{"id":9610,"date":"2020-08-20T00:00:00","date_gmt":"2020-08-20T06:00:00","guid":{"rendered":"https:\/\/swimlane.com\/resource\/establishing-your-data-privacy-program-with-soar\/"},"modified":"2023-03-10T09:41:58","modified_gmt":"2023-03-10T16:41:58","slug":"soar%eb%a5%bc-%ec%82%ac%ec%9a%a9%ed%95%98%ec%97%ac-%eb%8d%b0%ec%9d%b4%ed%84%b0-%ea%b0%9c%ec%9d%b8%ec%a0%95%eb%b3%b4-%eb%b3%b4%ed%98%b8-%ed%94%84%eb%a1%9c%ea%b7%b8%eb%9e%a8%ec%9d%84-%ea%b5%ac%ec%b6%95","status":"publish","type":"sw_resource","link":"https:\/\/swimlane.com\/ko\/blog\/establishing-your-data-privacy-program-with-soar\/","title":{"rendered":"SOAR\ub97c \ud65c\uc6a9\ud558\uc5ec \uc815\ubcf4 \uc8fc\uccb4\uc758 \uae30\ubcf8\uad8c\uc744 \uc774\ud574\ud558\uace0 \ub370\uc774\ud130 \uac1c\uc778\uc815\ubcf4 \ubcf4\ud638 \ud504\ub85c\uadf8\ub7a8\uc744 \uad6c\ucd95\ud558\uc138\uc694."},"content":{"rendered":"\n\n\n<section class=\"bs-section bs-section-f49668dca89a07af4c4bed27713f079b6839f643 bs-section---default bs-section--blog-inner-banner  \"><style>.bs-section.bs-section-f49668dca89a07af4c4bed27713f079b6839f643{ background-color: #000743;} <\/style><div class=\"container\">\n<div class=\"bs-row row  flex-md-row-reverse bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-12 col-lg-6   bs-column-3c02e72bbbdd27fbc2206a57dc520373f8b450b2 bs-column---default bs-column--right d-flex flex-column justify-content-end    \"><figure class=\"wp-block-post-featured-image\"><img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/GDPR.png\" class=\"attachment-post-thumbnail size-post-thumbnail wp-post-image\" alt=\"Darkened view of Earth from space at night, city lights glowing across continents beneath a vast, silent expanse of stars, evoking an eerie sense of isolation and unseen activity.\" style=\"object-fit:cover;\" srcset=\"https:\/\/swimlane.com\/wp-content\/uploads\/GDPR.png 800w, https:\/\/swimlane.com\/wp-content\/uploads\/GDPR-300x197.png 300w, https:\/\/swimlane.com\/wp-content\/uploads\/GDPR-768x503.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure><\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-6   bs-column-6a13826d98ae006805bf00373c567a95c3c65a9a bs-column---default d-flex flex-column    \"><div class=\"wp-block-post-date\"><time datetime=\"2020-08-20T00:00:00-06:00\">8\uc6d4 20, 2020<\/time><\/div>\n\n<h1 class=\"wp-block-post-title has-text-color has-white-color\">Understanding the Fundamental Rights of the Data Subject and establishing your Data Privacy Program with SOAR<\/h1>\n\n\n<div class=\"bs-div bs-div-f106fb945b2c4610a440b9e5b4f63c0c1cbbec02 bs-div---default\"><div class=\"bs-div__inner d-flex flex-wrap align-items-center    \">\n<a class=\"bs-post__author has-text-align-center\" href=\"https:\/\/swimlane.com\/ko\/author\/Katie_Bykowski\/\">\n\t<div class=\"profile-desc\">\n\t\t<figure>\n\t\t\t<img decoding=\"async\" src=\"https:\/\/swimlane.com\/wp-content\/uploads\/author_Katie_Bykowski.jpg\" alt=\"user-avatar\">\n\t\t<\/figure>\n\t\t<span class=\"prefix\"><\/span>\n\t\t<span class=\"name\">\n\t\t\tKatie Bykowski\t\t<\/span>\n\t<\/div>\n<\/a>\n\n\n\n<div class=\"reading-time\">\n    <span class=\"reading-time__time\">6 <\/span> Minute Read\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n\n\n\n\n\n\n<section class=\"bs-section bs-section-050e6505c2b06c7ce9ca858e2f56661a365e6ba8 bs-section---default bs-section--blog-inner-main-contents  \"><div class=\"container\">\n<div class=\"bs-row row justify-content-between  bs-row---default\">\n<div class=\" bs-column col-sm-12 col-md-1   bs-column-b9d738473a055284b615b4f50be5a383dfe4cc38 bs-column---default     \"><div class=\"heateor_sss_sharing_container heateor_sss_horizontal_sharing\" data-heateor-ss-offset=\"0\" data-heateor-sss-href='https:\/\/swimlane.com\/ko\/blog\/establishing-your-data-privacy-program-with-soar\/'><div class=\"heateor_sss_sharing_ul\"><a aria-label=\"Email\" class=\"heateor_sss_email\" href=\"https:\/\/swimlane.com\/ko\/blog\/establishing-your-data-privacy-program-with-soar\/\" onclick=\"event.preventDefault();window.open('mailto:?subject=' + decodeURIComponent('Understanding%20the%20Fundamental%20Rights%20of%20the%20Data%20Subject%20and%20establishing%20your%20Data%20Privacy%20Program%20with%20SOAR').replace('&', '%26') + '&body=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Festablishing-your-data-privacy-program-with-soar%2F', '_blank')\" title=\"Email\" rel=\"noopener\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#649a3f;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-.75 -.5 36 36\"><path d=\"M 5.5 11 h 23 v 1 l -11 6 l -11 -6 v -1 m 0 2 l 11 6 l 11 -6 v 11 h -22 v -11\" stroke-width=\"1\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Twitter\" class=\"heateor_sss_button_twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?text=Understanding%20the%20Fundamental%20Rights%20of%20the%20Data%20Subject%20and%20establishing%20your%20Data%20Privacy%20Program%20with%20SOAR&url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Festablishing-your-data-privacy-program-with-soar%2F\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_twitter\" style=\"background-color:#55acee;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"-4 -4 39 39\"><path d=\"M28 8.557a9.913 9.913 0 0 1-2.828.775 4.93 4.93 0 0 0 2.166-2.725 9.738 9.738 0 0 1-3.13 1.194 4.92 4.92 0 0 0-3.593-1.55 4.924 4.924 0 0 0-4.794 6.049c-4.09-.21-7.72-2.17-10.15-5.15a4.942 4.942 0 0 0-.665 2.477c0 1.71.87 3.214 2.19 4.1a4.968 4.968 0 0 1-2.23-.616v.06c0 2.39 1.7 4.38 3.952 4.83-.414.115-.85.174-1.297.174-.318 0-.626-.03-.928-.086a4.935 4.935 0 0 0 4.6 3.42 9.893 9.893 0 0 1-6.114 2.107c-.398 0-.79-.023-1.175-.068a13.953 13.953 0 0 0 7.55 2.213c9.056 0 14.01-7.507 14.01-14.013 0-.213-.005-.426-.015-.637.96-.695 1.795-1.56 2.455-2.55z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><a aria-label=\"Facebook\" class=\"heateor_sss_facebook\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Festablishing-your-data-privacy-program-with-soar%2F\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg\" style=\"background-color:#0765FE;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path fill=\"#fff\" d=\"M28 16c0-6.627-5.373-12-12-12S4 9.373 4 16c0 5.628 3.875 10.35 9.101 11.647v-7.98h-2.474V16H13.1v-1.58c0-4.085 1.849-5.978 5.859-5.978.76 0 2.072.15 2.608.298v3.325c-.283-.03-.775-.045-1.386-.045-1.967 0-2.728.745-2.728 2.683V16h3.92l-.673 3.667h-3.247v8.245C23.395 27.195 28 22.135 28 16Z\"><\/path><\/svg><\/span><\/a><a aria-label=\"Linkedin\" class=\"heateor_sss_button_linkedin\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=https%3A%2F%2Fswimlane.com%2Fko%2Fblog%2Festablishing-your-data-privacy-program-with-soar%2F\" title=\"Linkedin\" rel=\"nofollow noopener\" target=\"_blank\" style=\"font-size:32px!important;box-shadow:none;display:inline-block;vertical-align:middle\"><span class=\"heateor_sss_svg heateor_sss_s__default heateor_sss_s_linkedin\" style=\"background-color:#0077b5;width:35px;height:35px;border-radius:999px;display:inline-block;opacity:1;float:left;font-size:32px;box-shadow:none;display:inline-block;font-size:16px;padding:0 4px;vertical-align:middle;background-repeat:repeat;overflow:hidden;padding:0;cursor:pointer;box-sizing:content-box\"><svg style=\"display:block;border-radius:999px;\" focusable=\"false\" aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"100%\" height=\"100%\" viewBox=\"0 0 32 32\"><path d=\"M6.227 12.61h4.19v13.48h-4.19V12.61zm2.095-6.7a2.43 2.43 0 0 1 0 4.86c-1.344 0-2.428-1.09-2.428-2.43s1.084-2.43 2.428-2.43m4.72 6.7h4.02v1.84h.058c.56-1.058 1.927-2.176 3.965-2.176 4.238 0 5.02 2.792 5.02 6.42v7.395h-4.183v-6.56c0-1.564-.03-3.574-2.178-3.574-2.18 0-2.514 1.7-2.514 3.46v6.668h-4.187V12.61z\" fill=\"#fff\"><\/path><\/svg><\/span><\/a><\/div><div class=\"heateorSssClear\"><\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-lg-8 col-md-11   bs-column-5fcbee853797bef68c609dd2715f511e3ead78a3 bs-column---default bs-column--contents     \">\n<h2>&nbsp;<\/h2>\n<p>The <a href=\"https:\/\/betanews.com\/2020\/05\/25\/gdpr-two-years-on\/\" target=\"_blank\" rel=\"noopener\">Global Data Protection Regulation (GDPR) recently celebrated its second anniversary<\/a>. Many organizations still seem to be figuring out how to navigate the two-year-old regulation as they begin to receive requests from Data Subjects\u2014individuals whose personally identifiable information (PII) has been collected by an organization. What do you need to know about these requests? Throughout this post, I will outline the eight &#8220;fundamental rights&#8221; of the Data Subject laid out in GDPR and discuss the global impact and influence of these rights on organizations ranging from small- and medium-sized businesses (SMBs) to large enterprises. And since the regulatory and compliance requirements associated with these rights typically involve time-consuming, tedious tasks, I will explore how organizations can leverage a security orchestration, automation and response (SOAR) solution for increased efficiency and regulatory compliance.<\/p>\n<h3>The 8 Rights of the Data Subject<\/h3>\n<ol>\n<li><strong>Right of Access (Article 15):<\/strong> This right sets the stage for later data rights, such as rights to erasure or rectification, but also has some important considerations. First, the controller must identify if any personal data is being processed, providing the results to the data subject. Second, if personal data is being processed, the controller must present a range of information to the data subject. Don\u2019t forget to consider third parties or data processors that may be involved.<\/li>\n<li><strong>Right to Rectification (Article 16):<\/strong> This right ensures that a Data Subject can request correction of inaccurate data or remedy incomplete data.<\/li>\n<li><strong>Right to Erasure (Article 17): <\/strong> Also known as the <em>Right to be Forgotten<\/em>, this right allows Data Subjects to request personal data to be deleted by the Controller. There are specific instances spelled out by GDPR that warrant undue delay by the Controller to delete the data, but there are also considerations, such as legal investigation, that may prevent this right from being executed. This is likely one of the more common requests that organizations can expect to fulfill.<\/li>\n<li><strong>Right to the Restriction of Processing (Article 18): <\/strong>This right allows the Data Subject to request the Controller to restrict processing of their personal data based on certain criteria such as the Controller no longer needs the personal data for purpose of processing or the processing of the data is unlawful, but the Data Subject does not wish to exercise the right of erasure. Keep in mind that the Controller must inform the Data Subject should restrictions of processing be lifted.<\/li>\n<li><strong>Right to be Informed (Article 19):<\/strong> This right outlines a number of circumstances in which the Controller is required to inform the Data Subject on how their data is being used and who it was sent to. This ensures Data Subjects are informed and can therefore make an appropriate decision, or exercise other rights accordingly.<\/li>\n<li><strong>Right to Data Portability (Article 20):<\/strong> This right ensures the Data Subject can request to have the personal data transferred from one Controller to another, in a readable format and where technically feasible.<\/li>\n<li><strong>Right to Object (Article 21): <\/strong>If a Data Subject\u2019s request to stop processing of their data is denied by the Data Controller, the Data Subject has the right to object to their Article 18 denial.<\/li>\n<li><strong>Right Regarding Automated Decision Making (Article 22): <\/strong>This right allows the Data Subject to not be subject solely to automated decisions, including profiling, where a legal or similarly significant effect on them can occur. Article 22 also specifies exceptions to this Right, such as decisions necessary for a contract or when authorized by law. This can be particularly challenging for organizations, especially those with targeted marketing campaigns.<\/li>\n<\/ol>\n<h3>Others considerations<\/h3>\n<p>Outside of the eight fundamental rights of the Data Subject, there are a number of other rights or considerations organizations should be aware of. There are subsets of personal data called &#8220;sensitive data&#8221; that have special considerations around them. These include personal data for criminal convictions and offenses (Article 10) and personal data related to a child (Article 8).<\/p>\n<h3>Pay attention to time requirements<\/h3>\n<p>When responding to a Data Subject requests, organizations must be aware of the information they are required to include, confirm the fulfillment of the requests, and be able to explain any and all courses of action. Keep in mind the clock is ticking. GDPR employs strict timelines based on response to both Data Subject requests (30 days) and reporting of a data breach (72 hours) to Supervisory Authorities.<\/p>\n<p>Organizations integrating their compliance processes into their SOAR platform can easily track these timelines and use the SOAR metrics, reporting and dashboards to ensure compliance deadlines are met. In addition to real-time displays of process timelines, the organization can use their SOAR platform to trigger workflow-based tasks such as notifications and report submissions to guarantee the processes are followed accurately and timely.<\/p>\n<h3>Establish key resources<\/h3>\n<p>When establishing your Data Privacy Program, one of the first key resources is a data discovery process that identifies and maps sensitive information throughout its lifecycle, including any exchanging of information with third parties. A documented data flow along with a data classification are fundamental resources to set the tone going forward.<\/p>\n<p>As you identify your organization\u2019s sensitive data and map the data lifecycle, your next step is to classify your involved systems. This can include a number of factors in assigning prioritization, but generally speaking, you can start with risk factors and business criticality values. Collectively, this will help your organization prioritize where high risk areas need stringent controls and protections. As you build out controls and implement supporting technologies for risk reduction, these lessons learned can be carried forward into medium and low risk business processes as well.<\/p>\n<p>Documentation is key to confirming your organization&#8217;s awareness and understanding of data privacy. The culture shift happens once data privacy is no longer an afterthought but a consideration in any change to business processes, third party relationships, and the data used for automatic decision making.<\/p>\n<p>Once your organization has set the foundation for the data privacy and security program, be sure to carry forward the requirements into discussion when selecting business partners, data processors, or other third party vendors. You can contract out business processes, but you cannot necessarily contract out ownership of risks. Your choice of SOAR platform could be critical to the success of your compliance. Are you using your SOAR platform to identify and track your resources? Are your controls being tracked and monitored by your SOAR platform? Is all of the compliance documentation fully integrated into your SOAR platform? Is your SOAR platform automatically creating and submitting all of the required compliance documents and reports? If not, maybe you should be asking yourself, \u201cWhy not?\u201d<\/p>\n<p>Other important resources are the supporting policies and procedures that support governance risk and compliance. Without getting into too much detail, these supporting documents are the first stop for auditors to validate control design and implementation. Not having policies and procedures in place is a quick road to noncompliance. One procedure that should be established is how the organization takes in, processes, responds to, and documents requests from Data Subjects.<\/p>\n<p>Finally, is there one team or individual that handles these requests? Considering the fact that this role often falls on IT Ops or security operations (SecOps) individuals, be sure to consider the impact if this role is secondary to primary job functions. It is important to have a centralized avenue for fielding and responding to requests to ensure you aren\u2019t missing Data Subject requests. SOAR can come in handy here.<\/p>\n<p>IT Ops and\/or SecOps teams do not need another set of tedious and manual processes taking up the precious little time they have to complete the rest of their job functions, including maintaining the network safety and security of the organization. Automating these tedious tasks with a SOAR platform helps boost IT Ops and SecOps efficacy, and it can also improve the organization&#8217;s compliance by reducing and eliminating the number of incidents that must be tracked and reported. This enables the organization to demonstrate the control is being satisfied while also providing a standardized method for fulfilling the requests and providing supporting evidence.<\/p>\n<hr>\n<h3>Interested in learning more?<\/h3>\n<p>If you&#8217;re reading this, your organization is likely overwhelmed with a daily influx of alerts from an evolving threat landscape and is daunted by regulatory and compliance processes and procedures. Swimlane can help! Watch this on-demand webinar, <a href=\"https:\/\/swimlane.com\/resources\/streamlining-incident-response-reporting-requirements-compliance-webinar\/\">&#8220;Streamlining Incident Response and Reporting Requirements in Compliance,&#8221;<\/a> to learn how SOAR can help automate your compliance reporting.<\/p>\n\n\n\n<div class=\"bs-div bs-div-ba9166fe52027c7aaf879eddf3c863499437dc02 bs-div---default bs-div--blog-inner-download-guide\"><style>.bs-div.bs-div-ba9166fe52027c7aaf879eddf3c863499437dc02 {background-image: url(https:\/\/swimlane.com\/wp-content\/uploads\/2022\/10\/download-report.png); background-position: center center;\n    background-size: cover;} <\/style><div class=\"bs-div__inner d-flex flex-wrap justify-content-center  flex-md-row-reverse align-items-md-center justify-content-md-between flex-md-nowrap  \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/Webinar-StreamliningIncidentResponse-Social-LinkedIn-1200x628-Post.jpg' class='img-fluid'   alt='Swimlane webinar banner for \"Streamlining Incident Response and Reporting Requirements in Compliance\" featuring a man in glasses.' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n\n<div class=\"bs-div bs-div-2aebcd1b2c11849d7c87d8462be32842b8c42b50 bs-div---default\"><div class=\"bs-div__inner     \">\n<h2 class=\"has-white-color has-text-color wp-block-heading\" id=\"h-webinar-streamlining-incident-response-and-reporting-requirements-in-compliance\">Webinar: Streamlining Incident Response and Reporting Requirements in Compliance<\/h2>\n\n\n\n<p class=\"has-white-color has-text-color\">As SOC teams continue to mitigate and adapt to cyberthreats, one thing remains constant\u2014incident response will continue to require documentation and reporting. One such common compliance requirement in the energy industry is North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP), which is a set of requirements designed to secure the assets necessary for operating and stabilizing North America&#8217;s bulk electric system. In this webinar replay, Bob Swanson, Compliance Research Consultant, and Jay Spann, SOAR Evangelist, discuss how SOAR can streamline and support compliance reporting and audit package creation. Watch now!<\/p>\n\n\n\n<span class=\"bs-pro-button bs-pro-button---default bs-pro-button--primary-with-arrow-small bs-pro-button-p-btn-42bc33541302d62ba4cc565709c336bf7b806dd7\"><style>.bs-pro-button-p-btn-42bc33541302d62ba4cc565709c336bf7b806dd7 .bs-pro-button__container {background-color: #abb8c3; color: #000000;}<\/style><a href=\"https:\/\/swimlane.com\/resources\/streamlining-incident-response-reporting-requirements-compliance-webinar\/\" target=\"\" rel=\"noopener noreferrer\" class=\"bs-pro-button__container\">Watch Now<\/a><\/span>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-12  col-md-12 col-lg-3   bs-column-4ffac197d945e44dadadc9d8f52ba4737135ba21 bs-column---default     \">\n<div class=\"bs-div bs-div-ffc71f24880cf5ca65c4a54e87fb14a656cc562d bs-div---default bs-div--tags\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-tags\">Tags<\/h2>\n\n\n<div class=\"post-tag-wrapper\">\n    <p><a href='https:\/\/swimlane.com\/ko\/tag\/soar\/'><span class='tag-content'>SOAR<\/span><\/a><\/p><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"bs-div bs-div-69c461f15bb5fa3fc09d1aa73a0e5865005218ff bs-div---default bs-div--related-posts\"><div class=\"bs-div__inner     \">\n<h2 class=\"wp-block-heading\" id=\"h-related-posts\">Related Posts<\/h2>\n\n\n\n<div class=\"bs-related-posts bs-related-posts-block---default\"><div class=\"bs-related-posts__container\"><div class=\"bs-related-posts__items\">\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69de903f07bb5 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/understanding-data-privacy-regulation-in-the-us-and-how-soar-can-help\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>9\uc6d4 18, 2020<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Understanding Data Privacy Regulation in the US and how SOAR can Help<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69de903f09174 bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/vulnerability-management-program-best-practices\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>8\uc6d4 15, 2019<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Best practices for your Vulnerability Management Program<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n\n\n\n<div class=\" bs-column col-sm-4   bs-column-4bb8c1b66cb5e72c43988fbaf017046daf38fc18 bs-column---default     \">\t\t\t\t\t<div class=\"bs-post bs-post-69de903f0a54e bs-single-post---default enable\" >\n\t\t\t<a class=\"bs-post__trigger\" href='https:\/\/swimlane.com\/ko\/blog\/understanding-apis-rest\/' target='_self'>\t\t\t<div class=\"bs-post__inner\">\n\t\t\t\t<div class=\"bs-post__details\">    <div class=\"bs-post__date\">\n        <span>10\uc6d4 17, 2019<\/span>\n    <\/div>\n    <div class=\"bs-post__title\">\n        <h5>Understanding APIs: REST<\/h5>\n    <\/div>\n<div class=\"bs-post__learn-more\">\n    <span class='btn learn-more-text bs-post__learn-more-text'>Read More<\/span><\/div>\n<\/div>\t\t\t<\/div>\n\t\t\t<\/a>\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n<\/div>\n<\/div>\n<\/div><\/section>\n\n\n\n<section class=\"bs-section bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1 bs-section---default bs-section--newsletter bs-section--common-marketo-form bs-section--common-marketo-form-two-columns  \"><style>.bs-section.bs-section-2a4a600ae9ab197b6a4ccafe05152bf1a2fde1d1{ background-color: #000743;} <\/style><div class=\"container-fluid\">\n<div class=\"bs-row row   bs-row---default\">\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \">\n<h2 class=\"wp-block-heading has-white-color has-text-color\" id=\"requestor\">Request a Live Demo<\/h2>\n<\/div>\n\n\n\n<div class=\" bs-column col-sm-0 col-md-0 col-lg-6   bs-column-df5e10bef85c15055718b4d93887855962017939 bs-column---default     \"><div class='media-elements bs-media-element---default enable'>    <div class='bs-common-image'>\n                            <figure class='figure justify-content-start d-flex'>\n                            <picture>\n                            \n                            <img src='https:\/\/swimlane.com\/wp-content\/uploads\/liitp.svg' class='img-fluid'   alt='' title=''  \/>\n                            <\/picture>\n                                \n                            <\/figure>\n                        <\/div><\/div>\n\n<script src=\"\/\/pages.swimlane.com\/js\/forms2\/js\/forms2.min.js\"><\/script>\n<form id=\"mktoForm_1017\"><\/form>\n<script>\n    var embeddedFormId = '05a6905d0187a23e165b2fd995e965fe15cb94f6';\n    var marketoBaseUrl = '\/\/pages.swimlane.com';\n    var munchkinId = '978-QCM-390';\n    var formId = '1017';\n    var responseType = 'redirect';\n    var responseMessage = 'Thank you!';\n    var redirectURL = '';\n    var downloadFileURL = '';\n    var linkOpenType = '_self';\n    var popupVideo = 'url';\n    var popupVideoURL = '';\n    var popupVideoUploadURL = '';\n    MktoForms2.loadForm(marketoBaseUrl, munchkinId, formId, function(form) {\n        form.onSuccess(function(values, followUpUrl) {\n            document.getElementById(\"int_mktoForm_\" + formId).innerHTML = responseMessage;\n                    });\n    });\n<\/script>\n<div class=\"form-submit-note\" id=\"int_mktoForm_1017\"><\/div>\n<!-- Incluing form response options -->\n\n\n\n<script>\n    (function() {\n        \/\/ Please include the email domains you would like to block in this list\n        var invalidDomains = [\"@gmail.\", \"@yahoo.\", \"@hotmail.\", \"@live.\", \"@icloud.\",\"@aol.\", \"@outlook.\", \"@proton.\", \"@mailinator.\"];\n\n\n        MktoForms2.whenReady(function(form) {\n            form.onValidate(function() {\n                var email = form.vals().Email;\n                if (email) {\n                    if (!isEmailGood(email)) {\n                        form.submitable(false);\n                        var emailElem = form.getFormElem().find(\"#Email\");\n                        form.showErrorMessage(\"Must be Business email.\", emailElem);\n                    } else {\n                        form.submitable(true);\n                    }\n                }\n            });\n        });\n\n        function isEmailGood(email) {\n            for (var i = 0; i < invalidDomains.length; i++) {\n                var domain = invalidDomains[i];\n                if (email.indexOf(domain) != -1) {\n                    return false;\n                }\n            }\n            return true;\n        }\n\n\n    })(); \n<\/script>\n<\/div>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":5,"featured_media":9611,"template":"","meta":{"_acf_changed":false,"show_custom_date":false,"custom_date":"","featured":false,"featured_image":0,"learn_more_label":"","image_alt_text":"","learn_more_type":"","learn_more_link":[],"show_popup":false,"disable_iframe":false,"enable_lazy_loading":false,"learn_more_link_file":0,"event_date":false,"event_start_date":"","event_end_date":"","featured_page_list":[],"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","inline_featured_image":false,"footnotes":""},"tags":[89],"resource-type":[67],"resource-topic":[],"resource-industry":[],"blog-category":[70],"class_list":["post-9610","sw_resource","type-sw_resource","status-publish","has-post-thumbnail","hentry","tag-soar","resource-type-blogs","blog-category-secops"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Fundamental Rights of the Data Subject and your Data Privacy<\/title>\n<meta name=\"description\" content=\"We will outline the 8 fundamental rights of the Data Subject laid out in GDPR and discuss the impact of these rights on organizations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/soar\ub97c-\uc0ac\uc6a9\ud558\uc5ec-\ub370\uc774\ud130-\uac1c\uc778\uc815\ubcf4-\ubcf4\ud638-\ud504\ub85c\uadf8\ub7a8\uc744-\uad6c\ucd95\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding the Fundamental Rights of the Data Subject and establishing your Data Privacy Program with SOAR\" \/>\n<meta property=\"og:description\" content=\"We will outline the 8 fundamental rights of the Data Subject laid out in GDPR and discuss the impact of these rights on organizations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/soar\ub97c-\uc0ac\uc6a9\ud558\uc5ec-\ub370\uc774\ud130-\uac1c\uc778\uc815\ubcf4-\ubcf4\ud638-\ud504\ub85c\uadf8\ub7a8\uc744-\uad6c\ucd95\/\" \/>\n<meta property=\"og:site_name\" content=\"AI Security Automation\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-10T16:41:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/swimlane.com\/wp-content\/uploads\/GDPR.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"524\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swimlane\" \/>\n<meta name=\"twitter:label1\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data1\" content=\"7\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/establishing-your-data-privacy-program-with-soar\/\",\"url\":\"https:\/\/swimlane.com\/ko\/blog\/establishing-your-data-privacy-program-with-soar\/\",\"name\":\"Fundamental Rights of the Data Subject and your Data Privacy\",\"isPartOf\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/establishing-your-data-privacy-program-with-soar\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/establishing-your-data-privacy-program-with-soar\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/GDPR.png\",\"datePublished\":\"2020-08-20T06:00:00+00:00\",\"dateModified\":\"2023-03-10T16:41:58+00:00\",\"description\":\"We will outline the 8 fundamental rights of the Data Subject laid out in GDPR and discuss the impact of these rights on organizations.\",\"breadcrumb\":{\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/establishing-your-data-privacy-program-with-soar\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/swimlane.com\/ko\/blog\/establishing-your-data-privacy-program-with-soar\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/establishing-your-data-privacy-program-with-soar\/#primaryimage\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/GDPR.png\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/GDPR.png\",\"width\":800,\"height\":524,\"caption\":\"Darkened view of Earth from space at night, city lights glowing across continents beneath a vast, silent expanse of stars, evoking an eerie sense of isolation and unseen activity.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/swimlane.com\/ko\/blog\/establishing-your-data-privacy-program-with-soar\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/swimlane.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding the Fundamental Rights of the Data Subject and establishing your Data Privacy Program with SOAR\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/swimlane.com\/ko\/#website\",\"url\":\"https:\/\/swimlane.com\/ko\/\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"description\":\"Agentic AI automation for every security function\",\"publisher\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/swimlane.com\/ko\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/swimlane.com\/ko\/#organization\",\"name\":\"Low-Code Security Automation & SOAR Platform | Swimlane\",\"url\":\"https:\/\/swimlane.com\/ko\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"contentUrl\":\"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg\",\"width\":912,\"height\":190,\"caption\":\"Low-Code Security Automation & SOAR Platform | Swimlane\"},\"image\":{\"@id\":\"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/swimlane\",\"https:\/\/www.linkedin.com\/company\/swimlane\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\uc815\ubcf4 \uc8fc\uccb4\uc758 \uae30\ubcf8\uad8c \ubc0f \uac1c\uc778\uc815\ubcf4 \ubcf4\ud638","description":"\ubcf8 \ubcf4\uace0\uc11c\uc5d0\uc11c\ub294 GDPR\uc5d0 \uba85\uc2dc\ub41c \uc815\ubcf4 \uc8fc\uccb4\uc758 8\uac00\uc9c0 \uae30\ubcf8 \uad8c\ub9ac\ub97c \uac04\ub7b5\ud788 \uc124\uba85\ud558\uace0, \uc774\ub7ec\ud55c \uad8c\ub9ac\uac00 \uc870\uc9c1\uc5d0 \ubbf8\uce58\ub294 \uc601\ud5a5\uc5d0 \ub300\ud574 \ub17c\uc758\ud560 \uac83\uc785\ub2c8\ub2e4.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/soar\ub97c-\uc0ac\uc6a9\ud558\uc5ec-\ub370\uc774\ud130-\uac1c\uc778\uc815\ubcf4-\ubcf4\ud638-\ud504\ub85c\uadf8\ub7a8\uc744-\uad6c\ucd95\/","og_locale":"ko_KR","og_type":"article","og_title":"Understanding the Fundamental Rights of the Data Subject and establishing your Data Privacy Program with SOAR","og_description":"We will outline the 8 fundamental rights of the Data Subject laid out in GDPR and discuss the impact of these rights on organizations.","og_url":"https:\/\/swimlane.com\/ko\/\ube14\ub85c\uadf8\/soar\ub97c-\uc0ac\uc6a9\ud558\uc5ec-\ub370\uc774\ud130-\uac1c\uc778\uc815\ubcf4-\ubcf4\ud638-\ud504\ub85c\uadf8\ub7a8\uc744-\uad6c\ucd95\/","og_site_name":"AI Security Automation","article_modified_time":"2023-03-10T16:41:58+00:00","og_image":[{"width":800,"height":524,"url":"https:\/\/swimlane.com\/wp-content\/uploads\/GDPR.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swimlane","twitter_misc":{"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"7\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/swimlane.com\/ko\/blog\/establishing-your-data-privacy-program-with-soar\/","url":"https:\/\/swimlane.com\/ko\/blog\/establishing-your-data-privacy-program-with-soar\/","name":"\uc815\ubcf4 \uc8fc\uccb4\uc758 \uae30\ubcf8\uad8c \ubc0f \uac1c\uc778\uc815\ubcf4 \ubcf4\ud638","isPartOf":{"@id":"https:\/\/swimlane.com\/ko\/#website"},"primaryImageOfPage":{"@id":"https:\/\/swimlane.com\/ko\/blog\/establishing-your-data-privacy-program-with-soar\/#primaryimage"},"image":{"@id":"https:\/\/swimlane.com\/ko\/blog\/establishing-your-data-privacy-program-with-soar\/#primaryimage"},"thumbnailUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/GDPR.png","datePublished":"2020-08-20T06:00:00+00:00","dateModified":"2023-03-10T16:41:58+00:00","description":"\ubcf8 \ubcf4\uace0\uc11c\uc5d0\uc11c\ub294 GDPR\uc5d0 \uba85\uc2dc\ub41c \uc815\ubcf4 \uc8fc\uccb4\uc758 8\uac00\uc9c0 \uae30\ubcf8 \uad8c\ub9ac\ub97c \uac04\ub7b5\ud788 \uc124\uba85\ud558\uace0, \uc774\ub7ec\ud55c \uad8c\ub9ac\uac00 \uc870\uc9c1\uc5d0 \ubbf8\uce58\ub294 \uc601\ud5a5\uc5d0 \ub300\ud574 \ub17c\uc758\ud560 \uac83\uc785\ub2c8\ub2e4.","breadcrumb":{"@id":"https:\/\/swimlane.com\/ko\/blog\/establishing-your-data-privacy-program-with-soar\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/swimlane.com\/ko\/blog\/establishing-your-data-privacy-program-with-soar\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/blog\/establishing-your-data-privacy-program-with-soar\/#primaryimage","url":"https:\/\/swimlane.com\/wp-content\/uploads\/GDPR.png","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/GDPR.png","width":800,"height":524,"caption":"Darkened view of Earth from space at night, city lights glowing across continents beneath a vast, silent expanse of stars, evoking an eerie sense of isolation and unseen activity."},{"@type":"BreadcrumbList","@id":"https:\/\/swimlane.com\/ko\/blog\/establishing-your-data-privacy-program-with-soar\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/swimlane.com\/"},{"@type":"ListItem","position":2,"name":"Understanding the Fundamental Rights of the Data Subject and establishing your Data Privacy Program with SOAR"}]},{"@type":"WebSite","@id":"https:\/\/swimlane.com\/ko\/#website","url":"https:\/\/swimlane.com\/ko\/","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","description":"\ubaa8\ub4e0 \ubcf4\uc548 \uae30\ub2a5\uc744 \uc704\ud55c \uc5d0\uc774\uc804\ud2b8 \uae30\ubc18 AI \uc790\ub3d9\ud654","publisher":{"@id":"https:\/\/swimlane.com\/ko\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/swimlane.com\/ko\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/swimlane.com\/ko\/#organization","name":"\ub85c\uc6b0\ucf54\ub4dc \ubcf4\uc548 \uc790\ub3d9\ud654 \ubc0f SOAR \ud50c\ub7ab\ud3fc | \uc2a4\uc714\ub808\uc778","url":"https:\/\/swimlane.com\/ko\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/","url":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","contentUrl":"https:\/\/swimlane.com\/wp-content\/uploads\/sw-inline-logo-color-white.svg","width":912,"height":190,"caption":"Low-Code Security Automation & SOAR Platform | Swimlane"},"image":{"@id":"https:\/\/swimlane.com\/ko\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/swimlane","https:\/\/www.linkedin.com\/company\/swimlane\/"]}]}},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/9610","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource"}],"about":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/types\/sw_resource"}],"author":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/users\/5"}],"version-history":[{"count":0,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/sw_resource\/9610\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media\/9611"}],"wp:attachment":[{"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/media?parent=9610"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/tags?post=9610"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-type?post=9610"},{"taxonomy":"resource-topic","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-topic?post=9610"},{"taxonomy":"resource-industry","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/resource-industry?post=9610"},{"taxonomy":"blog-category","embeddable":true,"href":"https:\/\/swimlane.com\/ko\/wp-json\/wp\/v2\/blog-category?post=9610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}