{"id":98459,"date":"2024-05-27T11:47:05","date_gmt":"2024-05-27T09:47:05","guid":{"rendered":"https:\/\/firstcolo.net\/glossary\/data-security\/"},"modified":"2026-03-13T00:11:23","modified_gmt":"2026-03-12T23:11:23","slug":"data-security","status":"publish","type":"glossary","link":"https:\/\/firstcolo.net\/en\/glossary\/data-security\/","title":{"rendered":"Data Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"98459\" class=\"elementor elementor-98459 elementor-48642\" data-elementor-post-type=\"glossary\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4e96faaf e-flex e-con-boxed e-con e-parent\" data-id=\"4e96faaf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-da76e91 e-con-full e-flex e-con e-child\" data-id=\"da76e91\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-4af4325a e-con-full e-flex e-con e-child\" data-id=\"4af4325a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-44c0d36a e-con-full e-flex e-con e-child\" data-id=\"44c0d36a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d1724a8 elementor-widget elementor-widget-heading\" data-id=\"6d1724a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">What is Data Security?<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c4fca2c elementor-widget elementor-widget-text-editor\" data-id=\"1c4fca2c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Data security encompasses all technical measures that ensure the protection of data. It ensures that information is protected from unauthorized access, manipulation, and loss. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6f2363c5 e-flex e-con-boxed e-con e-parent\" data-id=\"6f2363c5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-506730ac elementor-widget elementor-widget-heading\" data-id=\"506730ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Core Objectives of Data Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5316f52a elementor-widget elementor-widget-text-editor\" data-id=\"5316f52a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Data security is crucial to ensure the confidentiality, integrity, and availability of data. These three characteristics represent the core objectives of data security. They are defined as follows:  <\/p><ul><li><strong>Confidentiality<\/strong>: Only authorized persons may access the data. This prevents unauthorized access and protects sensitive information. <\/li><li><strong>Integrity<\/strong>: Data must remain unchanged and correct, protected from both manipulation and technical errors.<\/li><li><strong>Availability<\/strong>: Data should be accessible and usable at all times when needed.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0328cbb elementor-widget elementor-widget-heading\" data-id=\"0328cbb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Measures to Ensure Data Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46508ac elementor-widget elementor-widget-text-editor\" data-id=\"46508ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Various technical and organizational measures exist to ensure data security. These include: <\/p><ul><li>Access Control (Physical): This ensures that only authorized persons have physical access to data processing systems.<\/li><li>Access Control (Logical): It protects IT systems and data from unauthorized access.<\/li><li>Authorization Control: It limits permissions to the necessary minimum.<\/li><li>Transmission Control: This ensures that data cannot be read or copied without authorization during transmission.<\/li><li>Input Control: It provides traceability of who entered which data and when.<\/li><li>Job Control: This ensures that data is processed only according to specifications.<\/li><li>Availability Control: This includes measures for data recovery in case of physical or technical problems.<\/li><li>Data Separation: Data for different purposes must be processed separately to avoid mixing.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f04677a elementor-widget elementor-widget-heading\" data-id=\"f04677a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Risks and Dangers<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d0a6ce elementor-widget elementor-widget-text-editor\" data-id=\"2d0a6ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Data security faces challenges from technical vulnerabilities and unauthorized access, especially on the internet. For example, software can be insecure if it does not store data correctly or loses it. Therefore, regular updates and security checks are essential.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1dd383c elementor-widget elementor-widget-heading\" data-id=\"1dd383c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Difference from Data Protection and Data Sovereignty<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e4fe36 elementor-widget elementor-widget-text-editor\" data-id=\"4e4fe36\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>While <em>data security<\/em> concerns the general technical protection of all types of data, <em>data protection<\/em> focuses specifically on the protection of personal data. Data protection also regulates the collection, processing, and transfer of this data to protect privacy.  <strong>Data security provides the technical framework, while data protection also covers legal and ethical aspects.<\/strong><\/p><p><em>Data security<\/em> technically protects data, while <a href=\"https:\/\/firstcolo.net\/glossar\/datenhoheit\/\" target=\"_blank\" rel=\"noopener\"><em>data sovereignty<\/em><\/a> ensures control over its use and storage: The latter allows natural and legal persons to determine where and how their data is stored and who can access it. <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ae2849 elementor-widget elementor-widget-heading\" data-id=\"1ae2849\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conclusion<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8d81a3 elementor-widget elementor-widget-text-editor\" data-id=\"c8d81a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Data security is an integral part of modern information systems. It protects data from threats and ensures the operational capability of companies. By combining technical measures and organizational processes, risks can be minimized.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1bf95f7d e-con-full e-flex e-con e-child\" data-id=\"1bf95f7d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-10e32045 elementor-widget elementor-widget-button\" data-id=\"10e32045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Homepage<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6815e0c7 elementor-widget elementor-widget-button\" data-id=\"6815e0c7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/firstcolo.net\/en\/knowledge\/glossary\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Glossary<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>What is Data Security? Data security encompasses all technical measures that ensure the protection of data. It ensures that information is protected from unauthorized access, manipulation, and loss. Core Objectives of Data Security Data security is crucial to ensure the confidentiality, integrity, and availability of data. These three characteristics represent the core objectives of data [&hellip;]<\/p>\n","protected":false},"author":43,"featured_media":97354,"menu_order":0,"template":"","meta":{"content-type":"","footnotes":""},"glossary-categories":[],"glossary-tags":[],"class_list":["post-98459","glossary","type-glossary","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Data Security | firstcolo Glossary<\/title>\n<meta name=\"description\" content=\"Understand the three core objectives of data security: confidentiality, integrity, and availability in this article.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/firstcolo.net\/en\/glossary\/data-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Security\" \/>\n<meta property=\"og:description\" content=\"Understand the three core objectives of data security: confidentiality, integrity, and availability in this article.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/firstcolo.net\/en\/glossary\/data-security\/\" \/>\n<meta property=\"og:site_name\" content=\"firstcolo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/FirstColo.GmbH\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-12T23:11:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/firstcolo.net\/wp-content\/uploads\/2025\/12\/fc26-blogteaser-greendata-1500x1000-1.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@firstcolo\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/firstcolo.net\/en\/glossary\/data-security\/\",\"url\":\"https:\/\/firstcolo.net\/en\/glossary\/data-security\/\",\"name\":\"Data Security | firstcolo Glossary\",\"isPartOf\":{\"@id\":\"https:\/\/firstcolo.net\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/firstcolo.net\/en\/glossary\/data-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/firstcolo.net\/en\/glossary\/data-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/firstcolo.net\/wp-content\/uploads\/2025\/12\/fc26-blogteaser-greendata-1500x1000-1.webp\",\"datePublished\":\"2024-05-27T09:47:05+00:00\",\"dateModified\":\"2026-03-12T23:11:23+00:00\",\"description\":\"Understand the three core objectives of data security: confidentiality, integrity, and availability in this article.\",\"breadcrumb\":{\"@id\":\"https:\/\/firstcolo.net\/en\/glossary\/data-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/firstcolo.net\/en\/glossary\/data-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/firstcolo.net\/en\/glossary\/data-security\/#primaryimage\",\"url\":\"https:\/\/firstcolo.net\/wp-content\/uploads\/2025\/12\/fc26-blogteaser-greendata-1500x1000-1.webp\",\"contentUrl\":\"https:\/\/firstcolo.net\/wp-content\/uploads\/2025\/12\/fc26-blogteaser-greendata-1500x1000-1.webp\",\"width\":1500,\"height\":1000,\"caption\":\"firstcolo Glossary\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/firstcolo.net\/en\/glossary\/data-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Start\",\"item\":\"https:\/\/firstcolo.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/firstcolo.net\/en\/#website\",\"url\":\"https:\/\/firstcolo.net\/en\/\",\"name\":\"firstcolo\",\"description\":\"firstcolo.net\",\"publisher\":{\"@id\":\"https:\/\/firstcolo.net\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/firstcolo.net\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/firstcolo.net\/en\/#organization\",\"name\":\"firstcolo\",\"url\":\"https:\/\/firstcolo.net\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/firstcolo.net\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/firstcolo.net\/wp-content\/uploads\/firstcolo-logo_RGB-ohne-abstand.svg\",\"contentUrl\":\"https:\/\/firstcolo.net\/wp-content\/uploads\/firstcolo-logo_RGB-ohne-abstand.svg\",\"width\":118,\"height\":23,\"caption\":\"firstcolo\"},\"image\":{\"@id\":\"https:\/\/firstcolo.net\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/FirstColo.GmbH\",\"https:\/\/x.com\/firstcolo\",\"https:\/\/www.instagram.com\/accounts\/login\/?next=httpswww.instagram.comfirstcolo&is_from_rle\",\"https:\/\/www.linkedin.com\/company\/firstcolo\/posts\/?feedView=all\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Data Security | firstcolo Glossary","description":"Understand the three core objectives of data security: confidentiality, integrity, and availability in this article.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/firstcolo.net\/en\/glossary\/data-security\/","og_locale":"en_US","og_type":"article","og_title":"Data Security","og_description":"Understand the three core objectives of data security: confidentiality, integrity, and availability in this article.","og_url":"https:\/\/firstcolo.net\/en\/glossary\/data-security\/","og_site_name":"firstcolo","article_publisher":"https:\/\/www.facebook.com\/FirstColo.GmbH","article_modified_time":"2026-03-12T23:11:23+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/firstcolo.net\/wp-content\/uploads\/2025\/12\/fc26-blogteaser-greendata-1500x1000-1.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_site":"@firstcolo","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/firstcolo.net\/en\/glossary\/data-security\/","url":"https:\/\/firstcolo.net\/en\/glossary\/data-security\/","name":"Data Security | firstcolo Glossary","isPartOf":{"@id":"https:\/\/firstcolo.net\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/firstcolo.net\/en\/glossary\/data-security\/#primaryimage"},"image":{"@id":"https:\/\/firstcolo.net\/en\/glossary\/data-security\/#primaryimage"},"thumbnailUrl":"https:\/\/firstcolo.net\/wp-content\/uploads\/2025\/12\/fc26-blogteaser-greendata-1500x1000-1.webp","datePublished":"2024-05-27T09:47:05+00:00","dateModified":"2026-03-12T23:11:23+00:00","description":"Understand the three core objectives of data security: confidentiality, integrity, and availability in this article.","breadcrumb":{"@id":"https:\/\/firstcolo.net\/en\/glossary\/data-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/firstcolo.net\/en\/glossary\/data-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/firstcolo.net\/en\/glossary\/data-security\/#primaryimage","url":"https:\/\/firstcolo.net\/wp-content\/uploads\/2025\/12\/fc26-blogteaser-greendata-1500x1000-1.webp","contentUrl":"https:\/\/firstcolo.net\/wp-content\/uploads\/2025\/12\/fc26-blogteaser-greendata-1500x1000-1.webp","width":1500,"height":1000,"caption":"firstcolo Glossary"},{"@type":"BreadcrumbList","@id":"https:\/\/firstcolo.net\/en\/glossary\/data-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Start","item":"https:\/\/firstcolo.net\/en\/"},{"@type":"ListItem","position":2,"name":"Data Security"}]},{"@type":"WebSite","@id":"https:\/\/firstcolo.net\/en\/#website","url":"https:\/\/firstcolo.net\/en\/","name":"firstcolo","description":"firstcolo.net","publisher":{"@id":"https:\/\/firstcolo.net\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/firstcolo.net\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/firstcolo.net\/en\/#organization","name":"firstcolo","url":"https:\/\/firstcolo.net\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/firstcolo.net\/en\/#\/schema\/logo\/image\/","url":"https:\/\/firstcolo.net\/wp-content\/uploads\/firstcolo-logo_RGB-ohne-abstand.svg","contentUrl":"https:\/\/firstcolo.net\/wp-content\/uploads\/firstcolo-logo_RGB-ohne-abstand.svg","width":118,"height":23,"caption":"firstcolo"},"image":{"@id":"https:\/\/firstcolo.net\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/FirstColo.GmbH","https:\/\/x.com\/firstcolo","https:\/\/www.instagram.com\/accounts\/login\/?next=httpswww.instagram.comfirstcolo&is_from_rle","https:\/\/www.linkedin.com\/company\/firstcolo\/posts\/?feedView=all"]}]}},"_links":{"self":[{"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/glossary\/98459","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/types\/glossary"}],"author":[{"embeddable":true,"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/users\/43"}],"version-history":[{"count":1,"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/glossary\/98459\/revisions"}],"predecessor-version":[{"id":98460,"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/glossary\/98459\/revisions\/98460"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/media\/97354"}],"wp:attachment":[{"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/media?parent=98459"}],"wp:term":[{"taxonomy":"glossary-categories","embeddable":true,"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/glossary-categories?post=98459"},{"taxonomy":"glossary-tags","embeddable":true,"href":"https:\/\/firstcolo.net\/en\/wp-json\/wp\/v2\/glossary-tags?post=98459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}