{"id":15097,"date":"2016-06-08T06:28:52","date_gmt":"2016-06-08T06:28:52","guid":{"rendered":"http:\/\/live-42gears-site.pantheonsite.io\/?p=15097"},"modified":"2025-01-07T07:07:13","modified_gmt":"2025-01-07T07:07:13","slug":"how-to-balance-mobile-privacy-vs-security","status":"publish","type":"post","link":"https:\/\/www.42gears.com\/nl\/blog\/how-to-balance-mobile-privacy-vs-security\/","title":{"rendered":"How to balance mobile privacy vs security"},"content":{"rendered":"<p><img decoding=\"async\" class=\"aligncenter wp-image-15099 size-full\" src=\"http:\/\/live-42gears-site.pantheonsite.io\/wp-content\/uploads\/2016\/06\/byod-banner-blog.jpg\" alt=\"byod-banner-blog\" width=\"600\" height=\"361\" srcset=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2016\/06\/byod-banner-blog.jpg 600w, https:\/\/www.42gears.com\/wp-content\/uploads\/2016\/06\/byod-banner-blog-300x181.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p><strong>\u201cBYOD strategies are the most radical change to the economics and the culture of client computing in business in decades\u201d. &#8211;<\/strong> David Willis, VP &amp; Analyst, Gartner<\/p>\n<p>BYOD is a strategy where employees are allowed to connect their personal devices such as laptops, smartphones and tablets to the corporate network to access corporate data. The BYOD strategy benefits the company in several ways like enhanced work flexibility, increased productivity and efficiency of employees. This is why it is being embraced by IT organizations worldwide. A survey conducted by Tech Pro Research indicates that 74% of organizations are either using or planning to use BYOD in the future.<\/p>\n<p>BYOD provides flexibility to employees to work with their own devices and help organizations reduce cost. Along with the advantages, there are several challenges too. Employees can easily access company information on their devices. The influx of employee-owned devices poses a serious threat to enterprise data resources. It may harm the organization if a device is lost or damaged or when an employee quits. So, Information security is a big challenge for IT managers. Information and applications on the devices must be secured. According to a survey conducted in 2015, by Gartner, more than 75% of mobile applications fail basic security tests.<\/p>\n<p>BYOD has spread in almost every unit within an organization such as legal, IT, Human Resources, and Finance. Therefore, it should be controlled across all the departments. BYOD control measures should be taken in technical as well as non-technical ways. Sometimes IT ignores non-technical aspects such as policies and procedures which are very important for privacy purposes.\u00a0 There must be policies and standards under which BYOD can operate.<\/p>\n<p>Information Security is already a mature phenomenon and there are several standards defined around them like:<\/p>\n<ul>\n<li>ISO 27000 Series standards (known as ISMS Family of Standards) jointly published by ISO and IEC for information security<sup>1<\/sup>,<\/li>\n<li>COBIT (Control Objectives for Information and Related Technology) created by ISACA for IT management and governance it allows manager to bridge the gap between control requirements, technical issues, and business risks<sup>2<\/sup>,<\/li>\n<li>SOGP (Standard of Good Practice) published by Information Security Forum to provide a business-focused, practical and comprehensive guide to identifying and managing information security risks in organizations and their supply chains<sup>3<\/sup>,<\/li>\n<li>ITIL (it is based on ISO 27001 standard)<\/li>\n<\/ul>\n<p>Though there are universally accepted standards to secure data, using them on personal phones and devices invites employee restraint and push back. E.g. Location tracking technology is very helpful in case device is lost, data can be easily restored. However, people feel it\u2019s an invasion to their privacy<sup>4<\/sup>. MDM software used by IT to remotely access device gives them a feeling of intrusion. MDM agent on a device with access to personal files, pictures, and music, disturbs their privacy. Though it doesn\u2019t mean that users are absolutely incorrect. Personal devices always have some private and confidential information such as passport details, biometric information, financial as well as medical information which can be misused.<\/p>\n<p>An effective BYOD system would be a perfect blend of organizational as well as private data security concerns. BYOD has impacted various organizational resources and assets such as data, networks, communications, applications, and devices. It should be able to manage in a controlled way so that it may not harm any resources or data along with users\u2019 privacy. It is essential to consider the points mentioned below before implementing BYOD standards &amp; policies in an organisation<sup>5<\/sup>:<\/p>\n<ul>\n<li>Legal &amp; liability aspects,<\/li>\n<li>Impact of security and privacy controls on BYOD users,<\/li>\n<li>Technical control measures,<\/li>\n<li>Perception and behavior of users,<\/li>\n<li>Information security standards and procedures,<\/li>\n<li>BYOD awareness and training program.<\/li>\n<\/ul>\n<p><strong>Legal &amp; Liability aspects <\/strong>should be checked first while implementing a BYOD policy. In case organizational or private data are exposed, no one wants to take responsibility. Therefore, before putting control measures into action, liability should be defined properly by the legal department and legal ramifications of damages must be fixed.<\/p>\n<p><strong>The impact of Security and Privacy controls on BYOD users <\/strong>is necessary to be considered before enforcing any action.<\/p>\n<p>IT should use <strong>technical controls<\/strong> which secure both organizational as well as BYOD users\u2019 personal information.<\/p>\n<p><strong>Perception and view of employees<\/strong> must be considered by IT before making and implementing any BYOD policy. Users\u2019 positive attitude can reduce organizations and users\u2019 liability when any security or privacy breach occurs.<\/p>\n<p>IT should ensure that all <strong>Information security standards and procedures<\/strong> have compliance with national as well as International legal laws.<\/p>\n<p>Many employees might have never worked in a BYOD environment and unaware of the threat of losing private or organizational data.<strong> BYOD awareness and training program<\/strong> immensely help them to understand how they should work. Training program educates them about the International Privacy Principles and Security Standards.<\/p>\n<p>New and existing employees must have knowledge of the International Information Privacy Principle. According to Privacy International, an organization working to safeguard privacy, \u201cThe first law was passed in 1970 in Germany. Later, similar data protection law \u2018Fair Information Practices\u2019 developed by the US. The UK also started taking initiatives to safeguard people from threats of private companies by establishing a committee. Further, National laws have been developed by many nations such as US, Germany, Sweden, and France. In 1980 the Organization for Economic Cooperation and Development (OECD) developed its own privacy guidelines.<sup>6<\/sup><\/p>\n<p>Some basic privacy principles outlined in these drafts are:<\/p>\n<ol>\n<li><strong>Data collection limit:<\/strong> There should be a limit to personal data collection. Data should be obtained in a legal manner with prior consent of the individual.<\/li>\n<li><strong>Relevance of Information:<\/strong> Information should be accurate and relevant for the purposes it is being used.<\/li>\n<li><strong>Purpose of obtaining information should be defined:<\/strong> Data should be used for the purpose it is defined for. Information should be deleted once it is used or no longer needed.<\/li>\n<li><strong>Protection of Information:<\/strong> Security measures should be taken to protect personal information from getting lost, misused, disclosed and modified.<\/li>\n<li><strong>Individual involvement:<\/strong> Every individual has a right to involve for the information taken from him. A person can ask for deleting information once used<sup>7<\/sup>.<\/li>\n<\/ol>\n<p>A good BYOD system is where an organization or personal information both are secured. IT must understand the level of adoption, legal laws and procedures and controlling measures. All the possible threats, challenges and risks pertaining to it should be analyzed so that probability of information damage could be mitigated.<\/p>\n<p>References:<\/p>\n<ol>\n<li><a href=\"http:\/\/standards.iso.org\/ittf\/PubliclyAvailableStandards\/\">http:\/\/standards.iso.org\/ittf\/PubliclyAvailableStandards\/<\/a><\/li>\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/COBIT\">https:\/\/en.wikipedia.org\/wiki\/COBIT<\/a><\/li>\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Standard_of_Good_Practice\">https:\/\/en.wikipedia.org\/wiki\/Standard_of_Good_Practice<\/a><\/li>\n<li><a href=\"http:\/\/searchmobilecomputing.techtarget.com\/tip\/How-to-balance-mobile-device-privacy-vs-security\">http:\/\/searchmobilecomputing.techtarget.com\/tip\/How-to-balance-mobile-device-privacy-vs-security<\/a><\/li>\n<li>https:\/\/www.privacyinternational.org\/node\/44<\/li>\n<li>http:\/\/oecdprivacy.org\/<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>\u201cBYOD strategies are the most radical change to the economics and the culture of client computing in business in decades\u201d. &#8211; David Willis, VP &amp; Analyst, Gartner BYOD is a strategy where employees are allowed to connect their personal devices such as laptops, smartphones and tablets to the corporate network to access corporate data. The&hellip;<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10,23],"tags":[291,28,62],"class_list":["post-15097","post","type-post","status-publish","format-standard","hentry","category-business","category-enterprise-mobility","tag-byod","tag-enterprise-mobility","tag-mobility"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.6 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to balance mobile privacy vs security<\/title>\n<meta name=\"description\" content=\"Read about major challenges that an organization face with BYOD and how to evaluate and measure different aspects of BYOD before implementation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to balance mobile privacy vs security\" \/>\n<meta property=\"og:description\" content=\"Read about major challenges that an organization face with BYOD and how to evaluate and measure different aspects of BYOD before implementation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/\" \/>\n<meta property=\"og:site_name\" content=\"42Gears Mobility Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/42gears\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-08T06:28:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-07T07:07:13+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/live-42gears-site.pantheonsite.io\/wp-content\/uploads\/2016\/06\/byod-banner-blog.jpg\" \/>\n<meta name=\"author\" content=\"42Gears Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@42Gears\" \/>\n<meta name=\"twitter:site\" content=\"@42Gears\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"42Gears Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/\"},\"author\":{\"name\":\"42Gears Team\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d\"},\"headline\":\"How to balance mobile privacy vs security\",\"datePublished\":\"2016-06-08T06:28:52+00:00\",\"dateModified\":\"2025-01-07T07:07:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/\"},\"wordCount\":1094,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/live-42gears-site.pantheonsite.io\/wp-content\/uploads\/2016\/06\/byod-banner-blog.jpg\",\"keywords\":[\"BYOD\",\"Enterprise Mobility\",\"Mobility\"],\"articleSection\":[\"Business\",\"Enterprise Mobility\"],\"inLanguage\":\"nl\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/\",\"url\":\"https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/\",\"name\":\"How to balance mobile privacy vs security\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/live-42gears-site.pantheonsite.io\/wp-content\/uploads\/2016\/06\/byod-banner-blog.jpg\",\"datePublished\":\"2016-06-08T06:28:52+00:00\",\"dateModified\":\"2025-01-07T07:07:13+00:00\",\"description\":\"Read about major challenges that an organization face with BYOD and how to evaluate and measure different aspects of BYOD before implementation.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/#breadcrumb\"},\"inLanguage\":\"nl\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl\",\"@id\":\"https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/#primaryimage\",\"url\":\"http:\/\/live-42gears-site.pantheonsite.io\/wp-content\/uploads\/2016\/06\/byod-banner-blog.jpg\",\"contentUrl\":\"http:\/\/live-42gears-site.pantheonsite.io\/wp-content\/uploads\/2016\/06\/byod-banner-blog.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.42gears.com\/nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to balance mobile privacy vs security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.42gears.com\/#website\",\"url\":\"https:\/\/www.42gears.com\/\",\"name\":\"42Gears Mobility Systems\",\"description\":\"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown\",\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.42gears.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.42gears.com\/#organization\",\"name\":\"MDM - 42Gears\",\"url\":\"https:\/\/www.42gears.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"width\":499,\"height\":330,\"caption\":\"MDM - 42Gears\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/42gears\",\"https:\/\/x.com\/42Gears\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d\",\"name\":\"42Gears Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g\",\"caption\":\"42Gears Team\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to balance mobile privacy vs security","description":"Read about major challenges that an organization face with BYOD and how to evaluate and measure different aspects of BYOD before implementation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/","og_locale":"nl_NL","og_type":"article","og_title":"How to balance mobile privacy vs security","og_description":"Read about major challenges that an organization face with BYOD and how to evaluate and measure different aspects of BYOD before implementation.","og_url":"https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/","og_site_name":"42Gears Mobility Systems","article_publisher":"https:\/\/www.facebook.com\/42gears","article_published_time":"2016-06-08T06:28:52+00:00","article_modified_time":"2025-01-07T07:07:13+00:00","og_image":[{"url":"http:\/\/live-42gears-site.pantheonsite.io\/wp-content\/uploads\/2016\/06\/byod-banner-blog.jpg","type":"","width":"","height":""}],"author":"42Gears Team","twitter_card":"summary_large_image","twitter_creator":"@42Gears","twitter_site":"@42Gears","twitter_misc":{"Written by":"42Gears Team","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/#article","isPartOf":{"@id":"https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/"},"author":{"name":"42Gears Team","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d"},"headline":"How to balance mobile privacy vs security","datePublished":"2016-06-08T06:28:52+00:00","dateModified":"2025-01-07T07:07:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/"},"wordCount":1094,"commentCount":0,"publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"image":{"@id":"https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/#primaryimage"},"thumbnailUrl":"http:\/\/live-42gears-site.pantheonsite.io\/wp-content\/uploads\/2016\/06\/byod-banner-blog.jpg","keywords":["BYOD","Enterprise Mobility","Mobility"],"articleSection":["Business","Enterprise Mobility"],"inLanguage":"nl","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/","url":"https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/","name":"How to balance mobile privacy vs security","isPartOf":{"@id":"https:\/\/www.42gears.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/#primaryimage"},"image":{"@id":"https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/#primaryimage"},"thumbnailUrl":"http:\/\/live-42gears-site.pantheonsite.io\/wp-content\/uploads\/2016\/06\/byod-banner-blog.jpg","datePublished":"2016-06-08T06:28:52+00:00","dateModified":"2025-01-07T07:07:13+00:00","description":"Read about major challenges that an organization face with BYOD and how to evaluate and measure different aspects of BYOD before implementation.","breadcrumb":{"@id":"https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/#breadcrumb"},"inLanguage":"nl","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/"]}]},{"@type":"ImageObject","inLanguage":"nl","@id":"https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/#primaryimage","url":"http:\/\/live-42gears-site.pantheonsite.io\/wp-content\/uploads\/2016\/06\/byod-banner-blog.jpg","contentUrl":"http:\/\/live-42gears-site.pantheonsite.io\/wp-content\/uploads\/2016\/06\/byod-banner-blog.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.42gears.com\/pt-br\/blog\/how-to-balance-mobile-privacy-vs-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.42gears.com\/nl\/"},{"@type":"ListItem","position":2,"name":"How to balance mobile privacy vs security"}]},{"@type":"WebSite","@id":"https:\/\/www.42gears.com\/#website","url":"https:\/\/www.42gears.com\/","name":"42Gears Mobility Systems","description":"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown","publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.42gears.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl"},{"@type":"Organization","@id":"https:\/\/www.42gears.com\/#organization","name":"MDM - 42Gears","url":"https:\/\/www.42gears.com\/","logo":{"@type":"ImageObject","inLanguage":"nl","@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","width":499,"height":330,"caption":"MDM - 42Gears"},"image":{"@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/42gears","https:\/\/x.com\/42Gears"]},{"@type":"Person","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d","name":"42Gears Team","image":{"@type":"ImageObject","inLanguage":"nl","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g","caption":"42Gears Team"}}]}},"author_meta":{"ID":"7","user_nicename":"42gears","user_email":"42gears@gmail.com","user_registered":"2015-07-15 04:55:37","display_name":"42Gears Team","first_name":"42Gears","last_name":"Team"},"_links":{"self":[{"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/posts\/15097","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/comments?post=15097"}],"version-history":[{"count":9,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/posts\/15097\/revisions"}],"predecessor-version":[{"id":110392,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/posts\/15097\/revisions\/110392"}],"wp:attachment":[{"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/media?parent=15097"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/categories?post=15097"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.42gears.com\/nl\/wp-json\/wp\/v2\/tags?post=15097"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}