{"id":272,"date":"2021-01-27T15:20:27","date_gmt":"2021-01-27T21:20:27","guid":{"rendered":"https:\/\/idsinc.com\/?page_id=272"},"modified":"2024-01-10T10:43:29","modified_gmt":"2024-01-10T16:43:29","slug":"industry-trade-secrets","status":"publish","type":"page","link":"https:\/\/idsinc.com\/en_gb\/case-studies\/industry-trade-secrets\/","title":{"rendered":"Misappropriation of Trade Secrets \u2013 A Comprehensive Investigation"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-272\" data-postid=\"272\" class=\"themify_builder_content themify_builder_content-272 themify_builder tf_clear\">\n                    <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_sxix889 tb_first tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_dvve891 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_1zqw507 image-full-overlay   auto_fullwidth tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Industry-Trade-Secrets-1024x512.jpg\" class=\"wp-post-image wp-image-274\" title=\"iDiscovery Solutions Case Study - Misappropriation of Trade Secrets\" alt=\"Misappropriation of Trade Secrets, Case Study, iDiscovery Solutions, Digital Forensics, Trade Secrets\" srcset=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Industry-Trade-Secrets-1024x512.jpg 1024w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Industry-Trade-Secrets-300x150.jpg 300w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Industry-Trade-Secrets-768x384.jpg 768w, https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Industry-Trade-Secrets.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_z67o610 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_cajx611 first\">\n                    <!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_k9lo497\" data-lazy=\"1\">\n        <h2 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    CHALLENGE            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h2>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_vvfw5\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5><em><strong>An insurance industry client hired 70 employees from a competitor. They were accused of receiving and using trade secrets from the departed employee&#8217;s company.<\/strong><\/em><\/h5>\n<p>The Plaintiff had spent hundreds of thousands of dollars to perform digital forensics, both internally and through an independent service provider.<\/p>\n<p><strong>The client needed expertise for the following:<\/strong><\/p>\n<ul>\n<li>\n<p>To understand how to read and interpret tens of hundreds of pages of \u201cdigital forensic evidence\u201d.<\/p>\n<\/li>\n<li>\n<p>To understand how data gets stored, how data can be moved from one location to another, and to explain the reasons data<\/p>\n<p>may not be present on certain systems.<\/p>\n<\/li>\n<li>\n<p>To understand, explain and analyze the various ways to examine systems for the exfiltration and usage of data.<\/p>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_mxqe422\" data-lazy=\"1\">\n        <h2 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Solution            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h2>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_olr8818\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5><em>Using a team of experts, we evaluated the security measures in place as compared to industry standards. In addition, an expert report was composed describing our conclusions.<\/em><\/h5>\n<p>Our iDS Digital Forensics Consulting Experts examined numerous reports, artifacts and other materials to determine what the forensic evidence \u201creally showed\u201d.<\/p>\n<p><strong>The iDS Consulting team analyzed and reported on the following:<\/strong><\/p>\n<ul>\n<li>\n<p>That hundreds of devices had been forensically imaged and analyzed.<\/p>\n<\/li>\n<li>\n<p>That the artifacts listed in the reports simply showed access of documents from the corporate devices themselves as opposed to<\/p>\n<p>documents being exfiltrated.<\/p>\n<\/li>\n<li>\n<p>That no actual data had been exfiltrated.<\/p>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_7tyc312\" data-lazy=\"1\">\n        <h2 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Result            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h2>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_17by0\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h5><em>Through live testimony, the iDS expert was able to demonstrate the lack of forensic evidence to support any allegation of electronic data misappropriation.<\/em><\/h5>\n<p>Our client won a trial verdict, stating that in large part it was due to the iDS work dissecting the evidence and our ability to testify about the lack of forensic evidence in plain English.<\/p>\n<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n        <\/div>\n<!--\/themify_builder_content-->","protected":false},"excerpt":{"rendered":"<p>An insurance industry client hired 70 employees from a competitor. They were accused of receiving and using trade secrets from the departed employee&#8217;s company. The Plaintiff had spent hundreds of thousands of dollars to perform digital forensics, both internally and through an independent service provider. The client needed expertise for the following: To understand how [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":274,"parent":33,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"team":[],"class_list":["post-272","page","type-page","status-publish","has-post-thumbnail","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Misappropriation of Trade Secrets - iDiscovery Solutions<\/title>\n<meta name=\"description\" content=\"iDS Digital Forensics Consulting Experts successfully represented a client accused of using trade secrets from a departed employee\u2019s company.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/en_gb\/case-studies\/industry-trade-secrets\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Misappropriation of Trade Secrets \u2013 A Comprehensive Investigation\" \/>\n<meta property=\"og:description\" content=\"iDS Digital Forensics Consulting Experts successfully represented a client accused of using trade secrets from a departed employee\u2019s company.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/en_gb\/case-studies\/industry-trade-secrets\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-10T16:43:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Industry-Trade-Secrets.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/industry-trade-secrets\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/industry-trade-secrets\\\/\",\"name\":\"Misappropriation of Trade Secrets - iDiscovery Solutions\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/industry-trade-secrets\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/industry-trade-secrets\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Case-Study-Industry-Trade-Secrets.jpg\",\"datePublished\":\"2021-01-27T21:20:27+00:00\",\"dateModified\":\"2024-01-10T16:43:29+00:00\",\"description\":\"iDS Digital Forensics Consulting Experts successfully represented a client accused of using trade secrets from a departed employee\u2019s company.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/industry-trade-secrets\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/industry-trade-secrets\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/industry-trade-secrets\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Case-Study-Industry-Trade-Secrets.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Case-Study-Industry-Trade-Secrets.jpg\",\"width\":1200,\"height\":600,\"caption\":\"iDS Digital Forensics Consulting Experts successfully represented a client accused of using trade secrets from a departed employee\u2019s company.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/industry-trade-secrets\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case Studies\",\"item\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Misappropriation of Trade Secrets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Misappropriation of Trade Secrets - iDiscovery Solutions","description":"iDS Digital Forensics Consulting Experts successfully represented a client accused of using trade secrets from a departed employee\u2019s company.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/en_gb\/case-studies\/industry-trade-secrets\/","og_locale":"en_GB","og_type":"article","og_title":"Misappropriation of Trade Secrets \u2013 A Comprehensive Investigation","og_description":"iDS Digital Forensics Consulting Experts successfully represented a client accused of using trade secrets from a departed employee\u2019s company.","og_url":"https:\/\/idsinc.com\/en_gb\/case-studies\/industry-trade-secrets\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_modified_time":"2024-01-10T16:43:29+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Industry-Trade-Secrets.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/idsinc.com\/case-studies\/industry-trade-secrets\/","url":"https:\/\/idsinc.com\/case-studies\/industry-trade-secrets\/","name":"Misappropriation of Trade Secrets - iDiscovery Solutions","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/case-studies\/industry-trade-secrets\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/case-studies\/industry-trade-secrets\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Industry-Trade-Secrets.jpg","datePublished":"2021-01-27T21:20:27+00:00","dateModified":"2024-01-10T16:43:29+00:00","description":"iDS Digital Forensics Consulting Experts successfully represented a client accused of using trade secrets from a departed employee\u2019s company.","breadcrumb":{"@id":"https:\/\/idsinc.com\/case-studies\/industry-trade-secrets\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/case-studies\/industry-trade-secrets\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/case-studies\/industry-trade-secrets\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Industry-Trade-Secrets.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Case-Study-Industry-Trade-Secrets.jpg","width":1200,"height":600,"caption":"iDS Digital Forensics Consulting Experts successfully represented a client accused of using trade secrets from a departed employee\u2019s company."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/case-studies\/industry-trade-secrets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Case Studies","item":"https:\/\/idsinc.com\/case-studies\/"},{"@type":"ListItem","position":3,"name":"Misappropriation of Trade Secrets"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery Solutions","description":"Use data to your advantage in the courtroom","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery Solutions","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"}]}},"builder_content":"\n<h2>CHALLENGE<br\/><\/h2>\n<h5><em><strong>An insurance industry client hired 70 employees from a competitor. They were accused of receiving and using trade secrets from the departed employee's company.<\/strong><\/em><\/h5> <p>The Plaintiff had spent hundreds of thousands of dollars to perform digital forensics, both internally and through an independent service provider.<\/p> <p><strong>The client needed expertise for the following:<\/strong><\/p> <ul> <li> <p>To understand how to read and interpret tens of hundreds of pages of \u201cdigital forensic evidence\u201d.<\/p> <\/li> <li> <p>To understand how data gets stored, how data can be moved from one location to another, and to explain the reasons data<\/p> <p>may not be present on certain systems.<\/p> <\/li> <li> <p>To understand, explain and analyze the various ways to examine systems for the exfiltration and usage of data.<\/p> <\/li> <\/ul>\n<h2>Solution<br\/><\/h2>\n<h5><em>Using a team of experts, we evaluated the security measures in place as compared to industry standards. In addition, an expert report was composed describing our conclusions.<\/em><\/h5> <p>Our iDS Digital Forensics Consulting Experts examined numerous reports, artifacts and other materials to determine what the forensic evidence \u201creally showed\u201d.<\/p> <p><strong>The iDS Consulting team analyzed and reported on the following:<\/strong><\/p> <ul> <li> <p>That hundreds of devices had been forensically imaged and analyzed.<\/p> <\/li> <li> <p>That the artifacts listed in the reports simply showed access of documents from the corporate devices themselves as opposed to<\/p> <p>documents being exfiltrated.<\/p> <\/li> <li> <p>That no actual data had been exfiltrated.<\/p> <\/li> <\/ul>\n<h2>Result<br\/><\/h2>\n<h5><em>Through live testimony, the iDS expert was able to demonstrate the lack of forensic evidence to support any allegation of electronic data misappropriation.<\/em><\/h5> <p>Our client won a trial verdict, stating that in large part it was due to the iDS work dissecting the evidence and our ability to testify about the lack of forensic evidence in plain English.<\/p>","_links":{"self":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/272","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/comments?post=272"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/272\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/33"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media\/274"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media?parent=272"}],"wp:term":[{"taxonomy":"team","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/team?post=272"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}