{"id":4280,"date":"2017-09-22T11:05:59","date_gmt":"2017-09-22T10:05:59","guid":{"rendered":"https:\/\/www.infolaw.co.uk\/newsletter\/?p=4280"},"modified":"2017-09-22T10:02:08","modified_gmt":"2017-09-22T09:02:08","slug":"what-is-encryption","status":"publish","type":"post","link":"https:\/\/www.infolaw.co.uk\/newsletter\/2017\/09\/what-is-encryption\/","title":{"rendered":"What is encryption?"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.infolaw.co.uk\/newsletter\/wp-content\/uploads\/2017\/09\/Hacker-Firewall-by-Christoph-Scholz.jpg\" alt=\"Hacker Firewall by Christoph Scholz\" width=\"640\" \/><\/p>\n<p>Encryption is a way of making data secure, so that it can only be accessed by authorised parties. Cryptographic techniques are used to render information unintelligible to any third parties whilst it is being stored on an electronic device such as a laptop or smartphone, or during its transit from sender to recipient over the internet or other types of computer network.<\/p>\n<p>There are many techniques of encryption but the main principles are as follows:<\/p>\n<ul>\n<li>Unencrypted data is referred to as \u201cplaintext\u201d.<\/li>\n<li>Plaintext is encrypted using an algorithm known as a \u201ccipher\u201d.<\/li>\n<li>The algorithm also generates a pseudo-random encryption \u201ckey\u201d.<\/li>\n<li>Once plaintext has been encrypted it is known as \u201cciphertext\u201d.<\/li>\n<li>The ciphertext is unreadable and can only be deciphered (ie converted back to plaintext) with the symmetric (private) or asymmetric (public) key which was previously generated by the algorithm.<\/li>\n<li>End to end encryption means that data which passes through a company\u2019s servers (eg WhatsApp) can only be read by the sender and recipient and cannot be accessed or interfered with by the company handling the data.<\/li>\n<\/ul>\n<p>Hashing is another method used to help to preserve the <em>integrity<\/em> of data but it is different from encryption. A hash is essentially a digital fingerprint of mapped digital information and it can be used to verify that a second instance of the information is exactly the same as the original and has not been tampered with. But hashing is a one way process; there is no way to reverse a hash or obtain any intelligible information from it. However, it can be used effectively in conjunction with encryption, particularly where the encrypted data needs to be transmitted across insecure networks.<\/p>\n<h3>Pros and cons<\/h3>\n<p>In an age where vast swathes of personal information are stored on internet-connected devices and online, the need to protect privacy has never been greater. Whether it\u2019s alleged Russian interference in the 2016 American elections or personal details of 143 million individuals being compromised by a <a href=\"http:\/\/www.bbc.co.uk\/news\/business-41192163\">hack<\/a> into a worldwide credit report company, the relentless surge of cybercrime means that leaving data unencrypted is akin to leaving your front door unlocked. Most of the tech giants are building sophisticated encryption into their devices, apps and software as standard \u2013 not least because laws increasingly demand that data protection be taken seriously, but also due to customer expectation. Furthermore, privacy campaigners, including human rights organisations such as <a href=\"https:\/\/www.amnesty.org\/en\/latest\/campaigns\/2016\/10\/easy-guide-to-encryption-and-why-it-matters\/\">Amnesty International<\/a>, argue that end to end encryption is crucial for providing people who live in totalitarian regimes with the ability to communicate freely without being monitored by oppressive governments or dictatorships.<\/p>\n<p>However there are also many concerns about encryption, primarily raised by governments, police and law enforcement agencies. Whilst encryption can be used to thwart criminal hackers, on the flipside it can also facilitate crime and prevent criminals from being caught. The authorities often claim that encryption impedes criminal investigations into terrorism, paedophilia and other crimes where crucial evidence is locked away on a smartphone, laptop or cloud based storage or communication services. One solution, which is often put forward to prevent criminals hiding behind encryption, is to provide law enforcement with a virtual skeleton key which gives them \u2018backdoor\u2019 access to any encrypted material. However, the fallacy of this argument is that any such backdoor would also be hackable by malevolent parties and consequently creates a huge opportunity for cybercriminals. An example of this is the ransomware attack which affected the NHS; the WannaCry virus apparently used an <a href=\"https:\/\/www.theguardian.com\/technology\/2017\/may\/12\/nhs-ransomware-cyber-attack-what-is-wanacrypt0r-20\">exploit<\/a> which had previously been leaked as part of a cache of NSA hacking tools.<\/p>\n<h3>Legislation dealing with encryption<\/h3>\n<p>Principle 7 of the <strong>Data Protection Act<\/strong> requires that all businesses holding personal data take \u201cappropriate technical and organisational measures\u201d against its \u201cunauthorised or unlawful processing\u201d. Although it does not specify the use of encryption, the ICO <a href=\"https:\/\/ico.org.uk\/for-organisations\/guide-to-data-protection\/encryption\/\">notes<\/a> that data controllers should \u201cbe aware of any industry or sector specific guidelines that may recommend a minimum standard for encrypting personal data\u201d.<\/p>\n<p>The <strong>General Data Protection Regulation<\/strong> (GDPR) comes into effect on 25 May 2018. This will tighten up many of the existing data protection requirements, significantly increase maximum penalties and introduce new rules. Of particular note for purposes of encryption is Article 32 which requires data controllers and processors to \u201cimplement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate &#8230; the pseudonymisation and encryption of personal data\u201d.<\/p>\n<p>Part III of the <strong>Regulation of Investigatory Powers Act 2000<\/strong> (RIPA) allows authorities to force a person to either hand over an encryption key to access data or to provide the requested material in an intelligible form.<\/p>\n<p>The <strong>Investigatory Powers Act 2016<\/strong> extends the powers of authorities to demand that service providers who are served a Technical Capability Notice (TCN) remove any \u201celectronic protection\u201d (s 253(5)(c)) \u2013 which essentially means encryption or any similar technology. However, this requirement is subject to the \u201ctechnical feasibility\u201d of complying with the notice (s. 255(3)(c)).<\/p>\n<h3>Recent developments<\/h3>\n<p>In the USA, following the San Bernardino terror attack in December 2015, the US government <a href=\"https:\/\/www.engadget.com\/2016\/02\/18\/fbi-apple-iphone-explainer\/\">asked Apple to help the FBI<\/a> access encrypted data on the suspect\u2019s iPhone in case it contained any useful evidence or leads. Apple refused to comply with this request, arguing that the creation of a backdoor would pose a threat to the data of other customers. Although a legal battle was on the cards, the FBI withdrew its request after it purchased hacking software for <a href=\"https:\/\/www.macrumors.com\/2017\/05\/08\/fbi-paid-900k-hacking-tool-iphone\/\">$900,000<\/a> \u2013 which in the event found \u201cnothing of real significance\u201d.<\/p>\n<p>In the UK, following the Westminster Bridge terrorist incident in March 2017, home secretary Amber Rudd <a href=\"https:\/\/www.theguardian.com\/technology\/2017\/mar\/26\/intelligence-services-access-whatsapp-amber-rudd-westminster-attack-encrypted-messaging\">claimed<\/a> that it was \u201ccompletely unacceptable\u201d that the government could not read messages protected by end-to-end encryption. She argued that: \u201cWe need to make sure that organisations like WhatsApp, and there are plenty of others like that, don\u2019t provide a secret place for terrorists to communicate with each other.\u201d However, her rhetoric was met with <a href=\"https:\/\/www.theregister.co.uk\/2017\/07\/10\/former_gchq_wades_into_encryption_debate\/\">resistance<\/a> from the former GCHQ director Robert Hannigan who said that \u201cIt\u2019s not a good idea to weaken security for everybody in order to tackle a minority\u201d and warned that \u201cTrying to weaken the system, trying to build in backdoors won\u2019t work and is technically difficult\u201d.<\/p>\n<h3>Further reading<\/h3>\n<p>Pinsent Masons: <a href=\"https:\/\/www.out-law.com\/page-484\">Cryptography<\/a><\/p>\n<p>TechTarget: <a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/encryption\">Encryption<\/a><\/p>\n<p>ICO: <a href=\"https:\/\/ico.org.uk\/for-organisations\/guide-to-data-protection\/encryption\/\">Guide to Encryption<\/a><\/p>\n<p>legislation.gov.uk: <a href=\"http:\/\/www.legislation.gov.uk\/ukpga\/2016\/25\/section\/255\">Investigatory Powers Act 2016<\/a> s 255<\/p>\n<p>Amnesty International: <a href=\"http:\/\/bit.ly\/encryption4\">Easy guide to encryption and why it matters<\/a><\/p>\n<p>The Verge: <a href=\"https:\/\/www.theverge.com\/2016\/1\/12\/10749806\/encryption-debate-fbi-terrorism-going-dark\">The five big lies of the encryption debate<\/a><\/p>\n<p><em>Alex Heshmaty is a legal copywriter and journalist with a particular interest in legal technology. He runs <a href=\"http:\/\/www.legalwords.co.uk\">Legal Words<\/a>, a copywriting agency in Bristol. Email <a href=\"mailto:alex@legalwords.co.uk\">alex@legalwords.co.uk<\/a>. Twitter @<a href=\"https:\/\/twitter.com\/alexheshmaty\">alexheshmaty<\/a>.<\/em><\/p>\n<p><em>Image: <a href=\"https:\/\/www.flickr.com\/photos\/140988606@N08\/36359513993\">cc by Christoph Scholz<\/a> on Flickr.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Encryption is a way of making data secure, so that it can only be accessed by authorised parties. Cryptographic techniques are used to render information unintelligible to any third parties whilst it is being stored on an electronic device such as a laptop or smartphone, or during its transit from sender to recipient over the [&hellip;]<\/p>\n","protected":false},"author":61,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[133,4,124],"tags":[],"class_list":["post-4280","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-technology","category-understanding-the-internet"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>What is encryption? - Internet for Lawyers Newsletter<\/title>\r\n<meta name=\"description\" content=\"Encryption is a way of making data secure, so that it can only be accessed by authorised parties. Cryptographic techniques are used to render information\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.infolaw.co.uk\/newsletter\/2017\/09\/what-is-encryption\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_GB\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"What is encryption? - Internet for Lawyers Newsletter\" \/>\r\n<meta property=\"og:description\" content=\"Encryption is a way of making data secure, so that it can only be accessed by authorised parties. Cryptographic techniques are used to render information\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.infolaw.co.uk\/newsletter\/2017\/09\/what-is-encryption\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Internet for Lawyers Newsletter\" \/>\r\n<meta property=\"article:published_time\" content=\"2017-09-22T10:05:59+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/www.infolaw.co.uk\/newsletter\/wp-content\/uploads\/2017\/09\/Hacker-Firewall-by-Christoph-Scholz.jpg\" \/>\r\n<meta name=\"author\" content=\"Alex Heshmaty\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@nickholmes\" \/>\r\n<meta name=\"twitter:site\" content=\"@nickholmes\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alex Heshmaty\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.infolaw.co.uk\/newsletter\/2017\/09\/what-is-encryption\/\",\"url\":\"https:\/\/www.infolaw.co.uk\/newsletter\/2017\/09\/what-is-encryption\/\",\"name\":\"What is encryption? - Internet for Lawyers Newsletter\",\"isPartOf\":{\"@id\":\"https:\/\/www.infolaw.co.uk\/newsletter\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.infolaw.co.uk\/newsletter\/2017\/09\/what-is-encryption\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.infolaw.co.uk\/newsletter\/2017\/09\/what-is-encryption\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.infolaw.co.uk\/newsletter\/wp-content\/uploads\/2017\/09\/Hacker-Firewall-by-Christoph-Scholz.jpg\",\"datePublished\":\"2017-09-22T10:05:59+00:00\",\"author\":{\"@id\":\"https:\/\/www.infolaw.co.uk\/newsletter\/#\/schema\/person\/daff2a47987956c44c74c8e136c0ffde\"},\"description\":\"Encryption is a way of making data secure, so that it can only be accessed by authorised parties. Cryptographic techniques are used to render information\",\"breadcrumb\":{\"@id\":\"https:\/\/www.infolaw.co.uk\/newsletter\/2017\/09\/what-is-encryption\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.infolaw.co.uk\/newsletter\/2017\/09\/what-is-encryption\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.infolaw.co.uk\/newsletter\/2017\/09\/what-is-encryption\/#primaryimage\",\"url\":\"https:\/\/www.infolaw.co.uk\/newsletter\/wp-content\/uploads\/2017\/09\/Hacker-Firewall-by-Christoph-Scholz.jpg\",\"contentUrl\":\"https:\/\/www.infolaw.co.uk\/newsletter\/wp-content\/uploads\/2017\/09\/Hacker-Firewall-by-Christoph-Scholz.jpg\",\"width\":640,\"height\":453},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.infolaw.co.uk\/newsletter\/2017\/09\/what-is-encryption\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.infolaw.co.uk\/newsletter\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is encryption?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.infolaw.co.uk\/newsletter\/#website\",\"url\":\"https:\/\/www.infolaw.co.uk\/newsletter\/\",\"name\":\"Internet for Lawyers Newsletter\",\"description\":\"Edited by Nick Holmes\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.infolaw.co.uk\/newsletter\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.infolaw.co.uk\/newsletter\/#\/schema\/person\/daff2a47987956c44c74c8e136c0ffde\",\"name\":\"Alex Heshmaty\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.infolaw.co.uk\/newsletter\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/dd8296d053e8fde73684687cf6357300702da710fec385800bf0bf74f12a5916?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/dd8296d053e8fde73684687cf6357300702da710fec385800bf0bf74f12a5916?s=96&d=mm&r=g\",\"caption\":\"Alex Heshmaty\"},\"description\":\"Alex Heshmaty is technology editor for the Newsletter. He runs Legal Words, a legal copywriting agency based in the Silicon Gorge. Email alex@legalwords.co.uk.\",\"sameAs\":[\"http:\/\/www.legalwords.co.uk\"],\"url\":\"https:\/\/www.infolaw.co.uk\/newsletter\/author\/alexheshmaty\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is encryption? - Internet for Lawyers Newsletter","description":"Encryption is a way of making data secure, so that it can only be accessed by authorised parties. Cryptographic techniques are used to render information","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infolaw.co.uk\/newsletter\/2017\/09\/what-is-encryption\/","og_locale":"en_GB","og_type":"article","og_title":"What is encryption? - Internet for Lawyers Newsletter","og_description":"Encryption is a way of making data secure, so that it can only be accessed by authorised parties. Cryptographic techniques are used to render information","og_url":"https:\/\/www.infolaw.co.uk\/newsletter\/2017\/09\/what-is-encryption\/","og_site_name":"Internet for Lawyers Newsletter","article_published_time":"2017-09-22T10:05:59+00:00","og_image":[{"url":"https:\/\/www.infolaw.co.uk\/newsletter\/wp-content\/uploads\/2017\/09\/Hacker-Firewall-by-Christoph-Scholz.jpg","type":"","width":"","height":""}],"author":"Alex Heshmaty","twitter_card":"summary_large_image","twitter_creator":"@nickholmes","twitter_site":"@nickholmes","twitter_misc":{"Written by":"Alex Heshmaty","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.infolaw.co.uk\/newsletter\/2017\/09\/what-is-encryption\/","url":"https:\/\/www.infolaw.co.uk\/newsletter\/2017\/09\/what-is-encryption\/","name":"What is encryption? - Internet for Lawyers Newsletter","isPartOf":{"@id":"https:\/\/www.infolaw.co.uk\/newsletter\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infolaw.co.uk\/newsletter\/2017\/09\/what-is-encryption\/#primaryimage"},"image":{"@id":"https:\/\/www.infolaw.co.uk\/newsletter\/2017\/09\/what-is-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infolaw.co.uk\/newsletter\/wp-content\/uploads\/2017\/09\/Hacker-Firewall-by-Christoph-Scholz.jpg","datePublished":"2017-09-22T10:05:59+00:00","author":{"@id":"https:\/\/www.infolaw.co.uk\/newsletter\/#\/schema\/person\/daff2a47987956c44c74c8e136c0ffde"},"description":"Encryption is a way of making data secure, so that it can only be accessed by authorised parties. Cryptographic techniques are used to render information","breadcrumb":{"@id":"https:\/\/www.infolaw.co.uk\/newsletter\/2017\/09\/what-is-encryption\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infolaw.co.uk\/newsletter\/2017\/09\/what-is-encryption\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.infolaw.co.uk\/newsletter\/2017\/09\/what-is-encryption\/#primaryimage","url":"https:\/\/www.infolaw.co.uk\/newsletter\/wp-content\/uploads\/2017\/09\/Hacker-Firewall-by-Christoph-Scholz.jpg","contentUrl":"https:\/\/www.infolaw.co.uk\/newsletter\/wp-content\/uploads\/2017\/09\/Hacker-Firewall-by-Christoph-Scholz.jpg","width":640,"height":453},{"@type":"BreadcrumbList","@id":"https:\/\/www.infolaw.co.uk\/newsletter\/2017\/09\/what-is-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infolaw.co.uk\/newsletter\/"},{"@type":"ListItem","position":2,"name":"What is encryption?"}]},{"@type":"WebSite","@id":"https:\/\/www.infolaw.co.uk\/newsletter\/#website","url":"https:\/\/www.infolaw.co.uk\/newsletter\/","name":"Internet for Lawyers Newsletter","description":"Edited by Nick Holmes","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infolaw.co.uk\/newsletter\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.infolaw.co.uk\/newsletter\/#\/schema\/person\/daff2a47987956c44c74c8e136c0ffde","name":"Alex Heshmaty","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.infolaw.co.uk\/newsletter\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/dd8296d053e8fde73684687cf6357300702da710fec385800bf0bf74f12a5916?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/dd8296d053e8fde73684687cf6357300702da710fec385800bf0bf74f12a5916?s=96&d=mm&r=g","caption":"Alex Heshmaty"},"description":"Alex Heshmaty is technology editor for the Newsletter. He runs Legal Words, a legal copywriting agency based in the Silicon Gorge. Email alex@legalwords.co.uk.","sameAs":["http:\/\/www.legalwords.co.uk"],"url":"https:\/\/www.infolaw.co.uk\/newsletter\/author\/alexheshmaty\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infolaw.co.uk\/newsletter\/wp-json\/wp\/v2\/posts\/4280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infolaw.co.uk\/newsletter\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infolaw.co.uk\/newsletter\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infolaw.co.uk\/newsletter\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infolaw.co.uk\/newsletter\/wp-json\/wp\/v2\/comments?post=4280"}],"version-history":[{"count":5,"href":"https:\/\/www.infolaw.co.uk\/newsletter\/wp-json\/wp\/v2\/posts\/4280\/revisions"}],"predecessor-version":[{"id":4286,"href":"https:\/\/www.infolaw.co.uk\/newsletter\/wp-json\/wp\/v2\/posts\/4280\/revisions\/4286"}],"wp:attachment":[{"href":"https:\/\/www.infolaw.co.uk\/newsletter\/wp-json\/wp\/v2\/media?parent=4280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infolaw.co.uk\/newsletter\/wp-json\/wp\/v2\/categories?post=4280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infolaw.co.uk\/newsletter\/wp-json\/wp\/v2\/tags?post=4280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}