{"id":13450,"date":"2026-02-11T00:55:32","date_gmt":"2026-02-11T08:55:32","guid":{"rendered":"https:\/\/www.solix.com\/blog\/?p=13450"},"modified":"2026-02-11T06:45:47","modified_gmt":"2026-02-11T14:45:47","slug":"what-is-data-privacy-meaning-laws-and-why-it-matters-in-2026","status":"publish","type":"post","link":"https:\/\/www.solix.com\/blog\/what-is-data-privacy-meaning-laws-and-why-it-matters-in-2026\/","title":{"rendered":"What Is Data Privacy? Meaning, Laws, and Why It Matters in 2026","gt_translate_keys":[{"key":"rendered","format":"text"}]},"content":{"rendered":"<div class=\"tldr\">\n<h2>TL;DR<\/h2>\n<ul>\n<li>Data privacy is the right of individuals to control how their personal information is collected, used, stored, and shared.<\/li>\n<li>It is distinct from data security (technical defenses) and data protection (the broader governance umbrella).<\/li>\n<li>By January 2026, twenty US states have comprehensive privacy frameworks in effect, the EU AI Act is fully enforceable, and global enforcement has never been more aggressive.<\/li>\n<li>AI governance, children&#8217;s online safety, and the collapse of &#8220;compliance theater&#8221; are the defining forces shaping data privacy this year.<\/li>\n<\/ul>\n<\/div>\n<p>If you have ever clicked &#8220;Accept All Cookies&#8221; without reading the fine print, hesitated before handing over your email to download a free guide, or wondered what happens to the data your smart speaker collects while you sleep \u2014 you have already been thinking about data privacy, whether you realized it or not.<\/p>\n<p>This guide breaks down exactly what data privacy means, how it differs from related concepts, what laws govern it around the world, and why 2026 represents a pivotal year for anyone who handles personal information \u2014 as a business, a developer, or simply a person who uses the internet.<\/p>\n<h2>Data Privacy (Information Privacy)<\/h2>\n<blockquote class=\"wp-block-quote\">\n<p>The right of individuals to control how their personal information is collected, used, stored, shared, and deleted \u2014 and the policies, practices, and legal frameworks that enforce that right.<\/p>\n<\/blockquote>\n<h2>Data Privacy, Defined<\/h2>\n<p>At its core, <strong>data privacy<\/strong> \u2014 sometimes called information privacy \u2014 refers to the principle that individuals should have meaningful control over how their personal data is collected, processed, stored, shared, and eventually deleted. It encompasses the policies, practices, and legal frameworks that determine who can access your information, for what purposes, and under what conditions.<\/p>\n<p>Personal data, in this context, means any information that can identify a specific individual \u2014 directly or indirectly. That includes the obvious things like names, email addresses, and Social Security numbers. But it also includes less intuitive categories: IP addresses, device fingerprints, browsing history, geolocation data, biometric identifiers like facial scans or fingerprints, and even <strong>inferences drawn about you by algorithms<\/strong> based on your behavior patterns.<\/p>\n<p>The concept is deceptively simple: people should get a say in what happens with their information. In practice, making that principle operational across a global digital economy is extraordinarily complex.<\/p>\n<h2>Data Privacy vs. Data Security vs. Data Protection<\/h2>\n<p>These three terms are often used interchangeably, but they refer to distinct (though overlapping) ideas.<\/p>\n<table class=\"blogTable\">\n<thead>\n<tr>\n<th>Concept<\/th>\n<th>Core Question<\/th>\n<th>Focus<\/th>\n<th>Examples<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><strong>Data Privacy<\/strong><\/td>\n<td>Who is allowed to access this data, for what purpose, and with what consent?<\/td>\n<td>Rights and rules<\/td>\n<td>Consent management, opt-out signals, purpose limitation, individual access rights<\/td>\n<\/tr>\n<tr>\n<td><strong>Data Security<\/strong><\/td>\n<td>How do we prevent unauthorized access, breaches, or loss?<\/td>\n<td>Defenses and safeguards<\/td>\n<td>Encryption, firewalls, access controls, incident response plans<\/td>\n<\/tr>\n<tr>\n<td><strong>Data Protection<\/strong><\/td>\n<td>How do we govern data responsibly across its entire lifecycle?<\/td>\n<td>Broader umbrella<\/td>\n<td><span itemscope=\"\" itemtype=\"https:\/\/schema.org\/Legislation\">GDPR<\/span> compliance programs, data governance frameworks, retention policies<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Think of it this way: data privacy is the what and why (what rules apply, and why individuals have these rights), while data security is the how (how you technically prevent unauthorized access). Data protection is the entire framework that ties them together.<\/p>\n<h2>Why Data Privacy Matters More Than Ever<\/h2>\n<p>Data privacy is not an abstract legal concern \u2014 it has tangible consequences for individuals, businesses, and society.<\/p>\n<p><strong>For individuals<\/strong>, poor data privacy practices can lead to identity theft, financial fraud, discriminatory profiling, unwanted surveillance, and a loss of personal autonomy. When companies collect behavioral data and feed it into algorithms that determine creditworthiness, insurance rates, or job eligibility, the stakes become deeply personal. According to <a href=\"https:\/\/usercentrics.com\/guides\/data-privacy\/data-privacy-trends\/\" target=\"_blank\" rel=\"nofollow noopener\">Usercentrics&#8217; 2025 State of Digital Trust report<\/a>, 59 percent of respondents feel uncomfortable when AI models are trained on their data, and 62 percent feel that they have become &#8220;the product&#8221; rather than the customer.<\/p>\n<p><strong>For businesses<\/strong>, the cost of getting data privacy wrong has skyrocketed. According to the <a href=\"https:\/\/www.dlapiper.com\/en\/insights\/publications\/2025\/01\/dla-piper-gdpr-fines-and-data-breach-survey-2025\" target=\"_blank\" rel=\"nofollow noopener\">DLA Piper GDPR Fines and Data Breach Survey (January 2026)<\/a>, the EU has issued over 2,200 GDPR fines since 2018, with cumulative penalties approaching \u20ac6.8 billion. GDPR fines in 2025 totaled approximately \u20ac1.2 billion \u2014 a notable figure, though down from the record-setting Meta and TikTok penalties that inflated 2023 totals. In the United States, state-level enforcement actions have resulted in seven-figure settlements for failures as specific as not properly honoring browser-based opt-out signals.<\/p>\n<p>For society, data privacy is a prerequisite for trust in digital systems. Paradoxically, strong privacy protections actually enable more data sharing, not less \u2014 research consistently shows that people are more comfortable sharing information when they trust the systems collecting it.<\/p>\n<h2>Disclosure \u2014 Enterprise perspective<\/h2>\n<blockquote class=\"wp-block-quote\">\n<p>At Solix, we see data privacy obligations surface most acutely when organizations attempt to modernize or retire legacy systems. Historical records often carry retention, legal hold, and regulatory obligations that must be preserved through any migration \u2014 a challenge that intersects directly with <a href=\"https:\/\/www.solix.com\/solutions\/data-governance\/\">data governance<\/a> and lifecycle management. In our work with regulated enterprises, we have seen 30\u201340% reductions in compliance risk exposure through automated data lineage mapping before AI fine-tuning or analytics projects begin. (I work at <a href=\"https:\/\/www.solix.com\/\">Solix Technologies<\/a>.)<\/p>\n<\/blockquote>\n<h2>The Core Principles Behind Data Privacy<\/h2>\n<p>While specific laws vary across jurisdictions, most modern data privacy frameworks share a common set of principles. These are drawn from the <a href=\"https:\/\/gdpr-info.eu\/art-5-gdpr\/\" target=\"_blank\" rel=\"nofollow noopener\">GDPR&#8217;s Article 5 principles<\/a> and echoed in virtually every comprehensive privacy law worldwide.<\/p>\n<ul class=\"cbpoints\">\n<li>Consent and lawful basis. Organizations should have a legitimate, transparent reason for collecting personal data, and in most cases, they need meaningful consent from the individual. Burying consent in a 40-page terms of service document does not qualify under most modern regulations.<\/li>\n<li>Purpose limitation. Data collected for one stated purpose should not be repurposed for something entirely different without additional notice or consent.<\/li>\n<li>Data minimization. Organizations should collect only the data they actually need for the stated purpose \u2014 no more. The instinct to hoard data &#8220;just in case&#8221; runs directly counter to this principle.<\/li>\n<li>Transparency. Individuals should be clearly informed about what data is being collected, why, how it will be used, who it will be shared with, and for how long it will be retained.<\/li>\n<li>Individual rights. Modern privacy frameworks grant individuals specific rights over their data \u2014 typically the right to access it, correct it, delete it, restrict its processing, and port it to another provider.<\/li>\n<li>Accountability. Organizations that collect and process data are responsible for demonstrating compliance, not just claiming it. This includes maintaining documentation, conducting impact assessments, and having clear governance structures.<\/li>\n<\/ul>\n<h2>The Global Data Privacy Landscape in 2026<\/h2>\n<h3>The European Union<\/h3>\n<p>The EU remains the global benchmark for data privacy regulation. The <a href=\"https:\/\/www.solix.com\/kb\/gdpr\/\">GDPR<\/a>, which celebrated its tenth anniversary of publication in 2026, continues to serve as the foundational framework. The European Commission has introduced the Digital Omnibus package, which proposes targeted amendments to the GDPR aimed at simplifying compliance \u2014 particularly for small and medium enterprises \u2014 while enabling responsible AI innovation and streamlining breach reporting. The legislative process will continue through 2026, with implementation expected to begin in late 2027 (<a href=\"https:\/\/fpf.org\/blog\/2026-a-year-at-the-crossroads-for-global-data-protection-and-privacy\/\" rel=\"nofollow noopener\" target=\"_blank\">Future of Privacy Forum, Jan 2026<\/a>).<\/p>\n<p>The EU AI Act reached full enforceability in August 2026. It prohibits eight categories of unacceptable AI practices \u2014 including harmful behavioral manipulation and untargeted facial recognition scraping \u2014 and requires high-risk AI systems used in recruitment, law enforcement, and critical infrastructure to pass risk assessments, maintain activity logs, and ensure human oversight. Non-compliance carries fines of up to seven percent of global annual turnover (<a href=\"https:\/\/secureprivacy.ai\/blog\/data-privacy-trends-2026\" target=\"_blank\" rel=\"nofollow noopener\">Secure Privacy, 2026<\/a>).<\/p>\n<p>The EU Data Act, applicable since September 2025, extends data sovereignty beyond personal data into industrial and non-personal data, granting users rights to access and port information from connected devices while prohibiting vendor lock-in.<\/p>\n<h3>The United States<\/h3>\n<p>The US continues to operate without a comprehensive federal privacy law, but the state-level landscape is remarkably active. By January 2026, approximately twenty states \u2014 including narrower-scope laws like Florida&#8217;s \u2014 have comprehensive privacy frameworks in effect, with three new laws (Indiana, Kentucky, Rhode Island) activating on <a href=\"https:\/\/www.wilmerhale.com\/en\/insights\/blogs\/wilmerhale-privacy-and-cybersecurity-law\/20260128-year-in-review-the-top-ten-us-data-privacy-developments-from-2025\" target=\"_blank\" rel=\"nofollow noopener\">January 1, 2026 (WilmerHale, Jan 2026<\/a>; <a href=\"https:\/\/iapp.org\/resources\/article\/us-state-privacy-legislation-tracker\/\" target=\"_blank\" rel=\"nofollow noopener\">IAPP tracker<\/a>). While no new state passed a comprehensive privacy law in 2025 \u2014 the first time that has happened since 2020 \u2014 nine states amended their existing laws, expanding definitions of sensitive data, strengthening consumer access rights, and adding protections for minors.<\/p>\n<table class=\"blogTable\">\n<thead>\n<tr>\n<th>Enforcement Action (2025)<\/th>\n<th>Key Violation<\/th>\n<th>Outcome<\/th>\n<th>Source<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><strong>Tractor Supply (CPPA)<\/strong><\/td>\n<td>Non-functional opt-out webform; inadequate data-sharing transparency<\/td>\n<td>$1.35M fine<\/td>\n<td><a href=\"https:\/\/www.osano.com\/articles\/data-privacy-trends\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Osano<\/a><\/td>\n<\/tr>\n<tr>\n<td><strong>Honda (CPPA)<\/strong><\/td>\n<td>Asymmetric opt-out flows; excessive verification for opt-outs<\/td>\n<td>Settlement establishing asymmetric opt-out designs are unlawful<\/td>\n<td><a href=\"https:\/\/www.ketch.com\/blog\/posts\/us-privacy-laws-2026\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Ketch<\/a><\/td>\n<\/tr>\n<tr>\n<td><strong>Healthline Media<\/strong><\/td>\n<td>Failure to honor GPC signal; misuse of health-related data for advertising<\/td>\n<td>Over $1.5M<\/td>\n<td><a href=\"https:\/\/www.ketch.com\/blog\/posts\/us-privacy-laws-2026\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Ketch<\/a><\/td>\n<\/tr>\n<tr>\n<td><strong>Blue Shield of California<\/strong><\/td>\n<td>Misconfigured analytics tools sharing health information<\/td>\n<td>Investigation; 4.7M members affected<\/td>\n<td><a href=\"https:\/\/www.ketch.com\/blog\/posts\/us-privacy-laws-2026\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Ketch<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>A bipartisan group of state regulators also formed the Consortium of Privacy Regulators in 2025 to share expertise and coordinate enforcement across state lines \u2014 a significant step toward addressing the fragmentation that has long characterized US privacy regulation (WilmerHale).<\/p>\n<p><strong>Colorado&#8217;s Algorithmic Accountability Law<\/strong>, effective February 2026, specifically targets high-risk AI systems that make employment, healthcare, or education decisions. Developers must provide documentation and mitigate discrimination, while consumers gain rights to notice, explanation, correction, and appeal (Secure Privacy).<\/p>\n<h3>The Rest of the World<\/h3>\n<p>Data privacy is now a global phenomenon. Japan&#8217;s Mobile Software Competition Act became effective December 2025. Vietnam&#8217;s comprehensive Data Law took effect July 2025. Brazil&#8217;s Digital ECA \u2014 a children&#8217;s online safety law \u2014 was passed at the end of 2025 and will be enforced starting spring 2026. The UK&#8217;s Data Use and Access Act received Royal Assent in June 2025 and is entering into force incrementally throughout 2026. Australia implemented a blanket social media ban for users under sixteen (Future of Privacy Forum).<\/p>\n<p>Gartner projected that <strong>75 percent of the world&#8217;s population<\/strong> would operate under modern privacy regulation by 2025 \u2014 a threshold that now appears to have been met or exceeded, and a figure that would have been unthinkable a decade ago.<\/p>\n<h2>Data Privacy and AI: The Defining Tension of 2026<\/h2>\n<p>No discussion of data privacy in 2026 is complete without addressing artificial intelligence. Large language models, recommendation algorithms, and automated decision-making systems all depend on vast quantities of data \u2014 much of it personal. This creates a fundamental tension between innovation and privacy that regulators, businesses, and technologists are actively working to resolve.<\/p>\n<p>The core privacy challenges posed by AI include the sheer volume of personal data required to train models, the opacity of how that data is processed and what inferences are drawn, the risk of encoded biases that can perpetuate discrimination, and the difficulty of applying traditional privacy concepts like individual consent and purpose limitation to systems that learn and evolve continuously.<\/p>\n<p><strong>Privacy-enhancing technologies (PETs)<\/strong> have emerged as one of the most promising approaches. Techniques like homomorphic encryption, secure multi-party computation, and differential privacy allow organizations to analyze data without exposing the underlying personal information. According to Secure Privacy&#8217;s 2026 analysis, the global PET market reached between $3.12 billion and $4.40 billion in 2024 and is projected to grow to between $12 billion and $28 billion by the early 2030s, with cryptographic techniques controlling 54 percent of market share.<\/p>\n<h2>Disclosure \u2014 Where this connects to data governance<\/h2>\n<blockquote class=\"wp-block-quote\">\n<p>AI readiness depends on data quality, and data quality depends on governance. Organizations that maintain disciplined lifecycle management \u2014 including proper archiving, retention enforcement, and lineage tracking \u2014 are better positioned to use their historical data responsibly in AI workloads. This is especially true for enterprises managing legacy systems where decades of institutional knowledge may be encoded in records that lack modern documentation. Solix Technologies&#8217; data governance solutions are designed to address these lifecycle challenges. (I work at Solix.)<\/p>\n<\/blockquote>\n<h2>Children&#8217;s Privacy: The Most Active Frontier<\/h2>\n<p>Children&#8217;s data privacy has become arguably the most active area of regulatory development globally. Lawmakers increasingly recognize that children are uniquely vulnerable to data misuse, targeted advertising, algorithmic manipulation, and online exploitation.<\/p>\n<p>In the US, CCPA amendments that took effect at the start of 2026 now classify data from individuals under sixteen as sensitive personal information \u2014 a designation that triggers heightened protections (Osano). Multiple states have passed or amended laws specifically targeting minors&#8217; data, including bans on targeted advertising to children.<\/p>\n<p>Internationally, Australia&#8217;s social media ban for under-sixteens, the UK&#8217;s Online Safety Act, and Brazil&#8217;s Digital ECA represent the most aggressive approaches to children&#8217;s digital safety. For businesses \u2014 especially those offering platforms, apps, learning tools, or social experiences that may attract younger audiences \u2014 the message is clear: protecting minors&#8217; data is non-negotiable, and the threshold for compliance is rising steadily.<\/p>\n<h2>Practical Steps for Individuals<\/h2>\n<ul class=\"cbpoints\">\n<li><strong>Enable Global Privacy Control (GPC) in your browser<\/strong>. GPC is a browser-level signal that communicates your preference to opt out of data sales and targeted advertising. It is now effectively mandatory for businesses to honor in over ten US states \u2014 including California, Colorado, Connecticut, Oregon, Texas, Montana, Delaware, Nebraska, New Hampshire, New Jersey, and Minnesota \u2014 with more states expected to follow as new privacy laws take effect.<\/li>\n<li><strong>Exercise your data subject rights<\/strong>. If you live in a state or country with comprehensive privacy law, you have the legal right to request access to, correction of, and deletion of your personal data. The California Privacy Protection Agency (CPPA) reports that over 8,000 consumer complaints have been filed, with 51 percent related to deletion requests and 39 percent related to limiting the use of sensitive information.<\/li>\n<li><strong>Audit your app permissions<\/strong>. Regularly review which apps have access to your location, microphone, camera, contacts, and health data. Remove permissions you do not actively need.<\/li>\n<li><strong>Be skeptical of &#8220;free&#8221; services<\/strong>. If a digital product is free, the business model almost certainly involves monetizing your data. That does not mean you should not use free services, but you should understand the trade-off and make informed choices.<\/li>\n<li><strong>Use privacy-focused tools<\/strong>. Consider privacy-respecting browsers, search engines, email providers, and messaging platforms as alternatives to services whose business models depend on extensive data collection.<\/li>\n<\/ul>\n<h2>What to Expect Next<\/h2>\n<p>The trajectory of data privacy regulation is clear: more laws, more enforcement, more consumer awareness, and more sophisticated technical solutions. The EU&#8217;s GDPR Omnibus package may signal a shift away from technology-neutral regulation \u2014 potentially rewriting assumptions that have underpinned data protection law for decades. The US Consortium of Privacy Regulators could bring unprecedented coordination to state-level enforcement. AI governance frameworks will continue to mature, likely establishing new categories of data rights related to algorithmic transparency and automated decision-making.<\/p>\n<p>For businesses, the era of &#8220;compliance theater&#8221; \u2014 putting up a consent banner and calling it a day \u2014 is ending. Regulators increasingly scrutinize the actual mechanics of how companies collect, process, and share data, not just the disclosures on their websites. The Honda and Tractor Supply enforcement actions of 2025 are templates, not anomalies.<\/p>\n<p>For individuals, the most important shift may be cultural rather than legal. As privacy rights become more widely understood and easier to exercise, the expectation that companies will handle personal data responsibly is becoming a baseline \u2014 not a differentiator.<\/p>\n<h2>Key Takeaways<\/h2>\n<ul class=\"cbpoints\">\n<li>Data privacy is distinct from data security \u2014 it is about rights and governance, not just technical defenses.<\/li>\n<li>Approximately twenty US states now have comprehensive privacy frameworks as of January 2026, with enforcement increasingly coordinated.<\/li>\n<li>AI regulation is converging with privacy law through the EU AI Act, Colorado&#8217;s Algorithmic Accountability Law, and emerging PET markets.<\/li>\n<li>Children&#8217;s online safety is the fastest-moving regulatory frontier globally.<\/li>\n<li>Global Privacy Control (GPC) is now mandatory in over ten US states \u2014 enable it in your browser today.<\/li>\n<\/ul>\n<h3>Further Reading: Primary Sources<\/h3>\n<ul class=\"cbpoints\">\n<li>Full text of the GDPR \u2014 gdpr-info.eu<\/li>\n<li>California Privacy Protection Agency (CPPA) \u2014 Enforcement updates and consumer complaint data<\/li>\n<li>EU AI Act regulatory framework \u2014 European Commission<\/li>\n<li>DLA Piper GDPR Fines and Data Breach Survey \u2014 Annual enforcement tracker<\/li>\n<li>IAPP US State Privacy Legislation Tracker \u2014 Comprehensive state law tracker<\/li>\n<li>Global Privacy Control (GPC) \u2014 Official specification and browser support<\/li>\n<\/ul>\n<p><em>Disclaimer: This article is based on practitioner experience and publicly available regulatory information. Solix Technologies is listed in the IBM PartnerPlus directory. This content does not constitute legal, regulatory, or implementation advice. Validate requirements and controls with qualified professionals and your internal compliance policies.<\/em><\/p>\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"excerpt":{"rendered":"<p>TL;DR Data privacy is the right of individuals to control how their personal information is collected, used, stored, and shared. It is distinct from data security (technical defenses) and data protection (the broader governance umbrella). By January 2026, twenty US states have comprehensive privacy frameworks in effect, the EU AI Act is fully enforceable, and [&hellip;]<\/p>\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"author":123474,"featured_media":13459,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[331,39],"tags":[],"coauthors":[314],"class_list":["post-13450","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-privacy","category-gdpr"],"gt_translate_keys":[{"key":"link","format":"url"}],"_links":{"self":[{"href":"https:\/\/www.solix.com\/blog\/wp-json\/wp\/v2\/posts\/13450","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.solix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.solix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.solix.com\/blog\/wp-json\/wp\/v2\/users\/123474"}],"replies":[{"embeddable":true,"href":"https:\/\/www.solix.com\/blog\/wp-json\/wp\/v2\/comments?post=13450"}],"version-history":[{"count":0,"href":"https:\/\/www.solix.com\/blog\/wp-json\/wp\/v2\/posts\/13450\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.solix.com\/blog\/wp-json\/wp\/v2\/media\/13459"}],"wp:attachment":[{"href":"https:\/\/www.solix.com\/blog\/wp-json\/wp\/v2\/media?parent=13450"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.solix.com\/blog\/wp-json\/wp\/v2\/categories?post=13450"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.solix.com\/blog\/wp-json\/wp\/v2\/tags?post=13450"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.solix.com\/blog\/wp-json\/wp\/v2\/coauthors?post=13450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}