{"id":98457,"date":"2024-05-27T11:46:22","date_gmt":"2024-05-27T09:46:22","guid":{"rendered":"https:\/\/firstcolo.net\/glossary\/data-sovereignty\/"},"modified":"2026-03-13T00:11:23","modified_gmt":"2026-03-12T23:11:23","slug":"data-sovereignty","status":"publish","type":"glossary","link":"https:\/\/firstcolo.net\/en\/glossary\/data-sovereignty\/","title":{"rendered":"Data Sovereignty"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"98457\" class=\"elementor elementor-98457 elementor-48643\" data-elementor-post-type=\"glossary\">\n\t\t\t\t<div class=\"elementor-element elementor-element-16001ba0 e-flex e-con-boxed e-con e-parent\" data-id=\"16001ba0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7358c525 e-con-full e-flex e-con e-child\" data-id=\"7358c525\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-f1be323 e-con-full e-flex e-con e-child\" data-id=\"f1be323\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-415b4ceb e-con-full e-flex e-con e-child\" data-id=\"415b4ceb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e10a90d elementor-widget elementor-widget-heading\" data-id=\"e10a90d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">What Does Data Sovereignty Mean?<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3febfd9 elementor-widget elementor-widget-text-editor\" data-id=\"3febfd9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Data sovereignty refers to control over the storage, use, and processing of one&#8217;s own data. It is also called data autonomy or data sovereignty. Thanks to this self-determination, individuals, companies, and governments have the ability to determine how and where their data is stored and who may access it.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2364fb95 e-flex e-con-boxed e-con e-parent\" data-id=\"2364fb95\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2e906bc0 elementor-widget elementor-widget-heading\" data-id=\"2e906bc0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Legal Context of Data Sovereignty<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3d7143fc elementor-widget elementor-widget-text-editor\" data-id=\"3d7143fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>In legal terms, data sovereignty is subject to the data protection requirements of the country in which the data was generated or collected. In the European Union, the <a href=\"\/glossar\/dsgvo\/\" target=\"_blank\" rel=\"noopener\">General Data Protection Regulation (GDPR)<\/a> ensures this sovereignty: it stipulates that personal data must be processed securely and transparently. This is intended to prevent data from being transferred without control to countries that may apply different data protection standards. The USA, for example, grants its authorities extensive access to data processed in the United States through the CLOUD Act. You can read here why GDPR and the CLOUD Act are incompatible.     <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff160a6 elementor-widget elementor-widget-heading\" data-id=\"ff160a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Connection with Data Protection and Cloud Computing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1cecccc elementor-widget elementor-widget-text-editor\" data-id=\"1cecccc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Data sovereignty is closely linked to data protection and <a href=\"\/glossar\/cloud-computing\/\" target=\"_blank\" rel=\"noopener\">cloud computing<\/a>. The increasing use of cloud services raises questions about <a href=\"\/glossar\/datensicherheit\/\" target=\"_blank\" rel=\"noopener\">data security<\/a>, especially when servers are located in countries with less stringent data protection laws. Companies must therefore ensure that data sovereignty is maintained by establishing clear agreements with service providers and implementing measures such as encryption to protect data.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-590dfe1 elementor-widget elementor-widget-heading\" data-id=\"590dfe1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Data Sovereignty in Different Contexts<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3ec83d elementor-widget elementor-widget-text-editor\" data-id=\"a3ec83d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li><strong>Individuals<\/strong>: Here, data sovereignty refers to the protection and control of personal data. Individuals should be able to decide what information they share and how it is used. <\/li><li><strong>Companies<\/strong>: Businesses must protect the data of their customers and employees while using it efficiently. It is essential that they comply with legal requirements to avoid legal consequences. <\/li><li><strong>States<\/strong>: Countries want to ensure that the data of their citizens does not flow uncontrolled into other states. This is intended to safeguard national security and economic advantages. <\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f75966a elementor-widget elementor-widget-heading\" data-id=\"f75966a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Distinction from Data Residency and Data Localization<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb111dc elementor-widget elementor-widget-text-editor\" data-id=\"fb111dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong>Data residency<\/strong>: This refers to the geographic location where data is stored. Companies often choose specific regions to meet legal requirements. <strong>Data localization<\/strong>: This, on the other hand, stipulates that data must remain in the country of origin. Some countries enact corresponding laws to protect privacy or to secure geopolitical advantages.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cbe1f58 elementor-widget elementor-widget-heading\" data-id=\"cbe1f58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Technical and Organizational Measures<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60669c8 elementor-widget elementor-widget-text-editor\" data-id=\"60669c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Companies should implement various measures to secure sovereignty over their data. Pseudonymization and encryption are important techniques for protecting data from unauthorized access. Additionally, data availability is usually business-critical for companies, which is why systems must be resilient to enable rapid data recovery. Companies are also well advised to introduce monitoring processes, as all protective measures must be continuously evaluated and improved.   <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc76419 elementor-widget elementor-widget-heading\" data-id=\"fc76419\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Future Developments<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aecb2f4 elementor-widget elementor-widget-text-editor\" data-id=\"aecb2f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Initiatives such as <a href=\"https:\/\/gaia-x.eu\/\" target=\"_blank\" rel=\"noopener\">Gaia-X<\/a> (a project supported by representatives from business, science, and administration from Germany and France together with other primarily European partners) aim to create a secure European data infrastructure that complies with data protection. Gaia-X seeks to represent an alternative to cloud providers outside Europe and ensure that data remains protected in Europe. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-739dfae1 e-con-full e-flex e-con e-child\" data-id=\"739dfae1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6aecf6ed elementor-widget elementor-widget-button\" data-id=\"6aecf6ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Homepage<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a2b4601 elementor-widget elementor-widget-button\" data-id=\"5a2b4601\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/firstcolo.net\/en\/knowledge\/glossary\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Glossary<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>What Does Data Sovereignty Mean? Data sovereignty refers to control over the storage, use, and processing of one&#8217;s own data. It is also called data autonomy or data sovereignty. Thanks to this self-determination, individuals, companies, and governments have the ability to determine how and where their data is stored and who may access it. Legal [&hellip;]<\/p>\n","protected":false},"author":43,"featured_media":97354,"menu_order":0,"template":"","meta":{"content-type":"","footnotes":""},"glossary-categories":[],"glossary-tags":[],"class_list":["post-98457","glossary","type-glossary","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What Does Data Sovereignty Mean? | firstcolo Glossary<\/title>\n<meta name=\"description\" content=\"What does data sovereignty mean? Discover how GDPR protects your data and guarantees transparency. Learn more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/firstcolo.net\/en\/glossary\/data-sovereignty\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Sovereignty\" \/>\n<meta property=\"og:description\" content=\"What does data sovereignty mean? Discover how GDPR protects your data and guarantees transparency. Learn more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/firstcolo.net\/en\/glossary\/data-sovereignty\/\" \/>\n<meta property=\"og:site_name\" content=\"firstcolo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/FirstColo.GmbH\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-12T23:11:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/firstcolo.net\/wp-content\/uploads\/2025\/12\/fc26-blogteaser-greendata-1500x1000-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@firstcolo\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/firstcolo.net\/en\/glossary\/data-sovereignty\/\",\"url\":\"https:\/\/firstcolo.net\/en\/glossary\/data-sovereignty\/\",\"name\":\"What Does Data Sovereignty Mean? | firstcolo Glossary\",\"isPartOf\":{\"@id\":\"https:\/\/firstcolo.net\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/firstcolo.net\/en\/glossary\/data-sovereignty\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/firstcolo.net\/en\/glossary\/data-sovereignty\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/firstcolo.net\/wp-content\/uploads\/2025\/12\/fc26-blogteaser-greendata-1500x1000-1.webp\",\"datePublished\":\"2024-05-27T09:46:22+00:00\",\"dateModified\":\"2026-03-12T23:11:23+00:00\",\"description\":\"What does data sovereignty mean? Discover how GDPR protects your data and guarantees transparency. Learn more.\",\"breadcrumb\":{\"@id\":\"https:\/\/firstcolo.net\/en\/glossary\/data-sovereignty\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/firstcolo.net\/en\/glossary\/data-sovereignty\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/firstcolo.net\/en\/glossary\/data-sovereignty\/#primaryimage\",\"url\":\"https:\/\/firstcolo.net\/wp-content\/uploads\/2025\/12\/fc26-blogteaser-greendata-1500x1000-1.webp\",\"contentUrl\":\"https:\/\/firstcolo.net\/wp-content\/uploads\/2025\/12\/fc26-blogteaser-greendata-1500x1000-1.webp\",\"width\":1500,\"height\":1000,\"caption\":\"firstcolo Glossary\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/firstcolo.net\/en\/glossary\/data-sovereignty\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Start\",\"item\":\"https:\/\/firstcolo.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Sovereignty\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/firstcolo.net\/en\/#website\",\"url\":\"https:\/\/firstcolo.net\/en\/\",\"name\":\"firstcolo\",\"description\":\"firstcolo.net\",\"publisher\":{\"@id\":\"https:\/\/firstcolo.net\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/firstcolo.net\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/firstcolo.net\/en\/#organization\",\"name\":\"firstcolo\",\"url\":\"https:\/\/firstcolo.net\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/firstcolo.net\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/firstcolo.net\/wp-content\/uploads\/firstcolo-logo_RGB-ohne-abstand.svg\",\"contentUrl\":\"https:\/\/firstcolo.net\/wp-content\/uploads\/firstcolo-logo_RGB-ohne-abstand.svg\",\"width\":118,\"height\":23,\"caption\":\"firstcolo\"},\"image\":{\"@id\":\"https:\/\/firstcolo.net\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/FirstColo.GmbH\",\"https:\/\/x.com\/firstcolo\",\"https:\/\/www.instagram.com\/accounts\/login\/?next=httpswww.instagram.comfirstcolo&is_from_rle\",\"https:\/\/www.linkedin.com\/company\/firstcolo\/posts\/?feedView=all\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What Does Data Sovereignty Mean? | firstcolo Glossary","description":"What does data sovereignty mean? Discover how GDPR protects your data and guarantees transparency. Learn more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/firstcolo.net\/en\/glossary\/data-sovereignty\/","og_locale":"en_US","og_type":"article","og_title":"Data Sovereignty","og_description":"What does data sovereignty mean? Discover how GDPR protects your data and guarantees transparency. Learn more.","og_url":"https:\/\/firstcolo.net\/en\/glossary\/data-sovereignty\/","og_site_name":"firstcolo","article_publisher":"https:\/\/www.facebook.com\/FirstColo.GmbH","article_modified_time":"2026-03-12T23:11:23+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/firstcolo.net\/wp-content\/uploads\/2025\/12\/fc26-blogteaser-greendata-1500x1000-1.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_site":"@firstcolo","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/firstcolo.net\/en\/glossary\/data-sovereignty\/","url":"https:\/\/firstcolo.net\/en\/glossary\/data-sovereignty\/","name":"What Does Data Sovereignty Mean? | firstcolo Glossary","isPartOf":{"@id":"https:\/\/firstcolo.net\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/firstcolo.net\/en\/glossary\/data-sovereignty\/#primaryimage"},"image":{"@id":"https:\/\/firstcolo.net\/en\/glossary\/data-sovereignty\/#primaryimage"},"thumbnailUrl":"https:\/\/firstcolo.net\/wp-content\/uploads\/2025\/12\/fc26-blogteaser-greendata-1500x1000-1.webp","datePublished":"2024-05-27T09:46:22+00:00","dateModified":"2026-03-12T23:11:23+00:00","description":"What does data sovereignty mean? Discover how GDPR protects your data and guarantees transparency. Learn more.","breadcrumb":{"@id":"https:\/\/firstcolo.net\/en\/glossary\/data-sovereignty\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/firstcolo.net\/en\/glossary\/data-sovereignty\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/firstcolo.net\/en\/glossary\/data-sovereignty\/#primaryimage","url":"https:\/\/firstcolo.net\/wp-content\/uploads\/2025\/12\/fc26-blogteaser-greendata-1500x1000-1.webp","contentUrl":"https:\/\/firstcolo.net\/wp-content\/uploads\/2025\/12\/fc26-blogteaser-greendata-1500x1000-1.webp","width":1500,"height":1000,"caption":"firstcolo Glossary"},{"@type":"BreadcrumbList","@id":"https:\/\/firstcolo.net\/en\/glossary\/data-sovereignty\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Start","item":"https:\/\/firstcolo.net\/en\/"},{"@type":"ListItem","position":2,"name":"Data Sovereignty"}]},{"@type":"WebSite","@id":"https:\/\/firstcolo.net\/en\/#website","url":"https:\/\/firstcolo.net\/en\/","name":"firstcolo","description":"firstcolo.net","publisher":{"@id":"https:\/\/firstcolo.net\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/firstcolo.net\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/firstcolo.net\/en\/#organization","name":"firstcolo","url":"https:\/\/firstcolo.net\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/firstcolo.net\/en\/#\/schema\/logo\/image\/","url":"https:\/\/firstcolo.net\/wp-content\/uploads\/firstcolo-logo_RGB-ohne-abstand.svg","contentUrl":"https:\/\/firstcolo.net\/wp-content\/uploads\/firstcolo-logo_RGB-ohne-abstand.svg","width":118,"height":23,"caption":"firstcolo"},"image":{"@id":"https:\/\/firstcolo.net\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/FirstColo.GmbH","https:\/\/x.com\/firstcolo","https:\/\/www.instagram.com\/accounts\/login\/?next=httpswww.instagram.comfirstcolo&is_from_rle","https:\/\/www.linkedin.com\/company\/firstcolo\/posts\/?feedView=all"]}]}},"_links":{"self":[{"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/glossary\/98457","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/types\/glossary"}],"author":[{"embeddable":true,"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/users\/43"}],"version-history":[{"count":1,"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/glossary\/98457\/revisions"}],"predecessor-version":[{"id":98458,"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/glossary\/98457\/revisions\/98458"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/media\/97354"}],"wp:attachment":[{"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/media?parent=98457"}],"wp:term":[{"taxonomy":"glossary-categories","embeddable":true,"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/glossary-categories?post=98457"},{"taxonomy":"glossary-tags","embeddable":true,"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/glossary-tags?post=98457"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}