{"id":3706,"date":"2023-03-01T13:00:00","date_gmt":"2023-03-01T13:00:00","guid":{"rendered":"https:\/\/cortadoblog1.wpengine.com\/tiktok-security\/"},"modified":"2024-01-08T10:09:40","modified_gmt":"2024-01-08T10:09:40","slug":"tiktok-security","status":"publish","type":"post","link":"https:\/\/blog.cortado.com\/en\/tiktok-security\/","title":{"rendered":"TikTok on Company Devices: A Security Risk?"},"content":{"rendered":"\n<p>TikTok has gained enormous popularity and the TikTok app is increasingly being installed on company phones. In this article, we explain why and when this poses a security risk and how to minimize such risks.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"625\" src=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/tiktok-app-EN-1.jpg\" alt=\"TikTok on a company smartphones and tablets can be a risk.\" class=\"wp-image-3708\" srcset=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/tiktok-app-EN-1.jpg 1000w, https:\/\/blog.cortado.com\/wp-content\/uploads\/tiktok-app-EN-1-300x188.jpg 300w, https:\/\/blog.cortado.com\/wp-content\/uploads\/tiktok-app-EN-1-768x480.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><figcaption class=\"wp-element-caption\">TikTok on a company devices &#8211; a security risk?<\/figcaption><\/figure>\n\n\n\n<p>TikTok has achieved enormous popularity in recent years and is now one of the most widely used social media apps worldwide. However, the app is also increasingly being installed on company phones, as many employees use their mobile devices for both personal and business purposes. This can potentially pose a risk to IT security and data protection, but can be minimized through suitable measures, especially by using Mobile Device Management, e.g. <a href=\"https:\/\/www.cortado.com\/en\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cortado MDM<\/a>. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-tiktok-on-company-phones-can-be-a-security-risk\">Why TikTok on Company Phones can be a Security Risk<\/h2>\n\n\n\n<p>TikTok states on its website that it collects a variety of data from its users (see the <a href=\"https:\/\/www.tiktok.com\/legal\/page\/eea\/privacy-policy\/en\">TikTok Privacy Policy<\/a>). This includes location data, device information, biometric data such as facial recognition, and information about how users use the app. According to TikTok, this information is used to create and recommend personalized content and for advertising.<\/p>\n\n\n\n<p>However, TikTok\u2019s data collection is viewed critically in many places. Most recently, the EU has banned the use of TikTok on official devices in all three government institutions, as reported by CNN <a href=\"https:\/\/edition.cnn.com\/2023\/02\/28\/tech\/tiktok-eu-ban-intl-hnk\/index.html\">here<\/a>. North American governments have also expressed significant security concerns and ordered the deletion of the app on work devices. According to the Canadian government, an internal review found that &#8220;TikTok&#8217;s data collection methods could make users vulnerable to cyberattacks&#8221; (see <a href=\"https:\/\/www.dw.com\/en\/us-gives-federal-agencies-30-days-to-introduce-tiktok-ban\/a-64837541\">DW report<\/a>).<\/p>\n\n\n\n<p>In addition, TikTok can pose &nbsp;potential risks to data protection. If employees use TikTok on company devices and import contact data, this can lead to data protection issues for the company, especially when business contacts are involved. Any resulting GDPR violations may be met with expensive fines..<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Minimize Risks with MDM<\/h2>\n\n\n\n<p>Mobile Device Management (MDM) is a technology that allows companies to centrally manage mobile devices such as smartphones and tablets. MDM systems like that of Cortado can be used to <a href=\"https:\/\/www.cortado.com\/en\/features\/\">control and restrict the use of apps<\/a> like TikTok on company devices.<\/p>\n\n\n\n<p>Installing TikTok does not necessarily have to be fully prohibited. With the help of Mobile Device Management (MDM), you can ensure strict separation of personal and business data on company devices and create a secure and encrypted environment in which business data is stored entirely separately from personal data. For example, it can be ensured that privately used apps like TikTok no longer have any access to business contacts.<\/p>\n\n\n\n<p>Overall, Mobile Device Management can help ensure the security and integrity of company devices, especially when dealing with potentially unsafe apps like TikTok. By using MDM systems, companies can control and restrict the use of apps on company devices to ensure the highest level of security and data protection.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Training and Clear Policies Are Key<\/h2>\n\n\n\n<p>Another important tip is to train your employees. It is important that companies educate their employees about the risks of apps like TikTok on company phones. Employees should be informed about how these apps work and what data they collect. Training can also help employees feel more secure in handling mobile devices and better understand how to use their company devices securely.<\/p>\n\n\n\n<p>In addition, companies should establish clear policies for the use of company phones to ensure that employees do not take security risks \u2013 preferably as part of a usage agreement. Companies should also ensure that employees know what to do if they identify a potential security breach or data loss.<\/p>\n\n\n\n<p>With these measures, companies can ensure that their employees are informed about the risks of TikTok and other apps on company devices and are aware of how to use their mobile devices securely. In combination with <a href=\"https:\/\/www.cortado.com\/en\/features\/\">Mobile Device Management<\/a>, companies can minimize the risk of data protection violations and security vulnerabilities and ensure the security of company data.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-media-text alignwide has-background is-stacked-on-mobile is-vertically-aligned-center is-image-fill\" style=\"background-color:#6fa12b\"><figure class=\"wp-block-media-text__media\" style=\"background-image:url(https:\/\/cortadoblog1.wpengine.com\/wp-content\/uploads\/mdm-trial.jpeg);background-position:50% 50%\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/cortadoblog1.wpengine.com\/wp-content\/uploads\/mdm-trial.jpeg\" alt=\"Cortado MDM Trial\" class=\"wp-image-3133\" srcset=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/mdm-trial.jpeg 800w, https:\/\/blog.cortado.com\/wp-content\/uploads\/mdm-trial-300x200.jpeg 300w, https:\/\/blog.cortado.com\/wp-content\/uploads\/mdm-trial-768x513.jpeg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p style=\"color:#ffffff\" class=\"has-text-color has-large-font-size\">Try for Free!<\/p>\n\n\n\n<p style=\"color:#ffffff\" class=\"has-text-color\">Discover the simplicity of mobile device management with Cortado MDM. Test free of charge and without obligation.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link has-text-color has-background\" href=\"https:\/\/www.cortado.com\/en\/trial\/?c_source=blog&amp;c_medium=cta-box\" style=\"background-color:#ffffff;color:#6fa12b;border-radius:5px\" target=\"_blank\" rel=\"noreferrer noopener\">Try for Free<\/a><\/div>\n<\/div>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Learn why TikTok can create security risks on company smartphones and how to minimize those risks here.<\/p>\n","protected":false},"author":6,"featured_media":3698,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[34],"tags":[],"class_list":["post-3706","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology-industry-news"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.1 (Yoast SEO v25.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TikTok Security Risks on Company Devices: How to Mitigate<\/title>\n<meta name=\"description\" content=\"Discover why TikTok poses security threats on corporate smartphones and explore effective strategies to mitigate these risks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.cortado.com\/en\/tiktok-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TikTok on Company Devices: A Security Risk?\" \/>\n<meta property=\"og:description\" content=\"Discover why TikTok poses security threats on corporate smartphones and explore effective strategies to mitigate these risks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.cortado.com\/en\/tiktok-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Cortado Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-01T13:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-08T10:09:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.cortado.com\/wp-content\/uploads\/tiktok-app.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"625\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Linda Martin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Linda Martin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.cortado.com\/en\/tiktok-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/tiktok-security\/\"},\"author\":{\"name\":\"Linda Martin\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/d5aad76933b5bb970b927006a5838794\"},\"headline\":\"TikTok on Company Devices: A Security Risk?\",\"datePublished\":\"2023-03-01T13:00:00+00:00\",\"dateModified\":\"2024-01-08T10:09:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/tiktok-security\/\"},\"wordCount\":657,\"publisher\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/tiktok-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/tiktok-app.jpg\",\"articleSection\":[\"Technology &amp; Industry News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.cortado.com\/en\/tiktok-security\/\",\"url\":\"https:\/\/blog.cortado.com\/en\/tiktok-security\/\",\"name\":\"TikTok Security Risks on Company Devices: How to Mitigate\",\"isPartOf\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/tiktok-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/tiktok-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/tiktok-app.jpg\",\"datePublished\":\"2023-03-01T13:00:00+00:00\",\"dateModified\":\"2024-01-08T10:09:40+00:00\",\"description\":\"Discover why TikTok poses security threats on corporate smartphones and explore effective strategies to mitigate these risks.\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/tiktok-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.cortado.com\/en\/tiktok-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.cortado.com\/en\/tiktok-security\/#primaryimage\",\"url\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/tiktok-app.jpg\",\"contentUrl\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/tiktok-app.jpg\",\"width\":1000,\"height\":625,\"caption\":\"TikTok auf Firmenhandys - ein Sicherheitsrisiko?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.cortado.com\/en\/tiktok-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.cortado.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TikTok on Company Devices: A Security Risk?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#website\",\"url\":\"https:\/\/blog.cortado.com\/en\/\",\"name\":\"Cortado Blog\",\"description\":\"News from Cortado\",\"publisher\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.cortado.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#organization\",\"name\":\"Cortado Blog\",\"url\":\"https:\/\/blog.cortado.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-logo.svg\",\"contentUrl\":\"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-logo.svg\",\"width\":226,\"height\":32,\"caption\":\"Cortado Blog\"},\"image\":{\"@id\":\"https:\/\/blog.cortado.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/d5aad76933b5bb970b927006a5838794\",\"name\":\"Linda Martin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e1fd8a35a769ec0834eaea8ea7152ebb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e1fd8a35a769ec0834eaea8ea7152ebb?s=96&d=mm&r=g\",\"caption\":\"Linda Martin\"},\"url\":\"https:\/\/blog.cortado.com\/en\/author\/dani\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"TikTok Security Risks on Company Devices: How to Mitigate","description":"Discover why TikTok poses security threats on corporate smartphones and explore effective strategies to mitigate these risks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.cortado.com\/en\/tiktok-security\/","og_locale":"en_US","og_type":"article","og_title":"TikTok on Company Devices: A Security Risk?","og_description":"Discover why TikTok poses security threats on corporate smartphones and explore effective strategies to mitigate these risks.","og_url":"https:\/\/blog.cortado.com\/en\/tiktok-security\/","og_site_name":"Cortado Blog","article_published_time":"2023-03-01T13:00:00+00:00","article_modified_time":"2024-01-08T10:09:40+00:00","og_image":[{"width":1000,"height":625,"url":"https:\/\/blog.cortado.com\/wp-content\/uploads\/tiktok-app.jpg","type":"image\/jpeg"}],"author":"Linda Martin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Linda Martin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.cortado.com\/en\/tiktok-security\/#article","isPartOf":{"@id":"https:\/\/blog.cortado.com\/en\/tiktok-security\/"},"author":{"name":"Linda Martin","@id":"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/d5aad76933b5bb970b927006a5838794"},"headline":"TikTok on Company Devices: A Security Risk?","datePublished":"2023-03-01T13:00:00+00:00","dateModified":"2024-01-08T10:09:40+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.cortado.com\/en\/tiktok-security\/"},"wordCount":657,"publisher":{"@id":"https:\/\/blog.cortado.com\/en\/#organization"},"image":{"@id":"https:\/\/blog.cortado.com\/en\/tiktok-security\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.cortado.com\/wp-content\/uploads\/tiktok-app.jpg","articleSection":["Technology &amp; Industry News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.cortado.com\/en\/tiktok-security\/","url":"https:\/\/blog.cortado.com\/en\/tiktok-security\/","name":"TikTok Security Risks on Company Devices: How to Mitigate","isPartOf":{"@id":"https:\/\/blog.cortado.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.cortado.com\/en\/tiktok-security\/#primaryimage"},"image":{"@id":"https:\/\/blog.cortado.com\/en\/tiktok-security\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.cortado.com\/wp-content\/uploads\/tiktok-app.jpg","datePublished":"2023-03-01T13:00:00+00:00","dateModified":"2024-01-08T10:09:40+00:00","description":"Discover why TikTok poses security threats on corporate smartphones and explore effective strategies to mitigate these risks.","breadcrumb":{"@id":"https:\/\/blog.cortado.com\/en\/tiktok-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.cortado.com\/en\/tiktok-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.cortado.com\/en\/tiktok-security\/#primaryimage","url":"https:\/\/blog.cortado.com\/wp-content\/uploads\/tiktok-app.jpg","contentUrl":"https:\/\/blog.cortado.com\/wp-content\/uploads\/tiktok-app.jpg","width":1000,"height":625,"caption":"TikTok auf Firmenhandys - ein Sicherheitsrisiko?"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.cortado.com\/en\/tiktok-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.cortado.com\/en\/"},{"@type":"ListItem","position":2,"name":"TikTok on Company Devices: A Security Risk?"}]},{"@type":"WebSite","@id":"https:\/\/blog.cortado.com\/en\/#website","url":"https:\/\/blog.cortado.com\/en\/","name":"Cortado Blog","description":"News from Cortado","publisher":{"@id":"https:\/\/blog.cortado.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.cortado.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.cortado.com\/en\/#organization","name":"Cortado Blog","url":"https:\/\/blog.cortado.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.cortado.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-logo.svg","contentUrl":"https:\/\/blog.cortado.com\/wp-content\/uploads\/cortado-blog-logo.svg","width":226,"height":32,"caption":"Cortado Blog"},"image":{"@id":"https:\/\/blog.cortado.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/d5aad76933b5bb970b927006a5838794","name":"Linda Martin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.cortado.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e1fd8a35a769ec0834eaea8ea7152ebb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e1fd8a35a769ec0834eaea8ea7152ebb?s=96&d=mm&r=g","caption":"Linda Martin"},"url":"https:\/\/blog.cortado.com\/en\/author\/dani\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/posts\/3706"}],"collection":[{"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/comments?post=3706"}],"version-history":[{"count":0,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/posts\/3706\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/media\/3698"}],"wp:attachment":[{"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/media?parent=3706"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/categories?post=3706"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cortado.com\/en\/wp-json\/wp\/v2\/tags?post=3706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}