{"id":332,"date":"2018-11-11T12:10:02","date_gmt":"2018-11-11T11:10:02","guid":{"rendered":"https:\/\/www.acronum.de.w0194bd1.kasserver.com\/?page_id=332"},"modified":"2019-09-11T15:14:12","modified_gmt":"2019-09-11T13:14:12","slug":"technische-und-organisatorische-massnahmen","status":"publish","type":"page","link":"https:\/\/www.kvinne.de\/en\/technische-und-organisatorische-massnahmen\/","title":{"rendered":"Technical and organizational measures"},"content":{"rendered":"<p>The European General Data Protection Regulation (GDPR) has been in effect since May 25, 2018. In addition to the creation of:<\/p>\n<ul>\n<li>Privacy policies<\/li>\n<li>Records of processing activities<\/li>\n<li>Data Processing Agreements (DPAs)<\/li>\n<\/ul>\n<p>The controller must also define the technical and organizational measures.<\/p>\n<h2>What is the purpose of technical and organizational measures?<\/h2>\n<p>The technical and organizational measures ensure that personal data processed by the controller is protected from unauthorized access in both IT systems and physical records.<\/p>\n<p>The scope of the measures depends on various factors:<\/p>\n<ul>\n<li>The number of data \/ affected individuals<\/li>\n<li>The purpose of the processing,<\/li>\n<li>The likelihood of a risk occurring<\/li>\n<li>The impact on an individual in the event of harm<\/li>\n<\/ul>\n<h2>Which data needs to be protected?<\/h2>\n<p class=\"translation-block\">The EU GDPR stipulates that all personal data must be identified and subjected to a risk analysis in accordance with <a href=\"https:\/\/dejure.org\/gesetze\/DSGVO\/32.html\" target=\"_blank\" rel=\"noopener noreferrer\">Article 32(1)<\/a> of the GDPR. Special categories of personal data must be protected with enhanced measures.<\/p>\n<p>The different likelihood and severity of the risk to the rights and freedoms of a natural person must be assessed.<\/p>\n<h2>Which measures must be implemented for which systems?<\/h2>\n<p class=\"translation-block\">To determine this, a list of all IT systems is required.<br> In which IT systems is personal data stored?<br> Is there a distinction for special categories of personal data?<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-340 size-medium\" src=\"https:\/\/www.kvinne.de\/wp-content\/uploads\/2018\/11\/Assets-e1541941071414-300x137.png\" alt=\"\" width=\"300\" height=\"137\" srcset=\"https:\/\/www.kvinne.de\/wp-content\/uploads\/2018\/11\/Assets-e1541941071414-300x137.png 300w, https:\/\/www.kvinne.de\/wp-content\/uploads\/2018\/11\/Assets-e1541941071414.png 659w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>The risk analysis is conducted using the factors of the CIA triad.<\/p>\n<p>carried out.<img loading=\"lazy\" decoding=\"async\" class=\"wp-image-334 aligncenter\" title=\"CIA\" src=\"https:\/\/www.kvinne.de\/wp-content\/uploads\/2018\/11\/cia-schild-symbol-mit-einem-adler_318-64615-150x150.jpg\" alt=\"\" width=\"74\" height=\"74\" srcset=\"https:\/\/www.kvinne.de\/wp-content\/uploads\/2018\/11\/cia-schild-symbol-mit-einem-adler_318-64615-150x150.jpg 150w, https:\/\/www.kvinne.de\/wp-content\/uploads\/2018\/11\/cia-schild-symbol-mit-einem-adler_318-64615-300x300.jpg 300w, https:\/\/www.kvinne.de\/wp-content\/uploads\/2018\/11\/cia-schild-symbol-mit-einem-adler_318-64615.jpg 626w\" sizes=\"auto, (max-width: 74px) 100vw, 74px\" \/><\/p>\n<ul>\n<li class=\"translation-block\"><span style=\"color: #ed6b1d\"><strong>C \u2013 Confidential<\/strong><br> <\/span><em>Confidentiality<\/em>: Information may only be read by previously authorized users.<\/li>\n<li class=\"translation-block\"><span style=\"color: #ed6b1d\"><strong>I \u2013 Integrity <\/strong> <\/span><span style=\"color: #ed6b1d\"><br> <\/span><em>Integrity:<\/em> Refers to ensuring the accuracy of the data.<\/li>\n<li class=\"translation-block\"><span style=\"color: #ed6b1d\"><strong>A \u2013 Availability<\/strong><br> <span style=\"color: #223b60\"><em>Availability<\/em>: IT systems should be operational at all times.<\/span><br> <\/span><\/li>\n<\/ul>\n<h2>How do I create a risk analysis?<\/h2>\n<p>The selected assets (company values) are now considered according to the criteria.<\/p>\n<ul>\n<li style=\"text-align: left;\" class=\"translation-block\"><strong>Access Control<\/strong><br> Building perimeter<br> Video surveillance<br> Locked office<br> Electronic access control<\/li>\n<li class=\"translation-block\"><strong>Access Protection<\/strong><br> Authentication methods<br> Network segmentation<br> Personalized access<br> Firewall<br> Antivirus software<\/li>\n<li class=\"translation-block\"><strong>Access Control<\/strong><br> Authorization concept<br> Complex passwords<\/li>\n<li class=\"translation-block\"><strong>Separation Control<\/strong><br> Multi-tenancy capability<\/li>\n<li class=\"translation-block\"><strong>Transfer Control<\/strong><br> Encryption options<br> Email encryption<\/li>\n<li class=\"translation-block\"><strong>Input Control<\/strong><br> Logging<\/li>\n<li class=\"translation-block\"><strong>Availability<\/strong><br> Disaster recovery plan<br> Backups<br> Redundant power supply design<\/li>\n<li class=\"translation-block\"><strong>Review\/Assessment<\/strong><br> Regular technical and organizational system audits<\/li>\n<li class=\"translation-block\"><strong>Data Processing<\/strong><br> Written instructions from the client<\/li>\n<\/ul>\n<p>Now, based on the current values, a scenario is developed in which the exploitation of a technical vulnerability or the absence of an organizational instruction within the company could lead to an unintended data release.<\/p>\n<p>The likelihood of the scenario occurring is assessed, as well as the extent of the damage in the event it happens. The resulting calculated risk provides information about the personnel and financial resources needed to enhance the protection of the data.<\/p>\n<h4>Example: Risk Analysis<\/h4>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-336 size-medium\" src=\"https:\/\/www.kvinne.de\/wp-content\/uploads\/2018\/11\/Risikoanalyse-1-300x129.png\" alt=\"\" width=\"300\" height=\"129\" srcset=\"https:\/\/www.kvinne.de\/wp-content\/uploads\/2018\/11\/Risikoanalyse-1-300x129.png 300w, https:\/\/www.kvinne.de\/wp-content\/uploads\/2018\/11\/Risikoanalyse-1.png 642w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<h3><\/h3>\n<h3>Do all measures have to be implemented?<\/h3>\n<p>The measures identified in the risk analysis are now evaluated, assigned, and time-limited in the action list.<\/p>\n<p>This action list provides the authority with information about everything you have planned. Reasons are described in the action list.<\/p>\n<p>Warum ist es nicht zur Umsetzung gekommen?<br \/>\nWarum findet die Umsetzung erst in 2 Jahren statt.<\/p>\n<p><strong>Die technischen Ma\u00dfnahmen wie:<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-358\" src=\"https:\/\/www.kvinne.de\/wp-content\/uploads\/2018\/11\/Firewall.png\" alt=\"\" width=\"287\" height=\"135\" srcset=\"https:\/\/www.kvinne.de\/wp-content\/uploads\/2018\/11\/Firewall.png 489w, https:\/\/www.kvinne.de\/wp-content\/uploads\/2018\/11\/Firewall-300x141.png 300w\" sizes=\"auto, (max-width: 287px) 100vw, 287px\" \/><\/p>\n<ul>\n<li>Firewall<\/li>\n<li>Virensoftware<\/li>\n<li>Intrusion Detection System<\/li>\n<li>Mobile Device Management<\/li>\n<li>Remote Monitoring Management<\/li>\n<li>Backup Konzept<\/li>\n<\/ul>\n<p>can be tested and implemented in cooperation with your IT system house.<\/p>\n<p class=\"translation-block\"><strong>The organizational measures are presented in the <a href=\"https:\/\/www.kvinne.de\/en\/digitales-managementsystem\/\" target=\"_self\">data protection management system<\/a>. They cover the following topics:<\/strong><\/p>\n<ul>\n<li>Handling of personal data<\/li>\n<li>Handling of mobile devices<\/li>\n<li>Internet usage<\/li>\n<li>Working from home<\/li>\n<li>Protection of devices while traveling<\/li>\n<li>Clean desk policy<\/li>\n<li>Deletion of data carriers<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.kvinne.de\/en\/downloads\/\">Download Muster<\/a><\/p>\n<p><a href=\"https:\/\/www.datenschutzzentrum.de\/uploads\/sdm\/SDM-Methode_V1.1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Standard Data Protection Model<\/a><\/p>\n<p>The Standard Data Protection Model is a method with which technical and organizational measures can be established. The following measures can be generated from this model:<\/p>\n<div class=\"entry-content clearfix\">\n<h3>Technical measures:<\/h3>\n<ul>\n<li>Structural changes to implement physical security<\/li>\n<li>Changes to the network infrastructure or outsourcing of data<\/li>\n<li>Video surveillance<\/li>\n<li>Access control system<\/li>\n<li>Firewall<\/li>\n<li>Intrusion Detection System (IDS)<\/li>\n<li>Antivirus software<\/li>\n<li>Commissioning of a logging server<\/li>\n<li>Implementation of encryption methods<\/li>\n<\/ul>\n<p>The implementation of the measures can be carried out by in-house system administrators or by an external service provider, in compliance with the principles of \"privacy by design\" and \"privacy by default.\"<\/p>\n<h3>Organizational measures are:<\/h3>\n<ul>\n<li>Introduction of an information security policy<\/li>\n<li>Implementation of a training concept<\/li>\n<li>Process definition for granting access permissions<\/li>\n<li>Development of an authorization concept<\/li>\n<li>Process for managing cryptographic keys<\/li>\n<li>Guidelines for the disposal\/removal of operating resources<\/li>\n<li>Change management<\/li>\n<li>Vulnerability management<\/li>\n<li>Process for responding to data security incidents<\/li>\n<li>Compliance and continuous improvement as well as conformity of your data security management system<\/li>\n<\/ul>\n<p>The organizational measures should be reviewed annually by an independent auditor. However, it is not necessary to involve an accredited body for an official certification.<\/p>\n<\/div>\n<p>Get in touch without obligation and let\u2019s talk:<\/p>\n<ul>\n<li>Email: <a href=\"mailto:info@kvinne.de\">info@kvinne.de<\/a><\/li>\n<li>Tel: <a title=\"\" href=\"tel:+4935121971182\">+49.351.21971182<\/a><\/li>\n<\/ul>\n<p>We look forward to hearing from you!<\/p>\n<p><a href=\"https:\/\/www.kvinne.de\/en\/eu-dsgvo\/\">Also interesting!<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-551\" src=\"https:\/\/www.kvinne.de\/wp-content\/uploads\/2019\/02\/gdd.png\" alt=\"\" width=\"147\" height=\"115\" \/><\/p>","protected":false},"excerpt":{"rendered":"<p>Die Europ\u00e4ische Datenschutzgrundverordnung ist seit 25.05.18 in Kraft getreten. Neben der Erstellung von Datenschutzerkl\u00e4rungen Verarbeitungsverzeichnissen Auftragsdatenvereinbarungen muss der Verantwortliche auch die technischen und organisatorischen Ma\u00dfnahmen festlegen. Welchen Zweck haben technische und organisatorische Ma\u00dfnahmen? Die technischen und organisatorischen Ma\u00dfnahmen gew\u00e4hrleisten, dass die vom Verantwortlichen verarbeiteten personenbezogenen Daten in den IT-Systemen und in analogen Verzeichnissen vor unberechtigtem &#8230; <a title=\"Technical and organizational measures\" class=\"read-more\" href=\"https:\/\/www.kvinne.de\/en\/technische-und-organisatorische-massnahmen\/\" aria-label=\"Read more about technische und organisatorische Ma\u00dfnahmen\">Read more<\/a><\/p>","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-332","page","type-page","status-publish"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Technische und organisatorische Ma\u00dfnahmen - EU DSGVO<\/title>\n<meta name=\"description\" content=\"Technische und organisatorische Ma\u00dfnahmen anhand einer Risikoanalyse f\u00fcr Ihr Unternehmen. Wir erarbeiten einen Ma\u00dfnahmenplan zur Erh\u00f6hung des Datenschutzes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.kvinne.de\/en\/technische-und-organisatorische-massnahmen\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Technische und organisatorische Ma\u00dfnahmen - EU DSGVO\" \/>\n<meta property=\"og:description\" content=\"Technische und organisatorische Ma\u00dfnahmen anhand einer Risikoanalyse f\u00fcr Ihr Unternehmen. Wir erarbeiten einen Ma\u00dfnahmenplan zur Erh\u00f6hung des Datenschutzes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.kvinne.de\/en\/technische-und-organisatorische-massnahmen\/\" \/>\n<meta property=\"og:site_name\" content=\"KVINNE GmbH\" \/>\n<meta property=\"article:modified_time\" content=\"2019-09-11T13:14:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.kvinne.de\/wp-content\/uploads\/2018\/11\/Assets-e1541941071414-300x137.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.kvinne.de\\\/technische-und-organisatorische-massnahmen\\\/\",\"url\":\"https:\\\/\\\/www.kvinne.de\\\/technische-und-organisatorische-massnahmen\\\/\",\"name\":\"Technische und organisatorische Ma\u00dfnahmen - EU DSGVO\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.kvinne.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.kvinne.de\\\/technische-und-organisatorische-massnahmen\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.kvinne.de\\\/technische-und-organisatorische-massnahmen\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.kvinne.de\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/Assets-e1541941071414-300x137.png\",\"datePublished\":\"2018-11-11T11:10:02+00:00\",\"dateModified\":\"2019-09-11T13:14:12+00:00\",\"description\":\"Technische und organisatorische Ma\u00dfnahmen anhand einer Risikoanalyse f\u00fcr Ihr Unternehmen. Wir erarbeiten einen Ma\u00dfnahmenplan zur Erh\u00f6hung des Datenschutzes.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.kvinne.de\\\/technische-und-organisatorische-massnahmen\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.kvinne.de\\\/technische-und-organisatorische-massnahmen\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.kvinne.de\\\/technische-und-organisatorische-massnahmen\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.kvinne.de\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/Assets-e1541941071414-300x137.png\",\"contentUrl\":\"https:\\\/\\\/www.kvinne.de\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/Assets-e1541941071414-300x137.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.kvinne.de\\\/technische-und-organisatorische-massnahmen\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.kvinne.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"technische und organisatorische Ma\u00dfnahmen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.kvinne.de\\\/#website\",\"url\":\"https:\\\/\\\/www.kvinne.de\\\/\",\"name\":\"KVINNE GmbH\",\"description\":\"Datenschutz und Informationssicherheit\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.kvinne.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.kvinne.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.kvinne.de\\\/#organization\",\"name\":\"KVINNE GmbH Datenschutz & Dgitalberatung\",\"alternateName\":\"KVINNE\",\"url\":\"https:\\\/\\\/www.kvinne.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.kvinne.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.kvinne.de\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/Logo-transparenter-Hintergrund-extra-Schloss-klein.png\",\"contentUrl\":\"https:\\\/\\\/www.kvinne.de\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/Logo-transparenter-Hintergrund-extra-Schloss-klein.png\",\"width\":150,\"height\":183,\"caption\":\"KVINNE GmbH Datenschutz & Dgitalberatung\"},\"image\":{\"@id\":\"https:\\\/\\\/www.kvinne.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/kvinne-gmbh\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Technische und organisatorische Ma\u00dfnahmen - EU DSGVO","description":"Technische und organisatorische Ma\u00dfnahmen anhand einer Risikoanalyse f\u00fcr Ihr Unternehmen. Wir erarbeiten einen Ma\u00dfnahmenplan zur Erh\u00f6hung des Datenschutzes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.kvinne.de\/en\/technische-und-organisatorische-massnahmen\/","og_locale":"en_US","og_type":"article","og_title":"Technische und organisatorische Ma\u00dfnahmen - EU DSGVO","og_description":"Technische und organisatorische Ma\u00dfnahmen anhand einer Risikoanalyse f\u00fcr Ihr Unternehmen. Wir erarbeiten einen Ma\u00dfnahmenplan zur Erh\u00f6hung des Datenschutzes.","og_url":"https:\/\/www.kvinne.de\/en\/technische-und-organisatorische-massnahmen\/","og_site_name":"KVINNE GmbH","article_modified_time":"2019-09-11T13:14:12+00:00","og_image":[{"url":"https:\/\/www.kvinne.de\/wp-content\/uploads\/2018\/11\/Assets-e1541941071414-300x137.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.kvinne.de\/technische-und-organisatorische-massnahmen\/","url":"https:\/\/www.kvinne.de\/technische-und-organisatorische-massnahmen\/","name":"Technische und organisatorische Ma\u00dfnahmen - EU DSGVO","isPartOf":{"@id":"https:\/\/www.kvinne.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.kvinne.de\/technische-und-organisatorische-massnahmen\/#primaryimage"},"image":{"@id":"https:\/\/www.kvinne.de\/technische-und-organisatorische-massnahmen\/#primaryimage"},"thumbnailUrl":"https:\/\/www.kvinne.de\/wp-content\/uploads\/2018\/11\/Assets-e1541941071414-300x137.png","datePublished":"2018-11-11T11:10:02+00:00","dateModified":"2019-09-11T13:14:12+00:00","description":"Technische und organisatorische Ma\u00dfnahmen anhand einer Risikoanalyse f\u00fcr Ihr Unternehmen. Wir erarbeiten einen Ma\u00dfnahmenplan zur Erh\u00f6hung des Datenschutzes.","breadcrumb":{"@id":"https:\/\/www.kvinne.de\/technische-und-organisatorische-massnahmen\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.kvinne.de\/technische-und-organisatorische-massnahmen\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kvinne.de\/technische-und-organisatorische-massnahmen\/#primaryimage","url":"https:\/\/www.kvinne.de\/wp-content\/uploads\/2018\/11\/Assets-e1541941071414-300x137.png","contentUrl":"https:\/\/www.kvinne.de\/wp-content\/uploads\/2018\/11\/Assets-e1541941071414-300x137.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.kvinne.de\/technische-und-organisatorische-massnahmen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.kvinne.de\/"},{"@type":"ListItem","position":2,"name":"technische und organisatorische Ma\u00dfnahmen"}]},{"@type":"WebSite","@id":"https:\/\/www.kvinne.de\/#website","url":"https:\/\/www.kvinne.de\/","name":"KVINNE GmbH","description":"Datenschutz und Informationssicherheit","publisher":{"@id":"https:\/\/www.kvinne.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.kvinne.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.kvinne.de\/#organization","name":"KVINNE GmbH Datenschutz & Dgitalberatung","alternateName":"KVINNE","url":"https:\/\/www.kvinne.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kvinne.de\/#\/schema\/logo\/image\/","url":"https:\/\/www.kvinne.de\/wp-content\/uploads\/2018\/07\/Logo-transparenter-Hintergrund-extra-Schloss-klein.png","contentUrl":"https:\/\/www.kvinne.de\/wp-content\/uploads\/2018\/07\/Logo-transparenter-Hintergrund-extra-Schloss-klein.png","width":150,"height":183,"caption":"KVINNE GmbH Datenschutz & Dgitalberatung"},"image":{"@id":"https:\/\/www.kvinne.de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/kvinne-gmbh\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.kvinne.de\/en\/wp-json\/wp\/v2\/pages\/332","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kvinne.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kvinne.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kvinne.de\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kvinne.de\/en\/wp-json\/wp\/v2\/comments?post=332"}],"version-history":[{"count":0,"href":"https:\/\/www.kvinne.de\/en\/wp-json\/wp\/v2\/pages\/332\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.kvinne.de\/en\/wp-json\/wp\/v2\/media?parent=332"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}