{"id":969,"date":"2022-04-19T20:23:29","date_gmt":"2022-04-19T20:23:29","guid":{"rendered":"https:\/\/www.upgreat.pl\/?page_id=969"},"modified":"2023-03-23T11:05:29","modified_gmt":"2023-03-23T11:05:29","slug":"zapobieganie-wyciekom","status":"publish","type":"page","link":"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zapobieganie-wyciekom\/","title":{"rendered":"Prevention of leakage"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"969\" class=\"elementor elementor-969\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6d2576a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6d2576a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cf75c6\" data-id=\"3cf75c6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-43c912b elementor-widget elementor-widget-heading\" data-id=\"43c912b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Prevention of leakage<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d035f6a elementor-widget elementor-widget-breadcrumbs\" data-id=\"d035f6a\" data-element_type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/www.upgreat.pl\/en\/\">Home<\/a><\/span><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f6bb74d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f6bb74d\" data-element_type=\"section\" id=\"tabs-nav\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b1a5cdf\" data-id=\"b1a5cdf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d085ff9 elementor-widget elementor-widget-heading\" data-id=\"d085ff9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/\">Security of IT systems<\/a><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc45979 elementor-nav-menu--dropdown-none menu-oferta elementor-widget elementor-widget-nav-menu\" data-id=\"bc45979\" data-element_type=\"widget\" data-settings=\"{&quot;layout&quot;:&quot;vertical&quot;,&quot;submenu_icon&quot;:{&quot;value&quot;:&quot;&lt;i class=\\&quot;fas fa-caret-down\\&quot; aria-hidden=\\&quot;true\\&quot;&gt;&lt;\\\/i&gt;&quot;,&quot;library&quot;:&quot;fa-solid&quot;}}\" data-widget_type=\"nav-menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<nav aria-label=\"Menu\" class=\"elementor-nav-menu--main elementor-nav-menu__container elementor-nav-menu--layout-vertical e--pointer-background e--animation-fade\">\n\t\t\t\t<ul id=\"menu-1-bc45979\" class=\"elementor-nav-menu sm-vertical\"><li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-964\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/audyty-bezpieczenstwa\/\" class=\"elementor-item\">Security audits<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-985\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/testy-penetracyjne\/\" class=\"elementor-item\">Penetration tests<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-984\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/polityki-bezpieczenstwa\/\" class=\"elementor-item\">Security policies<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-983\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-sieci-i-tresci\/\" class=\"elementor-item\">Web and content security systems<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-982\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwa-punktow-koncowych\/\" class=\"elementor-item\">Endpoint security<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-981\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zapobieganie-wyciekom\/\" class=\"elementor-item\">Prevention of leakage<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-980\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zarzadzanie-ryzykiem\/\" class=\"elementor-item\">Risk management<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-979\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-fizyczne\/\" class=\"elementor-item\">Physical security<\/a><\/li>\n<\/ul>\t\t\t<\/nav>\n\t\t\t\t\t\t<nav class=\"elementor-nav-menu--dropdown elementor-nav-menu__container\" aria-hidden=\"true\">\n\t\t\t\t<ul id=\"menu-2-bc45979\" class=\"elementor-nav-menu sm-vertical\"><li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-964\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/audyty-bezpieczenstwa\/\" class=\"elementor-item\" tabindex=\"-1\">Security audits<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-985\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/testy-penetracyjne\/\" class=\"elementor-item\" tabindex=\"-1\">Penetration tests<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-984\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/polityki-bezpieczenstwa\/\" class=\"elementor-item\" tabindex=\"-1\">Security policies<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-983\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-sieci-i-tresci\/\" class=\"elementor-item\" tabindex=\"-1\">Web and content security systems<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-982\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwa-punktow-koncowych\/\" class=\"elementor-item\" tabindex=\"-1\">Endpoint security<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-981\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zapobieganie-wyciekom\/\" class=\"elementor-item\" tabindex=\"-1\">Prevention of leakage<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-980\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zarzadzanie-ryzykiem\/\" class=\"elementor-item\" tabindex=\"-1\">Risk management<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-979\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-fizyczne\/\" class=\"elementor-item\" tabindex=\"-1\">Physical security<\/a><\/li>\n<\/ul>\t\t\t<\/nav>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1abc68b\" data-id=\"1abc68b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-a1b80cf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a1b80cf\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-5e3e54b\" data-id=\"5e3e54b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-60e6253 elementor-widget elementor-widget-text-editor\" data-id=\"60e6253\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Theft or accidental leakage of data through ICT may expose the organization to civil, criminal or other unpleasant consequences leading to loss of good image and real financial losses. To prevent such situations, we offer you our help in implementing DLP (Data Loss Prevention) solutions. Systems of this type help protect confidential and business-critical data by:<\/p><ul><li>detection of sensitive data in network traffic in a manner similar to intrusion detection systems or in files saved on external media in a manner similar to anti-virus programs;<\/li><li>classification and weighting of files in the local system based on the content of sensitive data, and then controlling the transfer of these files over the network or saving them to external media,<\/li><li>blocking of writing to external media,<\/li><li>transparent encryption and decryption of sensitive documents so that they never leave the organization unencrypted, and inside the organization are only readable by authorized persons (information rights management systems - IRM).<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Prevention of leaks Security of IT systems Theft or accidental leakage of data via ICT may expose the organization to civil, criminal or other unpleasant consequences leading to the loss of good image and real financial losses. To prevent such situations, we offer you our help in implementing DLP (Data Loss Prevention) solutions. Such systems [\u2026]<\/p>","protected":false},"author":1,"featured_media":0,"parent":456,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-969","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Bezpiecze\u0144stwo danych wra\u017cliwych w firmie | UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zapobieganie-wyciekom\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bezpiecze\u0144stwo danych wra\u017cliwych w firmie | UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\" \/>\n<meta property=\"og:description\" content=\"Zapobieganie wyciekom Bezpiecze\u0144stwo System\u00f3w IT Kradzie\u017c lub przypadkowy wyciek danych za po\u015brednictwem technologii teleinformatycznych mo\u017ce narazi\u0107 organizacj\u0119 na odpowiedzialno\u015b\u0107 cywiln\u0105, karn\u0105 lub innego rodzaju przykre konsekwencje prowadz\u0105ce do utraty dobrego wizerunku i realnych strat finansowych. Aby zapobiec tego typu sytuacjom oferujemy Pa\u0144stwu swoj\u0105 pomoc we wdra\u017caniu rozwi\u0105za\u0144 typu DLP (Data Loss Prevention). Systemy tego typu [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zapobieganie-wyciekom\/\" \/>\n<meta property=\"og:site_name\" content=\"Upgreat\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-23T11:05:29+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/zapobieganie-wyciekom\/\",\"url\":\"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/zapobieganie-wyciekom\/\",\"name\":\"Bezpiecze\u0144stwo danych wra\u017cliwych w firmie | UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\",\"isPartOf\":{\"@id\":\"https:\/\/www.upgreat.pl\/#website\"},\"datePublished\":\"2022-04-19T20:23:29+00:00\",\"dateModified\":\"2023-03-23T11:05:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/zapobieganie-wyciekom\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/zapobieganie-wyciekom\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/zapobieganie-wyciekom\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/www.upgreat.pl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bezpiecze\u0144stwo System\u00f3w IT\",\"item\":\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Zapobieganie wyciekom\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.upgreat.pl\/#website\",\"url\":\"https:\/\/www.upgreat.pl\/\",\"name\":\"Upgreat\",\"description\":\"Bezpiecze\u0144stwo system\u00f3w IT, Outsourcing IT, Architektura system\u00f3w IT\",\"publisher\":{\"@id\":\"https:\/\/www.upgreat.pl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.upgreat.pl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.upgreat.pl\/#organization\",\"name\":\"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\",\"url\":\"https:\/\/www.upgreat.pl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg\",\"contentUrl\":\"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg\",\"width\":600,\"height\":220,\"caption\":\"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\"},\"image\":{\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security of sensitive data in the company | UpGreat.pl \u2013 professional IT services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zapobieganie-wyciekom\/","og_locale":"en_US","og_type":"article","og_title":"Bezpiecze\u0144stwo danych wra\u017cliwych w firmie | UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne","og_description":"Zapobieganie wyciekom Bezpiecze\u0144stwo System\u00f3w IT Kradzie\u017c lub przypadkowy wyciek danych za po\u015brednictwem technologii teleinformatycznych mo\u017ce narazi\u0107 organizacj\u0119 na odpowiedzialno\u015b\u0107 cywiln\u0105, karn\u0105 lub innego rodzaju przykre konsekwencje prowadz\u0105ce do utraty dobrego wizerunku i realnych strat finansowych. Aby zapobiec tego typu sytuacjom oferujemy Pa\u0144stwu swoj\u0105 pomoc we wdra\u017caniu rozwi\u0105za\u0144 typu DLP (Data Loss Prevention). Systemy tego typu [&hellip;]","og_url":"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zapobieganie-wyciekom\/","og_site_name":"Upgreat","article_modified_time":"2023-03-23T11:05:29+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/zapobieganie-wyciekom\/","url":"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/zapobieganie-wyciekom\/","name":"Security of sensitive data in the company | UpGreat.pl \u2013 professional IT services","isPartOf":{"@id":"https:\/\/www.upgreat.pl\/#website"},"datePublished":"2022-04-19T20:23:29+00:00","dateModified":"2023-03-23T11:05:29+00:00","breadcrumb":{"@id":"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/zapobieganie-wyciekom\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/zapobieganie-wyciekom\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/zapobieganie-wyciekom\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/www.upgreat.pl\/"},{"@type":"ListItem","position":2,"name":"Bezpiecze\u0144stwo System\u00f3w IT","item":"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/"},{"@type":"ListItem","position":3,"name":"Zapobieganie wyciekom"}]},{"@type":"WebSite","@id":"https:\/\/www.upgreat.pl\/#website","url":"https:\/\/www.upgreat.pl\/","name":"Upgreat","description":"Security of IT systems, IT Outsourcing, Architecture of IT systems","publisher":{"@id":"https:\/\/www.upgreat.pl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.upgreat.pl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.upgreat.pl\/#organization","name":"UpGreat.pl \u2013 professional IT services","url":"https:\/\/www.upgreat.pl\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/","url":"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg","contentUrl":"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg","width":600,"height":220,"caption":"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne"},"image":{"@id":"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/pages\/969","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/comments?post=969"}],"version-history":[{"count":8,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/pages\/969\/revisions"}],"predecessor-version":[{"id":1693,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/pages\/969\/revisions\/1693"}],"up":[{"embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/pages\/456"}],"wp:attachment":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/media?parent=969"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}