{"id":2006,"date":"2025-03-27T12:40:22","date_gmt":"2025-03-27T12:40:22","guid":{"rendered":"https:\/\/www.gyfted.me\/resources\/?p=2006"},"modified":"2025-05-22T13:41:36","modified_gmt":"2025-05-22T13:41:36","slug":"how-hr-handles-candidate-data-a-quick-guide","status":"publish","type":"post","link":"https:\/\/www.gyfted.me\/resources\/blog\/how-hr-handles-candidate-data-a-quick-guide","title":{"rendered":"How HR handles candidate data &#8211; a quick guide"},"content":{"rendered":"\n<p>Human resource departments have become owners of increasingly vast and sensitive information ecosystems. Their responsibility extends far beyond traditional personnel management into the realm of sophisticated data stewardship. Throughout the employment lifecycle\u2014from initial application to onboarding and beyond\u2014HR professionals must navigate complex regulatory frameworks, emerging cybersecurity threats, and evolving best practices to safeguard candidate and employee information.<\/p>\n\n\n\n<p>This article examines the different stages of the hiring process. It highlights the challenges HR professionals face at each stage and outlines what practices to follow to maintain security, confidentiality, and compliance.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Application<\/strong><\/h2>\n\n\n\n<p>HR already collects much sensitive data from applications alone. Resumes and cover letters contain <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/personally-identifiable-information-PII\" target=\"_blank\" rel=\"noopener\">personally identifiable information<\/a>, requiring an effective data collection and retention policy.&nbsp;<\/p>\n\n\n\n<p>The modern application process generates a remarkable volume of sensitive data. Beyond the obvious personally identifiable information (PII) contained in resumes and cover letters\u2014names, addresses, phone numbers, email addresses\u2014applications often reveal candidates&#8217; educational backgrounds, work histories, salary expectations, and sometimes even protected class information through voluntary demographic disclosures.<\/p>\n\n\n\n<p>A vetted and secure applicant tracking system that securely handles applicant data is the foundation for building additional measures. At this stage, they include data encryption and guidelines for storage, usage, and eventual deletion.<\/p>\n\n\n\n<p>Contemporary HR professionals face a fundamental tension: collecting sufficient information to make informed hiring decisions while adhering to the principle of data minimization. This principle, codified in regulations like GDPR and increasingly reflected in privacy laws worldwide, requires organizations to collect only the data necessary for clearly defined purposes.<\/p>\n\n\n\n<p>Successful navigation of this tension requires HR teams to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Conduct regular audits of application forms to eliminate unnecessary fields<\/li>\n\n\n\n<li>Design multi-stage application processes that gather more sensitive information only as candidates advance<\/li>\n\n\n\n<li>Implement clear data retention schedules with automatic deletion protocols for unsuccessful applicants<\/li>\n\n\n\n<li>Develop transparent privacy notices that explain exactly how candidate data will be used, stored, and eventually disposed of<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Building a Secure Technical Infrastructure<\/strong><\/h3>\n\n\n\n<p>The applicant tracking system (ATS) forms the technological backbone of candidate data management. However, not all systems offer equal protection. When evaluating or upgrading an ATS, HR departments should consider:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>End-to-end encryption for both data in transit and at rest<\/li>\n\n\n\n<li>Role-based access controls with granular permission settings<\/li>\n\n\n\n<li>Comprehensive audit logging to track who accesses what information and when<\/li>\n\n\n\n<li>Regular security assessments and penetration testing<\/li>\n\n\n\n<li>Compliance certifications relevant to your industry (e.g., SOC 2, ISO 27001)<\/li>\n\n\n\n<li>Integration capabilities with other HR systems to prevent risky data transfers<\/li>\n<\/ul>\n\n\n\n<p>By establishing robust data governance at the application stage, HR teams create a foundation for secure information management throughout the hiring journey.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Screening&nbsp;<\/strong><\/h2>\n\n\n\n<p>As candidates move from application to screening, the nature and volume of collected data evolves dramatically. Initial resume reviews give way to more detailed assessments, generating interviewer notes, evaluation scores, and comparison matrices. This information often contains subjective judgments about candidates&#8217; qualifications, communication skills, and potential cultural fit\u2014data points that carry significant privacy and legal implications.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Documenting Selection Criteria and Decisions<\/strong><\/h3>\n\n\n\n<p>Maintaining detailed records of screening criteria serves multiple purposes beyond basic data management:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Creates an audit trail for demonstrating non-discriminatory hiring practices<\/li>\n\n\n\n<li>Enables pattern recognition for improving future recruitment efforts<\/li>\n\n\n\n<li>Provides defensible documentation in case of legal challenges<\/li>\n\n\n\n<li>Facilitates more objective comparison between candidates<\/li>\n<\/ul>\n\n\n\n<p>However, these records also create potential liability if not properly secured and governed. HR departments should establish standardized documentation practices with clearly defined retention periods based on both legal requirements and business needs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Implementing Tiered Access Controls<\/strong><\/h3>\n\n\n\n<p>Not everyone involved in the hiring process requires the same level of access to candidate information. A sophisticated approach to data security implements tiered access controls:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Level 1: Basic application data for initial screeners<\/li>\n\n\n\n<li>Level 2: Full application materials and screening notes for hiring managers<\/li>\n\n\n\n<li>Level 3: Comprehensive candidate profiles including assessment results for HR decision-makers<\/li>\n\n\n\n<li>Level 4: Administrative access for HR information system managers<\/li>\n<\/ul>\n\n\n\n<p>Each access level should be implemented through technical controls and reinforced through regular training on appropriate data handling practices.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The Role of AI and Algorithmic Screening<\/strong><\/h3>\n\n\n\n<p>As artificial intelligence and machine learning tools become more prevalent in candidate screening, HR professionals must address novel data governance challenges:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ensuring algorithmic transparency and explainability<\/li>\n\n\n\n<li>Auditing for potential bias in automated screening tools<\/li>\n\n\n\n<li>Managing the additional data generated through algorithmic analysis<\/li>\n\n\n\n<li>Establishing clear boundaries between human and automated decision-making<\/li>\n<\/ul>\n\n\n\n<p>Organizations using AI-enhanced screening must implement stronger data protection measures, including regular algorithm audits, clear documentation of AI decision factors, and human oversight mechanisms to prevent discriminatory outcomes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Testing and Protecting Sensitive Performance Data<\/strong><\/h2>\n\n\n\n<p>Candidate assessments\u2014whether technical skills tests, personality inventories, or cognitive ability measures\u2014generate particularly sensitive data. These assessments often reveal information beyond what&#8217;s directly relevant to the position, potentially including intellectual capabilities, psychological tendencies, or even indicators of neurological differences.<\/p>\n\n\n\n<p>Some roles require aptitude testing to identify the most capable candidates. Others may ask for psychological evaluations or administer personality tests to determine a candidate\u2019s cultural fit.<\/p>\n\n\n\n<p>Any third-party platform used for testing purposes needs to be vetted for data protection measures and compliance with regulations like the GDPR and <a href=\"https:\/\/www.cdc.gov\/phlp\/php\/resources\/health-insurance-portability-and-accountability-act-of-1996-hipaa.html\" target=\"_blank\" rel=\"noopener\">HIPAA<\/a>. Anonymizing the test results will decrease the chance of biases. Deleting excess data after making a hiring decision will reduce the risk of data breaches. It\u2019s also crucial to ensure that the platform used for testing has secure data storage and strong encryption protocols to protect the candidate&#8217;s information.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Conducting Due Diligence on Third-Party Assessment Providers<\/strong><\/h3>\n\n\n\n<p>Many organizations rely on external vendors for candidate assessment tools. When selecting these partners, HR departments should conduct thorough due diligence:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Review the provider&#8217;s data protection policies and security certifications<\/li>\n\n\n\n<li>Clarify data ownership and usage rights, especially regarding aggregated candidate data<\/li>\n\n\n\n<li>Examine how test results are transmitted, stored, and eventually deleted<\/li>\n\n\n\n<li>Ensure compliance with relevant accessibility and non-discrimination requirements<\/li>\n\n\n\n<li>Verify the scientific validity and reliability of the assessment tools<\/li>\n<\/ul>\n\n\n\n<p>The most secure arrangement involves contractual provisions that explicitly prohibit assessment vendors from using your candidates&#8217; data for purposes beyond your specific hiring needs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Implementing Privacy-Enhancing Assessment Practices<\/strong><\/h3>\n\n\n\n<p>Beyond vendor management, HR teams can adopt practices that inherently enhance data protection:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Using anonymized or coded identifiers during the assessment phase to reduce bias<\/li>\n\n\n\n<li>Storing raw assessment data separately from identifying information when possible<\/li>\n\n\n\n<li>Establishing clear protocols for communicating assessment results to decision-makers<\/li>\n\n\n\n<li>Implementing differential retention periods for different types of assessment data<\/li>\n\n\n\n<li>Providing candidates transparency about what data is collected and how it informs decisions<\/li>\n<\/ul>\n\n\n\n<p>These practices not only protect sensitive information but also demonstrate respect for candidate privacy, enhancing employer brand reputation in competitive talent markets.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The Ethical Dimension of Assessment Data<\/strong><\/h3>\n\n\n\n<p>HR professionals must recognize that assessment data carries ethical implications beyond basic security concerns. The power imbalance between organizations and job seekers means candidates often have little practical choice about submitting to assessments. This reality creates a heightened responsibility to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Collect only assessment data with clear relevance to job performance<\/li>\n\n\n\n<li>Be transparent about how assessment data influences hiring decisions<\/li>\n\n\n\n<li>Implement strong safeguards against data misuse or unauthorized access<\/li>\n\n\n\n<li>Respect candidate autonomy by providing clear information about data practices<\/li>\n<\/ul>\n\n\n\n<p>By approaching assessment data with both security and ethical considerations in mind, HR teams can build more trustworthy hiring processes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Interview Process<\/strong><\/h2>\n\n\n\n<p>Interviews generate complex data challenges, especially as organizations increasingly employ multiple interview formats\u2014structured in-person conversations, asynchronous video responses, technical demonstrations, and panel evaluations. Each format creates different types of data with unique security requirements.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Managing Digital Interview Records<\/strong><\/h3>\n\n\n\n<p>Video interviews, whether live or asynchronous, create permanent digital records that require special handling:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Implementing secure storage solutions with appropriate encryption<\/li>\n\n\n\n<li>Establishing clear retention policies for interview recordings<\/li>\n\n\n\n<li>Creating standardized permissions for accessing recorded interviews<\/li>\n\n\n\n<li>Developing protocols for sharing recordings among decision-makers<\/li>\n<\/ul>\n\n\n\n<p>Organizations should consider whether maintaining permanent visual records of all candidates serves a legitimate business purpose, weighing the value of these records against the increased security requirements and potential privacy concerns.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Standardizing Interview Documentation<\/strong><\/h3>\n\n\n\n<p>Even traditional in-person interviews generate significant documentation that requires protection:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Interview guides and question sets<\/li>\n\n\n\n<li>Interviewer notes and evaluations<\/li>\n\n\n\n<li>Scoring rubrics and comparison matrices<\/li>\n\n\n\n<li>Decision justifications and next-step recommendations<\/li>\n<\/ul>\n\n\n\n<p>Standardizing how this information is recorded, stored, and shared not only improves security but also enhances the quality and consistency of the hiring process. Digital templates with built-in security features can replace ad hoc documentation systems that might leave sensitive candidate information vulnerable.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Implementing Comprehensive Access Security<\/strong><\/h3>\n\n\n\n<p>As the interview process often involves multiple stakeholders across different departments, access security becomes increasingly complex. Best practices include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Password management systems that enforce strong, unique credentials<\/li>\n\n\n\n<li>Multi-factor authentication for accessing candidate information<\/li>\n\n\n\n<li>Browser extensions that facilitate secure access while preventing credential reuse<\/li>\n\n\n\n<li>Time-limited access permissions that automatically expire when no longer needed<\/li>\n\n\n\n<li>Regular access audits to identify and remove unnecessary permissions<\/li>\n<\/ul>\n\n\n\n<p>Password managers help maintain secure access to sensitive candidate information. They generate and store strong, unique passwords for each HR team member and as many accounts as they use. <a href=\"https:\/\/addons.mozilla.org\/en-US\/firefox\/addon\/nordpass-password-management\/\" target=\"_blank\" rel=\"noopener\">Password managers for Firefox<\/a>, Chrome, or other browsers can even integrate safe password management and autofill features into browsers, letting HR professionals securely access online platforms and cloud storage without having to run the manager separately.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Job Offer&nbsp;<\/strong><\/h2>\n\n\n\n<p>The transition from candidate selection to offer negotiation introduces new categories of sensitive information, including current compensation details, benefit requirements, relocation needs, and sometimes personal circumstances affecting employment terms. This information requires heightened protection due to its potential impact on both the individual and the organization.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Securing the Background Verification Process<\/strong><\/h3>\n\n\n\n<p>Before finalizing offers, most organizations conduct background verifications that generate particularly sensitive data:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Criminal history checks<\/li>\n\n\n\n<li>Credit reports (for certain positions)<\/li>\n\n\n\n<li>Educational credential verification<\/li>\n\n\n\n<li>Employment history confirmation<\/li>\n\n\n\n<li>Professional licensure validation<\/li>\n<\/ul>\n\n\n\n<p>This information often passes through third-party verification providers before reaching the organization, creating potential vulnerability points. HR departments should:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use only reputable verification providers with strong security practices<\/li>\n\n\n\n<li>Establish secure channels for receiving verification results<\/li>\n\n\n\n<li>Implement strict access limitations for background check information<\/li>\n\n\n\n<li>Create separate storage protocols for adverse information<\/li>\n\n\n\n<li>Develop clear retention policies that comply with relevant regulations<\/li>\n<\/ul>\n\n\n\n<p>Most importantly, organizations should collect only verification information relevant to the specific position, avoiding the temptation to conduct overly broad investigations that generate unnecessary data security risks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Managing Compensation Negotiations Securely<\/strong><\/h3>\n\n\n\n<p>Compensation discussions generate particularly sensitive data that could create significant problems if compromised. Security measures should include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Encryption for all compensation-related communications<\/li>\n\n\n\n<li>Restricted access to salary benchmarking data and offer details<\/li>\n\n\n\n<li>Secure templates for offer letters and compensation packages<\/li>\n\n\n\n<li>Clear protocols for documenting negotiation discussions<\/li>\n\n\n\n<li>Secure channels for candidates to submit current compensation details<\/li>\n<\/ul>\n\n\n\n<p>Organizations should also consider implementing &#8220;need-to-know&#8221; principles for compensation information, limiting full visibility to those directly involved in the decision-making process.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Preparing for Digital Offer Acceptance<\/strong><\/h3>\n\n\n\n<p>As offer acceptance increasingly moves to digital platforms, HR teams must ensure these systems provide adequate security:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Secure electronic signature solutions that meet relevant legal standards<\/li>\n\n\n\n<li>Protected document storage for executed employment agreements<\/li>\n\n\n\n<li>Encrypted communication channels for addressing candidate questions<\/li>\n\n\n\n<li>Audit trails documenting the offer, negotiation, and acceptance process<\/li>\n\n\n\n<li>Seamless integration with onboarding systems to prevent manual data transfers<\/li>\n<\/ul>\n\n\n\n<p>By treating the offer stage as a critical security transition point between external recruitment and internal employee data management, organizations can prevent costly data breaches during this vulnerable period.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Onboarding&nbsp;<\/strong><\/h2>\n\n\n\n<p>The final step is integrating the employee into their new work environment. This introduces additional information requirements, such as banking details and tax forms, further stressing the need for robust encryption and effective access controls.<\/p>\n\n\n\n<p>The onboarding process represents both the culmination of the hiring journey and the beginning of the employee lifecycle. From a data perspective, this transition is marked by a significant expansion in the volume and sensitivity of collected information, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Tax identification and work authorization documentation<\/li>\n\n\n\n<li>Banking details for payroll processing<\/li>\n\n\n\n<li>Benefit enrollment information, potentially including dependent data<\/li>\n\n\n\n<li>Emergency contact information<\/li>\n\n\n\n<li>Detailed personal information for HR records<\/li>\n<\/ul>\n\n\n\n<p>Since they&#8217;re now a full-fledged team member, it\u2019s time to educate the new employee on upholding your data privacy policies. Doing so will ensure they don\u2019t fall victim to <a href=\"https:\/\/consumer.ftc.gov\/articles\/how-recognize-and-avoid-phishing-scams\" target=\"_blank\" rel=\"noopener\">phishing scams<\/a> or otherwise endanger the data you store. The onboarding process is the perfect opportunity to review the company\u2019s security practices, from recognizing suspicious emails to securely handling company devices.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Creating Secure Data Transfer Protocols<\/strong><\/h3>\n\n\n\n<p>As candidate information transitions into employee records, organizations face the challenge of transferring data between systems without creating security vulnerabilities. Best practices include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Direct system integrations between ATS and HRIS platforms<\/li>\n\n\n\n<li>Encrypted data transfer protocols for any manual transitions<\/li>\n\n\n\n<li>Validation procedures to ensure data accuracy during transfers<\/li>\n\n\n\n<li>Clear documentation of what information moves forward and what remains in recruitment systems<\/li>\n\n\n\n<li>Access revocation for recruitment team members who no longer need candidate data<\/li>\n<\/ul>\n\n\n\n<p>This transition provides an opportunity to review what recruitment information should be retained in the employee&#8217;s permanent record and what should be securely disposed of once the hiring process concludes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Implementing Comprehensive Data Privacy Training<\/strong><\/h3>\n\n\n\n<p>New employee onboarding creates the perfect opportunity to establish organizational data privacy expectations:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Interactive training on recognizing and avoiding phishing attempts<\/li>\n\n\n\n<li>Clear policies on appropriate handling of sensitive information<\/li>\n\n\n\n<li>Guidelines for secure use of company systems and devices<\/li>\n\n\n\n<li>Explanation of relevant data protection regulations in your industry<\/li>\n\n\n\n<li>Introduction to organizational security resources and support<\/li>\n<\/ul>\n\n\n\n<p>By positioning data privacy as a shared responsibility from day one, organizations create a security-conscious culture that protects both employee and candidate information.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Establishing Ongoing Data Governance<\/strong><\/h3>\n\n\n\n<p>The onboarding phase should establish patterns for ongoing data governance throughout the employment relationship:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Regular privacy notice updates and acknowledgments<\/li>\n\n\n\n<li>Clear protocols for accessing and correcting personal information<\/li>\n\n\n\n<li>Transparent data retention schedules for different information categories<\/li>\n\n\n\n<li>Defined processes for handling data subject access requests<\/li>\n\n\n\n<li>Mechanisms for reporting potential data security concerns<\/li>\n<\/ul>\n\n\n\n<p>These governance structures set expectations for how the organization will respect employee privacy rights while fulfilling legitimate business needs for information management.<\/p>\n\n\n\n<p>As we&#8217;ve explored throughout this guide, effective candidate data management extends far beyond basic compliance or security concerns. When approached strategically, thoughtful data governance becomes a competitive advantage in talent acquisition and organizational risk management.<\/p>\n\n\n\n<p>The most successful HR departments recognize that candidate data practices directly affect:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Organizational reputation in increasingly privacy-conscious talent markets<\/li>\n\n\n\n<li>Legal and regulatory exposure in a rapidly evolving compliance landscape<\/li>\n\n\n\n<li>Efficiency and effectiveness of the overall talent acquisition function<\/li>\n\n\n\n<li>Quality of decision-making throughout the hiring process<\/li>\n\n\n\n<li>Trust relationships with both candidates and new employees<\/li>\n<\/ul>\n\n\n\n<p>By implementing the best practices outlined here, HR can transform data management from a mere administrative requirement into a strategic asset that enhances both candidate experience and organizational outcomes.\u00a0<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Human resource departments have become owners of increasingly vast and sensitive information ecosystems. Their responsibility extends far beyond traditional personnel management into [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":1526,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","postBodyCss":"","postBodyMargin":[],"postBodyPadding":[],"postBodyBackground":{"backgroundType":"classic","gradient":""},"enableOnePageScrollInPage":false,"onePageScrollSpeed":1000,"onePageScrollAnimation":"easeInOutQuad","onePageScrollShowDotNavigation":true,"onePageScrollNavigation":"scaleUp","onePageScrollNavigationPosition":"right","onePageScrollNavigationHorizontal":[],"onePageScrollNavigationVertical":[],"onePageScrollNavigationSpacing":[],"onePageScrollNavigationColor":"#00ff0d","onePageScrollNavigationColorHover":"#00ff0d","onePageScrollNavigationColorActive":"#00ff0d","onePageScrollNavigationIcon":[],"onePageScrollNavigationWidth":[],"onePageScrollNavigationWidthHover":[],"onePageScrollNavigationWidthActive":[],"onePageScrollNavigationHeight":[],"onePageScrollNavigationHeightHover":[],"onePageScrollNavigationHeightActive":[],"onePageScrollNavigationBorder":[],"onePageScrollNavigationBorderHover":[],"onePageScrollNavigationBorderActive":[],"onePageScrollNavigationBorderRadius":[],"onePageScrollNavigationBorderRadiusHover":[],"onePageScrollNavigationBorderRadiusActive":[],"onePageScrollNavigationTooltipTypography":[],"onePageScrollNavigationTooltipColor":"#ffffff","onePageScrollNavigationTooltipColorHover":"","onePageScrollNavigationTooltipBgColor":"#00ff0d","onePageScrollNavigationTooltipBgColorHover":"","onePageScrollNavigationTooltipPadding":[],"onePageScrollNavigationTooltipPaddingHover":[],"onePageScrollNavigationTooltipBorderRadius":[],"onePageScrollNavigationTooltipBorderRadiusHover":[],"pageSettingsCustomCss":"","_daim_seo_power":"1000","_daim_enable_ail":"1","footnotes":""},"categories":[36],"tags":[139,179],"class_list":["post-2006","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-data","tag-hr"],"_links":{"self":[{"href":"https:\/\/www.gyfted.me\/resources\/wp-json\/wp\/v2\/posts\/2006","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gyfted.me\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.gyfted.me\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.gyfted.me\/resources\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gyfted.me\/resources\/wp-json\/wp\/v2\/comments?post=2006"}],"version-history":[{"count":1,"href":"https:\/\/www.gyfted.me\/resources\/wp-json\/wp\/v2\/posts\/2006\/revisions"}],"predecessor-version":[{"id":2008,"href":"https:\/\/www.gyfted.me\/resources\/wp-json\/wp\/v2\/posts\/2006\/revisions\/2008"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.gyfted.me\/resources\/wp-json\/wp\/v2\/media\/1526"}],"wp:attachment":[{"href":"https:\/\/www.gyfted.me\/resources\/wp-json\/wp\/v2\/media?parent=2006"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.gyfted.me\/resources\/wp-json\/wp\/v2\/categories?post=2006"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gyfted.me\/resources\/wp-json\/wp\/v2\/tags?post=2006"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}