{"id":4308,"date":"2014-04-08T06:12:12","date_gmt":"2014-04-08T10:12:12","guid":{"rendered":"http:\/\/www.digitalbrandinsider.com\/?p=4308"},"modified":"2019-12-12T11:50:09","modified_gmt":"2019-12-12T16:50:09","slug":"tackling-domain-name-infringements","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/tackling-domain-name-infringements\/","title":{"rendered":"Tackling domain name infringements"},"content":{"rendered":"<p>By <a href=\"https:\/\/plus.google.com\/116083819179310081863\/\">Stina Pilotti<\/a>&nbsp;|<\/p>\n<p>Domain names are central to the identity of most businesses today. Good strategies for domain name protection and monitoring can significantly reduce the likelihood of your intellectual property being misused online. But when they do occur, domain infringements can have rapid, far-reaching, negative impacts.<\/p>\n<p>In the third installment of her blog series on digital rights enforcement, Stina Pilotti, CSC\u2019s Head of Digital IP Advisory Services, looks at the options for enforcing your rights when domain name infringement happens to you.<\/p>\n<p><!--more--><\/p>\n<p>The good news for brand holders faced with domains that infringe on their rights is that, much like with <a title=\"Enforcing your rights in social and mobile\" href=\"https:\/\/www.cscdigitalbrand.services\/blog\/enforcing-your-rights-in-social-and-mobile\/\">social media<\/a> and <a title=\"How to fight search engine fraud\" href=\"https:\/\/www.cscdigitalbrand.services\/blog\/how-to-fight-search-engine-fraud\/\">search<\/a>, there are clear, tried-and-tested steps you can take and centralized mechanisms for dealing with disputes.<\/p>\n<p><strong>Step 1: Cease and Desist<\/strong><br \/>\nBefore sending a cease and desist letter, it\u2019s important to check that the registrant does not have rights of their own. It is not enough that you have an older and more global right. If the registrant can show some legitimate interest in the name, they are likely to prevail.<\/p>\n<p><a href=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2014\/04\/GavelComputer_200w.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4313 alignright\" style=\"border: 0px; margin-left: 10px;\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2014\/04\/GavelComputer_200w.jpg\" alt=\"GavelComputer_200w\" width=\"200\" height=\"133\"\/><\/a>The sooner a brand owner sends a cease and desist letter, the sooner a registrant is \u201cput on notice.\u201d This formal notice is an important marker in the dispute process. When determining whether a registrant has legitimate rights to a name, the critical moment from a UDRP (Uniform Dispute Resolution Procedure) perspective is what the use looked like \u201cbefore any notice was given to [the Registrant] of the dispute\u201d (Uniform Dispute Resolution Policy, 4.(c) (1)). It has been established that regarding the term \u201cdispute\u201d in this sentence, \u201c[it] is not equal to \u201cproceeding,\u201d nor to \u2018complainant&#8217;s action to initiate proceedings\u2019.\u201d Rather, \u201cdispute\u201d means the controversy between the parties. This means that the sooner the brand owner sends a cease and desist letter, the sooner the registrant is \u201cput on notice\u201d in the sense intended in the UDRP. Also, often, the registrant will willingly transfer an offending domain in response to a cease and desist letter. In our experience, carefully crafted approaches succeed in over 50% of cases, making cease and desist letters a very cost-effective mechanism for recovering domains.<\/p>\n<p>Even if a registrant does not agree to transfer a domain, the correspondence following a cease and desist letter can provide useful evidence in favor of the complainant. A failure to reply can itself be considered an indication of bad-faith registration.<\/p>\n<p><strong>Step 2: Dispute<\/strong><br \/>\nIf cease and desist fails, dispute procedures offer a simple, expedient and cost-effective alternative to legal action for clear cases of cybersquatting. Many countries have implemented the UDRP, an out-of-court dispute resolution mechanism through which trademark owners can resolve cases of bad-faith registration and use of domain names like cybersquatting. Many countries have opted to create policies of their own, usually modeled after the UDRP but with some minor variations.<\/p>\n<p>There are three conditions that have to be fulfilled in order to be successful in a UDRP case:<\/p>\n<ul>\n<li>The domain name is identical or confusingly similar to a trademark or service mark to which the complainant has rights<\/li>\n<li>The registrant has no rights or legitimate interests with respect to the domain name<\/li>\n<li>The domain name has been registered and is being used in bad faith<\/li>\n<\/ul>\n<p>The URS (Uniform Rapid Suspension) system has been introduced as part of the new gTLD rights protection program. The URS is intended to be a lighter, quicker complement to the UDRP. Like the UDRP, it is intended for clear-cut cases of trademark abuse. The main difference between the URS and the UDRP is that while the UDRP allows for domain name transfer as a remedy, with the URS the domain name is never transferred; it remains the property of the owner although they are not allowed to have any online presence that uses it for the entire duration of its registration.<\/p>\n<p>There is also a higher burden of proof put on the complainant in a URS. This underscores the intention of the URS\u2014to be for clear-cut cases of infringement only. If there is any doubt about any of the requirements, the URS will be rejected. In general, our advice to clients is this: if you feel compelled to submit lengthy explanations about any of the requirements or excessive exhibits to prove something, then the URS is probably not the way to go.<\/p>\n<p><strong>Step 3: Acquisition<\/strong><br \/>\nIf there is no dispute-resolution procedure in place for a particular top-level domain (TLD) or if the registrant has rights, the only option may be to buy the domain name. Price is ultimately determined by the registrant but is influenced by several factors: the TLD, the number of characters in the string, whether it is generic, prior use and, most importantly, the registrant\u2019s expectations. A potential pitfall of acquisition is that it may encourage more cybersquatting.<\/p>\n<p>With these proven techniques and plenty of case law available, a well thought-out approach can help brand owners combat domain infringements quickly and cost-effectively.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>For more information<\/strong> on CSC\u2019s enforcement services or to request a complimentary consultation with an online enforcement specialist, please visit <a href=\"https:\/\/www.cscglobal.com\/global\/web\/csc\/udrp-service.html\">cscglobal.com<\/a>.<\/p>\n<p><strong>Further reading:<\/strong>&nbsp;<a href=\"https:\/\/www.cscglobal.com\/global\/web\/csc\/dbs-online-brand-enforcement-2014-cscg.html\">Online Brand Enforcement 2014<\/a> &#8211; this&nbsp;recent article&nbsp;in <em>World Trademark Review<\/em> explores one of the most urgent issues facing brands today: how do you protect your brand when its \u201cdigital footprint\u201d is growing all the time?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Stina Pilotti&nbsp;| Domain names are central to the identity of most businesses today. Good strategies for domain name protection and monitoring can significantly reduce the likelihood of your intellectual property being misused online. But when they do occur, domain infringements can have rapid, far-reaching, negative impacts. In the third installment of her blog series [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9,7,387],"tags":[161,110,28,166,348],"class_list":["post-4308","post","type-post","status-publish","format-standard","hentry","category-brands","category-domains","category-new-gtlds","tag-brand-protection","tag-cybersquatting","tag-new-gtld","tag-udrp","tag-urs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tackling domain name infringements | CSC<\/title>\n<meta name=\"description\" content=\"By Stina Pilotti&nbsp;| Domain names are central to the identity of most businesses today. Good strategies for domain name protection and monitoring can\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/tackling-domain-name-infringements\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tackling domain name infringements | CSC\" \/>\n<meta property=\"og:description\" content=\"By Stina Pilotti&nbsp;| Domain names are central to the identity of most businesses today. Good strategies for domain name protection and monitoring can\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/tackling-domain-name-infringements\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2014-04-08T10:12:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-12T16:50:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2014\/04\/GavelComputer_200w.jpg\" \/>\n<meta name=\"author\" content=\"CSC Digital Brand Services\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"CSC Digital Brand Services\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/tackling-domain-name-infringements\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/tackling-domain-name-infringements\\\/\"},\"author\":{\"name\":\"CSC Digital Brand Services\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/287f596645b34f3ea2b2d7e11d990868\"},\"headline\":\"Tackling domain name infringements\",\"datePublished\":\"2014-04-08T10:12:12+00:00\",\"dateModified\":\"2019-12-12T16:50:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/tackling-domain-name-infringements\\\/\"},\"wordCount\":889,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/tackling-domain-name-infringements\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2014\\\/04\\\/GavelComputer_200w.jpg\",\"keywords\":[\"brand protection\",\"cybersquatting\",\"new gTLD\",\"UDRP\",\"URS\"],\"articleSection\":[\"Brand Protection\",\"Domains\",\"New gTLDs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/tackling-domain-name-infringements\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/tackling-domain-name-infringements\\\/\",\"name\":\"Tackling domain name infringements | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/tackling-domain-name-infringements\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/tackling-domain-name-infringements\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2014\\\/04\\\/GavelComputer_200w.jpg\",\"datePublished\":\"2014-04-08T10:12:12+00:00\",\"dateModified\":\"2019-12-12T16:50:09+00:00\",\"description\":\"By Stina Pilotti&nbsp;| Domain names are central to the identity of most businesses today. Good strategies for domain name protection and monitoring can\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/tackling-domain-name-infringements\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/tackling-domain-name-infringements\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/tackling-domain-name-infringements\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2014\\\/04\\\/GavelComputer_200w.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2014\\\/04\\\/GavelComputer_200w.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/tackling-domain-name-infringements\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tackling domain name infringements\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/287f596645b34f3ea2b2d7e11d990868\",\"name\":\"CSC Digital Brand Services\",\"sameAs\":[\"https:\\\/\\\/cscdigitalbrand.services\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tackling domain name infringements | CSC","description":"By Stina Pilotti&nbsp;| Domain names are central to the identity of most businesses today. Good strategies for domain name protection and monitoring can","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/tackling-domain-name-infringements\/","og_locale":"en_US","og_type":"article","og_title":"Tackling domain name infringements | CSC","og_description":"By Stina Pilotti&nbsp;| Domain names are central to the identity of most businesses today. Good strategies for domain name protection and monitoring can","og_url":"https:\/\/www.cscdbs.com\/blog\/tackling-domain-name-infringements\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2014-04-08T10:12:12+00:00","article_modified_time":"2019-12-12T16:50:09+00:00","og_image":[{"url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2014\/04\/GavelComputer_200w.jpg","type":"","width":"","height":""}],"author":"CSC Digital Brand Services","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"CSC Digital Brand Services","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/tackling-domain-name-infringements\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/tackling-domain-name-infringements\/"},"author":{"name":"CSC Digital Brand Services","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/287f596645b34f3ea2b2d7e11d990868"},"headline":"Tackling domain name infringements","datePublished":"2014-04-08T10:12:12+00:00","dateModified":"2019-12-12T16:50:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/tackling-domain-name-infringements\/"},"wordCount":889,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/tackling-domain-name-infringements\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2014\/04\/GavelComputer_200w.jpg","keywords":["brand protection","cybersquatting","new gTLD","UDRP","URS"],"articleSection":["Brand Protection","Domains","New gTLDs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/tackling-domain-name-infringements\/","url":"https:\/\/www.cscdbs.com\/blog\/tackling-domain-name-infringements\/","name":"Tackling domain name infringements | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/tackling-domain-name-infringements\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/tackling-domain-name-infringements\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2014\/04\/GavelComputer_200w.jpg","datePublished":"2014-04-08T10:12:12+00:00","dateModified":"2019-12-12T16:50:09+00:00","description":"By Stina Pilotti&nbsp;| Domain names are central to the identity of most businesses today. Good strategies for domain name protection and monitoring can","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/tackling-domain-name-infringements\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/tackling-domain-name-infringements\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/tackling-domain-name-infringements\/#primaryimage","url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2014\/04\/GavelComputer_200w.jpg","contentUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2014\/04\/GavelComputer_200w.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/tackling-domain-name-infringements\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Tackling domain name infringements"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/287f596645b34f3ea2b2d7e11d990868","name":"CSC Digital Brand Services","sameAs":["https:\/\/cscdigitalbrand.services\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/4308","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=4308"}],"version-history":[{"count":11,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/4308\/revisions"}],"predecessor-version":[{"id":8496,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/4308\/revisions\/8496"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=4308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=4308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=4308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}