZTOLVG7713Jmw&amp;bvm=bv.60157871,d.Yms\">disconnect<\/a> the relevant infrastructure as a legally required option for protection of critical ICT structures. At least, in the most sensitive areas, the latter is indisputable.<\/p>\n<p><span style=\"line-height: 1.714285714; font-size: 1rem;\">Legally, the definition of \u00a0\u201ccriticality\u201d, i.e. the question of what makes infrastructure critical to society, will be a substantial issue for further legislative steps. \u00a0The main question in this regard is which infrastructures in particular will fall in the scope of the directives and laws. \u00a0The original European proposal for the directive had a broad concept of network and information systems insofar as it even intended to cover cloud computing services. The more service providers fall within the scope of legal measures, the higher is also the bureaucratic and financial burden for official actors and private companies. This may also run counter to the desire to aim only at the essential infrastructures. In a nutshell, not every network and information system is a critical information infrastructure.<\/span><\/p>\n<p>From a governance-theoretical perspective, the question rises of how collaboration between private and public actors could be designed in concrete terms, for instance in multi-stakeholder-platforms, without facing any <a href=\"https:\/\/netzpolitik.org\/2013\/eu-lobbyismus-neue-expertengruppe-mit-zweifelhafter-besetzung-beraet-eu-kommission-bei-cybersecurity\/\">criticism<\/a> objecting lobbying. Similar thoughts will be made on standardisation committees. One could possibly use new smart forms of <a href=\"http:\/\/www.google.de\/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=2&amp;ved=0CDcQFjAB&amp;url=http%3A%2F%2Fmercury.ethz.ch%2Fserviceengine%2FFiles%2FISN%2F106323%2Fipublicationdocument_singledocument%2Fb50a697d-c212-4b20-b622-b4b4113355cb%2Fen%2FPPP_no_silver_bullet.pdf&amp;ei=KwDpUqbNM8ictAbymICoCA&amp;usg=AFQjCNF7oJvO3ufztHRdCnMlxDwf2CdWjg&amp;bvm=bv.60157871,d.Yms\">meta-governance<\/a>, whereby public actors will set free dynamics purposefully as well as, after that, coordinating and steer them smoothly in order to achieve a \u2018network response to network threats\u2019. Several players like the German Federal Office for Information Security (<a href=\"https:\/\/www.bsi.bund.de\/DE\/Home\/home_node.html\">BSI<\/a>) and the European Agency for Network and Information Security (<a href=\"http:\/\/www.enisa.europa.eu\/\">ENISA<\/a>) have a key role in this area.<\/p>\n<p>As far as it concerns the specific configuration, referring to \u00a0reporting obligations, substantial problems will be coming up, too. The legal projects provide an obligation for operators of critical infrastructures to report security incidents to the competent authorities. Such obligations to report are intended to be remedies for epistemic uncertainty; moreover, they should convey an objectified picture of the situation to the public actors. \u00a0However, it is arguable from when and which information need to be reported. At this, the threshold of significant security breaches is still to be defined. All in all, the considerations by <a href=\"https:\/\/secure.edps.europa.eu\/EDPSWEB\/webdav\/site\/mySite\/shared\/Documents\/Consultation\/Opinions\/2013\/13-06-14_Cyber_security_EN.pdf\">European<\/a> and German privacy protection supervisors in the context of further elaborations have to be taken into account. The approach of making certain reports about security incidents accessible to the public does not seem being unfruitful.<\/p>\n<p>In the field of private law, it\u2019s certain that the topic will experience a significant revaluation in the future, especially the compliance agendas in companies. The standard for companies&#8217; liability concerning IT security will be specified by the legislative measures. This in turn has considerable influence on the contractual practice and insurance coverage practice.<\/p>\n<p>All in all, problems concerning protection of critical information infrastructures are numerous. It\u2019s necessary to develop appropriate solutions in this field on a legal, political and technical level. Generally spoken and out of a legal point of view, it is a matter of balancing the relevant stakeholders legally protected interests and last but not least of a properly designed relation between law and technology.<\/p>\n<h4>This post is part of a weekly series of articles by\u00a0<a title=\"Doctoral Programme\" href=\"https:\/\/www.hiig.de\/en\/doctoral-programme\/\">doctoral canditates<\/a>\u00a0of the Alexander von Humboldt Institute for Internet and Society. It does not necessarily represent the view of the Institute itself. For more information about the topics of these articles and asssociated research projects, please contact\u00a0<a href=\"mailto:presse@hiig.de\">presse@hiig.de<\/a>.<\/h4>\n<div class=\"shariff shariff-align-flex-start shariff-widget-align-flex-start\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.hiig.de%2Fen%2Flaw-cyber-security-and-critical-information-infrastructure-protection%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button bluesky shariff-nocustomcolor\" style=\"background-color:#84c4ff\"><a href=\"https:\/\/bsky.app\/intent\/compose?text=Law%2C%20Cybersecurity%20and%20Critical%20Information%20Infrastructure%20Protection https%3A%2F%2Fwww.hiig.de%2Fen%2Flaw-cyber-security-and-critical-information-infrastructure-protection%2F  via @hiigberlin.bsky.social\" title=\"Share on Bluesky\" aria-label=\"Share on Bluesky\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0085ff; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"20\" height=\"20\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\"><path class=\"st0\" d=\"M4.89,3.12c2.07,1.55,4.3,4.71,5.11,6.4.82-1.69,3.04-4.84,5.11-6.4,1.49-1.12,3.91-1.99,3.91.77,0,.55-.32,4.63-.5,5.3-.64,2.3-2.99,2.89-5.08,2.54,3.65.62,4.58,2.68,2.57,4.74-3.81,3.91-5.48-.98-5.9-2.23-.08-.23-.11-.34-.12-.25,0-.09-.04.02-.12.25-.43,1.25-2.09,6.14-5.9,2.23-2.01-2.06-1.08-4.12,2.57-4.74-2.09.36-4.44-.23-5.08-2.54-.19-.66-.5-4.74-.5-5.3,0-2.76,2.42-1.89,3.91-.77h0Z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto shariff-nocustomcolor\" style=\"background-color:#a8a8a8\"><a href=\"mailto:?body=https%3A%2F%2Fwww.hiig.de%2Fen%2Flaw-cyber-security-and-critical-information-infrastructure-protection%2F&subject=Law%2C%20Cybersecurity%20and%20Critical%20Information%20Infrastructure%20Protection\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#999; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>Beckstrom\u2019s Law of Cybersecurity There is a new law in the field of Cybersecurity. Rod Beckstrom presented Beckstrom&#8217;s Law of Cybersecurity at this year&#8217;s DLD14 conference in Munich.\u00a0Thereafter the following shall apply: Anything attached to a network can be hacked. Everything is being attached to networks. Everything is vulnerable The list of eponymous laws is&hellip;<\/p>\n","protected":false},"author":50,"featured_media":15289,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7],"tags":[],"class_list":["post-15592","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Law, Cybersecurity and Critical Information Infrastructure Protection &#8211; Digital Society Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hiig.de\/en\/law-cyber-security-and-critical-information-infrastructure-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Law, Cybersecurity and Critical Information Infrastructure Protection &#8211; Digital Society Blog\" \/>\n<meta property=\"og:description\" content=\"Beckstrom\u2019s Law of Cybersecurity There is a new law in the field of Cybersecurity. Rod Beckstrom presented Beckstrom&#8217;s Law of Cybersecurity at this year&#8217;s DLD14 conference in Munich.\u00a0Thereafter the following shall apply: Anything attached to a network can be hacked. Everything is being attached to networks. Everything is vulnerable The list of eponymous laws is&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hiig.de\/en\/law-cyber-security-and-critical-information-infrastructure-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"HIIG\" \/>\n<meta property=\"article:published_time\" content=\"2014-02-02T22:21:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-06-26T16:58:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2014\/01\/european-union-155207_640.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hannfried Leisterer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hannfried Leisterer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Law, Cybersecurity and Critical Information Infrastructure Protection &#8211; Digital Society Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hiig.de\/en\/law-cyber-security-and-critical-information-infrastructure-protection\/","og_locale":"en_US","og_type":"article","og_title":"Law, Cybersecurity and Critical Information Infrastructure Protection &#8211; Digital Society Blog","og_description":"Beckstrom\u2019s Law of Cybersecurity There is a new law in the field of Cybersecurity. Rod Beckstrom presented Beckstrom&#8217;s Law of Cybersecurity at this year&#8217;s DLD14 conference in Munich.\u00a0Thereafter the following shall apply: Anything attached to a network can be hacked. Everything is being attached to networks. Everything is vulnerable The list of eponymous laws is&hellip;","og_url":"https:\/\/www.hiig.de\/en\/law-cyber-security-and-critical-information-infrastructure-protection\/","og_site_name":"HIIG","article_published_time":"2014-02-02T22:21:11+00:00","article_modified_time":"2018-06-26T16:58:35+00:00","og_image":[{"width":640,"height":426,"url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2014\/01\/european-union-155207_640.png","type":"image\/png"}],"author":"Hannfried Leisterer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hannfried Leisterer","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hiig.de\/en\/law-cyber-security-and-critical-information-infrastructure-protection\/#article","isPartOf":{"@id":"https:\/\/www.hiig.de\/en\/law-cyber-security-and-critical-information-infrastructure-protection\/"},"author":{"name":"Hannfried Leisterer","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/be2f0008393292dc0ae9646459502bb2"},"headline":"Law, Cybersecurity and Critical Information Infrastructure Protection","datePublished":"2014-02-02T22:21:11+00:00","dateModified":"2018-06-26T16:58:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hiig.de\/en\/law-cyber-security-and-critical-information-infrastructure-protection\/"},"wordCount":1136,"commentCount":0,"publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"image":{"@id":"https:\/\/www.hiig.de\/en\/law-cyber-security-and-critical-information-infrastructure-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hiig.de\/en\/law-cyber-security-and-critical-information-infrastructure-protection\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hiig.de\/en\/law-cyber-security-and-critical-information-infrastructure-protection\/","url":"https:\/\/www.hiig.de\/en\/law-cyber-security-and-critical-information-infrastructure-protection\/","name":"Law, Cybersecurity and Critical Information Infrastructure Protection &#8211; Digital Society Blog","isPartOf":{"@id":"https:\/\/www.hiig.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hiig.de\/en\/law-cyber-security-and-critical-information-infrastructure-protection\/#primaryimage"},"image":{"@id":"https:\/\/www.hiig.de\/en\/law-cyber-security-and-critical-information-infrastructure-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","datePublished":"2014-02-02T22:21:11+00:00","dateModified":"2018-06-26T16:58:35+00:00","breadcrumb":{"@id":"https:\/\/www.hiig.de\/en\/law-cyber-security-and-critical-information-infrastructure-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hiig.de\/en\/law-cyber-security-and-critical-information-infrastructure-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/en\/law-cyber-security-and-critical-information-infrastructure-protection\/#primaryimage","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/12\/post_generic.png","width":640,"height":426},{"@type":"BreadcrumbList","@id":"https:\/\/www.hiig.de\/en\/law-cyber-security-and-critical-information-infrastructure-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hiig.de\/en\/"},{"@type":"ListItem","position":2,"name":"Law, Cybersecurity and Critical Information Infrastructure Protection"}]},{"@type":"WebSite","@id":"https:\/\/www.hiig.de\/#website","url":"https:\/\/www.hiig.de\/","name":"HIIG","description":"Alexander von Humboldt Institute for Internet and Society","publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hiig.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hiig.de\/#organization","name":"HIIG","url":"https:\/\/www.hiig.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","width":320,"height":80,"caption":"HIIG"},"image":{"@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/be2f0008393292dc0ae9646459502bb2","name":"Hannfried Leisterer"}]}},"_links":{"self":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/15592","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/comments?post=15592"}],"version-history":[{"count":5,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/15592\/revisions"}],"predecessor-version":[{"id":49275,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/15592\/revisions\/49275"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media\/15289"}],"wp:attachment":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media?parent=15592"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/categories?post=15592"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/tags?post=15592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}