{"id":2622,"date":"2021-12-03T12:14:50","date_gmt":"2021-12-03T18:14:50","guid":{"rendered":"https:\/\/staging2.idsinc.com\/case-studies\/internet-filtering-software-reasonable-measures-copy\/"},"modified":"2022-12-07T13:42:32","modified_gmt":"2022-12-07T19:42:32","slug":"forensic-neutral","status":"publish","type":"page","link":"https:\/\/idsinc.com\/en_gb\/case-studies\/forensic-neutral\/","title":{"rendered":"Working as a Forensic Neutral to Help Counsel Understand How Parties Interacted with Devices"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-2622\" data-postid=\"2622\" class=\"themify_builder_content themify_builder_content-2622 themify_builder tf_clear\">\n                    <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_d952295 tb_first tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_yp38296 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_ixqa296 image-full-overlay   auto_fullwidth tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-202110-forensicneutral-1024x512.jpg\" class=\"wp-post-image wp-image-2486\" title=\"Working as a Forensic Neutral to Help Counsel Understand How Parties Interacted with Devices\" alt=\"Working as a Forensic Neutral to Help Counsel Understand How Parties Interacted with Devices\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-202110-forensicneutral-1024x512.jpg 1024w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-202110-forensicneutral-300x150.jpg 300w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-202110-forensicneutral-768x384.jpg 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-202110-forensicneutral-1536x768.jpg 1536w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-202110-forensicneutral-2048x1024.jpg 2048w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-202110-forensicneutral-1320x660.jpg 1320w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_szkr295 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_ygag297 first\">\n                    <!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_2pfz298\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    CHALLENGE            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_ecr1298\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>Plaintiff and Defendant agreed to retain iDS as a forensic neutral. Anonymous harassing text messages had been received by Party A and Party B was suspected as being the sender.<\/h5>\nCounsel for both Plaintiff and Defendant needed specific answers to the following:<br><br>\n<ul>\n<li>Did any evidence exist to show the use of anonymizing text message platforms<\/li>\n<li>If so, did the use of the anonymous text messages show visual similarities to the received text messages (i.e., fonts, format, field names, etc.)<\/li>\n<li>Was there any evidence to establish who specifically sent the anonymous text messages<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_2696298\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Solution            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_hhb4299\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>Our Forensic Team imaged multiple mobile devices and several laptop computers, allowing for analysis and reporting on the parties\u2019 digital interaction.<\/h5>\n<p>The iDS Forensics Team performed analysis and reporting on the following:<\/p>\n<ul>\n<li>A \u201ctest\u201d anonymous text was located on the suspect device that contained personal identifiable information of the accused sender (i.e., information known only to the sender)<\/li>\n<li>Multiple fields within the \u201ctest\u201d text on the suspect device matched the actual text from the victim device<\/li>\n<li>Text messages were located on a Part C device that pre-dated the phone being setup, indicating that the messages had been restored after phone setup to overwrite pre-existing text messages<\/li>\n<li>Unallocated spaces on the suspect laptop had been \u201coverwritten\u201d by the copying of hundreds of GBs of movie files onto the laptop hard drive on the day of deposition<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_mxjp300\" data-lazy=\"1\">\n        <h1 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Result            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h1>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_kyvq300\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5>iDS\u2019 Forensics Team was able to show counsel for Party A and Party B how each of their clients interacted with their devices. Additionally, we were able to show the traces of evidence that resulted as a result of those interactions.<\/h5>\n<p>Based upon our showings surrounding device interaction and the traces of resulting evidence, as well as the forensics findings presented directly to the court, the parties entered into a confidential settlement.<\/p>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n        <\/div>\n<!--\/themify_builder_content-->","protected":false},"excerpt":{"rendered":"<p>Plaintiff and Defendant agreed to retain iDS as a forensic neutral. Anonymous harassing text messages had been received by Party A and Party B was suspected as being the sender. Counsel for both Plaintiff and Defendant needed specific answers to the following: Did any evidence exist to show the use of anonymizing text message platforms [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2486,"parent":33,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"team":[],"class_list":["post-2622","page","type-page","status-publish","has-post-thumbnail","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Working as a Forensic Neutral - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"iDS shows displays the effectiveness of Working as a Forensic Neutral to Help Counsel Understand How Parties Interacted with Devices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/en_gb\/case-studies\/forensic-neutral\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Working as a Forensic Neutral to Help Counsel Understand How Parties Interacted with Devices\" \/>\n<meta property=\"og:description\" content=\"iDS shows displays the effectiveness of Working as a Forensic Neutral to Help Counsel Understand How Parties Interacted with Devices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/en_gb\/case-studies\/forensic-neutral\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-07T19:42:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-202110-forensicneutral.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/forensic-neutral\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/forensic-neutral\\\/\",\"name\":\"Working as a Forensic Neutral - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/forensic-neutral\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/forensic-neutral\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/iDS-CaseStudyImages-202110-forensicneutral.jpg\",\"datePublished\":\"2021-12-03T18:14:50+00:00\",\"dateModified\":\"2022-12-07T19:42:32+00:00\",\"description\":\"iDS shows displays the effectiveness of Working as a Forensic Neutral to Help Counsel Understand How Parties Interacted with Devices.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/forensic-neutral\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/forensic-neutral\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/forensic-neutral\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/iDS-CaseStudyImages-202110-forensicneutral.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/iDS-CaseStudyImages-202110-forensicneutral.jpg\",\"width\":2500,\"height\":1250},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/forensic-neutral\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case Studies\",\"item\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Working as a Forensic Neutral to Help Counsel Understand How Parties Interacted with Devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Working as a Forensic Neutral - iDiscovery Solutions","description":"iDS shows displays the effectiveness of Working as a Forensic Neutral to Help Counsel Understand How Parties Interacted with Devices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/en_gb\/case-studies\/forensic-neutral\/","og_locale":"en_GB","og_type":"article","og_title":"Working as a Forensic Neutral to Help Counsel Understand How Parties Interacted with Devices","og_description":"iDS shows displays the effectiveness of Working as a Forensic Neutral to Help Counsel Understand How Parties Interacted with Devices.","og_url":"https:\/\/idsinc.com\/en_gb\/case-studies\/forensic-neutral\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_modified_time":"2022-12-07T19:42:32+00:00","og_image":[{"width":2500,"height":1250,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-202110-forensicneutral.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/idsinc.com\/case-studies\/forensic-neutral\/","url":"https:\/\/idsinc.com\/case-studies\/forensic-neutral\/","name":"Working as a Forensic Neutral - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/case-studies\/forensic-neutral\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/case-studies\/forensic-neutral\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-202110-forensicneutral.jpg","datePublished":"2021-12-03T18:14:50+00:00","dateModified":"2022-12-07T19:42:32+00:00","description":"iDS shows displays the effectiveness of Working as a Forensic Neutral to Help Counsel Understand How Parties Interacted with Devices.","breadcrumb":{"@id":"https:\/\/idsinc.com\/case-studies\/forensic-neutral\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/case-studies\/forensic-neutral\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/case-studies\/forensic-neutral\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-202110-forensicneutral.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/12\/iDS-CaseStudyImages-202110-forensicneutral.jpg","width":2500,"height":1250},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/case-studies\/forensic-neutral\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Case Studies","item":"https:\/\/idsinc.com\/case-studies\/"},{"@type":"ListItem","position":3,"name":"Working as a Forensic Neutral to Help Counsel Understand How Parties Interacted with Devices"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery Solutions","description":"Use data to your advantage in the courtroom","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery Solutions","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"}]}},"builder_content":"\n<h1>CHALLENGE<br\/><\/h1>\n<h5>Plaintiff and Defendant agreed to retain iDS as a forensic neutral. Anonymous harassing text messages had been received by Party A and Party B was suspected as being the sender.<\/h5> Counsel for both Plaintiff and Defendant needed specific answers to the following:<br><br> <ul> <li>Did any evidence exist to show the use of anonymizing text message platforms<\/li> <li>If so, did the use of the anonymous text messages show visual similarities to the received text messages (i.e., fonts, format, field names, etc.)<\/li> <li>Was there any evidence to establish who specifically sent the anonymous text messages<\/li> <\/ul>\n<h1>Solution<br\/><\/h1>\n<h5>Our Forensic Team imaged multiple mobile devices and several laptop computers, allowing for analysis and reporting on the parties\u2019 digital interaction.<\/h5> <p>The iDS Forensics Team performed analysis and reporting on the following:<\/p> <ul> <li>A \u201ctest\u201d anonymous text was located on the suspect device that contained personal identifiable information of the accused sender (i.e., information known only to the sender)<\/li> <li>Multiple fields within the \u201ctest\u201d text on the suspect device matched the actual text from the victim device<\/li> <li>Text messages were located on a Part C device that pre-dated the phone being setup, indicating that the messages had been restored after phone setup to overwrite pre-existing text messages<\/li> <li>Unallocated spaces on the suspect laptop had been \u201coverwritten\u201d by the copying of hundreds of GBs of movie files onto the laptop hard drive on the day of deposition<\/li> <\/ul>\n<h1>Result<br\/><\/h1>\n<h5>iDS\u2019 Forensics Team was able to show counsel for Party A and Party B how each of their clients interacted with their devices. Additionally, we were able to show the traces of evidence that resulted as a result of those interactions.<\/h5> <p>Based upon our showings surrounding device interaction and the traces of resulting evidence, as well as the forensics findings presented directly to the court, the parties entered into a confidential settlement.<\/p>","_links":{"self":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/2622","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/comments?post=2622"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/2622\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/33"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media\/2486"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media?parent=2622"}],"wp:term":[{"taxonomy":"team","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/team?post=2622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}