{"id":4827,"date":"2023-04-06T14:07:31","date_gmt":"2023-04-06T20:07:31","guid":{"rendered":"https:\/\/idsinc.com\/case-studies\/analysis-of-data-establishes-employee-spent-half-his-day-on-non-work-activity-copy\/"},"modified":"2024-07-08T14:16:57","modified_gmt":"2024-07-08T20:16:57","slug":"digital-footprints","status":"publish","type":"page","link":"https:\/\/idsinc.com\/en_gb\/case-studies\/digital-footprints\/","title":{"rendered":"Highly Skilled Coders Try to Outsmart Their Digital Footprints"},"content":{"rendered":"<!--themify_builder_content-->\n<div id=\"themify_builder_content-4827\" data-postid=\"4827\" class=\"themify_builder_content themify_builder_content-4827 themify_builder tf_clear\">\n                    <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_1g79733 tb_first tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_xtyh704 first\">\n                    <!-- module image -->\n<div  class=\"module module-image tb_dxz3487 image-full-overlay   auto_fullwidth tf_mw\" data-lazy=\"1\">\n        <div class=\"image-wrap tf_rel tf_mw\">\n            <img decoding=\"async\" src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2023\/04\/Highly-Skilled-Coders-Try-to-Outsmart-Thier-Digital-Footprints-iDS-Case-Study-1024x512.jpg\" title=\"Highly Skilled Coders Try to Outsmart Their Digital Footprints\" alt=\"Highly Skilled Coders Try to Outsmart Their Digital Footprints\">    \n        <\/div>\n    <!-- \/image-wrap -->\n    \n        <\/div>\n<!-- \/module image -->        <\/div>\n                        <\/div>\n        <\/div>\n                        <div  data-lazy=\"1\" class=\"module_row themify_builder_row tb_o11x444 tf_w\">\n                        <div class=\"row_inner col_align_top tb_col_count_1 tf_box tf_rel\">\n                        <div  data-lazy=\"1\" class=\"module_column tb-column col-full tb_s4vs048 first\">\n                    <!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_eunx788\" data-lazy=\"1\">\n        <h2 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    CHALLENGE            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h2>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_zbw7777\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<h5>iDS was presented with a software plagiarism case. The plaintiffs, two hotshot software developers, claimed the defendants, our clients, didn\u2019t have the right to use their software. Ultimately, the plaintiffs alleged that the defendants stole their source code. <\/h5>\n<p>The case hinged on whether or not the source code had been conceived prior to the plaintiffs claiming it. As a result, we had to determine the development date.<br><strong><br>Our client needed authority in the following areas:<\/strong><\/p>\n<ul>\n<li>Data recovery<\/li>\n<li>Forensic analysis<\/li>\n<li>Forensic acquisitions<\/li>\n<\/ul>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_feb6505\" data-lazy=\"1\">\n        <h2 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Solution            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h2>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_ju5u180\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\">Our team of iDS experts proved through forensic acquisition that not only had the software in question not been created on the computer presented to the court, but that the plaintiffs also presented false information to the court. <\/div>\n<div>\u00a0<\/div>\n<div class=\"column\"><strong>The iDS Team of Experts tested, validated, and determined the following:<\/strong> <\/div>\n<div>\u00a0<\/div>\n<ul>\n<li class=\"column\">The plaintiffs drastically inflated their billings and grossly exaggerated their time spent on the project<\/li>\n<li class=\"column\">The plaintiffs deceived the court with a dummy computer to make it look like they had been building software on it for years<\/li>\n<li class=\"column\">The dummy computer was filled with falsified &amp; tampered data that was created by the plaintiffs<\/li>\n<\/ul>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text --><!-- module fancy heading -->\n<div  class=\"module module-fancy-heading tb_1qta919\" data-lazy=\"1\">\n        <h2 class=\"fancy-heading\">\n    <span class=\"main-head tf_block\">\n                    Result            <\/span>\n\n    \n    <span class=\"sub-head tf_block tf_rel\">\n                                <\/span>\n    <\/h2>\n<\/div>\n<!-- \/module fancy heading -->\n<!-- module text -->\n<div  class=\"module module-text tb_v588411\" data-lazy=\"1\">\n        <div  class=\"tb_text_wrap\">\n        <div class=\"page\" title=\"Page 1\">\n<div class=\"layoutArea\">\n<div class=\"column\"><strong>The court threw out the entire case and awarded attorney fees to the defendants.<\/strong><\/div>\n<div class=\"column\"><br>Through iDS discovery analysis, the results revealed damaging evidence against the plaintiff. It was enough to secure a successful defense. This ultimately resulted in a counter-suit and damages awarded to the defendants. The successful defense was a testament to iDS\u2019 skill and expertise.<\/div>\n<\/div>\n<\/div>    <\/div>\n<\/div>\n<!-- \/module text -->        <\/div>\n                        <\/div>\n        <\/div>\n        <\/div>\n<!--\/themify_builder_content-->","protected":false},"excerpt":{"rendered":"<p>iDS was presented with a software plagiarism case. The plaintiffs, two hotshot software developers, claimed the defendants, our clients, didn\u2019t have the right to use their software. Ultimately, the plaintiffs alleged that the defendants stole their source code. The case hinged on whether or not the source code had been conceived prior to the plaintiffs [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":4829,"parent":33,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"team":[],"class_list":["post-4827","page","type-page","status-publish","has-post-thumbnail","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Coders Try to Outsmart Their Digital Footprints - Case Study<\/title>\n<meta name=\"description\" content=\"iDiscovery Solutions was presented with a software plagiarism case in which Highly Skilled Coders Tried to Outsmart Their Digital Footprints.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/idsinc.com\/en_gb\/case-studies\/digital-footprints\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Highly Skilled Coders Try to Outsmart Their Digital Footprints\" \/>\n<meta property=\"og:description\" content=\"iDiscovery Solutions was presented with a software plagiarism case in which Highly Skilled Coders Tried to Outsmart Their Digital Footprints.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/idsinc.com\/en_gb\/case-studies\/digital-footprints\/\" \/>\n<meta property=\"og:site_name\" content=\"iDiscovery Solutions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-08T20:16:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/idsinc.com\/wp-content\/uploads\/2023\/04\/Highly-Skilled-Coders-Try-to-Outsmart-Thier-Digital-Footprints-iDS-Case-Study-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/digital-footprints\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/digital-footprints\\\/\",\"name\":\"Coders Try to Outsmart Their Digital Footprints - Case Study\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/digital-footprints\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/digital-footprints\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Highly-Skilled-Coders-Try-to-Outsmart-Thier-Digital-Footprints-iDS-Case-Study-scaled.jpg\",\"datePublished\":\"2023-04-06T20:07:31+00:00\",\"dateModified\":\"2024-07-08T20:16:57+00:00\",\"description\":\"iDiscovery Solutions was presented with a software plagiarism case in which Highly Skilled Coders Tried to Outsmart Their Digital Footprints.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/digital-footprints\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/digital-footprints\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/digital-footprints\\\/#primaryimage\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Highly-Skilled-Coders-Try-to-Outsmart-Thier-Digital-Footprints-iDS-Case-Study-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/Highly-Skilled-Coders-Try-to-Outsmart-Thier-Digital-Footprints-iDS-Case-Study-scaled.jpg\",\"width\":1200,\"height\":600,\"caption\":\"iDiscovery Solutions was presented with a software plagiarism case in which Highly Skilled Coders Tried to Outsmart Their Digital Footprints.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/digital-footprints\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/idsinc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Case Studies\",\"item\":\"https:\\\/\\\/idsinc.com\\\/case-studies\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Highly Skilled Coders Try to Outsmart Their Digital Footprints\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#website\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"name\":\"iDiscovery Solutions\",\"description\":\"Use data to your advantage in the courtroom\",\"publisher\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\"},\"alternateName\":\"iDS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#organization\",\"name\":\"iDiscovery Solutions\",\"alternateName\":\"iDS\",\"url\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"contentUrl\":\"https:\\\/\\\/idsinc.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/iDS-Logo-3c-e1611176096212.png\",\"width\":100,\"height\":73,\"caption\":\"iDiscovery Solutions\"},\"image\":{\"@id\":\"https:\\\/\\\/idsinc.com\\\/en_gb\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/iDiscovery-Solutions-110210573904472\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/idsinc\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCarv7o1MeYfCp0eZ1IrufIw\"],\"description\":\"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.\",\"email\":\"info@idsinc.com\",\"telephone\":\"+1.800.813.4832\",\"legalName\":\"iDiscovery Solutions\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Coders Try to Outsmart Their Digital Footprints - Case Study","description":"iDiscovery Solutions was presented with a software plagiarism case in which Highly Skilled Coders Tried to Outsmart Their Digital Footprints.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/idsinc.com\/en_gb\/case-studies\/digital-footprints\/","og_locale":"en_GB","og_type":"article","og_title":"Highly Skilled Coders Try to Outsmart Their Digital Footprints","og_description":"iDiscovery Solutions was presented with a software plagiarism case in which Highly Skilled Coders Tried to Outsmart Their Digital Footprints.","og_url":"https:\/\/idsinc.com\/en_gb\/case-studies\/digital-footprints\/","og_site_name":"iDiscovery Solutions","article_publisher":"https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","article_modified_time":"2024-07-08T20:16:57+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/idsinc.com\/wp-content\/uploads\/2023\/04\/Highly-Skilled-Coders-Try-to-Outsmart-Thier-Digital-Footprints-iDS-Case-Study-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/idsinc.com\/case-studies\/digital-footprints\/","url":"https:\/\/idsinc.com\/case-studies\/digital-footprints\/","name":"Coders Try to Outsmart Their Digital Footprints - Case Study","isPartOf":{"@id":"https:\/\/idsinc.com\/en_gb\/#website"},"primaryImageOfPage":{"@id":"https:\/\/idsinc.com\/case-studies\/digital-footprints\/#primaryimage"},"image":{"@id":"https:\/\/idsinc.com\/case-studies\/digital-footprints\/#primaryimage"},"thumbnailUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2023\/04\/Highly-Skilled-Coders-Try-to-Outsmart-Thier-Digital-Footprints-iDS-Case-Study-scaled.jpg","datePublished":"2023-04-06T20:07:31+00:00","dateModified":"2024-07-08T20:16:57+00:00","description":"iDiscovery Solutions was presented with a software plagiarism case in which Highly Skilled Coders Tried to Outsmart Their Digital Footprints.","breadcrumb":{"@id":"https:\/\/idsinc.com\/case-studies\/digital-footprints\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/idsinc.com\/case-studies\/digital-footprints\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/case-studies\/digital-footprints\/#primaryimage","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2023\/04\/Highly-Skilled-Coders-Try-to-Outsmart-Thier-Digital-Footprints-iDS-Case-Study-scaled.jpg","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2023\/04\/Highly-Skilled-Coders-Try-to-Outsmart-Thier-Digital-Footprints-iDS-Case-Study-scaled.jpg","width":1200,"height":600,"caption":"iDiscovery Solutions was presented with a software plagiarism case in which Highly Skilled Coders Tried to Outsmart Their Digital Footprints."},{"@type":"BreadcrumbList","@id":"https:\/\/idsinc.com\/case-studies\/digital-footprints\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/idsinc.com\/"},{"@type":"ListItem","position":2,"name":"Case Studies","item":"https:\/\/idsinc.com\/case-studies\/"},{"@type":"ListItem","position":3,"name":"Highly Skilled Coders Try to Outsmart Their Digital Footprints"}]},{"@type":"WebSite","@id":"https:\/\/idsinc.com\/en_gb\/#website","url":"https:\/\/idsinc.com\/en_gb\/","name":"iDiscovery Solutions","description":"Use data to your advantage in the courtroom","publisher":{"@id":"https:\/\/idsinc.com\/en_gb\/#organization"},"alternateName":"iDS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/idsinc.com\/en_gb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/idsinc.com\/en_gb\/#organization","name":"iDiscovery Solutions","alternateName":"iDS","url":"https:\/\/idsinc.com\/en_gb\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/","url":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","contentUrl":"https:\/\/idsinc.com\/wp-content\/uploads\/2021\/01\/iDS-Logo-3c-e1611176096212.png","width":100,"height":73,"caption":"iDiscovery Solutions"},"image":{"@id":"https:\/\/idsinc.com\/en_gb\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/iDiscovery-Solutions-110210573904472","https:\/\/www.linkedin.com\/company\/idsinc","https:\/\/www.youtube.com\/channel\/UCarv7o1MeYfCp0eZ1IrufIw"],"description":"iDS provides consultative data solutions to corporations and law firms around the world, giving them a decisive advantage \u2013 both in and out of the courtroom. iDS\u2019s subject matter experts and data strategists specialize in finding solutions to complex data problems, ensuring data can be leveraged as an asset, not a liability.","email":"info@idsinc.com","telephone":"+1.800.813.4832","legalName":"iDiscovery Solutions"}]}},"builder_content":"<img src=\"https:\/\/idsinc.com\/wp-content\/uploads\/2023\/04\/Highly-Skilled-Coders-Try-to-Outsmart-Thier-Digital-Footprints-iDS-Case-Study-1024x512.jpg\" title=\"Highly Skilled Coders Try to Outsmart Their Digital Footprints\" alt=\"Highly Skilled Coders Try to Outsmart Their Digital Footprints\"> <h1> Highly Skilled Coders Try to Outsmart Their Digital Footprints <\/h1>\n<h2>CHALLENGE<br\/><\/h2>\n<h5>iDS was presented with a software plagiarism case. The plaintiffs, two hotshot software developers, claimed the defendants, our clients, didn\u2019t have the right to use their software. Ultimately, the plaintiffs alleged that the defendants stole their source code. <\/h5> <p>The case hinged on whether or not the source code had been conceived prior to the plaintiffs claiming it. As a result, we had to determine the development date.<br><strong><br>Our client needed authority in the following areas:<\/strong><\/p> <ul> <li>Data recovery<\/li> <li>Forensic analysis<\/li> <li>Forensic acquisitions<\/li> <\/ul>\n<h2>Solution<br\/><\/h2>\nOur team of iDS experts proved through forensic acquisition that not only had the software in question not been created on the computer presented to the court, but that the plaintiffs also presented false information to the court. \u00a0 <strong>The iDS Team of Experts tested, validated, and determined the following:<\/strong> \u00a0 <ul> <li>The plaintiffs drastically inflated their billings and grossly exaggerated their time spent on the project<\/li> <li>The plaintiffs deceived the court with a dummy computer to make it look like they had been building software on it for years<\/li> <li>The dummy computer was filled with falsified &amp; tampered data that was created by the plaintiffs<\/li> <\/ul>\n<h2>Result<br\/><\/h2>\n<strong>The court threw out the entire case and awarded attorney fees to the defendants.<\/strong> <br>Through iDS discovery analysis, the results revealed damaging evidence against the plaintiff. It was enough to secure a successful defense. This ultimately resulted in a counter-suit and damages awarded to the defendants. The successful defense was a testament to iDS\u2019 skill and expertise.","_links":{"self":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/4827","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/comments?post=4827"}],"version-history":[{"count":0,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/4827\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/pages\/33"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media\/4829"}],"wp:attachment":[{"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/media?parent=4827"}],"wp:term":[{"taxonomy":"team","embeddable":true,"href":"https:\/\/idsinc.com\/en_gb\/wp-json\/wp\/v2\/team?post=4827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}