{"id":3843,"date":"2025-11-11T13:49:37","date_gmt":"2025-11-11T12:49:37","guid":{"rendered":"https:\/\/splitbot.ai\/?page_id=3843"},"modified":"2026-01-15T13:30:29","modified_gmt":"2026-01-15T12:30:29","slug":"become-a-partner-2","status":"publish","type":"page","link":"https:\/\/splitbot.ai\/en\/become-a-partner-2\/","title":{"rendered":"RAG and Data Protection"},"content":{"rendered":"\n<div class=\"wp-block-group alignfull has-base-background-color has-background has-global-padding is-layout-constrained wp-block-group-is-layout-constrained\" style=\"border-style:none;border-width:0px;border-radius:0px;margin-top:0;margin-bottom:0;padding-top:var(--wp--preset--spacing--30);padding-bottom:var(--wp--preset--spacing--30)\">\n<div class=\"wp-block-columns alignwide is-not-stacked-on-mobile is-layout-flex wp-container-core-columns-is-layout-0c08611d wp-block-columns-is-layout-flex\" style=\"margin-top:-120px;margin-bottom:0;padding-top:0px;padding-right:0;padding-bottom:0px;padding-left:0\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"padding-top:0px;padding-bottom:0px\">\n\n\n\n  <meta charset=\"UTF-8\"\/>\n  <meta name=\"viewport\" content=\"width=device-width, initial-scale=1\"\/>\n  <title>RAG &#038; Data Protection | DSK Recommendations &#038; KOSMO for your SME<\/title>\n  <meta name=\"description\" content=\"RAG and Data Protection: What the guidance from the Data Protection Conference (DSK) means for the use of AI systems in SMEs, municipalities, and administrations \u2013 and how KOSMO meets these requirements.\"\/>\n  <script src=\"https:\/\/cdn.tailwindcss.com\"><\/script>\n  <script src=\"https:\/\/unpkg.com\/lucide@latest\"><\/script>\n  <style>\n    a:focus, button:focus { outline: 2px solid #8A8AB2; outline-offset: 2px; }\n  <\/style>\n\n\n\n  <!-- Hero -->\n  <section class=\"max-w-7xl mx-auto px-6 mt-10\">\n    <div class=\"rounded-[55px] p-8 md:p-14 flex flex-col gap-6\" style=\"background:linear-gradient(135deg,rgba(7,146,227,0.12) 0%,rgba(155,81,224,0.35) 100%);\">\n      <div class=\"max-w-3xl\">\n        <h1 class=\"text-3xl sm:text-4xl md:text-5xl font-extrabold leading-tight mb-4\">\n  RAG &#038; Data Protection:<br\/>          <span class=\"text-gray-800\">What the new DSK guidance means for your company<\/span>\n        <\/h1>\n        <p class=\"text-lg md:text-xl\">\n The Data Protection Conference (DSK) has published clear guidelines for AI systems with Retrieval Augmented Generation (RAG).\n Here you can learn what this entails \u2013 and why KOSMO is specifically designed to meet these requirements.\n        <\/p>\n      <\/div>\n      <div class=\"flex flex-wrap gap-4 items-center\">\n         <a href=\"#kosmo\" class=\"bg-[#8A8AB2] text-white px-6 py-3 rounded-xl font-semibold shadow hover:bg-[#77779c] transition\">\n How KOSMO Meets the DSK Recommendations\n        <\/a>\n        <a href=\"https:\/\/www.datenschutzkonferenz-online.de\/media\/oh\/DSK_OH_RAG.pdf\" target=\"_blank\" rel=\"noopener noreferrer\" class=\"px-6 py-3 rounded-xl font-semibold border border-[#8A8AB2] text-[#8A8AB2] hover:bg-[#8A8AB2] hover:text-white transition flex items-center gap-2\">\n          <i data-lucide=\"file-text\" class=\"w-5 h-5\"><\/i>\n View DSK Guidance (PDF)\n        <\/a> \n      <\/div>\n    <\/div>\n  <\/section>\n\n  <!-- Wer ist die DSK -->\n  <section class=\"max-w-7xl mx-auto px-6 py-12\">\n    <div class=\"grid grid-cols-1 md:grid-cols-3 gap-10 items-start\">\n      <div class=\"md:col-span-2\">\n        <h2 class=\"text-2xl md:text-3xl font-bold mb-4\">Who is the DSK \u2013 and why is it important?<\/h2>\n        <p class=\"text-lg mb-3\">\n The Data Protection Conference (DSK) is the joint body of the independent data protection supervisory authorities\n of the federal government and the 16 federal states. It develops common positions and guidance on data protection. \n        <\/p>\n        <p class=\"text-lg mb-3\">\n Its publications are not directly legally binding, but are de facto authoritative:\n They show how supervisory authorities evaluate technologies \u2013 and thus, what is considered data protection compliant or risky in audits.\n\n        <\/p>\n        <p class=\"text-lg\">\n Anyone who uses or plans to use AI systems today should use the DSK recommendations as a reliable compass \u2013\n especially when dealing with personal data in companies, municipalities, and sensitive areas.\n        <\/p>\n      <\/div>\n      <div class=\"bg-gray-50 rounded-2xl p-5 shadow flex flex-col gap-3\">\n        <div class=\"flex items-center gap-2\">\n          <i data-lucide=\"shield-check\" class=\"w-6 h-6 text-[#8A8AB2]\"><\/i>\n          <span class=\"font-semibold\">Relevance for You<\/span>\n        <\/div>\n        <ul class=\"text-sm space-y-2\">\n          <li>Consistent View of Supervisory Authorities<\/li>\n          <li>Concrete Guidelines for AI &#038; RAG Systems<\/li>\n          <li>High Practical Relevance for SMEs and Administration<\/li>\n        <\/ul>\n      <\/div>\n    <\/div>\n  <\/section>\n\n  <!-- Was ist RAG -->\n  <section class=\"max-w-7xl mx-auto px-6 pb-12\">\n    <div class=\"bg-gray-50 rounded-[40px] p-8 md:p-10 shadow\">\n      <h2 class=\"text-2xl md:text-3xl font-bold mb-4\">What is RAG \u2013 Briefly Explained<\/h2>\n      <p class=\"text-lg mb-4\">\n RAG stands for <strong>Retrieval Augmented Generation<\/strong>. Simply put:\n An AI language model is connected to an intelligent search within your own data. \n      <\/p>\n      <p class=\"text-lg mb-4\">\n Before the model generates an answer, a retrieval module searches your\n documents, emails, or knowledge bases and provides relevant content. The AI then uses\n this current, internal information to answer \u2013 including source references. \n      <\/p>\n      <p class=\"text-lg mb-2\">\n Important: The documents are not permanently integrated into the model. They remain in your database and can be changed or deleted at any time. This approach offers clear advantages for data protection, transparency, and the exercise of data subject rights.  \n      <\/p>\n      <ul class=\"mt-4 grid grid-cols-1 md:grid-cols-3 gap-4 text-sm\">\n        <li class=\"flex items-start gap-2\">\n          <i data-lucide=\"search\" class=\"w-5 h-5 mt-0.5 text-[#8A8AB2]\"><\/i>\n Semantic Search instead of Keywords\n        <\/li>\n        <li class=\"flex items-start gap-2\">\n          <i data-lucide=\"book-open-check\" class=\"w-5 h-5 mt-0.5 text-[#8A8AB2]\"><\/i>\n Answers from your Real Documents\n        <\/li>\n        <li class=\"flex items-start gap-2\">\n          <i data-lucide=\"link-2\" class=\"w-5 h-5 mt-0.5 text-[#8A8AB2]\"><\/i>\n Traceably Linked with Source References\n        <\/li>\n      <\/ul>\n    <\/div>\n  <\/section>\n\n  <!-- Vorteile laut DSK -->\n  <section class=\"max-w-7xl mx-auto px-6 pb-16\">\n    <h2 class=\"text-2xl md:text-3xl font-bold mb-6\">\n What Opportunities Does the DSK See in RAG Systems?\n    <\/h2>\n    <p class=\"text-lg mb-6\">\n The guidance shows: RAG systems can be an important building block for data protection-compliant AI \u2013\n if implemented correctly. In particular, the following points are highlighted positively: \n    <\/p>\n\n    <div class=\"grid grid-cols-1 md:grid-cols-2 lg:grid-cols-3 gap-6\">\n      <div class=\"bg-gray-50 rounded-2xl p-5 shadow\">\n        <h3 class=\"font-semibold mb-2\">Increased Accuracy<\/h3>\n        <p class=\"text-sm\">\n Answers are based on specific documents instead of just training knowledge.\n Errors can be corrected by updating your sources.\n        <\/p>\n      <\/div>\n      <div class=\"bg-gray-50 rounded-2xl p-5 shadow\">\n        <h3 class=\"font-semibold mb-2\">Transparency &#038; Traceability<\/h3>\n        <p class=\"text-sm\">\n Source references make it possible to trace every answer \u2013\n a plus point for compliance and documentation.\n        <\/p>\n      <\/div>\n      <div class=\"bg-gray-50 rounded-2xl p-5 shadow\">\n        <h3 class=\"font-semibold mb-2\">Data Remains Under Control<\/h3>\n        <p class=\"text-sm\">\n Personal data remains in proprietary systems. RAG uses it,\n without permanently integrating it into the model. \n        <\/p>\n      <\/div>\n      <div class=\"bg-gray-50 rounded-2xl p-5 shadow\">\n        <h3 class=\"font-semibold mb-2\">Enforceable Data Subject Rights<\/h3>\n        <p class=\"text-sm\">\n If you delete a document, this immediately affects future answers \u2013\n unlike with fixed-trained models.\n        <\/p>\n      <\/div>\n      <div class=\"bg-gray-50 rounded-2xl p-5 shadow\">\n        <h3 class=\"font-semibold mb-2\">On-Premise Feasible<\/h3>\n        <p class=\"text-sm\">\n Smaller, focused models plus RAG enable operation on proprietary hardware\n \u2013 without dependence on global cloud providers.\n        <\/p>\n      <\/div>\n    <\/div>\n  <\/section>\n\n  <!-- Herausforderungen -->\n  <section class=\"max-w-7xl mx-auto px-6 pb-16\">\n    <div class=\"bg-white border border-gray-200 rounded-[40px] p-8 md:p-10 shadow-sm\">\n      <h2 class=\"text-2xl md:text-3xl font-bold mb-4\">What Risks Remain?<\/h2>\n      <p class=\"text-lg mb-4\">\n The DSK makes it clear: RAG is not a free pass. Some challenges remain\n and must be actively addressed: \n      <\/p>\n      <ul class=\"list-disc list-inside space-y-2 text-sm\">\n        <li>An unlawfully trained base language model remains problematic \u2013 even with RAG.<\/li>\n        <li>Purpose Limitation: Personal data may only be processed for the specific, predetermined purpose.<\/li>\n        <li>Risk of Unintended Linking: Internal data can be linked to existing knowledge within the model.<\/li>\n        <li>Black Box Effect: The exact internal decision-making process of the model remains technically complex.<\/li>\n      <\/ul>\n      <p class=\"text-sm mt-4 text-gray-700\">\n Precisely for this reason, systems are needed that are designed <strong>from the outset<\/strong> for Data Protection by Design,\n controllable data flows, and transparent architecture.\n      <\/p>\n    <\/div>\n  <\/section>\n\n  <!-- Wie KOSMO \/ Splitbot umsetzt -->\n  <section id=\"kosmo\" class=\"max-w-7xl mx_auto px-6 pb-20\">\n    <div class=\"rounded-[55px] p-8 md:p-12\" style=\"background:linear-gradient(135deg,rgba(7,146,227,0.12) 0%,rgba(155,81,224,0.35) 100%);\">\n      <h2 class=\"text-2xl md:text-3xl font-bold mb-6\">\n How KOSMO Implements DSK Recommendations in Practice\n      <\/h2>\n      <p class=\"text-lg mb-6\">\n KOSMO was developed from the outset to meet the DSK&#8217;s recently published requirements for RAG systems.\n      <\/p>\n\n      <div class=\"grid grid-cols-1 md:grid-cols-2 gap-5 text-sm\">\n        <div class=\"bg-white rounded-2xl p-5 shadow\">\n          <h3 class=\"font-semibold mb-1\">100% Data Sovereignty<\/h3>\n          <p>KOSMO runs either completely on-premise or in certified data centers in Germany.\n No data transfer to US clouds or third countries.<\/p>\n        <\/div>\n        <div class=\"bg-white rounded-2xl p-5 shadow\">\n          <h3 class=\"font-semibold mb-1\">European Language Models<\/h3>\n          <p>Use and exchange of models that are compatible with European requirements \u2013\n without lock-in to proprietary black-box APIs.<\/p>\n        <\/div>\n        <div class=\"bg-white rounded-2xl p-5 shadow\">\n          <h3 class=\"font-semibold mb-1\">RAG with Full Control<\/h3>\n          <p>You define which data sources are connected. No data is used for model training \u2013 changes take effect in real-time. <\/p>\n        <\/div>\n        <div class=\"bg-white rounded-2xl p-5 shadow\">\n          <h3 class=\"font-semibold mb-1\">Source References &#038; Transparency<\/h3>\n          <p>Every answer can be traced back to the underlying documents \u2013 ideal for inspections,\n audits, and QA.<\/p>\n        <\/div>\n        <div class=\"bg-white rounded-2xl p-5 shadow\">\n          <h3 class=\"font-semibold mb-1\">Role-Based Access<\/h3>\n          <p>Fine-grained rights: Employees only see content for which they are authorized \u2013\n technically enforced by the system.<\/p>\n        <\/div>\n        <div class=\"bg-white rounded-2xl p-5 shadow\">\n          <h3 class=\"font-semibold mb-1\">Controllable External Data<\/h3>\n          <p>Web search and external sources are optional and clearly marked. Standard: internal,\n verified knowledge bases. <\/p>\n        <\/div>\n        <div class=\"bg-white rounded-2xl p-5 shadow\">\n          <h3 class=\"font-semibold mb-1\">Open Source &#038; Configurable<\/h3>\n          <p>Open components and transparent architecture enable technical and legal review \u2013\n a real advantage over closed-source AI.<\/p>\n        <\/div>\n      <\/div>\n\n      <div class=\"mt-8 flex flex-wrap gap-4 items-center\">\n        <a href=\"https:\/\/splitbot.ai\/en\/contact\/\" class=\"bg-[#8A8AB2] text-white px-6 py-3 rounded-xl font-semibold shadow hover:bg-[#77779c] transition\">\n Request Consultation on RAG &#038; Data Protection\n        <\/a>\n        <p class=\"text-sm text-gray-700 max-w-xl\">\n Ideal for SMEs, municipalities, healthcare and education sectors, energy providers, chambers of commerce, and all\n who want to use AI without losing control over their data.\n        <\/p>\n      <\/div>\n    <\/div>\n  <\/section>\n\n\n\n<\/div>\n<\/div>\n<\/div>\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>RAG &#038; Data Protection | DSK Recommendations &#038; KOSMO for your SME RAG &#038; Data Protection: What the new DSK guidance means for your company The Data Protection Conference (DSK) has published clear guidelines for AI systems with Retrieval Augmented Generation (RAG). Here you can learn what this entails \u2013 and why KOSMO is specifically [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3843","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>RAG &amp; Data Protection for SMEs | Secure AI Applications Explained<\/title>\n<meta name=\"description\" content=\"Learn what RAG Data Protection SME means and what requirements the Data Protection Conference has published for AI systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/splitbot.ai\/en\/become-a-partner-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RAG &amp; Data Protection for SMEs | Secure AI Applications Explained\" \/>\n<meta property=\"og:description\" content=\"Learn what RAG Data Protection SME means and what requirements the Data Protection Conference has published for AI systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/splitbot.ai\/en\/become-a-partner-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Bring digital sovereignty to your workplace with splitbot.ai.\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-15T12:30:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/splitbot.ai\/wp-content\/uploads\/2026\/01\/splitbot-works-for-you.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/splitbot.ai\/en\/become-a-partner-2\/\",\"url\":\"https:\/\/splitbot.ai\/en\/become-a-partner-2\/\",\"name\":\"RAG & Data Protection for SMEs | Secure AI Applications Explained\",\"isPartOf\":{\"@id\":\"https:\/\/splitbot.ai\/en\/#website\"},\"datePublished\":\"2025-11-11T12:49:37+00:00\",\"dateModified\":\"2026-01-15T12:30:29+00:00\",\"description\":\"Learn what RAG Data Protection SME means and what requirements the Data Protection Conference has published for AI systems.\",\"breadcrumb\":{\"@id\":\"https:\/\/splitbot.ai\/en\/become-a-partner-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/splitbot.ai\/en\/become-a-partner-2\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/splitbot.ai\/en\/become-a-partner-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Start\",\"item\":\"https:\/\/splitbot.ai\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"RAG and Data Protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/splitbot.ai\/en\/#website\",\"url\":\"https:\/\/splitbot.ai\/en\/\",\"name\":\"Digital Souver\u00e4ne KI f\u00fcr deinen Arbeitsplatz\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/splitbot.ai\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/splitbot.ai\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/splitbot.ai\/en\/#organization\",\"name\":\"Splitbot\",\"url\":\"https:\/\/splitbot.ai\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/splitbot.ai\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/splitbot.ai\/wp-content\/uploads\/2025\/02\/Log_Wort_Bild_Lilablau.png\",\"contentUrl\":\"https:\/\/splitbot.ai\/wp-content\/uploads\/2025\/02\/Log_Wort_Bild_Lilablau.png\",\"width\":393,\"height\":46,\"caption\":\"Splitbot\"},\"image\":{\"@id\":\"https:\/\/splitbot.ai\/en\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"RAG & Data Protection for SMEs | Secure AI Applications Explained","description":"Learn what RAG Data Protection SME means and what requirements the Data Protection Conference has published for AI systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/splitbot.ai\/en\/become-a-partner-2\/","og_locale":"en_US","og_type":"article","og_title":"RAG & Data Protection for SMEs | Secure AI Applications Explained","og_description":"Learn what RAG Data Protection SME means and what requirements the Data Protection Conference has published for AI systems.","og_url":"https:\/\/splitbot.ai\/en\/become-a-partner-2\/","og_site_name":"Bring digital sovereignty to your workplace with splitbot.ai.","article_modified_time":"2026-01-15T12:30:29+00:00","og_image":[{"width":1200,"height":675,"url":"https:\/\/splitbot.ai\/wp-content\/uploads\/2026\/01\/splitbot-works-for-you.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/splitbot.ai\/en\/become-a-partner-2\/","url":"https:\/\/splitbot.ai\/en\/become-a-partner-2\/","name":"RAG & Data Protection for SMEs | Secure AI Applications Explained","isPartOf":{"@id":"https:\/\/splitbot.ai\/en\/#website"},"datePublished":"2025-11-11T12:49:37+00:00","dateModified":"2026-01-15T12:30:29+00:00","description":"Learn what RAG Data Protection SME means and what requirements the Data Protection Conference has published for AI systems.","breadcrumb":{"@id":"https:\/\/splitbot.ai\/en\/become-a-partner-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/splitbot.ai\/en\/become-a-partner-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/splitbot.ai\/en\/become-a-partner-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Start","item":"https:\/\/splitbot.ai\/en\/"},{"@type":"ListItem","position":2,"name":"RAG and Data Protection"}]},{"@type":"WebSite","@id":"https:\/\/splitbot.ai\/en\/#website","url":"https:\/\/splitbot.ai\/en\/","name":"Digital Souver\u00e4ne KI f\u00fcr deinen Arbeitsplatz","description":"","publisher":{"@id":"https:\/\/splitbot.ai\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/splitbot.ai\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/splitbot.ai\/en\/#organization","name":"Splitbot","url":"https:\/\/splitbot.ai\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/splitbot.ai\/en\/#\/schema\/logo\/image\/","url":"https:\/\/splitbot.ai\/wp-content\/uploads\/2025\/02\/Log_Wort_Bild_Lilablau.png","contentUrl":"https:\/\/splitbot.ai\/wp-content\/uploads\/2025\/02\/Log_Wort_Bild_Lilablau.png","width":393,"height":46,"caption":"Splitbot"},"image":{"@id":"https:\/\/splitbot.ai\/en\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/splitbot.ai\/en\/wp-json\/wp\/v2\/pages\/3843","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/splitbot.ai\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/splitbot.ai\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/splitbot.ai\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/splitbot.ai\/en\/wp-json\/wp\/v2\/comments?post=3843"}],"version-history":[{"count":5,"href":"https:\/\/splitbot.ai\/en\/wp-json\/wp\/v2\/pages\/3843\/revisions"}],"predecessor-version":[{"id":4021,"href":"https:\/\/splitbot.ai\/en\/wp-json\/wp\/v2\/pages\/3843\/revisions\/4021"}],"wp:attachment":[{"href":"https:\/\/splitbot.ai\/en\/wp-json\/wp\/v2\/media?parent=3843"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}