{"id":11167,"date":"2025-03-21T10:45:35","date_gmt":"2025-03-21T14:45:35","guid":{"rendered":"https:\/\/www.dialoginsight.com\/?p=11167"},"modified":"2025-10-17T11:07:36","modified_gmt":"2025-10-17T15:07:36","slug":"data-security-the-legal-responsibilities-of-businesses","status":"publish","type":"post","link":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/","title":{"rendered":"Data Security: The Legal and Strategic Responsibilities of Businesses\u00a0\u00a0"},"content":{"rendered":"\n<p>In a digital landscape where data breaches are becoming increasingly common, businesses must take clear responsibility for securing their strategic information. It is no longer just a technical issue\u2014it is a matter of legal compliance and business trust.\u00a0\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong>Legal Responsibility: Compliance with Local Laws<\/strong>\u00a0<\/strong>\u00a0<\/h2>\n\n\n\n<p>Businesses operating in Canada or Europe must adhere to strict data protection regulations:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Law 25 in Quebec<\/strong> \u2013 Requires companies to implement concrete measures to protect personal information.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>PIPEDA (Personal Information Protection and Electronic Documents Act)<\/strong> \u2013 Regulates the processing of personal data in Canada.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>GDPR (General Data Protection Regulation)<\/strong> \u2013 Imposes enhanced security obligations on European businesses.\u00a0<\/li>\n<\/ul>\n\n\n\n<p><strong>Concrete example:<\/strong> If a Canadian company accidentally transfers data to a foreign authority without explicit consent, it could face significant financial penalties and reputational damage.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong>Strategic Responsibility: Choosing the Right Provider and Maintaining Control Over Data<\/strong>\u00a0<\/strong>\u00a0<\/h2>\n\n\n\n<p>Choosing a cloud provider goes beyond performance and cost. Businesses must ensure that their provider:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Is a <strong>Canadian or European company<\/strong> not subject to the Cloud Act.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Hosts data under <strong>local jurisdiction (Canada or Europe).<\/strong>\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Does not rely on servers or infrastructure <strong>owned by an American company.<\/strong>\u00a0<\/li>\n<\/ul>\n\n\n\n<p><strong>Risk:<\/strong> If your provider is American (e.g., AWS, Microsoft, Google), your data is technically accessible by the U.S. government under the <strong>Cloud Act,<\/strong> even if it is hosted locally.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><strong>Operational Responsibility: Protecting Data on a Daily Basis<\/strong><\/strong>\u00a0<\/h2>\n\n\n\n<p>Data security is not just about hosting:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Train employees:<\/strong> Staff must be aware of risks (phishing, security breaches).\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Implement an internal policy:<\/strong> Clearly define who has access to data and why.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Control access:<\/strong> Use two-factor authentication (2FA) and data segmentation.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Encrypt data:<\/strong> Encrypt all sensitive information so it remains inaccessible in case of a breach.\u00a0<\/li>\n<\/ul>\n\n\n\n<p><strong>Concrete example:<\/strong> A company that enforces a strict access management policy significantly reduces the risk of data leaks in the event of a security breach.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How Businesses Can Strengthen Their Responsibility<\/strong>\u00a0<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Choose a provider under local jurisdiction:<\/strong> Ensure that the provider is not subject to laws such as the <strong>Cloud Act.<\/strong>\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Conduct regular audits of internal processes:<\/strong> Verify that your security measures are up to date.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Establish a response plan for breaches:<\/strong> Having a strategy to quickly handle a security breach minimizes damage.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Work with trusted partners:<\/strong> A provider like <strong>Dialog Insight, which is 100% Canadian,<\/strong> offers real protection under Canadian jurisdiction.\u00a0<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">&nbsp;Conclusion<\/h2>\n\n\n\n<p>Data security is a <strong>global responsibility:<\/strong> legal, strategic, and operational. Businesses must go beyond hosting and ensure they maintain <strong>effective control over their data.<\/strong> By choosing a provider <strong>independent of U.S. laws,<\/strong> training employees, and implementing a clear internal policy, they strengthen their security and build trust with their customers.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the increasing electronic sharing of personal information across various digital platforms, cybersecurity threats are becoming more frequent and their consequences more severe. Privacy incidents are no longer isolated events. It is essential to be prepared to face them in order to minimize their risks and impact.<\/p>\n","protected":false},"author":25,"featured_media":11182,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-11167","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-and-conformity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data Security: The Legal and Strategic Responsibilities of Businesses\u00a0\u00a0 - Dialog Insight<\/title>\n<meta name=\"description\" content=\"Data Security: A Legal and Strategic Responsibility. Explore the regulatory requirements for data protection and adopt best practices to effectively secure your sensitive information, maintain customer trust, and strengthen your competitive advantage.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Security: The Legal and Strategic Responsibilities of Businesses\u00a0\u00a0 - Dialog Insight\" \/>\n<meta property=\"og:description\" content=\"Data Security: A Legal and Strategic Responsibility. Explore the regulatory requirements for data protection and adopt best practices to effectively secure your sensitive information, maintain customer trust, and strengthen your competitive advantage.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/\" \/>\n<meta property=\"og:site_name\" content=\"Dialog Insight\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-21T14:45:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-17T15:07:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2025\/03\/Blog-Banner-Article-blog-exemples-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"M\u00e9liza Guay\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"M\u00e9liza Guay\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/\"},\"author\":{\"name\":\"M\u00e9liza Guay\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/f0c0528d9d281404c5702de9ad59113d\"},\"headline\":\"Data Security: The Legal and Strategic Responsibilities of Businesses\u00a0\u00a0\",\"datePublished\":\"2025-03-21T14:45:35+00:00\",\"dateModified\":\"2025-10-17T15:07:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/\"},\"wordCount\":444,\"image\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2025\/03\/Blog-Banner-Article-blog-exemples-scaled.jpg\",\"articleSection\":[\"Security and conformity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/\",\"url\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/\",\"name\":\"Data Security: The Legal and Strategic Responsibilities of Businesses\u00a0\u00a0 - Dialog Insight\",\"isPartOf\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2025\/03\/Blog-Banner-Article-blog-exemples-scaled.jpg\",\"datePublished\":\"2025-03-21T14:45:35+00:00\",\"dateModified\":\"2025-10-17T15:07:36+00:00\",\"author\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/f0c0528d9d281404c5702de9ad59113d\"},\"description\":\"Data Security: A Legal and Strategic Responsibility. Explore the regulatory requirements for data protection and adopt best practices to effectively secure your sensitive information, maintain customer trust, and strengthen your competitive advantage.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/#primaryimage\",\"url\":\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2025\/03\/Blog-Banner-Article-blog-exemples-scaled.jpg\",\"contentUrl\":\"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2025\/03\/Blog-Banner-Article-blog-exemples-scaled.jpg\",\"width\":2560,\"height\":1280,\"caption\":\"Data Security: The Legal and Strategic Responsibilities of Businesses\u00a0\u00a0\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.dialoginsight.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Security: The Legal and Strategic Responsibilities of Businesses\u00a0\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#website\",\"url\":\"https:\/\/www.dialoginsight.com\/en\/\",\"name\":\"Dialog Insight\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dialoginsight.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/f0c0528d9d281404c5702de9ad59113d\",\"name\":\"M\u00e9liza Guay\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4961796966cf96d5e93b4b3b30fc67a17cd76b5bb2f02f8e28748ed5a89c8770?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4961796966cf96d5e93b4b3b30fc67a17cd76b5bb2f02f8e28748ed5a89c8770?s=96&d=mm&r=g\",\"caption\":\"M\u00e9liza Guay\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Security: The Legal and Strategic Responsibilities of Businesses\u00a0\u00a0 - Dialog Insight","description":"Data Security: A Legal and Strategic Responsibility. Explore the regulatory requirements for data protection and adopt best practices to effectively secure your sensitive information, maintain customer trust, and strengthen your competitive advantage.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/","og_locale":"en_US","og_type":"article","og_title":"Data Security: The Legal and Strategic Responsibilities of Businesses\u00a0\u00a0 - Dialog Insight","og_description":"Data Security: A Legal and Strategic Responsibility. Explore the regulatory requirements for data protection and adopt best practices to effectively secure your sensitive information, maintain customer trust, and strengthen your competitive advantage.","og_url":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/","og_site_name":"Dialog Insight","article_published_time":"2025-03-21T14:45:35+00:00","article_modified_time":"2025-10-17T15:07:36+00:00","og_image":[{"width":2560,"height":1280,"url":"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2025\/03\/Blog-Banner-Article-blog-exemples-scaled.jpg","type":"image\/jpeg"}],"author":"M\u00e9liza Guay","twitter_card":"summary_large_image","twitter_misc":{"Written by":"M\u00e9liza Guay","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/#article","isPartOf":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/"},"author":{"name":"M\u00e9liza Guay","@id":"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/f0c0528d9d281404c5702de9ad59113d"},"headline":"Data Security: The Legal and Strategic Responsibilities of Businesses\u00a0\u00a0","datePublished":"2025-03-21T14:45:35+00:00","dateModified":"2025-10-17T15:07:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/"},"wordCount":444,"image":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2025\/03\/Blog-Banner-Article-blog-exemples-scaled.jpg","articleSection":["Security and conformity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/","url":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/","name":"Data Security: The Legal and Strategic Responsibilities of Businesses\u00a0\u00a0 - Dialog Insight","isPartOf":{"@id":"https:\/\/www.dialoginsight.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/#primaryimage"},"image":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2025\/03\/Blog-Banner-Article-blog-exemples-scaled.jpg","datePublished":"2025-03-21T14:45:35+00:00","dateModified":"2025-10-17T15:07:36+00:00","author":{"@id":"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/f0c0528d9d281404c5702de9ad59113d"},"description":"Data Security: A Legal and Strategic Responsibility. Explore the regulatory requirements for data protection and adopt best practices to effectively secure your sensitive information, maintain customer trust, and strengthen your competitive advantage.","breadcrumb":{"@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/#primaryimage","url":"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2025\/03\/Blog-Banner-Article-blog-exemples-scaled.jpg","contentUrl":"https:\/\/www.dialoginsight.com\/wp-content\/uploads\/2025\/03\/Blog-Banner-Article-blog-exemples-scaled.jpg","width":2560,"height":1280,"caption":"Data Security: The Legal and Strategic Responsibilities of Businesses\u00a0\u00a0"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dialoginsight.com\/en\/blog\/security-and-conformity\/data-security-the-legal-responsibilities-of-businesses\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.dialoginsight.com\/en\/"},{"@type":"ListItem","position":2,"name":"Data Security: The Legal and Strategic Responsibilities of Businesses\u00a0\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.dialoginsight.com\/en\/#website","url":"https:\/\/www.dialoginsight.com\/en\/","name":"Dialog Insight","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dialoginsight.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/f0c0528d9d281404c5702de9ad59113d","name":"M\u00e9liza Guay","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dialoginsight.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4961796966cf96d5e93b4b3b30fc67a17cd76b5bb2f02f8e28748ed5a89c8770?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4961796966cf96d5e93b4b3b30fc67a17cd76b5bb2f02f8e28748ed5a89c8770?s=96&d=mm&r=g","caption":"M\u00e9liza Guay"}}]}},"_links":{"self":[{"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/posts\/11167","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/comments?post=11167"}],"version-history":[{"count":3,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/posts\/11167\/revisions"}],"predecessor-version":[{"id":11197,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/posts\/11167\/revisions\/11197"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/media\/11182"}],"wp:attachment":[{"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/media?parent=11167"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/categories?post=11167"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dialoginsight.com\/en\/wp-json\/wp\/v2\/tags?post=11167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}