{"id":2774,"date":"2025-03-18T19:51:01","date_gmt":"2025-03-18T18:51:01","guid":{"rendered":"https:\/\/www.lawoffice-vujacic.com\/?p=2774"},"modified":"2025-03-18T19:51:01","modified_gmt":"2025-03-18T18:51:01","slug":"die-cybersicherheits-richtlinie-nis-2","status":"publish","type":"post","link":"https:\/\/www.lawoffice-vujacic.com\/de\/die-cybersicherheits-richtlinie-nis-2\/","title":{"rendered":"Die Cybersicherheits-Richtlinie NIS 2"},"content":{"rendered":"<p>Die Cybersicherheits-Richtlinie NIS 2 wurde mit dem Ziel der Modernisierung und Weiterentwicklung der vorherigen NIS-Richtlinie verabschiedet. Ihre Hauptcharakteristik ist die Erweiterung des Anwendungsbereichs der fr\u00fcheren NIS-Richtlinie auf Sektoren wie die Herstellung von Medizinger\u00e4ten, elektrischen Ausr\u00fcstungen und Kraftfahrzeugen sowie auf bestimmte B2B IKT-Dienste, darunter Anbieter verwalteter Dienste und Anbieter verwalteter Sicherheitsdienste. Es sollte beachtet werden, dass die Liste der relevanten Sektoren von den Mitgliedstaaten bei der Umsetzung der Richtlinie erweitert werden kann.<\/p>\n<p>Die Einhaltung der Richtlinie wird neue Bewertungen erfordern, da die M\u00f6glichkeit besteht, dass einige Einrichtungen aus verschiedenen Mitgliedsstaaten reguliert werden k\u00f6nnten. Dies ist besonders bedeutend, da die NIS-2-Richtlinie nicht direkt anwendbar ist, sondern in nationales Recht der Mitgliedsstaaten umgesetzt werden muss.<\/p>\n<p>Die Einrichtungen haben kurze Fristen, um die zust\u00e4ndige Beh\u00f6rde \u00fcber erhebliche Sicherheitsvorf\u00e4lle zu informieren. Zus\u00e4tzlich betr\u00e4gt die Frist f\u00fcr die Fr\u00fchwarnung nur 24 Stunden. Es sollte beachtet werden, dass die NIS-2-Richtlinie eine sehr breite Definition erheblicher Sicherheitsvorf\u00e4lle hat. Diese umfasst Sicherheitsvorf\u00e4lle, die erhebliche Betriebsst\u00f6rungen des Dienstes oder finanzielle Verluste f\u00fcr eine Einrichtung verursachen k\u00f6nnen oder verursacht haben, sowie solche, die nat\u00fcrlichen oder juristischen Personen erhebliche materielle oder immaterielle Sch\u00e4den verursachen k\u00f6nnen oder verursacht haben.<\/p>\n<p>Die Sanktionen, die der zust\u00e4ndigen Beh\u00f6rde zur Verf\u00fcgung stehen, sind f\u00fcr die Nichteinhaltung der NIS-2-Regeln sehr streng und betragen bis zu 10 Millionen Euro oder mindestens 2 % des j\u00e4hrlichen Umsatzes des Unternehmens. Letztlich f\u00fchrt die NIS-2-Richtlinie zur Sicherstellung der Einhaltung die M\u00f6glichkeit der Haftung der Leitungsorgane des Unternehmens ein.<\/p>\n<p>&nbsp;<\/p>\n<p>Umfasst von,<\/p>\n<p>Daniel Vujacic, LL.M. (UW)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Die Cybersicherheits-Richtlinie NIS 2 wurde mit dem Ziel der Modernisierung und Weiterentwicklung der vorherigen NIS-Richtlinie verabschiedet. Ihre Hauptcharakteristik ist die Erweiterung des Anwendungsbereichs der fr\u00fcheren NIS-Richtlinie auf Sektoren wie die Herstellung von Medizinger\u00e4ten, elektrischen Ausr\u00fcstungen und Kraftfahrzeugen sowie auf bestimmte B2B IKT-Dienste, darunter Anbieter verwalteter Dienste und Anbieter verwalteter Sicherheitsdienste. Es sollte beachtet werden, dass [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[71],"tags":[],"class_list":["post-2774","post","type-post","status-publish","format-standard","hentry","category-unkategorisiert"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Die Cybersicherheits-Richtlinie NIS 2 &#8212; Law Office Vujacic<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lawoffice-vujacic.com\/de\/die-cybersicherheits-richtlinie-nis-2\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Die Cybersicherheits-Richtlinie NIS 2 &#8212; Law Office Vujacic\" \/>\n<meta property=\"og:description\" content=\"Die Cybersicherheits-Richtlinie NIS 2 wurde mit dem Ziel der Modernisierung und Weiterentwicklung der vorherigen NIS-Richtlinie verabschiedet. Ihre Hauptcharakteristik ist die Erweiterung des Anwendungsbereichs der fr\u00fcheren NIS-Richtlinie auf Sektoren wie die Herstellung von Medizinger\u00e4ten, elektrischen Ausr\u00fcstungen und Kraftfahrzeugen sowie auf bestimmte B2B IKT-Dienste, darunter Anbieter verwalteter Dienste und Anbieter verwalteter Sicherheitsdienste. Es sollte beachtet werden, dass [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lawoffice-vujacic.com\/de\/die-cybersicherheits-richtlinie-nis-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Law Office Vujacic\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/lawvujacic\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-18T18:51:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lawoffice-vujacic.com\/media\/2020\/12\/hero-01.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1166\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jelena Vujisic\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jelena Vujisic\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"2\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.lawoffice-vujacic.com\\\/de\\\/die-cybersicherheits-richtlinie-nis-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.lawoffice-vujacic.com\\\/de\\\/die-cybersicherheits-richtlinie-nis-2\\\/\"},\"author\":{\"name\":\"Jelena Vujisic\",\"@id\":\"https:\\\/\\\/www.lawoffice-vujacic.com\\\/#\\\/schema\\\/person\\\/30b1db212220e8fe23e982517523935e\"},\"headline\":\"Die Cybersicherheits-Richtlinie NIS 2\",\"datePublished\":\"2025-03-18T18:51:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.lawoffice-vujacic.com\\\/de\\\/die-cybersicherheits-richtlinie-nis-2\\\/\"},\"wordCount\":274,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.lawoffice-vujacic.com\\\/#organization\"},\"articleSection\":[\"Unkategorisiert\"],\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.lawoffice-vujacic.com\\\/de\\\/die-cybersicherheits-richtlinie-nis-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.lawoffice-vujacic.com\\\/de\\\/die-cybersicherheits-richtlinie-nis-2\\\/\",\"url\":\"https:\\\/\\\/www.lawoffice-vujacic.com\\\/de\\\/die-cybersicherheits-richtlinie-nis-2\\\/\",\"name\":\"Die Cybersicherheits-Richtlinie NIS 2 &#8212; Law Office Vujacic\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.lawoffice-vujacic.com\\\/#website\"},\"datePublished\":\"2025-03-18T18:51:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.lawoffice-vujacic.com\\\/de\\\/die-cybersicherheits-richtlinie-nis-2\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.lawoffice-vujacic.com\\\/de\\\/die-cybersicherheits-richtlinie-nis-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.lawoffice-vujacic.com\\\/de\\\/die-cybersicherheits-richtlinie-nis-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.lawoffice-vujacic.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Die Cybersicherheits-Richtlinie NIS 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.lawoffice-vujacic.com\\\/#website\",\"url\":\"https:\\\/\\\/www.lawoffice-vujacic.com\\\/\",\"name\":\"Law Office Vujacic\",\"description\":\"Law Office Vujacic is law firm with a long and proud tradition of supporting clients by high quality legal services.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.lawoffice-vujacic.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.lawoffice-vujacic.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.lawoffice-vujacic.com\\\/#organization\",\"name\":\"Law Office Vujacic\",\"url\":\"https:\\\/\\\/www.lawoffice-vujacic.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/www.lawoffice-vujacic.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.lawoffice-vujacic.com\\\/media\\\/2020\\\/12\\\/favicon.png\",\"contentUrl\":\"https:\\\/\\\/www.lawoffice-vujacic.com\\\/media\\\/2020\\\/12\\\/favicon.png\",\"width\":512,\"height\":512,\"caption\":\"Law Office Vujacic\"},\"image\":{\"@id\":\"https:\\\/\\\/www.lawoffice-vujacic.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/lawvujacic\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/law-office-vujacic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.lawoffice-vujacic.com\\\/#\\\/schema\\\/person\\\/30b1db212220e8fe23e982517523935e\",\"name\":\"Jelena Vujisic\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db7a1458699b45ba9093de37a54d444b27d6f3d7047b1fceb093894ddeb7bd46?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db7a1458699b45ba9093de37a54d444b27d6f3d7047b1fceb093894ddeb7bd46?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/db7a1458699b45ba9093de37a54d444b27d6f3d7047b1fceb093894ddeb7bd46?s=96&d=mm&r=g\",\"caption\":\"Jelena Vujisic\"},\"sameAs\":[\"http:\\\/\\\/www.lawoffice-vujacic.com\"],\"url\":\"https:\\\/\\\/www.lawoffice-vujacic.com\\\/de\\\/author\\\/jelena-vujisic\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Die Cybersicherheits-Richtlinie NIS 2 &#8212; Law Office Vujacic","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lawoffice-vujacic.com\/de\/die-cybersicherheits-richtlinie-nis-2\/","og_locale":"de_DE","og_type":"article","og_title":"Die Cybersicherheits-Richtlinie NIS 2 &#8212; Law Office Vujacic","og_description":"Die Cybersicherheits-Richtlinie NIS 2 wurde mit dem Ziel der Modernisierung und Weiterentwicklung der vorherigen NIS-Richtlinie verabschiedet. Ihre Hauptcharakteristik ist die Erweiterung des Anwendungsbereichs der fr\u00fcheren NIS-Richtlinie auf Sektoren wie die Herstellung von Medizinger\u00e4ten, elektrischen Ausr\u00fcstungen und Kraftfahrzeugen sowie auf bestimmte B2B IKT-Dienste, darunter Anbieter verwalteter Dienste und Anbieter verwalteter Sicherheitsdienste. Es sollte beachtet werden, dass [&hellip;]","og_url":"https:\/\/www.lawoffice-vujacic.com\/de\/die-cybersicherheits-richtlinie-nis-2\/","og_site_name":"Law Office Vujacic","article_publisher":"https:\/\/www.facebook.com\/lawvujacic","article_published_time":"2025-03-18T18:51:01+00:00","og_image":[{"width":1920,"height":1166,"url":"https:\/\/www.lawoffice-vujacic.com\/media\/2020\/12\/hero-01.jpg","type":"image\/jpeg"}],"author":"Jelena Vujisic","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Jelena Vujisic","Gesch\u00e4tzte Lesezeit":"2\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lawoffice-vujacic.com\/de\/die-cybersicherheits-richtlinie-nis-2\/#article","isPartOf":{"@id":"https:\/\/www.lawoffice-vujacic.com\/de\/die-cybersicherheits-richtlinie-nis-2\/"},"author":{"name":"Jelena Vujisic","@id":"https:\/\/www.lawoffice-vujacic.com\/#\/schema\/person\/30b1db212220e8fe23e982517523935e"},"headline":"Die Cybersicherheits-Richtlinie NIS 2","datePublished":"2025-03-18T18:51:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lawoffice-vujacic.com\/de\/die-cybersicherheits-richtlinie-nis-2\/"},"wordCount":274,"commentCount":0,"publisher":{"@id":"https:\/\/www.lawoffice-vujacic.com\/#organization"},"articleSection":["Unkategorisiert"],"inLanguage":"de","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.lawoffice-vujacic.com\/de\/die-cybersicherheits-richtlinie-nis-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.lawoffice-vujacic.com\/de\/die-cybersicherheits-richtlinie-nis-2\/","url":"https:\/\/www.lawoffice-vujacic.com\/de\/die-cybersicherheits-richtlinie-nis-2\/","name":"Die Cybersicherheits-Richtlinie NIS 2 &#8212; Law Office Vujacic","isPartOf":{"@id":"https:\/\/www.lawoffice-vujacic.com\/#website"},"datePublished":"2025-03-18T18:51:01+00:00","breadcrumb":{"@id":"https:\/\/www.lawoffice-vujacic.com\/de\/die-cybersicherheits-richtlinie-nis-2\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lawoffice-vujacic.com\/de\/die-cybersicherheits-richtlinie-nis-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.lawoffice-vujacic.com\/de\/die-cybersicherheits-richtlinie-nis-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.lawoffice-vujacic.com\/"},{"@type":"ListItem","position":2,"name":"Die Cybersicherheits-Richtlinie NIS 2"}]},{"@type":"WebSite","@id":"https:\/\/www.lawoffice-vujacic.com\/#website","url":"https:\/\/www.lawoffice-vujacic.com\/","name":"Law Office Vujacic","description":"Law Office Vujacic is law firm with a long and proud tradition of supporting clients by high quality legal services.","publisher":{"@id":"https:\/\/www.lawoffice-vujacic.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lawoffice-vujacic.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.lawoffice-vujacic.com\/#organization","name":"Law Office Vujacic","url":"https:\/\/www.lawoffice-vujacic.com\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.lawoffice-vujacic.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.lawoffice-vujacic.com\/media\/2020\/12\/favicon.png","contentUrl":"https:\/\/www.lawoffice-vujacic.com\/media\/2020\/12\/favicon.png","width":512,"height":512,"caption":"Law Office Vujacic"},"image":{"@id":"https:\/\/www.lawoffice-vujacic.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/lawvujacic","https:\/\/www.linkedin.com\/company\/law-office-vujacic\/"]},{"@type":"Person","@id":"https:\/\/www.lawoffice-vujacic.com\/#\/schema\/person\/30b1db212220e8fe23e982517523935e","name":"Jelena Vujisic","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/db7a1458699b45ba9093de37a54d444b27d6f3d7047b1fceb093894ddeb7bd46?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/db7a1458699b45ba9093de37a54d444b27d6f3d7047b1fceb093894ddeb7bd46?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/db7a1458699b45ba9093de37a54d444b27d6f3d7047b1fceb093894ddeb7bd46?s=96&d=mm&r=g","caption":"Jelena Vujisic"},"sameAs":["http:\/\/www.lawoffice-vujacic.com"],"url":"https:\/\/www.lawoffice-vujacic.com\/de\/author\/jelena-vujisic\/"}]}},"_links":{"self":[{"href":"https:\/\/www.lawoffice-vujacic.com\/de\/wp-json\/wp\/v2\/posts\/2774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lawoffice-vujacic.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lawoffice-vujacic.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lawoffice-vujacic.com\/de\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lawoffice-vujacic.com\/de\/wp-json\/wp\/v2\/comments?post=2774"}],"version-history":[{"count":1,"href":"https:\/\/www.lawoffice-vujacic.com\/de\/wp-json\/wp\/v2\/posts\/2774\/revisions"}],"predecessor-version":[{"id":2775,"href":"https:\/\/www.lawoffice-vujacic.com\/de\/wp-json\/wp\/v2\/posts\/2774\/revisions\/2775"}],"wp:attachment":[{"href":"https:\/\/www.lawoffice-vujacic.com\/de\/wp-json\/wp\/v2\/media?parent=2774"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lawoffice-vujacic.com\/de\/wp-json\/wp\/v2\/categories?post=2774"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lawoffice-vujacic.com\/de\/wp-json\/wp\/v2\/tags?post=2774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}