{"id":2154,"date":"2018-05-18T12:33:19","date_gmt":"2018-05-18T07:03:19","guid":{"rendered":"https:\/\/codelattice.com\/blog\/?p=2154"},"modified":"2021-06-09T15:35:05","modified_gmt":"2021-06-09T10:05:05","slug":"data-breach-privacy-and-the-future-of-personalization","status":"publish","type":"post","link":"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/","title":{"rendered":"Data breach, privacy and the future of personalization"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Internet, which some 10-15 years back was a new pass time in our lives, has eventually become our\u00a0<\/span><span style=\"font-weight: 400;\">life. From something that we used 15-20 minutes a day, it has become our lifeline today. Consumers\u00a0<\/span><span style=\"font-weight: 400;\">have always been concerned about their privacy since the early days of world wide web and with\u00a0<\/span><span style=\"font-weight: 400;\">recent news articles about data breaches, more so. The Cambridge Analytica, Facebook, eBay,\u00a0<\/span><span style=\"font-weight: 400;\">Aadhaar, Uber, MyFitnessPal and Yahoo are some of the biggest data leaks of recent times. A recent\u00a0<\/span><span style=\"font-weight: 400;\">survey conducted shows that only 9% of the people are very confident that social media companies\u00a0<\/span><span style=\"font-weight: 400;\">would protect their data [by Pew Research Center].<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">User personalization is the hot topic these days. With such huge data leaks, what could be the future\u00a0<\/span><span style=\"font-weight: 400;\">of personalization? A survey by Accenture shows that among 25.996 respondents from 26 countries,\u00a0<\/span><span style=\"font-weight: 400;\">approximately more than 50% of people are intended on purchasing smart phones for personalized\u00a0<\/span><span style=\"font-weight: 400;\">services. Other surveys too indicate that, people are supportive of personalization if it involves great\u00a0<\/span><span style=\"font-weight: 400;\">experience and ease of usage.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The future still looks bright. But for organizations to build data trust and customer loyalty, it will\u00a0<\/span><span style=\"font-weight: 400;\">come down to the following things<\/span><\/p>\n<ol>\n<li><span style=\"font-weight: 400;\"> Data privacy audit: Understand what data is needed for your business and what data you are\u00a0<\/span>collecting from your users. The data storage and security measures need to be reviewed and legal obligations have to be understood if you are handling data such as financial or medical.\u00a0Many a times, the company handling your digital assets or analytics pulls more data than is required by you. Hence the need for this audit.<\/li>\n<\/ol>\n<ol start=\"2\">\n<li><span style=\"font-weight: 400;\"> Minimize data: Once you do an audit, you will be able to tell what data is not required. We\u00a0<\/span>tend to collect such data thinking that we might need them in future. But doing so poses a risk. So collect only what you need and store only that.<\/li>\n<\/ol>\n<ol start=\"3\">\n<li><span style=\"font-weight: 400;\"> Secure the data: Even though you might be collecting trivial information, make sure you\u00a0<\/span>secure the data, network, website and apps. You never know how this information could be used by fraudsters.<\/li>\n<\/ol>\n<ol start=\"4\">\n<li><span style=\"font-weight: 400;\"> Find customer data comfort zone: Every customer is different and each one has their own\u00a0<\/span>comfort zone. So don&amp;#39;t make any assumptions or generalize on their behalf. Take their feedback on what they would find comfortable sharing and what they consider as private.<\/li>\n<\/ol>\n<ol start=\"5\">\n<li><span style=\"font-weight: 400;\"> Ask permission: When you start collecting information, inform your customers about the\u00a0<\/span>data you are collecting, the purpose, security measures and ways of usage. Get their permission before you start collecting the data you need.<\/li>\n<\/ol>\n<ol start=\"7\">\n<li><span style=\"font-weight: 400;\"> Give the control to your customers: It is vital that your customers understand that they have\u00a0<\/span>control over their data and they can change the permission to their data. You have to assure them that you would stop collecting data with immediate effect if they wish so.<\/li>\n<li><span style=\"font-weight: 400;\"> Provide a complaints-feedback cell: Your customers should know how to contact you\u00a0<\/span>immediately, in case of data concerns. Give them an email\/phone number through which they can get an immediate response. Be proactive to avoid potential privacy concerns.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Internet, which some 10-15 years back was a new pass time in our lives, has eventually become our\u00a0life. From something that we used 15-20 minutes a day, it has become our lifeline today. Consumers\u00a0have always been concerned about their privacy since the early days of world wide web and with\u00a0recent news articles about data breaches, [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":2155,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[378],"tags":[],"class_list":["post-2154","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-security"],"acf":{"heading_txt":"","webp":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/05\/ezgif.com-gif-maker-39.webp"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data breach, privacy and the future of personalization - Codelattice Blog<\/title>\n<meta name=\"description\" content=\"Consumers have always been concerned about their privacy since the early days of world wide web and with recent news articles about data breaches, more so.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data breach, privacy and the future of personalization - Codelattice Blog\" \/>\n<meta property=\"og:description\" content=\"Consumers have always been concerned about their privacy since the early days of world wide web and with recent news articles about data breaches, more so.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/\" \/>\n<meta property=\"og:site_name\" content=\"Codelattice Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/codelattice\" \/>\n<meta property=\"article:author\" content=\"http:\/\/www.facebook.com\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-18T07:03:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-09T10:05:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/05\/ezgif.com-gif-maker-39.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"344\" \/>\n<meta name=\"author\" content=\"Nithya\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Data breach, privacy and the future of personalization\" \/>\n<meta name=\"twitter:description\" content=\"Consumers have always been concerned about their privacy since the early days of world wide web and with recent news articles about data breaches, more so.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/05\/ezgif.com-gif-maker-39.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@http:\/\/twitter.com\/#!\/\" \/>\n<meta name=\"twitter:site\" content=\"@Codelattice\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nithya\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/\"},\"author\":{\"name\":\"Nithya\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/b675612fa6c8f8904200fe1ed21e7f43\"},\"headline\":\"Codelattice Blog\",\"datePublished\":\"2018-05-18T07:03:19+00:00\",\"dateModified\":\"2021-06-09T10:05:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/\"},\"wordCount\":517,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/05\/data-security.jpg\",\"articleSection\":[\"Cloud &amp; Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/\",\"url\":\"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/\",\"name\":\"Data breach, privacy and the future of personalization - Codelattice Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/05\/data-security.jpg\",\"datePublished\":\"2018-05-18T07:03:19+00:00\",\"dateModified\":\"2021-06-09T10:05:05+00:00\",\"description\":\"Consumers have always been concerned about their privacy since the early days of world wide web and with recent news articles about data breaches, more so.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/#primaryimage\",\"url\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/05\/ezgif.com-gif-maker-39.webp\",\"contentUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/05\/ezgif.com-gif-maker-39.webp\",\"width\":600,\"height\":344,\"thumbnailUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/05\/ezgif.com-gif-maker-39.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.codelattice.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Codelattice Blog\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#website\",\"url\":\"https:\/\/www.codelattice.com\/blog\/\",\"name\":\"Codelattice Blog\",\"description\":\"Home\",\"publisher\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.codelattice.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#organization\",\"name\":\"Codelattice\",\"url\":\"https:\/\/www.codelattice.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/12\/cl-logo-icon.png\",\"contentUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/12\/cl-logo-icon.png\",\"width\":366,\"height\":366,\"caption\":\"Codelattice\"},\"image\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/codelattice\",\"https:\/\/x.com\/Codelattice\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/b675612fa6c8f8904200fe1ed21e7f43\",\"name\":\"Nithya\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b04adeaceb2572023cb2114e116bfe5ea1e5b89e1c2167f7e60cf8194dabf030?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b04adeaceb2572023cb2114e116bfe5ea1e5b89e1c2167f7e60cf8194dabf030?s=96&d=mm&r=g\",\"caption\":\"Nithya\"},\"description\":\"Nithya is a MARCOMM consultant at Codelattice. She is busy conquering the Kingdom of Content and blogs for Codelattice. Her interest areas include Social Media, Lifestyle and Commerce. Connect with her through nithya@codelattice.com\",\"sameAs\":[\"http:\/\/www.facebook.com\/\",\"https:\/\/www.linkedin.com\/\",\"https:\/\/x.com\/http:\/\/twitter.com\/#!\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data breach, privacy and the future of personalization - Codelattice Blog","description":"Consumers have always been concerned about their privacy since the early days of world wide web and with recent news articles about data breaches, more so.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/","og_locale":"en_US","og_type":"article","og_title":"Data breach, privacy and the future of personalization - Codelattice Blog","og_description":"Consumers have always been concerned about their privacy since the early days of world wide web and with recent news articles about data breaches, more so.","og_url":"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/","og_site_name":"Codelattice Blog","article_publisher":"https:\/\/www.facebook.com\/codelattice","article_author":"http:\/\/www.facebook.com\/","article_published_time":"2018-05-18T07:03:19+00:00","article_modified_time":"2021-06-09T10:05:05+00:00","og_image":[{"width":600,"height":344,"url":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/05\/ezgif.com-gif-maker-39.webp","type":""}],"author":"Nithya","twitter_card":"summary_large_image","twitter_title":"Data breach, privacy and the future of personalization","twitter_description":"Consumers have always been concerned about their privacy since the early days of world wide web and with recent news articles about data breaches, more so.","twitter_image":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/05\/ezgif.com-gif-maker-39.webp","twitter_creator":"@http:\/\/twitter.com\/#!\/","twitter_site":"@Codelattice","twitter_misc":{"Written by":"Nithya","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/#article","isPartOf":{"@id":"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/"},"author":{"name":"Nithya","@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/b675612fa6c8f8904200fe1ed21e7f43"},"headline":"Codelattice Blog","datePublished":"2018-05-18T07:03:19+00:00","dateModified":"2021-06-09T10:05:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/"},"wordCount":517,"commentCount":0,"publisher":{"@id":"https:\/\/www.codelattice.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/05\/data-security.jpg","articleSection":["Cloud &amp; Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/","url":"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/","name":"Data breach, privacy and the future of personalization - Codelattice Blog","isPartOf":{"@id":"https:\/\/www.codelattice.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/#primaryimage"},"image":{"@id":"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/05\/data-security.jpg","datePublished":"2018-05-18T07:03:19+00:00","dateModified":"2021-06-09T10:05:05+00:00","description":"Consumers have always been concerned about their privacy since the early days of world wide web and with recent news articles about data breaches, more so.","breadcrumb":{"@id":"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/#primaryimage","url":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/05\/ezgif.com-gif-maker-39.webp","contentUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/05\/ezgif.com-gif-maker-39.webp","width":600,"height":344,"thumbnailUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2018\/05\/ezgif.com-gif-maker-39.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.codelattice.com\/blog\/data-breach-privacy-and-the-future-of-personalization\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.codelattice.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Codelattice Blog"}]},{"@type":"WebSite","@id":"https:\/\/www.codelattice.com\/blog\/#website","url":"https:\/\/www.codelattice.com\/blog\/","name":"Codelattice Blog","description":"Home","publisher":{"@id":"https:\/\/www.codelattice.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.codelattice.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.codelattice.com\/blog\/#organization","name":"Codelattice","url":"https:\/\/www.codelattice.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/12\/cl-logo-icon.png","contentUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/12\/cl-logo-icon.png","width":366,"height":366,"caption":"Codelattice"},"image":{"@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/codelattice","https:\/\/x.com\/Codelattice"]},{"@type":"Person","@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/b675612fa6c8f8904200fe1ed21e7f43","name":"Nithya","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b04adeaceb2572023cb2114e116bfe5ea1e5b89e1c2167f7e60cf8194dabf030?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b04adeaceb2572023cb2114e116bfe5ea1e5b89e1c2167f7e60cf8194dabf030?s=96&d=mm&r=g","caption":"Nithya"},"description":"Nithya is a MARCOMM consultant at Codelattice. She is busy conquering the Kingdom of Content and blogs for Codelattice. Her interest areas include Social Media, Lifestyle and Commerce. Connect with her through nithya@codelattice.com","sameAs":["http:\/\/www.facebook.com\/","https:\/\/www.linkedin.com\/","https:\/\/x.com\/http:\/\/twitter.com\/#!\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/posts\/2154","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/comments?post=2154"}],"version-history":[{"count":4,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/posts\/2154\/revisions"}],"predecessor-version":[{"id":3681,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/posts\/2154\/revisions\/3681"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/media\/2155"}],"wp:attachment":[{"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/media?parent=2154"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/categories?post=2154"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/tags?post=2154"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}