{"id":148938,"date":"2020-11-02T08:42:15","date_gmt":"2020-11-02T08:42:15","guid":{"rendered":"http:\/\/dominiclevent.com\/blog\/?p=148938"},"modified":"2020-11-05T11:54:35","modified_gmt":"2020-11-05T11:54:35","slug":"top-five-tips-to-protect-privilege-in-a-data-breach-litigation-mediation-arbitration-cana","status":"publish","type":"post","link":"https:\/\/dominiclevent.com\/blog\/top-five-tips-to-protect-privilege-in-a-data-breach-litigation-mediation-arbitration-cana\/","title":{"rendered":"Top Five Tips To Protect Privilege In A Data Breach &#8211; Litigation, Mediation &amp; Arbitration &#8211; Cana&#8230;"},"content":{"rendered":"\n<div>\n<h2>\n<span class=\"region-heading\">Canada: <\/span><\/p>\n<p>Top Five Tips To Protect Privilege In A Data Breach<\/h2>\n<div class=\"article-author-info\">\n<div class=\"article-author-info-left\">\n<div class=\"smalltext\">\n<p>25 October 2020<\/p>\n<p>Blake, Cassels &amp; Graydon LLP<\/p>\n<\/div>\n<\/div>\n<div class=\"authorphoto\"><a title=\"View this authors biography on their website\" href=\"http:\/\/www.mondaq.com\/Home\/Redirect\/672126?mode=author&amp;article_id=997738\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" class=\"author-logo\" src=\"http:\/\/www.mondaq.com\/images\/profile\/individual\/672126.jpg\" \/><\/a><\/div>\n<\/div>\n<\/div>\n<p>To print this article, all you need is to be registered or login on Mondaq.com.<\/p>\n<div id=\"articlebody\">\n<div>\n<p>When your organization is addressing a cyber-attack or other<br \/>\ndata breach, protecting privilege is crucial. In the aftermath of a<br \/>\ndata breach, events can move very quickly. However, appropriate<br \/>\nsteps should be taken to ensure that the privileged and<br \/>\nconfidential documents generated in your breach investigation and<br \/>\nresponse stay that way. Shortcuts taken for expediency&#8217;s sake<br \/>\ncan lead to problems later, particularly in the event of<br \/>\nlitigation. Protecting privilege is important to preserve the<br \/>\nconfidentiality of your discussions with counsel and other<br \/>\ndocuments generated in your breach response, to guard against the<br \/>\nrisk of such materials being producible in future litigation.<\/p>\n<p>Here are our top five tips for protecting privilege in the<br \/>\ncontext of a data breach:<\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"line-height: 17px;\"><strong>Avoid using your<br \/>\norganization&#8217;s computer systems if they are<br \/>\ncompromised.<\/strong> If there is reason to believe that your<br \/>\norganization&#8217;s internet technology (IT) infrastructure remains<br \/>\ncompromised, you should not use it to communicate (internally or<br \/>\nexternally) about the breach. Otherwise, any privileged<br \/>\ncommunications could be intercepted by the threat actor,<br \/>\nexacerbating the data breach. Instead, consider using phone calls<br \/>\nor a secure and uncompromised external email address to communicate<br \/>\nregarding the breach response.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"line-height: 17px;\"><strong>Engage legal counsel as soon<br \/>\nas possible.<\/strong> A data breach should be treated as a legal<br \/>\nincident for the organization, with counsel involved from the<br \/>\noutset of the response. Internal counsel should be notified right<br \/>\naway of a breach. In the case of a significant breach, it also may<br \/>\nbe prudent to retain outside litigation counsel immediately. This<br \/>\ncan help bolster claims for solicitor-client privilege because it<br \/>\nunderscores the legal, as opposed to business-related, nature of<br \/>\nthe advice being given. It also emphasizes the litigation-oriented<br \/>\nobjectives of any forensic expert reports into the data breach,<br \/>\nbolstering a claim for litigation privilege. Solicitor-client and<br \/>\nlitigation privileges can apply with respect to in-house counsel,<br \/>\nbut only when in-house counsel is providing legal rather than<br \/>\nbusiness advice. Because in-house counsel often provide both kinds<br \/>\nof advice in the aftermath of a data breach, privilege claims<br \/>\ninvolving internal counsel may be more closely scrutinized by the<br \/>\ncourts in the event of a dispute.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"line-height: 17px;\"><strong>Structure retainers with<br \/>\nthird-party consultants with privilege in mind.<\/strong><br \/>\nCommunications with and documents generated by an external forensic<br \/>\nexpert hired to investigate the data breach can be privileged,<br \/>\nprovided that the retainer is structured appropriately. For<br \/>\nexample:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"line-height: 17px;\">Where possible, external counsel and the organization should<br \/>\nretain the third party jointly<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"line-height: 17px;\">Even if the organization has an ongoing relationship with the<br \/>\nconsultant, a separate retainer or statement of work should be<br \/>\nentered into with respect to the breach to distinguish the<br \/>\nprivileged work from any other non-privileged work<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"line-height: 17px;\">The terms of the third-party retainer should reflect the legal<br \/>\nnature of the advice given and that all communications and<br \/>\ndocuments relating to the engagement should be marked and treated<br \/>\nas privileged by all involved<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"line-height: 17px;\">The third-party adviser should take instructions from, and<br \/>\nreport to, counsel (and ideally external counsel<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li style=\"line-height: 17px;\">Payment to the third-party adviser should be recorded and<br \/>\ntreated as a legal expense (for example, paid out of the<br \/>\norganization&#8217;s legal budget)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"line-height: 17px;\"><strong>Control dissemination of<br \/>\nprivileged material in your organization.<\/strong> Privileged<br \/>\ncommunications should not be copied or disseminated more widely<br \/>\nwithin your organization than is necessary. It will usually also be<br \/>\nprudent for internal or external counsel to be copied on<br \/>\ncommunications regarding the breach, although doing so does not<br \/>\nautomatically cloak those communications with privilege. All<br \/>\ncommunications and any notes or other documents regarding the<br \/>\nbreach or reflecting privileged advice should be marked as<br \/>\n&#8220;privileged and confidential.&#8221;<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"line-height: 17px;\"><strong>Beware of divulging<br \/>\nprivileged material externally.<\/strong> Some regulators may have<br \/>\nauthority to compel your organization to produce privileged<br \/>\ndocuments, such as a forensic investigator&#8217;s report. When<br \/>\nresponding to these demands, it should be stated expressly that<br \/>\nyour organization does not intend to waive privilege through such<br \/>\ndisclosure. Voluntary disclosure of potentially privileged<br \/>\ninformation to law enforcement should be approached with caution.<br \/>\nThe organization should also avoid inadvertent disclosure of<br \/>\nprivileged information, such as in pleadings and other legal<br \/>\nfilings, which may imply waiver of privilege. If disclosure of any<br \/>\nprivileged information is truly necessary, the disclosure should be<br \/>\nas narrow as possible, and it should expressly be stated that no<br \/>\nwaiver of privilege is intended.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p>For permission to reprint articles, please contact the <a class=\"force\" href=\"http:\/\/www.mondaq.com\/redirection.asp?article_id=997738&amp;company_id=19&amp;redirectaddress=http%3A\/\/www.blakes.com\/English\/Pages\/default.aspx\" target=\"_blank\" rel=\"noopener noreferrer\"><br \/>\nBlakes<\/a> Marketing Department.<\/p>\n<p>\u00a9 2020 Blake, Cassels &amp; Graydon LLP.<\/p>\n<p><em>The content of this article is intended to provide a general<br \/>\nguide to the subject matter. Specialist advice should be sought<br \/>\nabout your specific circumstances.<\/em><\/p>\n<\/div>\n<\/div>\n<div id=\"populararticles\">\n<p>POPULAR ARTICLES ON: Litigation, Mediation &amp; Arbitration from Canada<\/p>\n<div class=\"related-article\"><a class=\"related-article-title\" href=\"http:\/\/www.mondaq.com\/canada\/trials-appeals-compensation\/990270\/considerations-on-service-of-a-statement-of-claim?type=popular\">Considerations On Service Of A Statement Of Claim<\/a><\/p>\n<p>McLennan Ross LLP<\/p>\n<p>In today&#8217;s increasingly litigious world, it is imperative for both those in the legal field and non-legal field who may be involved in litigation to have a solid understanding&#8230;<\/p>\n<\/div>\n<div class=\"related-article\"><a class=\"related-article-title\" href=\"http:\/\/www.mondaq.com\/canada\/civil-law\/991088\/web-of-lies?type=popular\">Web Of Lies<\/a><\/p>\n<p>McMillan LLP<\/p>\n<p>Opposing counsel just sent a long awaited email responding to his client&#8217;s undertakings from a hard fought pre-trial examination. You scan the brief email, and find your frustration rising.<\/p>\n<\/div>\n<\/div>\n\n<p><a href=\"https:\/\/www.mondaq.com\/canada\/trials-appeals-compensation\/997738\/top-five-tips-to-protect-privilege-in-a-data-breach\">Source link <\/a><br \/>\n<a href=\"https:\/\/www.dominiclevent.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-19471\" src=\"http:\/\/dominiclevent.com\/blog\/wp-content\/uploads\/2017\/11\/litigation-300x225.jpg\" alt=\"\" width=\"400\" height=\"350\" \/><\/a><\/p>\n<p><center><iframe loading=\"lazy\" src=\"https:\/\/www.google.com\/maps\/d\/u\/1\/embed?mid=1w4tN9mf5kVdBXUXTq2KvwE23NmpUzEna\" width=\"640\" height=\"480\"><\/iframe><\/center><\/p>\n<p><center><iframe loading=\"lazy\" style=\"border: 0px #ffffff none;\" src=\"https:\/\/calendar.google.com\/calendar\/embed?src=sc635csnrm8h9s9lq0cad6vkss@group.calendar.google.com\" name=\"myiFrame\" width=\"600px\" height=\"3px\" frameborder=\"1\" marginwidth=\"0px\" marginheight=\"0px\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/center><\/p>\n<p><center><\/p>\n<div>\n<div><img decoding=\"async\" src=\"http:\/\/www.dominiclevent.com\/wp-content\/uploads\/2018\/06\/Business_Solicitors_London.jpg\" width=\"600\" \/><\/div>\n<div>Dominic Levent Solicitors<\/div>\n<div>Email: Enquiries@dominiclevent.com<\/div>\n<div>Phone: 020 8347 6640<\/div>\n<div>Url: https:\/\/www.dominiclevent.com<\/div>\n<div style=\"display: none;\">cash, check, credit card, invoice<\/div>\n<div><\/div>\n<div>\n<div>1345 High Rd<\/div>\n<div>London, London N20 9HR<\/div>\n<\/div>\n<\/div>\n<p><\/center><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Canada: Top Five Tips To Protect Privilege In A Data Breach 25 October 2020 Blake, Cassels &amp; Graydon LLP To print this article, all you need is to be registered or login on Mondaq.com. When your organization is addressing a cyber-attack or other data breach, protecting privilege is crucial. In the aftermath of a data &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/dominiclevent.com\/blog\/top-five-tips-to-protect-privilege-in-a-data-breach-litigation-mediation-arbitration-cana\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Top Five Tips To Protect Privilege In A Data Breach &#8211; Litigation, Mediation &amp; Arbitration &#8211; Cana&#8230;&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-148938","post","type-post","status-publish","format-standard","hentry","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Top Five Tips To Protect Privilege In A Data Breach - Litigation, Mediation &amp; Arbitration - Cana... - Dominic Levent Solicitors Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dominiclevent.com\/blog\/top-five-tips-to-protect-privilege-in-a-data-breach-litigation-mediation-arbitration-cana\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top Five Tips To Protect Privilege In A Data Breach - Litigation, Mediation &amp; Arbitration - Cana... - Dominic Levent Solicitors Blog\" \/>\n<meta property=\"og:description\" content=\"Canada: Top Five Tips To Protect Privilege In A Data Breach 25 October 2020 Blake, Cassels &amp; Graydon LLP To print this article, all you need is to be registered or login on Mondaq.com. When your organization is addressing a cyber-attack or other data breach, protecting privilege is crucial. In the aftermath of a data &hellip; Continue reading &quot;Top Five Tips To Protect Privilege In A Data Breach &#8211; Litigation, Mediation &amp; Arbitration &#8211; Cana&#8230;&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dominiclevent.com\/blog\/top-five-tips-to-protect-privilege-in-a-data-breach-litigation-mediation-arbitration-cana\/\" \/>\n<meta property=\"og:site_name\" content=\"Dominic Levent Solicitors Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-02T08:42:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-05T11:54:35+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.mondaq.com\/images\/profile\/individual\/672126.jpg\" \/>\n<meta name=\"author\" content=\"spainops\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"spainops\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dominiclevent.com\/blog\/top-five-tips-to-protect-privilege-in-a-data-breach-litigation-mediation-arbitration-cana\/\",\"url\":\"https:\/\/dominiclevent.com\/blog\/top-five-tips-to-protect-privilege-in-a-data-breach-litigation-mediation-arbitration-cana\/\",\"name\":\"Top Five Tips To Protect Privilege In A Data Breach - Litigation, Mediation &amp; Arbitration - Cana... - Dominic Levent Solicitors Blog\",\"isPartOf\":{\"@id\":\"https:\/\/dominiclevent.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dominiclevent.com\/blog\/top-five-tips-to-protect-privilege-in-a-data-breach-litigation-mediation-arbitration-cana\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dominiclevent.com\/blog\/top-five-tips-to-protect-privilege-in-a-data-breach-litigation-mediation-arbitration-cana\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.mondaq.com\/images\/profile\/individual\/672126.jpg\",\"datePublished\":\"2020-11-02T08:42:15+00:00\",\"dateModified\":\"2020-11-05T11:54:35+00:00\",\"author\":{\"@id\":\"https:\/\/dominiclevent.com\/blog\/#\/schema\/person\/bacc79b48921539cd8fc642f86d23254\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dominiclevent.com\/blog\/top-five-tips-to-protect-privilege-in-a-data-breach-litigation-mediation-arbitration-cana\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dominiclevent.com\/blog\/top-five-tips-to-protect-privilege-in-a-data-breach-litigation-mediation-arbitration-cana\/#primaryimage\",\"url\":\"http:\/\/www.mondaq.com\/images\/profile\/individual\/672126.jpg\",\"contentUrl\":\"http:\/\/www.mondaq.com\/images\/profile\/individual\/672126.jpg\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dominiclevent.com\/blog\/#website\",\"url\":\"https:\/\/dominiclevent.com\/blog\/\",\"name\":\"Dominic Levent Solicitors Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dominiclevent.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/dominiclevent.com\/blog\/#\/schema\/person\/bacc79b48921539cd8fc642f86d23254\",\"name\":\"spainops\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dominiclevent.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6a2648c0ace71d8dde31f2a9e8b370b694f81d70a3ed9ccfb9ec45550a223943?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6a2648c0ace71d8dde31f2a9e8b370b694f81d70a3ed9ccfb9ec45550a223943?s=96&d=mm&r=g\",\"caption\":\"spainops\"},\"sameAs\":[\"https:\/\/dominiclevent.com\/blog\"],\"url\":\"https:\/\/dominiclevent.com\/blog\/author\/spainops\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top Five Tips To Protect Privilege In A Data Breach - Litigation, Mediation &amp; Arbitration - Cana... - Dominic Levent Solicitors Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dominiclevent.com\/blog\/top-five-tips-to-protect-privilege-in-a-data-breach-litigation-mediation-arbitration-cana\/","og_locale":"en_US","og_type":"article","og_title":"Top Five Tips To Protect Privilege In A Data Breach - Litigation, Mediation &amp; Arbitration - Cana... - Dominic Levent Solicitors Blog","og_description":"Canada: Top Five Tips To Protect Privilege In A Data Breach 25 October 2020 Blake, Cassels &amp; Graydon LLP To print this article, all you need is to be registered or login on Mondaq.com. When your organization is addressing a cyber-attack or other data breach, protecting privilege is crucial. In the aftermath of a data &hellip; Continue reading \"Top Five Tips To Protect Privilege In A Data Breach &#8211; Litigation, Mediation &amp; Arbitration &#8211; Cana&#8230;\"","og_url":"https:\/\/dominiclevent.com\/blog\/top-five-tips-to-protect-privilege-in-a-data-breach-litigation-mediation-arbitration-cana\/","og_site_name":"Dominic Levent Solicitors Blog","article_published_time":"2020-11-02T08:42:15+00:00","article_modified_time":"2020-11-05T11:54:35+00:00","og_image":[{"url":"http:\/\/www.mondaq.com\/images\/profile\/individual\/672126.jpg","type":"","width":"","height":""}],"author":"spainops","twitter_card":"summary_large_image","twitter_misc":{"Written by":"spainops","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/dominiclevent.com\/blog\/top-five-tips-to-protect-privilege-in-a-data-breach-litigation-mediation-arbitration-cana\/","url":"https:\/\/dominiclevent.com\/blog\/top-five-tips-to-protect-privilege-in-a-data-breach-litigation-mediation-arbitration-cana\/","name":"Top Five Tips To Protect Privilege In A Data Breach - Litigation, Mediation &amp; Arbitration - Cana... - Dominic Levent Solicitors Blog","isPartOf":{"@id":"https:\/\/dominiclevent.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dominiclevent.com\/blog\/top-five-tips-to-protect-privilege-in-a-data-breach-litigation-mediation-arbitration-cana\/#primaryimage"},"image":{"@id":"https:\/\/dominiclevent.com\/blog\/top-five-tips-to-protect-privilege-in-a-data-breach-litigation-mediation-arbitration-cana\/#primaryimage"},"thumbnailUrl":"http:\/\/www.mondaq.com\/images\/profile\/individual\/672126.jpg","datePublished":"2020-11-02T08:42:15+00:00","dateModified":"2020-11-05T11:54:35+00:00","author":{"@id":"https:\/\/dominiclevent.com\/blog\/#\/schema\/person\/bacc79b48921539cd8fc642f86d23254"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dominiclevent.com\/blog\/top-five-tips-to-protect-privilege-in-a-data-breach-litigation-mediation-arbitration-cana\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dominiclevent.com\/blog\/top-five-tips-to-protect-privilege-in-a-data-breach-litigation-mediation-arbitration-cana\/#primaryimage","url":"http:\/\/www.mondaq.com\/images\/profile\/individual\/672126.jpg","contentUrl":"http:\/\/www.mondaq.com\/images\/profile\/individual\/672126.jpg"},{"@type":"WebSite","@id":"https:\/\/dominiclevent.com\/blog\/#website","url":"https:\/\/dominiclevent.com\/blog\/","name":"Dominic Levent Solicitors Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dominiclevent.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/dominiclevent.com\/blog\/#\/schema\/person\/bacc79b48921539cd8fc642f86d23254","name":"spainops","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dominiclevent.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6a2648c0ace71d8dde31f2a9e8b370b694f81d70a3ed9ccfb9ec45550a223943?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6a2648c0ace71d8dde31f2a9e8b370b694f81d70a3ed9ccfb9ec45550a223943?s=96&d=mm&r=g","caption":"spainops"},"sameAs":["https:\/\/dominiclevent.com\/blog"],"url":"https:\/\/dominiclevent.com\/blog\/author\/spainops\/"}]}},"_links":{"self":[{"href":"https:\/\/dominiclevent.com\/blog\/wp-json\/wp\/v2\/posts\/148938","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dominiclevent.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dominiclevent.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dominiclevent.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dominiclevent.com\/blog\/wp-json\/wp\/v2\/comments?post=148938"}],"version-history":[{"count":0,"href":"https:\/\/dominiclevent.com\/blog\/wp-json\/wp\/v2\/posts\/148938\/revisions"}],"wp:attachment":[{"href":"https:\/\/dominiclevent.com\/blog\/wp-json\/wp\/v2\/media?parent=148938"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dominiclevent.com\/blog\/wp-json\/wp\/v2\/categories?post=148938"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dominiclevent.com\/blog\/wp-json\/wp\/v2\/tags?post=148938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}