{"id":280,"date":"2022-06-10T11:29:21","date_gmt":"2022-06-10T11:29:21","guid":{"rendered":"https:\/\/geetauniversity.edu.in\/blog\/?p=280"},"modified":"2026-01-03T12:40:20","modified_gmt":"2026-01-03T12:40:20","slug":"what-is-data-security","status":"publish","type":"post","link":"https:\/\/geetauniversity.edu.in\/blog\/what-is-data-security\/","title":{"rendered":"What is data security? | Why is data security important? | Types of Data Protection \u2013 Geeta University"},"content":{"rendered":"<div class=\"elementor-element elementor-element-f1e2a53 elementor-widget elementor-widget-heading\" data-id=\"f1e2a53\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container\">\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_80 counter-hierarchy ez-toc-counter ez-toc-white ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/geetauniversity.edu.in\/blog\/what-is-data-security\/#Definitions\" >Definitions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/geetauniversity.edu.in\/blog\/what-is-data-security\/#Importance_of_Data_Security\" >Importance of Data Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/geetauniversity.edu.in\/blog\/what-is-data-security\/#Types_of_Data_Protection\" >Types of Data Protection-<\/a><ul class='ez-toc-list-level-2' ><li class='ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/geetauniversity.edu.in\/blog\/what-is-data-security\/#Accessibility_Controls\" >Accessibility Controls<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/geetauniversity.edu.in\/blog\/what-is-data-security\/#Evidence_of_authenticity\" >Evidence of authenticity<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/geetauniversity.edu.in\/blog\/what-is-data-security\/#Backups_and_Recovery\" >Backups and Recovery<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/geetauniversity.edu.in\/blog\/what-is-data-security\/#Data_Deletion\" >Data Deletion<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/geetauniversity.edu.in\/blog\/what-is-data-security\/#Hides_data\" >Hides data<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/geetauniversity.edu.in\/blog\/what-is-data-security\/#Data_Stability\" >Data Stability<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/geetauniversity.edu.in\/blog\/what-is-data-security\/#Encryption\" >Encryption<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/geetauniversity.edu.in\/blog\/what-is-data-security\/#Major_Data_Protection_Issues\" >Major Data Protection Issues<\/a><ul class='ez-toc-list-level-2' ><li class='ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/geetauniversity.edu.in\/blog\/what-is-data-security\/#Data_Security_Technology\" >Data Security Technology<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/geetauniversity.edu.in\/blog\/what-is-data-security\/#Data_Testing\" >Data Testing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/geetauniversity.edu.in\/blog\/what-is-data-security\/#Full-Time_Data_Warnings\" >Full-Time Data Warnings<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/geetauniversity.edu.in\/blog\/what-is-data-security\/#Data_Risk_Assessment\" >Data Risk Assessment<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h1 class=\"elementor-heading-title elementor-size-default\"><span class=\"ez-toc-section\" id=\"Definitions\"><\/span>Definitions<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-cad065c elementor-widget elementor-widget-text-editor\" data-id=\"cad065c\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p>Throughout its life cycle, data security is a hat-trick system that protects against illegal access and counterfeit data.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-7a6ca66 elementor-widget elementor-widget-heading\" data-id=\"7a6ca66\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container\">\n<h1 class=\"elementor-heading-title elementor-size-default\"><span class=\"ez-toc-section\" id=\"Importance_of_Data_Security\"><\/span>Importance of Data Security<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-078c02d elementor-widget elementor-widget-text-editor\" data-id=\"078c02d\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p>For a variety of reasons, data security is critical for both public and commercial enterprises.. First, there is the legal and ethical obligation of companies to protect their user and customer data from falling into the wrong hands. Then there is the risk of data breach or hacking. If you do not take the security of the data seriously, your reputation could be seriously damaged in the event of public law or hacking incidents.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-606abdf elementor-widget elementor-widget-heading\" data-id=\"606abdf\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container\">\n<h1 class=\"elementor-heading-title elementor-size-default\"><span class=\"ez-toc-section\" id=\"Types_of_Data_Protection\"><\/span>Types of Data Protection-<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-45e662d elementor-widget elementor-widget-heading\" data-id=\"45e662d\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"ez-toc-section\" id=\"Accessibility_Controls\"><\/span>Accessibility Controls<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-2eb25e5 elementor-widget elementor-widget-text-editor\" data-id=\"2eb25e5\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p>These types of data security measures include limiting physical and digital access to sensitive systems and data. This includes ensuring that all computers and devices are protected by mandatory login and that physical spaces can only be installed by authorized personnel.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-a01e8f5 elementor-widget elementor-widget-heading\" data-id=\"a01e8f5\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"ez-toc-section\" id=\"Evidence_of_authenticity\"><\/span>Evidence of authenticity<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-a70a36e elementor-widget elementor-widget-text-editor\" data-id=\"a70a36e\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p>Similar to access controls, authentication refers directly to the precise identification of users before receiving data. Examples include passwords, PIN numbers, security tokens, swipe cards, and biometrics.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-8336bcd elementor-widget elementor-widget-heading\" data-id=\"8336bcd\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"ez-toc-section\" id=\"Backups_and_Recovery\"><\/span>Backups and Recovery<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-da7a054 elementor-widget elementor-widget-text-editor\" data-id=\"da7a054\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p>Data security is having a plan in place to protect data access in the event of a system failure. disaster, data corruption, or breach. You will need a backup copy of the data, which is stored separately To recover if necessary, use a virtual drive, a local network, or the cloud.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-2900c08 elementor-widget elementor-widget-heading\" data-id=\"2900c08\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"ez-toc-section\" id=\"Data_Deletion\"><\/span>Data Deletion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f2dadd7 elementor-widget elementor-widget-text-editor\" data-id=\"f2dadd7\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p>Deleting the data ensures that the data is not available and will not fall into the wrong hands.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-faaa56b elementor-widget elementor-widget-heading\" data-id=\"faaa56b\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"ez-toc-section\" id=\"Hides_data\"><\/span>Hides data<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-96b7887 elementor-widget elementor-widget-text-editor\" data-id=\"96b7887\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p>By using encryption software, data is encrypted with numbers and alphabetical numbers of individual characters. This effectively hides important information even if an unauthorized group finds it. The information returns to its original form only when the authorized user receives it.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-2fb9092 elementor-widget elementor-widget-heading\" data-id=\"2fb9092\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"ez-toc-section\" id=\"Data_Stability\"><\/span>Data Stability<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-3557e61 elementor-widget elementor-widget-text-editor\" data-id=\"3557e61\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p>Complete data security means your systems can withstand or recover from failure. Building resilience on your hardware and software means that incidents such as power outages or natural disasters will not endanger security.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-8cdf0c4 elementor-widget elementor-widget-heading\" data-id=\"8cdf0c4\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"ez-toc-section\" id=\"Encryption\"><\/span>Encryption<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d6cf0a0 elementor-widget elementor-widget-text-editor\" data-id=\"d6cf0a0\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p>The computer algorithm converts text characters into unreadable formats with encryption keys. Only authorized users with the appropriate matching keys can open and access information. Everything from files and contact details by email can \u2013 and should \u2013 be encrypted to some degree.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d5f709c elementor-widget elementor-widget-heading\" data-id=\"d5f709c\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container\">\n<h1 class=\"elementor-heading-title elementor-size-default\"><span class=\"ez-toc-section\" id=\"Major_Data_Protection_Issues\"><\/span>Major Data Protection Issues<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-73dc532 elementor-widget elementor-widget-text-editor\" data-id=\"73dc532\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p>There are three key elements to data security that all organizations must adhere to Confidentiality, Integrity, and Availability.<\/p>\n<ul>\n<li>Confidentiality: Determines that data is only accessible to authorized users with appropriate credentials.<\/li>\n<li>Integrity: \u2013 Ensure that all information is reliable, accurate, and not subject to unauthorized changes.<\/li>\n<li>Availability: \u2013 Ensures that data is easily accessible \u2013 and secure \u2013 available and available for ongoing business needs.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-9ae53f9 elementor-widget elementor-widget-heading\" data-id=\"9ae53f9\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"ez-toc-section\" id=\"Data_Security_Technology\"><\/span>Data Security Technology<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-3e2360d elementor-widget elementor-widget-text-editor\" data-id=\"3e2360d\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p>The use of appropriate data aegis technology can help your organization prevent violations, reduce risks, and maintain security measures.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-b96ecc0 elementor-widget elementor-widget-heading\" data-id=\"b96ecc0\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"ez-toc-section\" id=\"Data_Testing\"><\/span>Data Testing<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-a41b4c7 elementor-widget elementor-widget-text-editor\" data-id=\"a41b4c7\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p>Security breaches are often unavoidable. Data analysis software captures and reports problems such as changes in data management, records of who has access to sensitive information, and the file format used. These audit procedures are essential for criminal investigation. Appropriate data analysis solutions also give IT administrator\u2019s visibility in defense of unauthorized changes and potential violations.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-8dace34 elementor-widget elementor-widget-heading\" data-id=\"8dace34\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"ez-toc-section\" id=\"Full-Time_Data_Warnings\"><\/span>Full-Time Data Warnings<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-af19cc6 elementor-widget elementor-widget-text-editor\" data-id=\"af19cc6\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p>By using real-time systems and data monitoring technology, you will be able to detect violations as quickly as possible. This helps you to reduce data loss, loss, alteration, or unauthorized access to personal data.<\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-1245427 elementor-widget elementor-widget-heading\" data-id=\"1245427\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\"><span class=\"ez-toc-section\" id=\"Data_Risk_Assessment\"><\/span>Data Risk Assessment<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-26405aa elementor-widget elementor-widget-text-editor\" data-id=\"26405aa\" data-element_type=\"widget\" data-settings=\"{&quot;ekit_we_effect_on&quot;:&quot;none&quot;}\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container\">\n<p>A comprehensive risk assessment will provide reliable and repetitive measures for prioritization and remediation of major security risks. The accurate risk assessment will summarize key findings, identify risks, and include corrective actions for corrective actions.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Definitions Throughout its life cycle, data security is a hat-trick system that protects against illegal&#8230;<\/p>\n","protected":false},"author":1,"featured_media":285,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-280","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-law","entry"],"acf":[],"_links":{"self":[{"href":"https:\/\/geetauniversity.edu.in\/blog\/wp-json\/wp\/v2\/posts\/280","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/geetauniversity.edu.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/geetauniversity.edu.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/geetauniversity.edu.in\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/geetauniversity.edu.in\/blog\/wp-json\/wp\/v2\/comments?post=280"}],"version-history":[{"count":1,"href":"https:\/\/geetauniversity.edu.in\/blog\/wp-json\/wp\/v2\/posts\/280\/revisions"}],"predecessor-version":[{"id":286,"href":"https:\/\/geetauniversity.edu.in\/blog\/wp-json\/wp\/v2\/posts\/280\/revisions\/286"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/geetauniversity.edu.in\/blog\/wp-json\/wp\/v2\/media\/285"}],"wp:attachment":[{"href":"https:\/\/geetauniversity.edu.in\/blog\/wp-json\/wp\/v2\/media?parent=280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/geetauniversity.edu.in\/blog\/wp-json\/wp\/v2\/categories?post=280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/geetauniversity.edu.in\/blog\/wp-json\/wp\/v2\/tags?post=280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}