{"id":971,"date":"2022-04-19T20:23:39","date_gmt":"2022-04-19T20:23:39","guid":{"rendered":"https:\/\/www.upgreat.pl\/?page_id=971"},"modified":"2023-03-23T11:08:57","modified_gmt":"2023-03-23T11:08:57","slug":"bezpieczenstwo-fizyczne","status":"publish","type":"page","link":"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-fizyczne\/","title":{"rendered":"Physical security"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"971\" class=\"elementor elementor-971\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6d2576a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6d2576a\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3cf75c6\" data-id=\"3cf75c6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-43c912b elementor-widget elementor-widget-heading\" data-id=\"43c912b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Physical security<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d035f6a elementor-widget elementor-widget-breadcrumbs\" data-id=\"d035f6a\" data-element_type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/www.upgreat.pl\/en\/\">Home<\/a><\/span><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f6bb74d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f6bb74d\" data-element_type=\"section\" id=\"tabs-nav\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-b1a5cdf\" data-id=\"b1a5cdf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d085ff9 elementor-widget elementor-widget-heading\" data-id=\"d085ff9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/\">Security of IT systems<\/a><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc45979 elementor-nav-menu--dropdown-none menu-oferta elementor-widget elementor-widget-nav-menu\" data-id=\"bc45979\" data-element_type=\"widget\" data-settings=\"{&quot;layout&quot;:&quot;vertical&quot;,&quot;submenu_icon&quot;:{&quot;value&quot;:&quot;&lt;i class=\\&quot;fas fa-caret-down\\&quot; aria-hidden=\\&quot;true\\&quot;&gt;&lt;\\\/i&gt;&quot;,&quot;library&quot;:&quot;fa-solid&quot;}}\" data-widget_type=\"nav-menu.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<nav aria-label=\"Menu\" class=\"elementor-nav-menu--main elementor-nav-menu__container elementor-nav-menu--layout-vertical e--pointer-background e--animation-fade\">\n\t\t\t\t<ul id=\"menu-1-bc45979\" class=\"elementor-nav-menu sm-vertical\"><li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-964\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/audyty-bezpieczenstwa\/\" class=\"elementor-item\">Security audits<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-985\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/testy-penetracyjne\/\" class=\"elementor-item\">Penetration tests<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-984\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/polityki-bezpieczenstwa\/\" class=\"elementor-item\">Security policies<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-983\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-sieci-i-tresci\/\" class=\"elementor-item\">Web and content security systems<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-982\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwa-punktow-koncowych\/\" class=\"elementor-item\">Endpoint security<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-981\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zapobieganie-wyciekom\/\" class=\"elementor-item\">Prevention of leakage<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-980\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zarzadzanie-ryzykiem\/\" class=\"elementor-item\">Risk management<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-979\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-fizyczne\/\" class=\"elementor-item\">Physical security<\/a><\/li>\n<\/ul>\t\t\t<\/nav>\n\t\t\t\t\t\t<nav class=\"elementor-nav-menu--dropdown elementor-nav-menu__container\" aria-hidden=\"true\">\n\t\t\t\t<ul id=\"menu-2-bc45979\" class=\"elementor-nav-menu sm-vertical\"><li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-964\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/audyty-bezpieczenstwa\/\" class=\"elementor-item\" tabindex=\"-1\">Security audits<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-985\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/testy-penetracyjne\/\" class=\"elementor-item\" tabindex=\"-1\">Penetration tests<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-984\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/polityki-bezpieczenstwa\/\" class=\"elementor-item\" tabindex=\"-1\">Security policies<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-983\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-sieci-i-tresci\/\" class=\"elementor-item\" tabindex=\"-1\">Web and content security systems<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-982\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwa-punktow-koncowych\/\" class=\"elementor-item\" tabindex=\"-1\">Endpoint security<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-981\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zapobieganie-wyciekom\/\" class=\"elementor-item\" tabindex=\"-1\">Prevention of leakage<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-980\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/zarzadzanie-ryzykiem\/\" class=\"elementor-item\" tabindex=\"-1\">Risk management<\/a><\/li>\n<li class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-979\"><a href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-fizyczne\/\" class=\"elementor-item\" tabindex=\"-1\">Physical security<\/a><\/li>\n<\/ul>\t\t\t<\/nav>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1abc68b\" data-id=\"1abc68b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4ba98fa elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4ba98fa\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-5eaf57c\" data-id=\"5eaf57c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e5ebd1e elementor-widget elementor-widget-text-editor\" data-id=\"e5ebd1e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Even the best security at the level of networks, systems, servers and workstations may turn out to be insufficient if the elements of our ICT infrastructure may be accessed by unauthorized and unauthorized persons. A popular security saying can be cited here: &quot;If someone has had physical access to your system, it is no longer your system&quot;. Appropriate protection of devices and cables should therefore constitute one of the many layers of protection. To help you properly secure your infrastructure elements against unauthorized access, we offer services in the field of:<\/p><ul><li>Installation of access control systems<\/li><li>Installation of CCTV and monitoring systems<\/li><li>Installations protected against unauthorized access by cabinets, switchboards and cable corridors<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Physical security Security of IT systems Even the best security at the level of networks, systems, servers and workstations may turn out to be insufficient if unauthorized and unauthorized persons may have access to elements of our ICT infrastructure. To quote a popular security saying here: &quot;if someone had physical access to your system, it is no longer your [\u2026]<\/p>","protected":false},"author":1,"featured_media":0,"parent":456,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"footnotes":""},"class_list":["post-971","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Instalacje system\u00f3w kontroli dost\u0119pu, instalacja monitoringu, kamery CCTV, monta\u017c telewizji przemys\u0142owej | UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-fizyczne\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Instalacje system\u00f3w kontroli dost\u0119pu, instalacja monitoringu, kamery CCTV, monta\u017c telewizji przemys\u0142owej | UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\" \/>\n<meta property=\"og:description\" content=\"Bezpiecze\u0144stwo fizyczne Bezpiecze\u0144stwo System\u00f3w IT Najlepsze nawet zabezpieczenia na poziomie sieci, system\u00f3w, serwer\u00f3w i stacji roboczych mog\u0105 okaza\u0107 si\u0119 niewystarczaj\u0105ce, je\u017celi do element\u00f3w naszej infrastruktury teleinformatycznej dost\u0119p mog\u0105 mie\u0107 niepowo\u0142ane i nieautoryzowane osoby. Zacytowa\u0107 tutaj mo\u017cna popularne powiedzenie z dziedziny bezpiecze\u0144stwa: &#8222;je\u017celi kto\u015b mia\u0142 fizyczny dost\u0119p do twojego systemu, to nie jest to ju\u017c tw\u00f3j [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-fizyczne\/\" \/>\n<meta property=\"og:site_name\" content=\"Upgreat\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-23T11:08:57+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/bezpieczenstwo-fizyczne\/\",\"url\":\"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/bezpieczenstwo-fizyczne\/\",\"name\":\"Instalacje system\u00f3w kontroli dost\u0119pu, instalacja monitoringu, kamery CCTV, monta\u017c telewizji przemys\u0142owej | UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\",\"isPartOf\":{\"@id\":\"https:\/\/www.upgreat.pl\/#website\"},\"datePublished\":\"2022-04-19T20:23:39+00:00\",\"dateModified\":\"2023-03-23T11:08:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/bezpieczenstwo-fizyczne\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/bezpieczenstwo-fizyczne\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/bezpieczenstwo-fizyczne\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/www.upgreat.pl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bezpiecze\u0144stwo System\u00f3w IT\",\"item\":\"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Bezpiecze\u0144stwo fizyczne\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.upgreat.pl\/#website\",\"url\":\"https:\/\/www.upgreat.pl\/\",\"name\":\"Upgreat\",\"description\":\"Bezpiecze\u0144stwo system\u00f3w IT, Outsourcing IT, Architektura system\u00f3w IT\",\"publisher\":{\"@id\":\"https:\/\/www.upgreat.pl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.upgreat.pl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.upgreat.pl\/#organization\",\"name\":\"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\",\"url\":\"https:\/\/www.upgreat.pl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg\",\"contentUrl\":\"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg\",\"width\":600,\"height\":220,\"caption\":\"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne\"},\"image\":{\"@id\":\"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Access control system installations, monitoring installations, CCTV cameras, CCTV installations | UpGreat.pl \u2013 professional IT services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-fizyczne\/","og_locale":"en_US","og_type":"article","og_title":"Instalacje system\u00f3w kontroli dost\u0119pu, instalacja monitoringu, kamery CCTV, monta\u017c telewizji przemys\u0142owej | UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne","og_description":"Bezpiecze\u0144stwo fizyczne Bezpiecze\u0144stwo System\u00f3w IT Najlepsze nawet zabezpieczenia na poziomie sieci, system\u00f3w, serwer\u00f3w i stacji roboczych mog\u0105 okaza\u0107 si\u0119 niewystarczaj\u0105ce, je\u017celi do element\u00f3w naszej infrastruktury teleinformatycznej dost\u0119p mog\u0105 mie\u0107 niepowo\u0142ane i nieautoryzowane osoby. Zacytowa\u0107 tutaj mo\u017cna popularne powiedzenie z dziedziny bezpiecze\u0144stwa: &#8222;je\u017celi kto\u015b mia\u0142 fizyczny dost\u0119p do twojego systemu, to nie jest to ju\u017c tw\u00f3j [&hellip;]","og_url":"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/bezpieczenstwo-fizyczne\/","og_site_name":"Upgreat","article_modified_time":"2023-03-23T11:08:57+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/bezpieczenstwo-fizyczne\/","url":"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/bezpieczenstwo-fizyczne\/","name":"Access control system installations, monitoring installations, CCTV cameras, CCTV installations | UpGreat.pl \u2013 professional IT services","isPartOf":{"@id":"https:\/\/www.upgreat.pl\/#website"},"datePublished":"2022-04-19T20:23:39+00:00","dateModified":"2023-03-23T11:08:57+00:00","breadcrumb":{"@id":"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/bezpieczenstwo-fizyczne\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/bezpieczenstwo-fizyczne\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.upgreat.pl\/bezpieczenstwo-systemow-it\/bezpieczenstwo-fizyczne\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/www.upgreat.pl\/"},{"@type":"ListItem","position":2,"name":"Bezpiecze\u0144stwo System\u00f3w IT","item":"https:\/\/www.upgreat.pl\/en\/bezpieczenstwo-systemow-it\/"},{"@type":"ListItem","position":3,"name":"Bezpiecze\u0144stwo fizyczne"}]},{"@type":"WebSite","@id":"https:\/\/www.upgreat.pl\/#website","url":"https:\/\/www.upgreat.pl\/","name":"Upgreat","description":"Security of IT systems, IT Outsourcing, Architecture of IT systems","publisher":{"@id":"https:\/\/www.upgreat.pl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.upgreat.pl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.upgreat.pl\/#organization","name":"UpGreat.pl \u2013 professional IT services","url":"https:\/\/www.upgreat.pl\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/","url":"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg","contentUrl":"https:\/\/www.upgreat.pl\/wp-content\/uploads\/2022\/04\/UpGreat_CI.svg","width":600,"height":220,"caption":"UpGreat.pl \u2013 profesjonalne us\u0142ugi informatyczne"},"image":{"@id":"https:\/\/www.upgreat.pl\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/pages\/971","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/comments?post=971"}],"version-history":[{"count":11,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/pages\/971\/revisions"}],"predecessor-version":[{"id":1700,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/pages\/971\/revisions\/1700"}],"up":[{"embeddable":true,"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/pages\/456"}],"wp:attachment":[{"href":"https:\/\/www.upgreat.pl\/en\/wp-json\/wp\/v2\/media?parent=971"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}