{"id":728,"date":"2024-07-12T12:31:20","date_gmt":"2024-07-12T12:31:20","guid":{"rendered":"https:\/\/icssindia.in\/blog\/?p=728"},"modified":"2024-07-12T12:32:46","modified_gmt":"2024-07-12T12:32:46","slug":"what-is-sensitive-information-and-how-to-classify-and-protect-it","status":"publish","type":"post","link":"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/","title":{"rendered":"What is sensitive information and How to classify and protect it?"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What is Sensitive Information?<\/strong><\/h3>\n\n\n\n<p>Sensitive information refers to data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization. This type of information typically includes:<\/p>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Personal Identifiable Information (PII)<\/strong> Names, addresses, phone numbers Social Security numbers Birthdates Passport numbers<\/li>\n\n\n\n<li><strong>Financial Information<\/strong> Bank account numbers Credit card numbers of financial statements Tax records<\/li>\n\n\n\n<li><strong>Health Information<\/strong> Medical records Health insurance information Prescription details<\/li>\n\n\n\n<li><strong>Business Information<\/strong> Trade Secrets Business Plans Customer lists Intellectual property<\/li>\n\n\n\n<li><strong>Government Information<\/strong> Classified Documents National security information Government operational details<\/li>\n\n\n\n<li><strong>Authentication Information<\/strong> Usernames and passwords Biometric data (fingerprints, facial recognition data)<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How to Classify Sensitive Information?<\/strong><\/h3>\n\n\n\n<p>Classification of sensitive information involves categorizing data based on its level of sensitivity and the potential impact of its unauthorized disclosure. Common classification levels include:<\/p>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Public<\/strong> Information that is intended to be shared with the public. Example: Company press releases, public job postings.<\/li>\n\n\n\n<li><strong>Internal<\/strong> Information that is not public but is not highly sensitive. Example: Internal memos, company policies.<\/li>\n\n\n\n<li><strong>Confidential<\/strong> Information that is sensitive and should be protected to avoid potential harm. Example: Employee records, customer contact details.<\/li>\n\n\n\n<li><strong>Restricted<\/strong> Highly sensitive information that requires strict protection. Example: Financial data, proprietary research.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How to Protect Sensitive Information?<\/strong><\/h3>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Encryption<\/strong> Use strong encryption for data at rest and in transit.<\/li>\n\n\n\n<li><strong>Access Control<\/strong> Implement strict access controls to limit who can view or edit sensitive information. Use multi-factor authentication (MFA) for added security.<\/li>\n\n\n\n<li><strong>Data Masking<\/strong> Mask sensitive information when it is not necessary to display the full data.<\/li>\n\n\n\n<li><strong>Regular Audits<\/strong> Conduct regular audits to ensure compliance with data protection policies.<\/li>\n\n\n\n<li><strong>Training and Awareness<\/strong> Educate employees about the importance of protecting sensitive information and how to handle it properly.<\/li>\n\n\n\n<li><strong>Secure Disposal<\/strong> Use secure methods to dispose of sensitive information that is no longer needed.<\/li>\n\n\n\n<li><strong>Data Backup<\/strong> Regularly back up sensitive information and store backups securely.<\/li>\n\n\n\n<li><strong>Incident Response Plan<\/strong> Have a plan in place to respond to data breaches or other security incidents promptly and effectively.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p>By understanding what constitutes sensitive information and how to classify and protect it, individuals and organizations can significantly reduce the risk of data breaches and ensure the privacy and security of their data.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is Sensitive Information? Sensitive information refers to data that must be protected from unauthorized access to safeguard the privacy [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":729,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[23],"tags":[387,384,54,246,388,389,383,241,390,382],"class_list":["post-728","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-information-security","tag-biometric-data","tag-business-information","tag-data-breaches","tag-data-security","tag-facial-recognition-data","tag-financial-data","tag-health-information","tag-incident-response-plan","tag-multi-factor-authentication","tag-sensitive-information"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is sensitive information and How to classify and protect it? - Blog.ICSS<\/title>\n<meta name=\"description\" content=\"Sensitive information refers to data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is sensitive information and How to classify and protect it? - Blog.ICSS\" \/>\n<meta property=\"og:description\" content=\"Sensitive information refers to data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog.ICSS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/icssindiaa\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-12T12:31:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-12T12:32:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2024\/07\/Sensitive-Information-12-July-2024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@icssindiaa\" \/>\n<meta name=\"twitter:site\" content=\"@icssindiaa\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/icssindia.in\/blog\/#\/schema\/person\/4792914fc6288fbf79fd93652777a7e9\"},\"headline\":\"What is sensitive information and How to classify and protect it?\",\"datePublished\":\"2024-07-12T12:31:20+00:00\",\"dateModified\":\"2024-07-12T12:32:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/\"},\"wordCount\":369,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/icssindia.in\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2024\/07\/Sensitive-Information-12-July-2024.png\",\"keywords\":[\"biometric data\",\"business information\",\"data breaches\",\"data security\",\"facial recognition data\",\"financial data\",\"health information\",\"incident response plan\",\"multi-factor authentication\",\"sensitive information\"],\"articleSection\":[\"Information Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/\",\"url\":\"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/\",\"name\":\"What is sensitive information and How to classify and protect it? - Blog.ICSS\",\"isPartOf\":{\"@id\":\"https:\/\/icssindia.in\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2024\/07\/Sensitive-Information-12-July-2024.png\",\"datePublished\":\"2024-07-12T12:31:20+00:00\",\"dateModified\":\"2024-07-12T12:32:46+00:00\",\"description\":\"Sensitive information refers to data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization.\",\"breadcrumb\":{\"@id\":\"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/#primaryimage\",\"url\":\"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2024\/07\/Sensitive-Information-12-July-2024.png\",\"contentUrl\":\"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2024\/07\/Sensitive-Information-12-July-2024.png\",\"width\":1200,\"height\":628,\"caption\":\"Protect Sensitive Information\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/icssindia.in\/blog\/home\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is sensitive information and How to classify and protect it?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/icssindia.in\/blog\/#website\",\"url\":\"https:\/\/icssindia.in\/blog\/\",\"name\":\"Blog.ICSS\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/icssindia.in\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/icssindia.in\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/icssindia.in\/blog\/#organization\",\"name\":\"Blog.ICSS\",\"url\":\"https:\/\/icssindia.in\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/icssindia.in\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2023\/02\/cropped-Logo-ICSS-remove-bg-1.png\",\"contentUrl\":\"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2023\/02\/cropped-Logo-ICSS-remove-bg-1.png\",\"width\":707,\"height\":353,\"caption\":\"Blog.ICSS\"},\"image\":{\"@id\":\"https:\/\/icssindia.in\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/icssindiaa\/\",\"https:\/\/x.com\/icssindiaa\",\"https:\/\/www.instagram.com\/icssindia.in\/\",\"https:\/\/www.linkedin.com\/school\/icssindia\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/icssindia.in\/blog\/#\/schema\/person\/4792914fc6288fbf79fd93652777a7e9\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/icssindia.in\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3961e2565dc1b8d36a8f464ede749ca2f7e572b56e32e2d8b47def7fbe55fa56?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3961e2565dc1b8d36a8f464ede749ca2f7e572b56e32e2d8b47def7fbe55fa56?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/icssindia.in\/blog\"],\"url\":\"https:\/\/icssindia.in\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is sensitive information and How to classify and protect it? - Blog.ICSS","description":"Sensitive information refers to data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/","og_locale":"en_US","og_type":"article","og_title":"What is sensitive information and How to classify and protect it? - Blog.ICSS","og_description":"Sensitive information refers to data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization.","og_url":"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/","og_site_name":"Blog.ICSS","article_publisher":"https:\/\/www.facebook.com\/icssindiaa\/","article_published_time":"2024-07-12T12:31:20+00:00","article_modified_time":"2024-07-12T12:32:46+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2024\/07\/Sensitive-Information-12-July-2024.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@icssindiaa","twitter_site":"@icssindiaa","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/#article","isPartOf":{"@id":"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/"},"author":{"name":"admin","@id":"https:\/\/icssindia.in\/blog\/#\/schema\/person\/4792914fc6288fbf79fd93652777a7e9"},"headline":"What is sensitive information and How to classify and protect it?","datePublished":"2024-07-12T12:31:20+00:00","dateModified":"2024-07-12T12:32:46+00:00","mainEntityOfPage":{"@id":"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/"},"wordCount":369,"commentCount":0,"publisher":{"@id":"https:\/\/icssindia.in\/blog\/#organization"},"image":{"@id":"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/#primaryimage"},"thumbnailUrl":"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2024\/07\/Sensitive-Information-12-July-2024.png","keywords":["biometric data","business information","data breaches","data security","facial recognition data","financial data","health information","incident response plan","multi-factor authentication","sensitive information"],"articleSection":["Information Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/","url":"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/","name":"What is sensitive information and How to classify and protect it? - Blog.ICSS","isPartOf":{"@id":"https:\/\/icssindia.in\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/#primaryimage"},"image":{"@id":"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/#primaryimage"},"thumbnailUrl":"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2024\/07\/Sensitive-Information-12-July-2024.png","datePublished":"2024-07-12T12:31:20+00:00","dateModified":"2024-07-12T12:32:46+00:00","description":"Sensitive information refers to data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization.","breadcrumb":{"@id":"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/#primaryimage","url":"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2024\/07\/Sensitive-Information-12-July-2024.png","contentUrl":"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2024\/07\/Sensitive-Information-12-July-2024.png","width":1200,"height":628,"caption":"Protect Sensitive Information"},{"@type":"BreadcrumbList","@id":"https:\/\/icssindia.in\/blog\/what-is-sensitive-information-and-how-to-classify-and-protect-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/icssindia.in\/blog\/home\/"},{"@type":"ListItem","position":2,"name":"What is sensitive information and How to classify and protect it?"}]},{"@type":"WebSite","@id":"https:\/\/icssindia.in\/blog\/#website","url":"https:\/\/icssindia.in\/blog\/","name":"Blog.ICSS","description":"","publisher":{"@id":"https:\/\/icssindia.in\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/icssindia.in\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/icssindia.in\/blog\/#organization","name":"Blog.ICSS","url":"https:\/\/icssindia.in\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/icssindia.in\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2023\/02\/cropped-Logo-ICSS-remove-bg-1.png","contentUrl":"https:\/\/icssindia.in\/blog\/wp-content\/uploads\/2023\/02\/cropped-Logo-ICSS-remove-bg-1.png","width":707,"height":353,"caption":"Blog.ICSS"},"image":{"@id":"https:\/\/icssindia.in\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/icssindiaa\/","https:\/\/x.com\/icssindiaa","https:\/\/www.instagram.com\/icssindia.in\/","https:\/\/www.linkedin.com\/school\/icssindia"]},{"@type":"Person","@id":"https:\/\/icssindia.in\/blog\/#\/schema\/person\/4792914fc6288fbf79fd93652777a7e9","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/icssindia.in\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3961e2565dc1b8d36a8f464ede749ca2f7e572b56e32e2d8b47def7fbe55fa56?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3961e2565dc1b8d36a8f464ede749ca2f7e572b56e32e2d8b47def7fbe55fa56?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/icssindia.in\/blog"],"url":"https:\/\/icssindia.in\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/icssindia.in\/blog\/wp-json\/wp\/v2\/posts\/728","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icssindia.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icssindia.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icssindia.in\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/icssindia.in\/blog\/wp-json\/wp\/v2\/comments?post=728"}],"version-history":[{"count":1,"href":"https:\/\/icssindia.in\/blog\/wp-json\/wp\/v2\/posts\/728\/revisions"}],"predecessor-version":[{"id":730,"href":"https:\/\/icssindia.in\/blog\/wp-json\/wp\/v2\/posts\/728\/revisions\/730"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/icssindia.in\/blog\/wp-json\/wp\/v2\/media\/729"}],"wp:attachment":[{"href":"https:\/\/icssindia.in\/blog\/wp-json\/wp\/v2\/media?parent=728"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icssindia.in\/blog\/wp-json\/wp\/v2\/categories?post=728"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icssindia.in\/blog\/wp-json\/wp\/v2\/tags?post=728"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}