{"id":11578,"date":"2026-04-02T03:17:09","date_gmt":"2026-04-02T03:17:09","guid":{"rendered":"https:\/\/www.wizbrand.com\/tutorials\/right-to-delete\/"},"modified":"2026-04-02T03:17:09","modified_gmt":"2026-04-02T03:17:09","slug":"right-to-delete","status":"publish","type":"post","link":"https:\/\/www.wizbrand.com\/tutorials\/right-to-delete\/","title":{"rendered":"Right to Delete: What It Is, Key Features, Benefits, Use Cases, and How It Fits in Privacy &#038; Consent"},"content":{"rendered":"\n<p>The <strong>Right to Delete<\/strong> is one of the most important ideas in <strong>Privacy &amp; Consent<\/strong> because it gives people a clear way to request that an organization erase their personal data. For marketers and growth teams, this isn\u2019t just a legal concept\u2014it directly affects how you collect leads, run campaigns, measure performance, and retain customer trust.<\/p>\n\n\n\n<p>In a world of first-party data, personalization, and stricter privacy expectations, the <strong>Right to Delete<\/strong> forces better data discipline. It pushes teams to know what data they have, where it lives, why they collected it, and how to remove it reliably when asked\u2014all core concerns in <strong>Privacy &amp; Consent<\/strong> strategy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is Right to Delete?<\/h2>\n\n\n\n<p>The <strong>Right to Delete<\/strong> is an individual\u2019s ability to request the deletion (erasure) of their personal data held by a business. In practice, it means an organization must be able to locate data connected to a person and remove it from systems\u2014subject to applicable laws, verification requirements, and exceptions such as record-keeping obligations.<\/p>\n\n\n\n<p>At its core, the <strong>Right to Delete<\/strong> is about control: people can reduce their digital footprint and limit ongoing use of their data for advertising, analytics, profiling, or communications.<\/p>\n\n\n\n<p>From a business perspective, the <strong>Right to Delete<\/strong> creates an operational requirement: marketing, product, support, data, and engineering must coordinate to fulfill deletion requests accurately and within defined timelines.<\/p>\n\n\n\n<p>Within <strong>Privacy &amp; Consent<\/strong>, the <strong>Right to Delete<\/strong> sits alongside consent management, data minimization, and transparency. It is also deeply connected to lifecycle management: data should not live forever simply because it might be useful later.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why Right to Delete Matters in Privacy &amp; Consent<\/h2>\n\n\n\n<p>The <strong>Right to Delete<\/strong> matters strategically because it turns privacy promises into auditable operations. If your brand says \u201cwe respect your privacy,\u201d your ability to delete data on request is one of the clearest tests of that statement.<\/p>\n\n\n\n<p>Key business impacts include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Reduced brand risk:<\/strong> Poor deletion handling can lead to customer complaints, regulator attention, and reputational damage.<\/li>\n<li><strong>Better data quality:<\/strong> Teams that can delete correctly usually also have cleaner schemas, better identity resolution, and fewer duplicate records.<\/li>\n<li><strong>Improved customer trust:<\/strong> Respecting deletion requests quickly and clearly can reduce churn and increase willingness to share first-party data in the future.<\/li>\n<li><strong>Competitive advantage:<\/strong> Strong <strong>Privacy &amp; Consent<\/strong> practices can be a differentiator, especially in regulated markets and B2B deals.<\/li>\n<\/ul>\n\n\n\n<p>Marketing outcomes are real: if customers believe data is handled responsibly, opt-in rates, email engagement, and long-term retention can improve. The <strong>Right to Delete<\/strong> can also reduce wasted spend by removing unreachable or non-compliant profiles from targeting.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Right to Delete Works<\/h2>\n\n\n\n<p>The <strong>Right to Delete<\/strong> is conceptual, but operationally it follows a practical workflow. A mature process typically looks like this:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Trigger (request intake):<\/strong> A user submits a deletion request via a web form, support ticket, in-app setting, or email. Good <strong>Privacy &amp; Consent<\/strong> design makes this easy to find and understand.<\/li>\n<li><strong>Verification (identity confirmation):<\/strong> The business confirms the requester is the correct person. Verification must be strong enough to prevent abuse, but not so burdensome that it becomes a barrier.<\/li>\n<li><strong>Discovery (data mapping and lookup):<\/strong> The organization identifies where the person\u2019s data exists\u2014CRM, email platform, product database, analytics events, ad audiences, support system, data warehouse, and backups (as applicable).<\/li>\n<li><strong>Execution (erasure or de-identification):<\/strong> Data is deleted, anonymized, or de-linked based on legal allowances and system design. Some records may be retained in limited form for compliance (for example, invoices) while removing marketing identifiers.<\/li>\n<li><strong>Confirmation (response and audit trail):<\/strong> The requester is notified, and the organization records proof of completion. A strong <strong>Privacy &amp; Consent<\/strong> program keeps an internal log for audits without retaining unnecessary personal data.<\/li>\n<\/ol>\n\n\n\n<p>What makes the <strong>Right to Delete<\/strong> challenging is not the idea\u2014it\u2019s the breadth of systems and partners involved in modern marketing stacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Key Components of Right to Delete<\/h2>\n\n\n\n<p>To operationalize the <strong>Right to Delete<\/strong>, organizations need coordinated elements across people, process, and technology:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Data inventory and mapping<\/h3>\n\n\n\n<p>You can\u2019t delete what you can\u2019t find. A current inventory of data sources, fields, and ownership is the foundation of <strong>Privacy &amp; Consent<\/strong> execution.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Identity resolution<\/h3>\n\n\n\n<p>Deletion requests often start with an email address, but data may also be stored under device IDs, customer IDs, cookie identifiers, or order numbers. The <strong>Right to Delete<\/strong> depends on consistent identity linking (and careful handling to avoid deleting the wrong person).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Governance and responsibilities<\/h3>\n\n\n\n<p>Clear ownership prevents delays:\n&#8211; Legal\/privacy defines policy, exceptions, and response standards.\n&#8211; Marketing owns workflows in CRM, email, and ad platforms.\n&#8211; Engineering owns product databases, event pipelines, and deletion automation.\n&#8211; Support handles intake and communication.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Processes for vendors and partners<\/h3>\n\n\n\n<p>If data is shared with processors (email service, analytics, ad platforms), the <strong>Right to Delete<\/strong> must extend to those relationships via contracts and operational runbooks\u2014an important part of <strong>Privacy &amp; Consent<\/strong> governance.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Auditability<\/h3>\n\n\n\n<p>Teams should be able to demonstrate what was deleted, when, and from which systems\u2014without creating a new privacy risk by over-logging sensitive details.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Types of Right to Delete<\/h2>\n\n\n\n<p>The <strong>Right to Delete<\/strong> is often discussed as a single right, but in practice there are meaningful distinctions that affect implementation:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Full account deletion vs. marketing-only deletion<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Account deletion<\/strong> removes product profile data and may close access entirely.<\/li>\n<li><strong>Marketing deletion<\/strong> may remove the person from email lists, CRM profiles, and ad audiences while retaining limited transaction records required for finance or legal reasons.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Hard deletion vs. de-identification<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Hard deletion<\/strong> removes the record entirely.<\/li>\n<li><strong>De-identification\/anonymization<\/strong> removes personal identifiers so the remaining data is no longer linked to an individual (useful for analytics retention when allowed). This must be done carefully to avoid re-identification risk.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Immediate deletion vs. staged deletion<\/h3>\n\n\n\n<p>Some systems delete instantly; others rely on scheduled jobs. A staged approach can still satisfy the <strong>Right to Delete<\/strong> if timelines are met and processing is controlled.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Deletion vs. suppression<\/h3>\n\n\n\n<p>Sometimes businesses must keep a minimal record to ensure the person is not re-added later (for example, a suppression list). This should be narrowly scoped and aligned with <strong>Privacy &amp; Consent<\/strong> principles.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Real-World Examples of Right to Delete<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1) Ecommerce: post-purchase deletion request<\/h3>\n\n\n\n<p>A customer requests the <strong>Right to Delete<\/strong> after receiving an order. The company deletes marketing profiles (email platform, CRM segments, ad audiences), removes saved addresses in the account, and de-links analytics identifiers. It retains limited invoice data for tax obligations while removing unnecessary marketing fields\u2014balancing <strong>Privacy &amp; Consent<\/strong> obligations with compliance needs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2) B2B SaaS: lead requests deletion after a webinar<\/h3>\n\n\n\n<p>A webinar lead asks for deletion. The team removes the lead from marketing automation, deletes event attendance logs tied to the email, and updates the CRM record per policy. They also ensure the lead is removed from retargeting audiences. The confirmation message clearly explains what was deleted and what minimal data (if any) is retained for suppression\u2014an approach that strengthens <strong>Privacy &amp; Consent<\/strong> transparency.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3) Mobile app: deletion across device identifiers<\/h3>\n\n\n\n<p>An app user requests deletion from in-app settings. Engineering triggers a workflow that deletes the user profile, unlinks device identifiers, and signals downstream systems (data warehouse, analytics pipeline) to remove or anonymize events linked to that user. This scenario shows why the <strong>Right to Delete<\/strong> is as much a data engineering problem as a policy problem.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Benefits of Using Right to Delete<\/h2>\n\n\n\n<p>Treating the <strong>Right to Delete<\/strong> as a first-class capability produces measurable business benefits:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Higher trust and better opt-in behavior:<\/strong> Users are more likely to consent when they know they can later delete.<\/li>\n<li><strong>Lower operational chaos:<\/strong> A defined process reduces ad-hoc requests and internal escalations.<\/li>\n<li><strong>Reduced storage and tool costs:<\/strong> Deleting stale profiles and unused data can lower warehouse, CRM, and email costs.<\/li>\n<li><strong>Cleaner audiences and reporting:<\/strong> Removing outdated or non-consenting profiles can improve segmentation accuracy and reduce wasted impressions.<\/li>\n<li><strong>Stronger <\/strong>Privacy &amp; Consent<strong> posture:<\/strong> Deletion readiness often correlates with better data governance overall.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Challenges of Right to Delete<\/h2>\n\n\n\n<p>The <strong>Right to Delete<\/strong> is difficult because modern marketing data is distributed and constantly replicated.<\/p>\n\n\n\n<p>Common challenges include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>System sprawl:<\/strong> Data exists in CRMs, CDPs, analytics tools, spreadsheets, support systems, and partner platforms.<\/li>\n<li><strong>Identifier mismatch:<\/strong> One person can have multiple emails, devices, and IDs, making lookup and deletion complex.<\/li>\n<li><strong>Backups and logs:<\/strong> Some environments can\u2019t practically delete from immutable logs or backups immediately; teams must define compliant approaches that still respect <strong>Privacy &amp; Consent<\/strong> expectations.<\/li>\n<li><strong>Downstream propagation delays:<\/strong> Deletions may take time to sync across tools, risking accidental re-targeting.<\/li>\n<li><strong>Measurement limitations:<\/strong> Removing data can change cohort sizes and historical reporting, requiring analysts to document impacts.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Best Practices for Right to Delete<\/h2>\n\n\n\n<p>Implement the <strong>Right to Delete<\/strong> like a product feature: design it, test it, measure it, and improve it.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Build a data map that stays current:<\/strong> Tie systems to owners and update when new tools are added.<\/li>\n<li><strong>Create a standard operating procedure:<\/strong> Intake, verification, execution steps, exceptions, and response templates.<\/li>\n<li><strong>Automate where possible:<\/strong> Use workflows to trigger deletions across core systems and reduce human error.<\/li>\n<li><strong>Minimize data by default:<\/strong> The easiest deletion is the data you never collected\u2014central to <strong>Privacy &amp; Consent<\/strong> maturity.<\/li>\n<li><strong>Use suppression carefully:<\/strong> If you maintain suppression records, keep them minimal and purpose-bound.<\/li>\n<li><strong>Test with \u201cdeletion drills\u201d:<\/strong> Run quarterly exercises to ensure teams can fulfill requests end-to-end.<\/li>\n<li><strong>Document analytics impacts:<\/strong> Establish how deletion affects attribution, LTV calculations, and A\/B testing datasets.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Tools Used for Right to Delete<\/h2>\n\n\n\n<p>The <strong>Right to Delete<\/strong> is enabled by systems more than standalone \u201cdeletion tools.\u201d Common tool categories include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Consent and preference management:<\/strong> Captures user choices and routes requests to the right workflow within <strong>Privacy &amp; Consent<\/strong> operations.<\/li>\n<li><strong>CRM systems:<\/strong> Where contact records, lifecycle stages, and sales notes may require deletion or redaction.<\/li>\n<li><strong>Customer data platforms (CDPs) and identity systems:<\/strong> Centralize identifiers and help propagate deletions to destinations.<\/li>\n<li><strong>Marketing automation and email platforms:<\/strong> Remove subscribers, event history, and behavioral profiles.<\/li>\n<li><strong>Analytics tools and tag management:<\/strong> Support deletion\/anonymization requests, reduce identifier collection, and control data flows.<\/li>\n<li><strong>Data warehouses and ETL pipelines:<\/strong> Store event data and require deletion routines or de-identification processes.<\/li>\n<li><strong>Ticketing\/workflow tools:<\/strong> Manage intake, verification, SLAs, and audit trails.<\/li>\n<li><strong>Reporting dashboards:<\/strong> Track operational metrics for <strong>Privacy &amp; Consent<\/strong> performance and deletion compliance.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Metrics Related to Right to Delete<\/h2>\n\n\n\n<p>To manage the <strong>Right to Delete<\/strong> effectively, track operational and business metrics:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Request volume:<\/strong> Number of deletion requests per week\/month, by channel (web, support, in-app).<\/li>\n<li><strong>Time to fulfill (median\/95th percentile):<\/strong> How quickly requests are completed end-to-end.<\/li>\n<li><strong>Completion rate:<\/strong> Percentage of requests fully completed within your internal target window.<\/li>\n<li><strong>System coverage:<\/strong> Share of known systems integrated into the deletion workflow (CRM, email, warehouse, ad platforms).<\/li>\n<li><strong>Re-contact rate:<\/strong> Incidents where deleted users were accidentally emailed or targeted again.<\/li>\n<li><strong>Audit readiness:<\/strong> Ability to produce internal evidence of completion without over-collecting data.<\/li>\n<li><strong>Marketing impact indicators:<\/strong> Changes in list size, audience match rates, and reporting continuity after deletion events.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Future Trends of Right to Delete<\/h2>\n\n\n\n<p>The <strong>Right to Delete<\/strong> is evolving as privacy regulation, technology, and AI-driven marketing change:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>More automation and orchestration:<\/strong> Deletion workflows will increasingly be event-driven across stacks, reducing manual work.<\/li>\n<li><strong>AI governance pressure:<\/strong> As models are trained on user data, organizations will face harder questions about how the <strong>Right to Delete<\/strong> applies to derived data and model outputs within <strong>Privacy &amp; Consent<\/strong> programs.<\/li>\n<li><strong>Privacy-preserving analytics:<\/strong> Aggregation, on-device processing, and de-identified measurement will reduce dependence on personal identifiers and make deletion less disruptive.<\/li>\n<li><strong>Global convergence (and fragmentation):<\/strong> More regions will adopt deletion-like rights, but details will vary, requiring flexible processes.<\/li>\n<li><strong>Stronger consumer expectations:<\/strong> Even where laws are less specific, user expectations will push brands to honor deletion requests as a trust baseline.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Right to Delete vs Related Terms<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Right to Delete vs Right to Access<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Right to Access<\/strong> focuses on providing a copy or summary of personal data.<\/li>\n<li><strong>Right to Delete<\/strong> focuses on erasing it (with lawful exceptions). Access is often a precursor to deletion because it helps users understand what exists.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Right to Delete vs Right to Rectification<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Rectification<\/strong> is about correcting inaccurate data (wrong email, incorrect name).<\/li>\n<li>The <strong>Right to Delete<\/strong> is about removal. From a marketing standpoint, rectification improves targeting accuracy; deletion removes the person from targeting entirely.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Right to Delete vs Opt-out \/ Right to Object<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Opt-out<\/strong> typically stops certain processing (like marketing emails or targeted ads) but may not require erasing all data.<\/li>\n<li>The <strong>Right to Delete<\/strong> is broader and usually requires removing personal data, not just stopping one channel\u2014an important distinction in <strong>Privacy &amp; Consent<\/strong> planning.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Who Should Learn Right to Delete<\/h2>\n\n\n\n<p>The <strong>Right to Delete<\/strong> matters across teams:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Marketers:<\/strong> To manage list hygiene, audience building, personalization boundaries, and campaign compliance.<\/li>\n<li><strong>Analysts:<\/strong> To understand how deletion affects attribution, retention metrics, and data integrity.<\/li>\n<li><strong>Agencies:<\/strong> To advise clients on compliant activation, audience sharing, and vendor coordination.<\/li>\n<li><strong>Business owners and founders:<\/strong> To reduce risk, protect brand trust, and design scalable operations early.<\/li>\n<li><strong>Developers and data engineers:<\/strong> To implement deletion APIs, data lifecycle controls, and reliable propagation across systems\u2014where most real-world challenges live.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Summary of Right to Delete<\/h2>\n\n\n\n<p>The <strong>Right to Delete<\/strong> is a core concept in <strong>Privacy &amp; Consent<\/strong> that enables individuals to request erasure of their personal data. It matters because it strengthens trust, reduces risk, and forces better data governance across marketing and product ecosystems. In practice, it requires intake and verification, data discovery, deletion or de-identification execution, and audit-ready confirmation. When implemented well, the <strong>Right to Delete<\/strong> supports stronger <strong>Privacy &amp; Consent<\/strong> by aligning customer expectations with operational reality.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Frequently Asked Questions (FAQ)<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1) What does Right to Delete mean for marketing databases?<\/h3>\n\n\n\n<p>It means you must be able to find and remove a person\u2019s data from marketing systems (CRM, email, audiences, analytics identifiers) when a valid request is received, subject to applicable rules and exceptions.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2) Is Right to Delete the same as unsubscribing from emails?<\/h3>\n\n\n\n<p>No. Unsubscribing usually stops marketing emails, but the <strong>Right to Delete<\/strong> can require broader removal of personal data across systems, not just one channel.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3) How does Privacy &amp; Consent affect how quickly deletion requests must be handled?<\/h3>\n\n\n\n<p><strong>Privacy &amp; Consent<\/strong> practices define intake, verification, and fulfillment timelines aligned to your legal and policy obligations. Even when exact timelines vary by jurisdiction, having clear internal SLAs is essential.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4) What data is typically hardest to delete?<\/h3>\n\n\n\n<p>Replicated data in warehouses, logs, analytics event streams, and partner platforms is often hardest. Identity mismatches across devices and emails also make deletion difficult.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5) Can a company keep any data after a deletion request?<\/h3>\n\n\n\n<p>Sometimes. Certain records may be retained for legal, security, or financial obligations, and minimal suppression data may be kept to prevent re-contact. Good <strong>Privacy &amp; Consent<\/strong> design keeps retained data minimal and purpose-limited.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6) How do we prevent accidentally re-adding deleted users?<\/h3>\n\n\n\n<p>Use controlled ingestion, suppression checks, and automated workflows that propagate deletions to downstream systems. Regular audits of sync jobs and audience uploads help avoid re-targeting mistakes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">7) What should we document when fulfilling a Right to Delete request?<\/h3>\n\n\n\n<p>Document the request source, verification method, systems processed, completion timestamp, and any exceptions applied\u2014enough for auditability without storing unnecessary personal details.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The **Right to Delete** is one of the most important ideas in **Privacy &#038; Consent** because it gives people a clear way to request that an organization erase their personal data. For marketers and growth teams, this isn\u2019t just a legal concept\u2014it directly affects how you collect leads, run campaigns, measure performance, and retain customer trust.<\/p>\n","protected":false},"author":10235,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1916],"tags":[],"class_list":["post-11578","post","type-post","status-publish","format-standard","hentry","category-privacy-consent"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.wizbrand.com\/tutorials\/wp-json\/wp\/v2\/posts\/11578","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wizbrand.com\/tutorials\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wizbrand.com\/tutorials\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wizbrand.com\/tutorials\/wp-json\/wp\/v2\/users\/10235"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wizbrand.com\/tutorials\/wp-json\/wp\/v2\/comments?post=11578"}],"version-history":[{"count":0,"href":"https:\/\/www.wizbrand.com\/tutorials\/wp-json\/wp\/v2\/posts\/11578\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.wizbrand.com\/tutorials\/wp-json\/wp\/v2\/media?parent=11578"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wizbrand.com\/tutorials\/wp-json\/wp\/v2\/categories?post=11578"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wizbrand.com\/tutorials\/wp-json\/wp\/v2\/tags?post=11578"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}