{"id":96771,"date":"2023-09-08T15:11:50","date_gmt":"2023-09-08T13:11:50","guid":{"rendered":"https:\/\/www.hiig.de\/?p=96771"},"modified":"2024-08-05T14:49:58","modified_gmt":"2024-08-05T12:49:58","slug":"data-breach-notification","status":"publish","type":"post","link":"https:\/\/www.hiig.de\/en\/data-breach-notification\/","title":{"rendered":"Data breaches: Does the GDPR help?"},"content":{"rendered":"\n<p>Authors: <a href=\"https:\/\/policyreview.info\/users\/frederik-j-zuiderveen-borgesius\" target=\"_blank\" rel=\"noreferrer noopener\">Frederik Zuiderveen Borgesius<\/a> &amp; <a href=\"https:\/\/www.hiig.de\/hadi-asghari-dr\/\">Hadi Asghari<\/a><\/p>\n\n\n\n<p><strong>Imagine waking up one morning to find that your favourite online service has been subject to an attack by hackers. The hackers have exposed confidential data from the company, including your name, address, and credit card details. Such a scenario illustrates what a data breach can mean: an unauthorised access to or release of sensitive information by malicious actors. But what steps need to be taken when such a security violation occurs? According to the General Data Protection Regulation (GDPR), an organisation (e.g., the online service) must notify the responsible data protection supervisory authority; and in a second step, notify the data subjects (e.g., you) if the data breach threatens their rights and freedoms. But does this notification requirement help protect personal data and mitigate the potential consequences of data breaches? In a <\/strong><a href=\"http:\/\/journals.ed.ac.uk\/script-ed\/article\/view\/8979\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>new paper<\/strong><\/a><strong> \u2013 written together with our colleagues No\u00ebl Bangma and Jaap-Henk Hoepman \u2013 we combine insights from different disciplines (law, information security and economics) to address the following question: What are the strengths and weaknesses of the data breach notification obligation in the GDPR given its objectives? In this blog post, we summarise the main points of the paper.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The GDPR and data breaches<\/strong><\/h2>\n\n\n\n<p>The GDPR\u2019s obligation to notify data breaches can be summarised as follows. Under <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/HTML\/?uri=CELEX:32016R0679#d1e3434-1-1\" target=\"_blank\" rel=\"noreferrer noopener\">article 33<\/a>, the data controller must report a breach to the data protection supervisory authority, unless the breach is unlikely to result in risks for people. Under <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/HTML\/?uri=CELEX:32016R0679#d1e3490-1-1\" target=\"_blank\" rel=\"noreferrer noopener\">article 34<\/a>, a controller must notify a data breach to the data subject, when the breach is likely to result in a high risk to the rights and freedoms of the data subject. The controller is, in short, the organisation that determines the purposes and means of the processing of personal data; The data subject is the person whose personal data are processed.&nbsp; A data breach can have far-reaching effects for people, and can lead, for instance, to financial loss, identity fraud, damage to reputation, and other privacy harms when sensitive data is involved.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Six goals of the GDPR`s data breach notification obligation<\/strong><\/h2>\n\n\n\n<p>Through our analysis we identified six rationales for the GDPR`s data breach notification obligation, and explored for each rationale whether the obligation is likely to be useful.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. People can protect themselves<\/strong><\/h3>\n\n\n\n<p>One rationale for a breach notification obligation is that people can protect themselves after a notification. Such an obligation can, for instance, inform people to change their passwords if a controller has leaked their passwords, or block their credit card after a breach involving the leak of credit cards.&nbsp;<\/p>\n\n\n\n<p>However, some personal data is difficult to change. One\u2019s medical record can contain sensitive and high-risk data, but there is not much that people can do, if their medical data has been leaked. Additionally, many people might lack the technical knowledge to protect themselves properly against identity fraud and other risks. In sum, while breach notifications can in some cases help people protect themselves, we shouldn\u2019t have overly optimistic exceptions.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. People can choose, or switch to, competing services<\/strong><\/h3>\n\n\n\n<p>A publicly known data breach could in theory encourage customers to switch to a competitor. However, in practice, this switching argument does not hold up in many situations. For instance, if your employer or university suffers a breach, you cannot easily switch to another job or university. For many online services, switching is also difficult, especially if the usefulness of the service depends on the number of other users. And in many cases, people find it difficult or burdensome to switch.&nbsp;<\/p>\n\n\n\n<p>Another challenge for most people is that it is difficult to assess whether another controller offers better security, since there is&nbsp; information asymmetry regarding the security practices of controllers.&nbsp;<\/p>\n\n\n\n<p>Regardless of our criticism, notification obligations can be useful for those consumers who are willing and able to switch to another company after a data breach.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Incentivising organisations to improve security<\/strong><\/h3>\n\n\n\n<p>A notification obligation could stimulate controllers to focus on better data security, as reported data breaches cause negative publicity. <a href=\"https:\/\/weis2019.econinfosec.org\/wp-content\/uploads\/sites\/6\/2019\/05\/WEIS_2019_paper_33.pdf\">Murcian-Goroff<\/a> found such better security practices in California, after that state adopted the world\u2019s first data breach notification law. In Europe too, it appears that controllers started to take data security more seriously after the GDPR was adopted. However, it is difficult to distinguish the effects of the GDPR in general, and the effects of its data breach notification requirements.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. The data breach notification obligation enables regulators to perform their functions<\/strong><\/h3>\n\n\n\n<p>A fourth rationale for the notification obligation is that it enables data protection supervisory authority to do their job. (Each EU member state has its own data protection supervisory authority, and in Germany, every <a href=\"https:\/\/www.datenschutz-berlin.de\/\">state<\/a> has its own authority). First, the supervisory authority can provide a second opinion if a controller decided not to notify the data subject. (If the authority considers the personal data breach to be of high risk, then they may require the controller to communicate the breach to the data subject, regardless of the opinion of the controller.) Second, the notifications give supervisory authorities information about security risks in the society. For instance, that many data breaches occur in a certain sector.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>5. Improving transparency and accountability<\/strong><\/h3>\n\n\n\n<p>A data breach notification obligation can help improve transparency towards the data subjects and the data protection supervisory authorities. However, as discussed next, the GDPR could have contributed more to transparency.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>6. Generating statistics<\/strong><\/h3>\n\n\n\n<p>A data breach notification obligation enables authorities to compile and publish statistics about data breaches. The European Data Protection Board (EDPB) already publishes some data: it sometimes reports on the number of data breaches that have been notified to the supervisory authorities. But more transparency would be welcome and we recommend that European supervisory authorities and the Board make more statistics and information available for researchers and others. Building on the data published by the <a href=\"https:\/\/edpb.europa.eu\/our-work-tools\/our-documents\/other\/contribution-edpb-evaluation-gdpr-under-article-97_en\">EDPB<\/a>, we calculated the number of breach notifications per hundred thousand firms, for all EU member states (except Greece) between May 2018 and November 2019. The results span quite a wide range&nbsp; from under 200 (Italy, Spain, Romania),&nbsp; to over 7,000 (Denmark, Ireland, Netherlands) breach notifications per 100,000 firms in the specified time period. The figure for Germany is around 3,000 breach notifications per 100,000 firms. Such a large difference is somewhat puzzling. A higher ratio does not necessarily reflect a worse security situation; it can also indicate better breach detection capabilities, and a more cautious business culture that prefers to over-report.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion<\/strong> on the data breach notification <\/h2>\n\n\n\n<p>Our main conclusion is that the GDPR\u2019s data breach rules are likely to contribute to the six goals. For instance, the data breach notification obligation can nudge organisations towards better security; such an obligation enables regulators to perform their duties; and such an obligation improves transparency and accountability.&nbsp;<\/p>\n\n\n\n<p>However, we also warn that we should not have unrealistic expectations of the possibilities for people to protect their interests after a data breach notice. Likewise, we should not have high expectations of people switching to other service providers after receiving a data breach notification.&nbsp;<\/p>\n\n\n\n<p>Lastly, we call upon data protection supervisory authorities to publish more information about data breaches that have been reported to them. Such information enables research and better policy making regarding data security.&nbsp;<\/p>\n\n\n\n<p>For more details, please check out <a href=\"http:\/\/journals.ed.ac.uk\/script-ed\/article\/view\/8979\" target=\"_blank\" rel=\"noreferrer noopener\">our paper<\/a> which is available without a paywall.&nbsp;<\/p>\n<div class=\"shariff shariff-align-flex-start shariff-widget-align-flex-start\"><ul class=\"shariff-buttons theme-round orientation-horizontal buttonsize-medium\"><li class=\"shariff-button linkedin shariff-nocustomcolor\" style=\"background-color:#1488bf\"><a href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fwww.hiig.de%2Fen%2Fdata-breach-notification%2F\" title=\"Share on LinkedIn\" aria-label=\"Share on LinkedIn\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0077b5; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 27 32\"><path fill=\"#0077b5\" d=\"M6.2 11.2v17.7h-5.9v-17.7h5.9zM6.6 5.7q0 1.3-0.9 2.2t-2.4 0.9h0q-1.5 0-2.4-0.9t-0.9-2.2 0.9-2.2 2.4-0.9 2.4 0.9 0.9 2.2zM27.4 18.7v10.1h-5.9v-9.5q0-1.9-0.7-2.9t-2.3-1.1q-1.1 0-1.9 0.6t-1.2 1.5q-0.2 0.5-0.2 1.4v9.9h-5.9q0-7.1 0-11.6t0-5.3l0-0.9h5.9v2.6h0q0.4-0.6 0.7-1t1-0.9 1.6-0.8 2-0.3q3 0 4.9 2t1.9 6z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button bluesky shariff-nocustomcolor\" style=\"background-color:#84c4ff\"><a href=\"https:\/\/bsky.app\/intent\/compose?text=Data%20breaches%3A%20Does%20the%20GDPR%20help%3F https%3A%2F%2Fwww.hiig.de%2Fen%2Fdata-breach-notification%2F  via @hiigberlin.bsky.social\" title=\"Share on Bluesky\" aria-label=\"Share on Bluesky\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#0085ff; color:#fff\" target=\"_blank\"><span class=\"shariff-icon\" style=\"\"><svg width=\"20\" height=\"20\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 20 20\"><path class=\"st0\" d=\"M4.89,3.12c2.07,1.55,4.3,4.71,5.11,6.4.82-1.69,3.04-4.84,5.11-6.4,1.49-1.12,3.91-1.99,3.91.77,0,.55-.32,4.63-.5,5.3-.64,2.3-2.99,2.89-5.08,2.54,3.65.62,4.58,2.68,2.57,4.74-3.81,3.91-5.48-.98-5.9-2.23-.08-.23-.11-.34-.12-.25,0-.09-.04.02-.12.25-.43,1.25-2.09,6.14-5.9,2.23-2.01-2.06-1.08-4.12,2.57-4.74-2.09.36-4.44-.23-5.08-2.54-.19-.66-.5-4.74-.5-5.3,0-2.76,2.42-1.89,3.91-.77h0Z\"\/><\/svg><\/span><\/a><\/li><li class=\"shariff-button mailto shariff-nocustomcolor\" style=\"background-color:#a8a8a8\"><a href=\"mailto:?body=https%3A%2F%2Fwww.hiig.de%2Fen%2Fdata-breach-notification%2F&subject=Data%20breaches%3A%20Does%20the%20GDPR%20help%3F\" title=\"Send by email\" aria-label=\"Send by email\" role=\"button\" rel=\"noopener nofollow\" class=\"shariff-link\" style=\"; background-color:#999; color:#fff\"><span class=\"shariff-icon\" style=\"\"><svg width=\"32px\" height=\"20px\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 32 32\"><path fill=\"#999\" d=\"M32 12.7v14.2q0 1.2-0.8 2t-2 0.9h-26.3q-1.2 0-2-0.9t-0.8-2v-14.2q0.8 0.9 1.8 1.6 6.5 4.4 8.9 6.1 1 0.8 1.6 1.2t1.7 0.9 2 0.4h0.1q0.9 0 2-0.4t1.7-0.9 1.6-1.2q3-2.2 8.9-6.1 1-0.7 1.8-1.6zM32 7.4q0 1.4-0.9 2.7t-2.2 2.2q-6.7 4.7-8.4 5.8-0.2 0.1-0.7 0.5t-1 0.7-0.9 0.6-1.1 0.5-0.9 0.2h-0.1q-0.4 0-0.9-0.2t-1.1-0.5-0.9-0.6-1-0.7-0.7-0.5q-1.6-1.1-4.7-3.2t-3.6-2.6q-1.1-0.7-2.1-2t-1-2.5q0-1.4 0.7-2.3t2.1-0.9h26.3q1.2 0 2 0.8t0.9 2z\"\/><\/svg><\/span><\/a><\/li><\/ul><\/div>","protected":false},"excerpt":{"rendered":"<p>What are the strengths and weaknesses of the data breach notification obligation in the GDPR given its objectives?<\/p>\n","protected":false},"author":347,"featured_media":96778,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1658],"tags":[],"class_list":["post-96771","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ftif-data-governance-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>GDPR\u2019s Rules on Data Breach Notifications &#8211; Digital Society Blog<\/title>\n<meta name=\"description\" content=\"What are the strengths and weaknesses of the data breach notification obligation in the GDPR given its objectives?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hiig.de\/en\/data-breach-notification\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GDPR\u2019s Rules on Data Breach Notifications &#8211; Digital Society Blog\" \/>\n<meta property=\"og:description\" content=\"What are the strengths and weaknesses of the data breach notification obligation in the GDPR given its objectives?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hiig.de\/en\/data-breach-notification\/\" \/>\n<meta property=\"og:site_name\" content=\"HIIG\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-08T13:11:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-05T12:49:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/09\/Data-Breach-GDPR-Datenschutzverletzung-DSGVO.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Frederik Efferenn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Frederik Efferenn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"GDPR\u2019s Rules on Data Breach Notifications &#8211; Digital Society Blog","description":"What are the strengths and weaknesses of the data breach notification obligation in the GDPR given its objectives?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hiig.de\/en\/data-breach-notification\/","og_locale":"en_US","og_type":"article","og_title":"GDPR\u2019s Rules on Data Breach Notifications &#8211; Digital Society Blog","og_description":"What are the strengths and weaknesses of the data breach notification obligation in the GDPR given its objectives?","og_url":"https:\/\/www.hiig.de\/en\/data-breach-notification\/","og_site_name":"HIIG","article_published_time":"2023-09-08T13:11:50+00:00","article_modified_time":"2024-08-05T12:49:58+00:00","og_image":[{"width":800,"height":450,"url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/09\/Data-Breach-GDPR-Datenschutzverletzung-DSGVO.png","type":"image\/png"}],"author":"Frederik Efferenn","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Frederik Efferenn","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hiig.de\/en\/data-breach-notification\/#article","isPartOf":{"@id":"https:\/\/www.hiig.de\/en\/data-breach-notification\/"},"author":{"name":"Frederik Efferenn","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/42269f2579783653bb3f7bfa6dea3663"},"headline":"Data breaches: Does the GDPR help?","datePublished":"2023-09-08T13:11:50+00:00","dateModified":"2024-08-05T12:49:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hiig.de\/en\/data-breach-notification\/"},"wordCount":1233,"publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"image":{"@id":"https:\/\/www.hiig.de\/en\/data-breach-notification\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/09\/Data-Breach-GDPR-Datenschutzverletzung-DSGVO.png","articleSection":["ftif Data Governance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.hiig.de\/en\/data-breach-notification\/","url":"https:\/\/www.hiig.de\/en\/data-breach-notification\/","name":"GDPR\u2019s Rules on Data Breach Notifications &#8211; Digital Society Blog","isPartOf":{"@id":"https:\/\/www.hiig.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hiig.de\/en\/data-breach-notification\/#primaryimage"},"image":{"@id":"https:\/\/www.hiig.de\/en\/data-breach-notification\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/09\/Data-Breach-GDPR-Datenschutzverletzung-DSGVO.png","datePublished":"2023-09-08T13:11:50+00:00","dateModified":"2024-08-05T12:49:58+00:00","description":"What are the strengths and weaknesses of the data breach notification obligation in the GDPR given its objectives?","breadcrumb":{"@id":"https:\/\/www.hiig.de\/en\/data-breach-notification\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hiig.de\/en\/data-breach-notification\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/en\/data-breach-notification\/#primaryimage","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/09\/Data-Breach-GDPR-Datenschutzverletzung-DSGVO.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2023\/09\/Data-Breach-GDPR-Datenschutzverletzung-DSGVO.png","width":800,"height":450,"caption":"What are the strengths and weaknesses of the data breach notification obligation in the GDPR given its objectives?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hiig.de\/en\/data-breach-notification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hiig.de\/en\/"},{"@type":"ListItem","position":2,"name":"Data breaches: Does the GDPR help?"}]},{"@type":"WebSite","@id":"https:\/\/www.hiig.de\/#website","url":"https:\/\/www.hiig.de\/","name":"HIIG","description":"Alexander von Humboldt Institute for Internet and Society","publisher":{"@id":"https:\/\/www.hiig.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hiig.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hiig.de\/#organization","name":"HIIG","url":"https:\/\/www.hiig.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","contentUrl":"https:\/\/www.hiig.de\/wp-content\/uploads\/2019\/06\/hiig.png","width":320,"height":80,"caption":"HIIG"},"image":{"@id":"https:\/\/www.hiig.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.hiig.de\/#\/schema\/person\/42269f2579783653bb3f7bfa6dea3663","name":"Frederik Efferenn"}]}},"_links":{"self":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/96771","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/users\/347"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/comments?post=96771"}],"version-history":[{"count":9,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/96771\/revisions"}],"predecessor-version":[{"id":103135,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/posts\/96771\/revisions\/103135"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media\/96778"}],"wp:attachment":[{"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/media?parent=96771"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/categories?post=96771"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hiig.de\/en\/wp-json\/wp\/v2\/tags?post=96771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}