{"id":956,"date":"2021-09-22T16:46:25","date_gmt":"2021-09-22T14:46:25","guid":{"rendered":"https:\/\/www.privacy-advice.com\/?page_id=956"},"modified":"2022-09-22T16:54:13","modified_gmt":"2022-09-22T14:54:13","slug":"it-security","status":"publish","type":"page","link":"https:\/\/www.privacy-advice.com\/en\/services\/it-security\/","title":{"rendered":"IT Security"},"content":{"rendered":"<div class=\"block block--header bg--blue  wp-block-acf-header with-image\">\r\n\r\n\t<picture>\r\n        <source \r\n            media=\"(min-width: 641px)\" \r\n            srcset=\"https:\/\/www.privacy-advice.com\/wp-content\/uploads\/dpa-header-bild-2400x1158.jpg 2400w,\r\n                https:\/\/www.privacy-advice.com\/wp-content\/uploads\/dpa-header-bild-1920x927.jpg 1920w,\r\n                https:\/\/www.privacy-advice.com\/wp-content\/uploads\/dpa-header-bild-1600x772.jpg 1600w,\r\n                https:\/\/www.privacy-advice.com\/wp-content\/uploads\/dpa-header-bild-1400x676.jpg 1400w,\r\n                https:\/\/www.privacy-advice.com\/wp-content\/uploads\/dpa-header-bild-1200x579.jpg 1200w,\r\n                https:\/\/www.privacy-advice.com\/wp-content\/uploads\/dpa-header-bild-1024x494.jpg 1024w\"\r\n            sizes=\"100vw\">\r\n            <source \r\n                media=\"(max-width: 640px)\" \r\n                srcset=\"https:\/\/www.privacy-advice.com\/wp-content\/uploads\/header-m.jpg 1200w,\r\n                        https:\/\/www.privacy-advice.com\/wp-content\/uploads\/header-m-1024x597.jpg 1024w,\r\n                         https:\/\/www.privacy-advice.com\/wp-content\/uploads\/header-m-800x467.jpg 800w\"\r\n                sizes=\"100vw\">  \r\n        <img decoding=\"async\" \r\n            src=\"https:\/\/www.privacy-advice.com\/wp-content\/uploads\/dpa-header-bild-1600x772.jpg\"\r\n            alt=\"IT Security\" loading=\"lazy\">\r\n    <\/picture>\r\n\r\n\r\n    \r\n        <div class=\"container\">\r\n\r\n            <div class=\"flex flexgrid--gutter flex--wrap spacing relative\">\r\n                <div class=\"flex__item one-half sm-one-whole flex flex--middle\">\r\n                    <div class=\"one-whole\">\r\n                        <h1>IT Security<\/h1>\r\n                        <p>We take care of IT security consulting as well as the review of your IT security documents.<\/p>\n                    <\/div>\r\n                <\/div>\r\n                                    <div class=\"flex__item one-half sm-one-whole\">\r\n                        <div class=\"relative\">\r\n                            <figure>\r\n                                <img decoding=\"async\" src=\"https:\/\/www.privacy-advice.com\/wp-content\/uploads\/it-sicherheit-540x360.jpg\"\r\n                                    srcset=\"https:\/\/www.privacy-advice.com\/wp-content\/uploads\/it-sicherheit-1024x683.jpg 1024w,\r\n                                            https:\/\/www.privacy-advice.com\/wp-content\/uploads\/it-sicherheit-800x533.jpg 800w,\r\n                                            https:\/\/www.privacy-advice.com\/wp-content\/uploads\/it-sicherheit-540x360.jpg 540w\"\r\n                                    alt=\"IT Security\" loading=\"lazy\" \r\n                                    width=\"1080\" height=\"720\" \r\n                                    sizes=\"auto, (min-width:1201px) 540px, (max-width:1200px) and (min-width:641px) 46vw, 96vw\" \/>\r\n                                                            <\/figure>\r\n                        <\/div>\r\n                    <\/div>\r\n                             <\/div>\r\n        <\/div>\r\n        \r\n       \r\n<\/div>\r\n\r\n\r\n<div class=\"block--breadcrumbs\">\r\n    <div class=\"container\">\r\n        <nav class=\"breadcrumbs\"><ol><li><a href=\"https:\/\/www.privacy-advice.com\/en\/\">Homepage<\/a><\/li><\/ol><\/nav>    <\/div>\r\n<\/div>\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<div class=\"container con--heading\">\n<h2 class=\"wp-block-heading\">The IT security consulting of DPA<\/h2>\n<\/div><div class=\"container con--para\">\n<p>Compliance with IT security standards is an essential aspect of ensuring data protection in the company. A breach of these requirements that results in unauthorized disclosure of personal data requires notification to the supervisory authority within 72 hours.  <\/p>\n<\/div><div class=\"container con--para\">\n<p>Together with you, we develop strategies to prevent this from happening. We are also your partner when it comes to implementing appropriate processes to ensure IT security in the company.  <\/p>\n<\/div><div class=\"container con--para\">\n<p>Our IT security consulting is based on recognized criteria. <a href=\"https:\/\/www.privacy-advice.com\/en\/about-us\/our-employees\/\">Experts from DPA Drewes Privacy Advice<\/a> have the corresponding certification from the German Federal Office for Information Security (BSI).  <\/p>\n<\/div><div class=\"block block--anchors wp-block-acf-anchor-links\">   \r\n\r\n\r\n    <div class=\"container spacing\">\r\n        <div class=\"padding-top--small \">\r\n            <h2 class=\"margin-bottom\">Overview of services in the area of IT security<\/h2>\r\n        <\/div>\r\n   \r\n\r\n        \r\n            <a href=\"#go-to-it safety concept\" class=\"link--anchor flex flex--middle\">\r\n                <img decoding=\"async\" src=\"https:\/\/www.privacy-advice.com\/wp-content\/uploads\/icon-it-sicherheit.svg\" alt=\"IT security concept\" loading=\"lazy\" \/>\r\n                <div class=\"link__headline flex1\">\r\n                    IT security concept                <\/div>\r\n                <div class=\"link__action\">\r\n                    More information                    <i class=\"icon-arrow-down\"><\/i>\r\n                <\/div>\r\n            <\/a>\r\n\r\n        \r\n            <a href=\"#go-to-it safety audits\" class=\"link--anchor flex flex--middle\">\r\n                <img decoding=\"async\" src=\"https:\/\/www.privacy-advice.com\/wp-content\/uploads\/icon-it-sicherheit.svg\" alt=\"IT security audits\" loading=\"lazy\" \/>\r\n                <div class=\"link__headline flex1\">\r\n                    IT security audits                <\/div>\r\n                <div class=\"link__action\">\r\n                    More information                    <i class=\"icon-arrow-down\"><\/i>\r\n                <\/div>\r\n            <\/a>\r\n\r\n        \r\n            <a href=\"#go-to-it-safety-documentation\" class=\"link--anchor flex flex--middle\">\r\n                <img decoding=\"async\" src=\"https:\/\/www.privacy-advice.com\/wp-content\/uploads\/icon-it-sicherheit.svg\" alt=\"IT security documentation\" loading=\"lazy\" \/>\r\n                <div class=\"link__headline flex1\">\r\n                    IT security documentation                <\/div>\r\n                <div class=\"link__action\">\r\n                    More information                    <i class=\"icon-arrow-down\"><\/i>\r\n                <\/div>\r\n            <\/a>\r\n\r\n        \r\n            <a href=\"#go-to-it safety training\" class=\"link--anchor flex flex--middle\">\r\n                <img decoding=\"async\" src=\"https:\/\/www.privacy-advice.com\/wp-content\/uploads\/icon-it-sicherheit.svg\" alt=\"IT security briefing\" loading=\"lazy\" \/>\r\n                <div class=\"link__headline flex1\">\r\n                    IT security briefing                <\/div>\r\n                <div class=\"link__action\">\r\n                    More information                    <i class=\"icon-arrow-down\"><\/i>\r\n                <\/div>\r\n            <\/a>\r\n\r\n        \r\n\r\n    <\/div>\r\n<\/div>\r\n\r\n\r\n\r\n\r\n\r\n<div class=\"container con--heading\">\n<h2 class=\"go-to-it-sicherheitskonzept wp-block-heading\">IT security concept<\/h2>\n<\/div><div class=\"container con--para\">\n<p>We show you which IT security requirements your company must fulfill according to the GDPR. After taking stock of the situation, we can determine the relevant protection levels and discuss with you what measures need to be taken according to the state of the art. On this basis, we develop an appropriate IT security concept for you.<\/p>\n<\/div><div class=\"container con--heading\">\n<h2 class=\"go-to-it-sicherheitsaudits wp-block-heading\">IT security audits<\/h2>\n<\/div><div class=\"container con--para\">\n<p>Under the GDPR, companies must implement a process whereby IT security measures are regularly monitored. Here we support companies and carry out such IT security audits at the company itself, but also at the service providers commissioned by companies. We check whether the company complies with the requirements of Art. 32 of the GDPR, prepare a corresponding audit report and make recommendations as to which measures need to be taken.<\/p>\n<\/div>\r\n\r\n<div class=\"block block--cta flex flex--middle wp-block-acf-cta icon-bigger\">\r\n                            \r\n    <picture>\r\n        <source \r\n            media=\"(min-width: 641px)\" \r\n            srcset=\"https:\/\/www.privacy-advice.com\/wp-content\/uploads\/dpa-call-to-action-background-2400x500.jpg 2400w,\r\n                https:\/\/www.privacy-advice.com\/wp-content\/uploads\/dpa-call-to-action-background-1920x400.jpg 1920w,\r\n                https:\/\/www.privacy-advice.com\/wp-content\/uploads\/dpa-call-to-action-background-1600x333.jpg 1600w,\r\n                https:\/\/www.privacy-advice.com\/wp-content\/uploads\/dpa-call-to-action-background-1400x292.jpg 1400w,\r\n                https:\/\/www.privacy-advice.com\/wp-content\/uploads\/dpa-call-to-action-background-1200x250.jpg 1200w,\r\n                https:\/\/www.privacy-advice.com\/wp-content\/uploads\/dpa-call-to-action-background-1024x213.jpg 1024w\"\r\n            sizes=\"100vw\">\r\n            <source \r\n                media=\"(max-width: 640px)\" \r\n                srcset=\"https:\/\/www.privacy-advice.com\/wp-content\/uploads\/dpa-call-to-action-background-1200x250.jpg 1200w,\r\n                        https:\/\/www.privacy-advice.com\/wp-content\/uploads\/dpa-call-to-action-background-1024x213.jpg 1024w,\r\n                         https:\/\/www.privacy-advice.com\/wp-content\/uploads\/dpa-call-to-action-background-800x167.jpg 800w\"\r\n                sizes=\"100vw\">  \r\n        <img decoding=\"async\" \r\n            src=\"https:\/\/www.privacy-advice.com\/wp-content\/uploads\/dpa-call-to-action-background-1600x333.jpg\"\r\n            alt=\"DPA | Call-to-Action Hintergrund\" loading=\"lazy\">\r\n    <\/picture>\r\n\r\n    <div class=\"one-whole spacing\">\r\n        <div class=\"container relative\">\r\n                            <a href=\"https:\/\/www.privacy-advice.com\/de\/kontakt\/\" target=\"_self\">\r\n                            <img decoding=\"async\" src=\"https:\/\/www.privacy-advice.com\/wp-content\/uploads\/p.svg\" \r\n                    alt=\"\" loading=\"lazy\" \/>\r\n                            <\/a>\r\n            \r\n            <div class=\"flex flexgrid--gutter flex--wrap flex--middle\">\r\n                <div class=\"flex__item\">\r\n                    <div class=\"left\">\r\n                                                                                    <a href=\"https:\/\/www.privacy-advice.com\/de\/kontakt\/\" target=\"_self\">\r\n                                                            <h2 class=\"gamma\">Arrange a consultation appointment with us<\/h2>\r\n                                                             <\/a>\r\n                                                       \r\n                        <p>Do you need support in the area of IT security in your company? We will be happy to provide you with an offer tailored to your needs.<\/p>\r\n                    <\/div>\r\n                <\/div>\r\n                <div class=\"right flex__item\">\r\n                                            <a href=\"https:\/\/www.privacy-advice.com\/de\/kontakt\/\" target=\"_self\" class=\"btn btn--white\">\r\n                            Contact us                        <\/a>\r\n                                    <\/div>\r\n            <\/div>\r\n        <\/div>\r\n    <\/div> \r\n\r\n\r\n<\/div><div class=\"container con--heading\">\n<h2 class=\"go-to-it-sicherheitsdokumentation wp-block-heading\">IT security documentation<\/h2>\n<\/div><div class=\"container con--para\">\n<p>Compliance with documentation requirements is an important part of the IT security process. Numerous regulations require comprehensive documentation of existing IT security measures. Not only the IT security policy, but also higher-level documents such as the emergency preparedness concept or specialist concepts for the firewall must be available in the company. We are happy to assist in the preparation of these documents.<\/p>\n<\/div><div class=\"container con--heading\">\n<h2 class=\"go-to-it-sicherheitsunterweisung wp-block-heading\">IT security briefing<\/h2>\n<\/div><div class=\"container con--para\">\n<p>Employee awareness is a very important aspect in preventing IT security breaches. Predominantly, IT security breaches take place due to negligence or simply ignorance. Therefore, instruction in the area of IT security is a very essential aspect of avoiding a breach of IT security standards.<\/p>\n<\/div><div class=\"container con--para\">\n<p><\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>The IT security consulting of DPA Compliance with IT security standards is an essential aspect of ensuring data protection in the company. A breach of these requirements that results in unauthorized disclosure of personal data requires notification to the supervisory authority within 72 hours. Together with you, we develop strategies to prevent this from happening. [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":1364,"parent":954,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-956","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT Security &#8211; DPA Drewes Privacy Advice<\/title>\n<meta name=\"description\" content=\"In the area of IT security, we cover IT security consulting and review IT security documents. \u2794 Learn more!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.privacy-advice.com\/en\/services\/it-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Security &#8211; DPA Drewes Privacy Advice\" \/>\n<meta property=\"og:description\" content=\"In the area of IT security, we cover IT security consulting and review IT security documents. \u2794 Learn more!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.privacy-advice.com\/en\/services\/it-security\/\" \/>\n<meta property=\"og:site_name\" content=\"DPA Drewes Privacy Advice\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-22T14:54:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.privacy-advice.com\/wp-content\/uploads\/it-sicherheit.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.privacy-advice.com\\\/en\\\/services\\\/it-security\\\/\",\"url\":\"https:\\\/\\\/www.privacy-advice.com\\\/en\\\/services\\\/it-security\\\/\",\"name\":\"IT Security &#8211; DPA Drewes Privacy Advice\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.privacy-advice.com\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.privacy-advice.com\\\/en\\\/services\\\/it-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.privacy-advice.com\\\/en\\\/services\\\/it-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.privacy-advice.com\\\/wp-content\\\/uploads\\\/it-sicherheit.jpg\",\"datePublished\":\"2021-09-22T14:46:25+00:00\",\"dateModified\":\"2022-09-22T14:54:13+00:00\",\"description\":\"In the area of IT security, we cover IT security consulting and review IT security documents. \u2794 Learn more!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.privacy-advice.com\\\/en\\\/services\\\/it-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.privacy-advice.com\\\/en\\\/services\\\/it-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.privacy-advice.com\\\/en\\\/services\\\/it-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.privacy-advice.com\\\/wp-content\\\/uploads\\\/it-sicherheit.jpg\",\"contentUrl\":\"https:\\\/\\\/www.privacy-advice.com\\\/wp-content\\\/uploads\\\/it-sicherheit.jpg\",\"width\":1080,\"height\":720,\"caption\":\"IT-Sicherheit\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.privacy-advice.com\\\/en\\\/services\\\/it-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.privacy-advice.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\\\/\\\/www.privacy-advice.com\\\/en\\\/services\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IT Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.privacy-advice.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/www.privacy-advice.com\\\/de\\\/\",\"name\":\"DPA Drewes Privacy Advice\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.privacy-advice.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.privacy-advice.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.privacy-advice.com\\\/de\\\/#organization\",\"name\":\"DPA Drewes Privacy Advice GmbH\",\"url\":\"https:\\\/\\\/www.privacy-advice.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.privacy-advice.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.privacy-advice.com\\\/wp-content\\\/uploads\\\/dpa-logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.privacy-advice.com\\\/wp-content\\\/uploads\\\/dpa-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"DPA Drewes Privacy Advice GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/www.privacy-advice.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Security &#8211; DPA Drewes Privacy Advice","description":"In the area of IT security, we cover IT security consulting and review IT security documents. \u2794 Learn more!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.privacy-advice.com\/en\/services\/it-security\/","og_locale":"en_US","og_type":"article","og_title":"IT Security &#8211; DPA Drewes Privacy Advice","og_description":"In the area of IT security, we cover IT security consulting and review IT security documents. \u2794 Learn more!","og_url":"https:\/\/www.privacy-advice.com\/en\/services\/it-security\/","og_site_name":"DPA Drewes Privacy Advice","article_modified_time":"2022-09-22T14:54:13+00:00","og_image":[{"width":1080,"height":720,"url":"https:\/\/www.privacy-advice.com\/wp-content\/uploads\/it-sicherheit.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.privacy-advice.com\/en\/services\/it-security\/","url":"https:\/\/www.privacy-advice.com\/en\/services\/it-security\/","name":"IT Security &#8211; DPA Drewes Privacy Advice","isPartOf":{"@id":"https:\/\/www.privacy-advice.com\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.privacy-advice.com\/en\/services\/it-security\/#primaryimage"},"image":{"@id":"https:\/\/www.privacy-advice.com\/en\/services\/it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.privacy-advice.com\/wp-content\/uploads\/it-sicherheit.jpg","datePublished":"2021-09-22T14:46:25+00:00","dateModified":"2022-09-22T14:54:13+00:00","description":"In the area of IT security, we cover IT security consulting and review IT security documents. \u2794 Learn more!","breadcrumb":{"@id":"https:\/\/www.privacy-advice.com\/en\/services\/it-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.privacy-advice.com\/en\/services\/it-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.privacy-advice.com\/en\/services\/it-security\/#primaryimage","url":"https:\/\/www.privacy-advice.com\/wp-content\/uploads\/it-sicherheit.jpg","contentUrl":"https:\/\/www.privacy-advice.com\/wp-content\/uploads\/it-sicherheit.jpg","width":1080,"height":720,"caption":"IT-Sicherheit"},{"@type":"BreadcrumbList","@id":"https:\/\/www.privacy-advice.com\/en\/services\/it-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.privacy-advice.com\/en\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/www.privacy-advice.com\/en\/services\/"},{"@type":"ListItem","position":3,"name":"IT Security"}]},{"@type":"WebSite","@id":"https:\/\/www.privacy-advice.com\/de\/#website","url":"https:\/\/www.privacy-advice.com\/de\/","name":"DPA Drewes Privacy Advice","description":"","publisher":{"@id":"https:\/\/www.privacy-advice.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.privacy-advice.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.privacy-advice.com\/de\/#organization","name":"DPA Drewes Privacy Advice GmbH","url":"https:\/\/www.privacy-advice.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.privacy-advice.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/www.privacy-advice.com\/wp-content\/uploads\/dpa-logo.svg","contentUrl":"https:\/\/www.privacy-advice.com\/wp-content\/uploads\/dpa-logo.svg","width":1,"height":1,"caption":"DPA Drewes Privacy Advice GmbH"},"image":{"@id":"https:\/\/www.privacy-advice.com\/de\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.privacy-advice.com\/en\/wp-json\/wp\/v2\/pages\/956","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.privacy-advice.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.privacy-advice.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.privacy-advice.com\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.privacy-advice.com\/en\/wp-json\/wp\/v2\/comments?post=956"}],"version-history":[{"count":5,"href":"https:\/\/www.privacy-advice.com\/en\/wp-json\/wp\/v2\/pages\/956\/revisions"}],"predecessor-version":[{"id":2297,"href":"https:\/\/www.privacy-advice.com\/en\/wp-json\/wp\/v2\/pages\/956\/revisions\/2297"}],"up":[{"embeddable":true,"href":"https:\/\/www.privacy-advice.com\/en\/wp-json\/wp\/v2\/pages\/954"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.privacy-advice.com\/en\/wp-json\/wp\/v2\/media\/1364"}],"wp:attachment":[{"href":"https:\/\/www.privacy-advice.com\/en\/wp-json\/wp\/v2\/media?parent=956"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}