{"id":5359,"date":"2020-06-26T11:42:59","date_gmt":"2020-06-26T04:42:59","guid":{"rendered":"https:\/\/bap-software.net\/?p=5359"},"modified":"2020-06-30T13:25:25","modified_gmt":"2020-06-30T06:25:25","slug":"isms","status":"publish","type":"post","link":"https:\/\/bap-software.net\/en\/isms\/","title":{"rendered":"ISMS And The Reason For Implementing One"},"content":{"rendered":"<p>Information security is considered as a part of making the brand, reputation and prestige of each business, so that the management of information security for BAP SOFTWARE not only protects brand name but also is an opportunity to better protect the company&#8217;s information property as well as raising awareness of information security at work through training and application of ISMS for employees.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"365\" class=\"aligncenter size-full wp-image-5360\" src=\"https:\/\/cdn.bap-software.net\/2020\/06\/isms-awareness.jpg\" alt=\"isms awareness\" \/><\/p>\n<h2><strong>So, did you know ISMS before?<\/strong><\/h2>\n<p>An information security management system (ISMS) is a set of policies and procedures for systematically managing an organization&#8217;s sensitive data. The goal of an ISMS is to minimize risk and ensure business continuity by pro-actively limiting the impact of a security breach.<\/p>\n<p>An ISMS typically addresses employee behavior and processes as well as data and technology. It can be targeted towards a particular type of data, such as customer data, or it can be implemented in a comprehensive way that becomes part of the company&#8217;s culture.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"345\" class=\"aligncenter size-full wp-image-5361\" src=\"https:\/\/cdn.bap-software.net\/2020\/06\/isms-iso.jpg\" alt=\"isms iso\" \/><\/p>\n<p>ISO 27001 is a specification for creating an ISMS. It does not mandate specific actions, but includes suggestions for documentation, internal audits, continual improvement, and corrective and preventive action<\/p>\n<p>It enables compliance with a host of laws and focuses on protecting three key aspects of information:<\/p>\n<p>Confidentiality: The information is not available or disclosed to unauthorised people, entities or processes.<\/p>\n<p>Integrity: The information is complete and accurate, and protected from corruption.<\/p>\n<p>Availability: The information is accessible and usable by authorised users.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"359\" class=\"aligncenter size-full wp-image-5362\" src=\"https:\/\/cdn.bap-software.net\/2020\/06\/isms-solutions.jpg\" alt=\"isms solutions\" \/><\/p>\n<h2><strong>Benefits of an ISMS<\/strong><\/h2>\n<p>An ISO 27001-compliant ISMS does more than simply help you comply with laws and win business. It a can also:<\/p>\n<p>Secure your information in all its forms: An ISMS helps protect all forms of information, whether digital, paper-based or in the Cloud.<\/p>\n<p>Increase your attack resilience: Implementing and maintaining an ISMS will significantly increase your organisation\u2019s resilience to cyber attacks.<\/p>\n<p>Manage all your information in one place: An ISMS provides a central framework for keeping your organisation\u2019s information safe and managing it all in one place.<\/p>\n<p>Respond to evolving security threats: Constantly adapting to changes both in the environment and inside the organisation, an ISMS reduces the threat of continually evolving risks.<\/p>\n<p>Reduce costs associated with information security: Thanks to the risk assessment and analysis approach of an ISMS, organisations can reduce costs spent on indiscriminately adding layers of defensive technology that might not work.<\/p>\n<p>Protect the confidentiality, availability and integrity of your data: An ISMS offers a set of policies, procedures, technical and physical controls to protect the confidentiality, availability and integrity of your information.<\/p>\n<p>Improve company culture: An ISMS\u2019s holistic approach covers the whole organisation, not just IT. This enables employees to readily understand risks and embrace security controls as part of their everyday working practices.<\/p>\n<p>Here are some companies that successfully applied to ISMS: Rikkei, VNPT, VINATI IT, EVN, FSI, Framga, VINASAT,\u2026<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"365\" class=\"aligncenter size-full wp-image-5363\" src=\"https:\/\/cdn.bap-software.net\/2020\/06\/iso-27001-certification.jpg\" alt=\"iso 27001 certification\" \/><\/p>\n<p>In order to set up and apply ISO\/IEC 27001 effectively, BAP SOFTWARE is aware that there are some important factors needed:<\/p>\n<p>The determination of the organization leadership, expressed through the support of resources, costs and implementation commitments.<\/p>\n<p>The activities of the specialized security function must take place regularly and continuously to check the compliance with policies, regulations, processes that have been developed and approved to find out the inappropriate points. .<\/p>\n<p>The close coordination between units in the organization as well as related units.<\/p>\n<p style=\"text-align: right;\">Source:\u00a0 Cnii.cybersecurity and itgovernance.co.uk<\/p>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Information security is considered as a part of making the brand, reputation and prestige of each business, so that the management of information security for BAP SOFTWARE not only protects brand name but also is an opportunity to better protect the company&#8217;s information property as well as raising awareness of information security at work through training and application of ISMS for employees. So, did you know ISMS before? An information security management system (ISMS) is a set of policies and procedures for systematically managing an organization&#8217;s sensitive data. The goal of an ISMS is to minimize risk and ensure business continuity by pro-actively limiting the impact of a security breach. An ISMS typically addresses employee behavior and processes as well as data and technology. It can be targeted towards a particular type of data, such as customer data, or it can be implemented in a comprehensive way that becomes part of the company&#8217;s culture. ISO 27001 is a specification for creating an ISMS. It does not mandate specific actions, but includes suggestions for documentation, internal audits, continual improvement, and corrective and preventive action It enables compliance with a host of laws and focuses on protecting three key aspects of information: Confidentiality: The information is not available or disclosed to unauthorised people, entities or processes. Integrity: The information is complete and accurate, and protected from corruption. Availability: The information is accessible and usable by authorised users. Benefits of an ISMS An ISO 27001-compliant ISMS does more than simply help you comply with laws and win business. It a can also: Secure your information in all its forms: An ISMS helps protect all forms of information, whether digital, paper-based or in the Cloud. Increase your attack resilience: Implementing and maintaining an ISMS will significantly increase your organisation\u2019s resilience to cyber attacks. Manage [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":5360,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"location":[],"class_list":["post-5359","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.1 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>ISMS And The Reason For Implementing One - Software development - offshore service | BAP Software<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bap-software.net\/en\/isms\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ISMS And The Reason For Implementing One\" \/>\n<meta property=\"og:description\" content=\"Information security is considered as a part of making the brand, reputation and prestige of each business, so that the management of information security for BAP SOFTWARE not only protects brand name but also is an opportunity to better protect the company&#8217;s information property as well as raising awareness of information security at work through training and application of ISMS for employees. So, did you know ISMS before? An information security management system (ISMS) is a set of policies and procedures for systematically managing an organization&#8217;s sensitive data. The goal of an ISMS is to minimize risk and ensure business continuity by pro-actively limiting the impact of a security breach. An ISMS typically addresses employee behavior and processes as well as data and technology. It can be targeted towards a particular type of data, such as customer data, or it can be implemented in a comprehensive way that becomes part of the company&#8217;s culture. ISO 27001 is a specification for creating an ISMS. It does not mandate specific actions, but includes suggestions for documentation, internal audits, continual improvement, and corrective and preventive action It enables compliance with a host of laws and focuses on protecting three key aspects of information: Confidentiality: The information is not available or disclosed to unauthorised people, entities or processes. Integrity: The information is complete and accurate, and protected from corruption. Availability: The information is accessible and usable by authorised users. Benefits of an ISMS An ISO 27001-compliant ISMS does more than simply help you comply with laws and win business. It a can also: Secure your information in all its forms: An ISMS helps protect all forms of information, whether digital, paper-based or in the Cloud. Increase your attack resilience: Implementing and maintaining an ISMS will significantly increase your organisation\u2019s resilience to cyber attacks. Manage [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bap-software.net\/en\/isms\/\" \/>\n<meta property=\"og:site_name\" content=\"Software development - offshore service | BAP Software\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/bap32\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-26T04:42:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-30T06:25:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.bap-software.net\/2020\/06\/isms-awareness.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"650\" \/>\n\t<meta property=\"og:image:height\" content=\"365\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dao Thanh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@bapsoftware\" \/>\n<meta name=\"twitter:site\" content=\"@bapsoftware\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dao Thanh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"12 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bap-software.net\\\/en\\\/isms\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bap-software.net\\\/en\\\/isms\\\/\"},\"author\":{\"name\":\"Dao Thanh\",\"@id\":\"https:\\\/\\\/bap-software.net\\\/vi\\\/#\\\/schema\\\/person\\\/4201306759281a7db99be01ea4e863b0\"},\"headline\":\"ISMS And The Reason For Implementing One\",\"datePublished\":\"2020-06-26T04:42:59+00:00\",\"dateModified\":\"2020-06-30T06:25:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bap-software.net\\\/en\\\/isms\\\/\"},\"wordCount\":2433,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/bap-software.net\\\/en\\\/isms\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn.bap-software.net\\\/2020\\\/06\\\/isms-awareness.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/bap-software.net\\\/en\\\/isms\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bap-software.net\\\/en\\\/isms\\\/\",\"url\":\"https:\\\/\\\/bap-software.net\\\/en\\\/isms\\\/\",\"name\":\"ISMS And The Reason For Implementing One - Software development - offshore service | BAP Software\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bap-software.net\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bap-software.net\\\/en\\\/isms\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bap-software.net\\\/en\\\/isms\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn.bap-software.net\\\/2020\\\/06\\\/isms-awareness.jpg\",\"datePublished\":\"2020-06-26T04:42:59+00:00\",\"dateModified\":\"2020-06-30T06:25:25+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/bap-software.net\\\/vi\\\/#\\\/schema\\\/person\\\/4201306759281a7db99be01ea4e863b0\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bap-software.net\\\/en\\\/isms\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[[\"https:\\\/\\\/bap-software.net\\\/en\\\/isms\\\/\"]]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/bap-software.net\\\/en\\\/isms\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cdn.bap-software.net\\\/2020\\\/06\\\/isms-awareness.jpg\",\"contentUrl\":\"https:\\\/\\\/cdn.bap-software.net\\\/2020\\\/06\\\/isms-awareness.jpg\",\"width\":650,\"height\":365,\"caption\":\"isms awareness\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bap-software.net\\\/en\\\/isms\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/bap-software.net\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ISMS And The Reason For Implementing One\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bap-software.net\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/bap-software.net\\\/en\\\/\",\"name\":\"Software development - offshore service | BAP Software\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bap-software.net\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/bap-software.net\\\/vi\\\/#\\\/schema\\\/person\\\/4201306759281a7db99be01ea4e863b0\",\"name\":\"Dao Thanh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/55e6932a633b56e79fda4c661fc49a96471fecfaf49cf903c3ebf00b103e542c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/55e6932a633b56e79fda4c661fc49a96471fecfaf49cf903c3ebf00b103e542c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/55e6932a633b56e79fda4c661fc49a96471fecfaf49cf903c3ebf00b103e542c?s=96&d=identicon&r=g\",\"caption\":\"Dao Thanh\"},\"sameAs\":[\"https:\\\/\\\/bap-software.net\"],\"url\":\"https:\\\/\\\/bap-software.net\\\/en\\\/author\\\/daothanh\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"ISMS And The Reason For Implementing One - Software development - offshore service | BAP Software","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bap-software.net\/en\/isms\/","og_locale":"en_US","og_type":"article","og_title":"ISMS And The Reason For Implementing One","og_description":"Information security is considered as a part of making the brand, reputation and prestige of each business, so that the management of information security for BAP SOFTWARE not only protects brand name but also is an opportunity to better protect the company&#8217;s information property as well as raising awareness of information security at work through training and application of ISMS for employees. So, did you know ISMS before? An information security management system (ISMS) is a set of policies and procedures for systematically managing an organization&#8217;s sensitive data. The goal of an ISMS is to minimize risk and ensure business continuity by pro-actively limiting the impact of a security breach. An ISMS typically addresses employee behavior and processes as well as data and technology. It can be targeted towards a particular type of data, such as customer data, or it can be implemented in a comprehensive way that becomes part of the company&#8217;s culture. ISO 27001 is a specification for creating an ISMS. It does not mandate specific actions, but includes suggestions for documentation, internal audits, continual improvement, and corrective and preventive action It enables compliance with a host of laws and focuses on protecting three key aspects of information: Confidentiality: The information is not available or disclosed to unauthorised people, entities or processes. Integrity: The information is complete and accurate, and protected from corruption. Availability: The information is accessible and usable by authorised users. Benefits of an ISMS An ISO 27001-compliant ISMS does more than simply help you comply with laws and win business. It a can also: Secure your information in all its forms: An ISMS helps protect all forms of information, whether digital, paper-based or in the Cloud. Increase your attack resilience: Implementing and maintaining an ISMS will significantly increase your organisation\u2019s resilience to cyber attacks. Manage [&hellip;]","og_url":"https:\/\/bap-software.net\/en\/isms\/","og_site_name":"Software development - offshore service | BAP Software","article_publisher":"https:\/\/www.facebook.com\/bap32","article_published_time":"2020-06-26T04:42:59+00:00","article_modified_time":"2020-06-30T06:25:25+00:00","og_image":[{"width":650,"height":365,"url":"https:\/\/cdn.bap-software.net\/2020\/06\/isms-awareness.jpg","type":"image\/jpeg"}],"author":"Dao Thanh","twitter_card":"summary_large_image","twitter_creator":"@bapsoftware","twitter_site":"@bapsoftware","twitter_misc":{"Written by":"Dao Thanh","Est. reading time":"12 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bap-software.net\/en\/isms\/#article","isPartOf":{"@id":"https:\/\/bap-software.net\/en\/isms\/"},"author":{"name":"Dao Thanh","@id":"https:\/\/bap-software.net\/vi\/#\/schema\/person\/4201306759281a7db99be01ea4e863b0"},"headline":"ISMS And The Reason For Implementing One","datePublished":"2020-06-26T04:42:59+00:00","dateModified":"2020-06-30T06:25:25+00:00","mainEntityOfPage":{"@id":"https:\/\/bap-software.net\/en\/isms\/"},"wordCount":2433,"commentCount":0,"image":{"@id":"https:\/\/bap-software.net\/en\/isms\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.bap-software.net\/2020\/06\/isms-awareness.jpg","articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/bap-software.net\/en\/isms\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/bap-software.net\/en\/isms\/","url":"https:\/\/bap-software.net\/en\/isms\/","name":"ISMS And The Reason For Implementing One - Software development - offshore service | BAP Software","isPartOf":{"@id":"https:\/\/bap-software.net\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bap-software.net\/en\/isms\/#primaryimage"},"image":{"@id":"https:\/\/bap-software.net\/en\/isms\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.bap-software.net\/2020\/06\/isms-awareness.jpg","datePublished":"2020-06-26T04:42:59+00:00","dateModified":"2020-06-30T06:25:25+00:00","author":{"@id":"https:\/\/bap-software.net\/vi\/#\/schema\/person\/4201306759281a7db99be01ea4e863b0"},"breadcrumb":{"@id":"https:\/\/bap-software.net\/en\/isms\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":[["https:\/\/bap-software.net\/en\/isms\/"]]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/bap-software.net\/en\/isms\/#primaryimage","url":"https:\/\/cdn.bap-software.net\/2020\/06\/isms-awareness.jpg","contentUrl":"https:\/\/cdn.bap-software.net\/2020\/06\/isms-awareness.jpg","width":650,"height":365,"caption":"isms awareness"},{"@type":"BreadcrumbList","@id":"https:\/\/bap-software.net\/en\/isms\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/bap-software.net\/en\/"},{"@type":"ListItem","position":2,"name":"ISMS And The Reason For Implementing One"}]},{"@type":"WebSite","@id":"https:\/\/bap-software.net\/en\/#website","url":"https:\/\/bap-software.net\/en\/","name":"Software development - offshore service | BAP Software","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bap-software.net\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/bap-software.net\/vi\/#\/schema\/person\/4201306759281a7db99be01ea4e863b0","name":"Dao Thanh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/55e6932a633b56e79fda4c661fc49a96471fecfaf49cf903c3ebf00b103e542c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/55e6932a633b56e79fda4c661fc49a96471fecfaf49cf903c3ebf00b103e542c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/55e6932a633b56e79fda4c661fc49a96471fecfaf49cf903c3ebf00b103e542c?s=96&d=identicon&r=g","caption":"Dao Thanh"},"sameAs":["https:\/\/bap-software.net"],"url":"https:\/\/bap-software.net\/en\/author\/daothanh\/"}]}},"_links":{"self":[{"href":"https:\/\/bap-software.net\/en\/wp-json\/wp\/v2\/posts\/5359","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bap-software.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bap-software.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bap-software.net\/en\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/bap-software.net\/en\/wp-json\/wp\/v2\/comments?post=5359"}],"version-history":[{"count":0,"href":"https:\/\/bap-software.net\/en\/wp-json\/wp\/v2\/posts\/5359\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bap-software.net\/en\/wp-json\/wp\/v2\/media\/5360"}],"wp:attachment":[{"href":"https:\/\/bap-software.net\/en\/wp-json\/wp\/v2\/media?parent=5359"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bap-software.net\/en\/wp-json\/wp\/v2\/categories?post=5359"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bap-software.net\/en\/wp-json\/wp\/v2\/tags?post=5359"},{"taxonomy":"location","embeddable":true,"href":"https:\/\/bap-software.net\/en\/wp-json\/wp\/v2\/location?post=5359"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}