{"id":1033,"date":"2022-09-15T09:35:00","date_gmt":"2022-09-15T09:35:00","guid":{"rendered":"https:\/\/beta.seersco.com\/articles\/?p=1033"},"modified":"2024-06-27T12:38:52","modified_gmt":"2024-06-27T12:38:52","slug":"what-do-you-know-about-information-security-policy","status":"publish","type":"post","link":"https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/","title":{"rendered":"What do you know about Information Security Policy?"},"content":{"rendered":"\n<p>Information Security Policy (ISP)is a set of rules that an organisation holds to ensure its users and networks of the IT structure obey the prescriptions about the security of data that is stored on digital platforms within the organisation.<\/p>\n\n\n\n<p>Information security policies are created to protect personal data. The protection of their clients\u2019 data is the primary concern of every enterprise, as data is the primary asset of any organisation.<\/p>\n\n\n\n<p>The policy can be as broad as the creators wanted it to be. It can cover every single aspect and term regarding IT security and many other things related to it.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/seersco.com\/policy-generator-sales.html\/\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1012\" height=\"348\" src=\"https:\/\/seersart.shubhmishra.com\/wp-content\/uploads\/2021\/02\/Policies-CTA-1.png\" alt=\"information security policy\" class=\"wp-image-1609\" srcset=\"https:\/\/seersco.com\/articles\/wp-content\/uploads\/sites\/2\/2021\/02\/Policies-CTA-1.png 1012w, https:\/\/seersco.com\/articles\/wp-content\/uploads\/sites\/2\/2021\/02\/Policies-CTA-1-300x103.png 300w, https:\/\/seersco.com\/articles\/wp-content\/uploads\/sites\/2\/2021\/02\/Policies-CTA-1-768x264.png 768w\" sizes=\"(max-width: 1012px) 100vw, 1012px\" \/><\/a><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">Below are some key elements that an organisation must consider.<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Elements of information security policy<\/h3>\n\n\n\n<p><strong>1) Purpose<\/strong><br>Organisations have multiple reasons to develop such a policy.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>For the establishment of a general approach to information security.<\/li>\n\n\n\n<li>To detect and intercept the misuse of data, networks, computer systems and applications.<\/li>\n\n\n\n<li>For the protection of a company\u2019s reputation in terms of its ethical and legal responsibilities.<\/li>\n\n\n\n<li>For the observance of customer rights. Also, to provide an effective mechanism to respond to complaints and queries related to real and perceived non-compliance.<\/li>\n<\/ul>\n\n\n\n<p><strong>2) Scope<\/strong><\/p>\n\n\n\n<p>The <strong>information security policy<\/strong> must address all the programs, data, systems, facilities, other tech infrastructure, users of technology in a given organisation, without exception. Information security policies should also take into account access given to third parties and what the expectations are for those parties.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\"><strong>3) Objectives&nbsp;<\/strong><\/h5>\n\n\n\n<p>If a company wants to compose a well-defined<strong> information security policy<\/strong>, it should have clear objectives related to security. It must also cover a strategy so that management can reach an agreement.<\/p>\n\n\n\n<p>Failure to ensure that the <strong>information security policy<\/strong> satisfies the above key areas can harm the business. The security management practices must also be included in the policy documents as it will guarantee completeness, quality, and workability.<\/p>\n\n\n\n<p>Simplification of policy language smooths away the differences and ensures harmony among management staff. Therefore, vague clauses and expressions must be avoided. For instance, words like \u201cmust\u201d express absolute adherence, whereas \u201cshould\u201d indicates a level of discretion.<\/p>\n\n\n\n<p><em>&#8220;It is expected from organisations to formulate an <strong>information security policy<\/strong>&nbsp;that is clear, concise and to the point. In simple words, too much detail can hinder understanding of and compliance to the policy across the organisation.&#8221;<\/em><\/p>\n\n\n\n<p>How management views <a href=\"https:\/\/seersco.com\/articles\/prerequisite-statistics-of-cybersecurity\/\">IT security<\/a> has great importance; it also affects the enforcement of the new rules. Moreover, in an organisation, a security professional must ensure that, as other enacted policies, the ISP has an equal institutional gravity.<\/p>\n\n\n\n<p>However, the organisation may vary in size and structure, hence, policies may differ. Therefore, policies should segregate to explain the dealings of the organisation.<\/p>\n\n\n\n<p><strong>I<\/strong>t&nbsp;protects three objectives of a company:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Confidentiality: Data and information must restrict only to authorize people and should not disclose any personal data. <\/li>\n\n\n\n<li>Integrity: Keeping the data safe, accurate, and IT systems operational.<\/li>\n\n\n\n<li>Availability: information should be available whenever authorized users require it.<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/seersco.com\/policy-generator-sales.html\/\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1012\" height=\"348\" src=\"https:\/\/seersart.shubhmishra.com\/wp-content\/uploads\/2021\/02\/Policies-CTA-1.png\" alt=\"information security policy\" class=\"wp-image-1609\" srcset=\"https:\/\/seersco.com\/articles\/wp-content\/uploads\/sites\/2\/2021\/02\/Policies-CTA-1.png 1012w, https:\/\/seersco.com\/articles\/wp-content\/uploads\/sites\/2\/2021\/02\/Policies-CTA-1-300x103.png 300w, https:\/\/seersco.com\/articles\/wp-content\/uploads\/sites\/2\/2021\/02\/Policies-CTA-1-768x264.png 768w\" sizes=\"(max-width: 1012px) 100vw, 1012px\" \/><\/a><\/figure>\n<\/div>\n\n\n<h3 class=\"wp-block-heading\">Importance of Information Security Policy<\/h3>\n\n\n\n<p>Many organisations download IT policy samples from random websites on the internet. Without giving much thought, they copy\/paste the prefabricated material and readjust their objectives and policy goals. While readjusting the ready-made policy, any blunder can make you pay a huge cost for it.<\/p>\n\n\n\n<p>The quality of the <strong>information security policy<\/strong> depends on you because a high-quality and relevant security policy is essential for a growing and successful business.<\/p>\n\n\n\n<p>Improved efficiency, increased productivity, clarity of the objectives, understanding of what data should secure, identifying the type and levels of security required and defining the applicable information security best practices are the reasons why a company must have an <strong>information security policy<\/strong> in place.<\/p>\n\n\n\n<p><em>&#8220;In summary, if you want to maintain a credible reputation and grow your company, then you must retain an effective <strong>information security policy<\/strong>.&#8221;<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Frequently Asked Questions (FAQs)<\/strong><\/h3>\n\n\n\n<p><strong>1) What makes a good information security policy?<\/strong><\/p>\n\n\n\n<p>Good <strong>information security policy <\/strong>covers several factors. One of the most important factors is it should be usable. It is useless to have such <strong>policy<\/strong>&nbsp;in your company, and the employers are unable to implement the guidelines or regulations flagged-up in the policy.<\/p>\n\n\n\n<p><strong>2) What is the purpose of an information security policy?<\/strong><\/p>\n\n\n\n<p>It&nbsp;is a set of rules which a company practices to ensure that users and networks of the IT structure are abiding the prescriptions of data security and data stored within the boundaries of the organisation.<\/p>\n\n\n\n<p><strong>3) What are its requirements?<\/strong><\/p>\n\n\n\n<p>It is a set of objectives for the betterment of a company. It carries rules of behavior for users and administrators, and <strong>requirements<\/strong> for management and system that ensure the <strong>security<\/strong> of network and computer systems in an organisation.<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":1034,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[38],"tags":[173,67],"class_list":["post-1033","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-policy-pack","tag-iso-27001-information-security-policy-for-supplier-relationships","tag-iso-27002-information-security-policy-template","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-50","no-featured-image-padding"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Information Security Policy | Seers<\/title>\n<meta name=\"description\" content=\"The Information Security Policy (ISP) is created to protect user information. It covers every aspect related to IT security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security Policy | Seers\" \/>\n<meta property=\"og:description\" content=\"The Information Security Policy (ISP) is created to protect user information. It covers every aspect related to IT security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/\" \/>\n<meta property=\"og:site_name\" content=\"Seers | Articles\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-15T09:35:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-27T12:38:52+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/seersco.com\/articles\/#\/schema\/person\/1230e02f2b0b8893f4284139066c4076\"},\"headline\":\"What do you know about Information Security Policy?\",\"datePublished\":\"2022-09-15T09:35:00+00:00\",\"dateModified\":\"2024-06-27T12:38:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/\"},\"wordCount\":783,\"publisher\":{\"@id\":\"https:\/\/seersco.com\/articles\/#organization\"},\"image\":{\"@id\":\"https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/seersco.com\/articles\/wp-content\/uploads\/sites\/2\/2021\/01\/What_do_you_know_about_Information_Security_Policy.svg\",\"keywords\":[\"ISO 27001 Supplier Security Policy Template\",\"ISO 27002 Information Security Policy Template\"],\"articleSection\":[\"Policy Pack\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/\",\"url\":\"https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/\",\"name\":\"Information Security Policy | Seers\",\"isPartOf\":{\"@id\":\"https:\/\/seersco.com\/articles\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/seersco.com\/articles\/wp-content\/uploads\/sites\/2\/2021\/01\/What_do_you_know_about_Information_Security_Policy.svg\",\"datePublished\":\"2022-09-15T09:35:00+00:00\",\"dateModified\":\"2024-06-27T12:38:52+00:00\",\"description\":\"The Information Security Policy (ISP) is created to protect user information. It covers every aspect related to IT security.\",\"breadcrumb\":{\"@id\":\"https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/#primaryimage\",\"url\":\"https:\/\/seersco.com\/articles\/wp-content\/uploads\/sites\/2\/2021\/01\/What_do_you_know_about_Information_Security_Policy.svg\",\"contentUrl\":\"https:\/\/seersco.com\/articles\/wp-content\/uploads\/sites\/2\/2021\/01\/What_do_you_know_about_Information_Security_Policy.svg\",\"width\":680,\"height\":340,\"caption\":\"Information security policy\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/seersco.com\/articles\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What do you know about Information Security Policy?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/seersco.com\/articles\/#website\",\"url\":\"https:\/\/seersco.com\/articles\/\",\"name\":\"Seers | Articles\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/seersco.com\/articles\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/seersco.com\/articles\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/seersco.com\/articles\/#organization\",\"name\":\"Seers | Articles\",\"url\":\"https:\/\/seersco.com\/articles\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/seersco.com\/articles\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/seersco.com\/articles\/wp-content\/uploads\/sites\/2\/2024\/02\/seers-logo-1.svg\",\"contentUrl\":\"https:\/\/seersco.com\/articles\/wp-content\/uploads\/sites\/2\/2024\/02\/seers-logo-1.svg\",\"width\":602,\"height\":185,\"caption\":\"Seers | Articles\"},\"image\":{\"@id\":\"https:\/\/seersco.com\/articles\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/seersco.com\/articles\/#\/schema\/person\/1230e02f2b0b8893f4284139066c4076\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/seersco.com\/articles\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c1d0b7a20fc5b7a759096288d5fdde5b4eb971e24d1e58d5b4d35cafe0827de2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c1d0b7a20fc5b7a759096288d5fdde5b4eb971e24d1e58d5b4d35cafe0827de2?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/seersco.com\"],\"url\":\"https:\/\/seersco.com\/articles\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security Policy | Seers","description":"The Information Security Policy (ISP) is created to protect user information. It covers every aspect related to IT security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/","og_locale":"en_US","og_type":"article","og_title":"Information Security Policy | Seers","og_description":"The Information Security Policy (ISP) is created to protect user information. It covers every aspect related to IT security.","og_url":"https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/","og_site_name":"Seers | Articles","article_published_time":"2022-09-15T09:35:00+00:00","article_modified_time":"2024-06-27T12:38:52+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/#article","isPartOf":{"@id":"https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/"},"author":{"name":"admin","@id":"https:\/\/seersco.com\/articles\/#\/schema\/person\/1230e02f2b0b8893f4284139066c4076"},"headline":"What do you know about Information Security Policy?","datePublished":"2022-09-15T09:35:00+00:00","dateModified":"2024-06-27T12:38:52+00:00","mainEntityOfPage":{"@id":"https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/"},"wordCount":783,"publisher":{"@id":"https:\/\/seersco.com\/articles\/#organization"},"image":{"@id":"https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/seersco.com\/articles\/wp-content\/uploads\/sites\/2\/2021\/01\/What_do_you_know_about_Information_Security_Policy.svg","keywords":["ISO 27001 Supplier Security Policy Template","ISO 27002 Information Security Policy Template"],"articleSection":["Policy Pack"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/","url":"https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/","name":"Information Security Policy | Seers","isPartOf":{"@id":"https:\/\/seersco.com\/articles\/#website"},"primaryImageOfPage":{"@id":"https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/#primaryimage"},"image":{"@id":"https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/#primaryimage"},"thumbnailUrl":"https:\/\/seersco.com\/articles\/wp-content\/uploads\/sites\/2\/2021\/01\/What_do_you_know_about_Information_Security_Policy.svg","datePublished":"2022-09-15T09:35:00+00:00","dateModified":"2024-06-27T12:38:52+00:00","description":"The Information Security Policy (ISP) is created to protect user information. It covers every aspect related to IT security.","breadcrumb":{"@id":"https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/#primaryimage","url":"https:\/\/seersco.com\/articles\/wp-content\/uploads\/sites\/2\/2021\/01\/What_do_you_know_about_Information_Security_Policy.svg","contentUrl":"https:\/\/seersco.com\/articles\/wp-content\/uploads\/sites\/2\/2021\/01\/What_do_you_know_about_Information_Security_Policy.svg","width":680,"height":340,"caption":"Information security policy"},{"@type":"BreadcrumbList","@id":"https:\/\/seersco.com\/articles\/what-do-you-know-about-information-security-policy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/seersco.com\/articles\/"},{"@type":"ListItem","position":2,"name":"What do you know about Information Security Policy?"}]},{"@type":"WebSite","@id":"https:\/\/seersco.com\/articles\/#website","url":"https:\/\/seersco.com\/articles\/","name":"Seers | Articles","description":"","publisher":{"@id":"https:\/\/seersco.com\/articles\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/seersco.com\/articles\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/seersco.com\/articles\/#organization","name":"Seers | Articles","url":"https:\/\/seersco.com\/articles\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/seersco.com\/articles\/#\/schema\/logo\/image\/","url":"https:\/\/seersco.com\/articles\/wp-content\/uploads\/sites\/2\/2024\/02\/seers-logo-1.svg","contentUrl":"https:\/\/seersco.com\/articles\/wp-content\/uploads\/sites\/2\/2024\/02\/seers-logo-1.svg","width":602,"height":185,"caption":"Seers | Articles"},"image":{"@id":"https:\/\/seersco.com\/articles\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/seersco.com\/articles\/#\/schema\/person\/1230e02f2b0b8893f4284139066c4076","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/seersco.com\/articles\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c1d0b7a20fc5b7a759096288d5fdde5b4eb971e24d1e58d5b4d35cafe0827de2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c1d0b7a20fc5b7a759096288d5fdde5b4eb971e24d1e58d5b4d35cafe0827de2?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/seersco.com"],"url":"https:\/\/seersco.com\/articles\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/seersco.com\/articles\/wp-json\/wp\/v2\/posts\/1033","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/seersco.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/seersco.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/seersco.com\/articles\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/seersco.com\/articles\/wp-json\/wp\/v2\/comments?post=1033"}],"version-history":[{"count":0,"href":"https:\/\/seersco.com\/articles\/wp-json\/wp\/v2\/posts\/1033\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/seersco.com\/articles\/wp-json\/wp\/v2\/media\/1034"}],"wp:attachment":[{"href":"https:\/\/seersco.com\/articles\/wp-json\/wp\/v2\/media?parent=1033"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/seersco.com\/articles\/wp-json\/wp\/v2\/categories?post=1033"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/seersco.com\/articles\/wp-json\/wp\/v2\/tags?post=1033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}