{"id":365428,"date":"2026-03-30T09:25:30","date_gmt":"2026-03-30T07:25:30","guid":{"rendered":"https:\/\/recogtech.com\/uncategorized\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\/"},"modified":"2026-03-30T09:25:30","modified_gmt":"2026-03-30T07:25:30","slug":"the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control","status":"publish","type":"post","link":"https:\/\/recogtech.com\/en\/insights-en\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\/","title":{"rendered":"The 5 Most Frequently Asked Questions About the Cyber Resilience Act (CRA) in Biometric Access Control"},"content":{"rendered":"<p style=\"font-weight: 400;\">The impact of the Cyber Resilience Act is still often underestimated in practice. The questions we are frequently asked:<\/p>\n<ul>\n<li style=\"font-weight: 400;\">Who must comply with the CRA?<\/li>\n<li style=\"font-weight: 400;\">We do not manufacture anything. Why does this concern us?<\/li>\n<li style=\"font-weight: 400;\">We are not subject to NIS2. Why is this still relevant for us?<\/li>\n<li style=\"font-weight: 400;\">How can I assess whether a supplier takes its CRA responsibilities seriously?<\/li>\n<li style=\"font-weight: 400;\">Why might a manufacturer not have this properly in place?<\/li>\n<\/ul>\n<p style=\"font-weight: 400;\"><strong>The bottom line:<\/strong><br \/>\nThe way a system is designed determines the risk, not just whether it functions. This applies to all products with digital components, and in particular to systems that are an integral part of physical security, such as access control.<\/p>\n<h2>Frequently Asked Questions About the Cyber Resilience Act (CRA)<\/h2>\n[et_pb_section global_module=\"365420\"][\/et_pb_section]\n<p><script type=\"application\/ld+json\"><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span>\n{\n  \"@context\": \"https:\/\/schema.org\",\n  \"@type\": \"FAQPage\",\n  \"mainEntity\": [\n    {\n      \"@type\": \"Question\",\n      \"name\": \"Who must comply with the CRA?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"The Cyber Resilience Act primarily targets manufacturers of products with digital elements placed on the EU market.\nThis includes producers of hardware and software, including suppliers of access control systems, controllers, and embedded systems.\nThe formal compliance obligation therefore lies with the manufacturer.\n\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"We do not manufacture anything. Why does this concern us?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"The CRA places the compliance obligation on manufacturers.\nFor your organization, this means that the cybersecurity quality of purchased products is no longer optional. The way a product is designed and maintained directly affects your operational and security risks.\nFor organizations that fall under NIS2, supplier risk is a legal component of the duty of care. For other organizations, this is increasingly becoming part of governance, insurance requirements, and contractual obligations.\n\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"We are not subject to NIS2. Why is this still relevant for us?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"The cybersecurity quality of the products you purchase directly determines your operational risk.\nAn access control system without structured maintenance, a controlled update policy, or with unnecessary network exposure can lead to disruption of business processes, data loss, and reputational damage. When biometric data is processed, this may also have implications under the GDPR.\n\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"How can I assess whether a supplier takes its CRA responsibilities seriously?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Ask for concrete technical substantiation: insight into product architecture, update policy, and vulnerability handling.\nThe CRA responsibility and the associated documentation form the basis for evaluating a product in a substantive manner.\nIf the answer remains vague or consists only of general statements without technical substantiation, the necessary transparency is missing.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"Why might a manufacturer not have this properly in place?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Many digital products were designed years ago within a different technical and regulatory context. Architectures with broad network access, remote management, or limited update control were common at that time.\nIf such systems were not designed from the outset with lifecycle security and controlled update management as core principles, adapting them afterward can be technically complex or costly.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"What does this mean for you as a user?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"If an existing architecture is difficult to adapt, this can affect updates, security improvements, and future support.\nThe technical foundation of a system directly determines how secure and future-proof it is.\n\"\n      }\n    }\n  ]\n}\n<\/script><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The impact of the Cyber Resilience Act is still often underestimated in practice. The questions we are frequently asked: Who must comply with the CRA? We do not manufacture anything. Why does this concern us? We are not subject to NIS2. Why is this still relevant for us? How can I assess whether a supplier [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":365405,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[35],"tags":[],"class_list":["post-365428","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The 5 Most Frequently Asked Questions About the Cyber Resilience Act (CRA) in Biometric Access Control | Recogtech - Biometrische beveiliging<\/title>\n<meta name=\"description\" content=\"Recogtech answers the 5 most frequently asked questions from organizations about the Cyber Resilience Act. The authority in access control.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/recogtech.com\/en\/insights-en\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The 5 Most Frequently Asked Questions About the Cyber Resilience Act (CRA) in Biometric Access Control | Recogtech - Biometrische beveiliging\" \/>\n<meta property=\"og:description\" content=\"Recogtech answers the 5 most frequently asked questions from organizations about the Cyber Resilience Act. The authority in access control.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/recogtech.com\/en\/insights-en\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\/\" \/>\n<meta property=\"og:site_name\" content=\"Recogtech - Biometrische beveiliging\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-30T07:25:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/recogtech.com\/wp-content\/uploads\/2026\/03\/FAQ-CRA.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Justi Veenhof\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Justi Veenhof\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\\\/\"},\"author\":{\"name\":\"Justi Veenhof\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/#\\\/schema\\\/person\\\/aabb0d9a4b473b0a549126d6b30b6735\"},\"headline\":\"The 5 Most Frequently Asked Questions About the Cyber Resilience Act (CRA) in Biometric Access Control\",\"datePublished\":\"2026-03-30T07:25:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\\\/\"},\"wordCount\":141,\"publisher\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/recogtech.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/FAQ-CRA.jpg\",\"articleSection\":[\"Insights\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\\\/\",\"url\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\\\/\",\"name\":\"The 5 Most Frequently Asked Questions About the Cyber Resilience Act (CRA) in Biometric Access Control | Recogtech - Biometrische beveiliging\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/recogtech.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/FAQ-CRA.jpg\",\"datePublished\":\"2026-03-30T07:25:30+00:00\",\"description\":\"Recogtech answers the 5 most frequently asked questions from organizations about the Cyber Resilience Act. The authority in access control.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\\\/#primaryimage\",\"url\":\"https:\\\/\\\/recogtech.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/FAQ-CRA.jpg\",\"contentUrl\":\"https:\\\/\\\/recogtech.com\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/FAQ-CRA.jpg\",\"width\":800,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/recogtech.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The 5 Most Frequently Asked Questions About the Cyber Resilience Act (CRA) in Biometric Access Control\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/recogtech.com\\\/en\\\/\",\"name\":\"Recogtech - Biometrische beveiliging\",\"description\":\"High-end Biometric Security\",\"publisher\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/recogtech.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/#organization\",\"name\":\"Recogtech B.V.\",\"url\":\"https:\\\/\\\/recogtech.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/recogtech.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/recogtech-weblogo-blauw-rood.png\",\"contentUrl\":\"https:\\\/\\\/recogtech.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/recogtech-weblogo-blauw-rood.png\",\"width\":600,\"height\":111,\"caption\":\"Recogtech B.V.\"},\"image\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/#\\\/schema\\\/person\\\/aabb0d9a4b473b0a549126d6b30b6735\",\"name\":\"Justi Veenhof\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c0691fdf289a8540abf11dabefe94b90e1896aef23be8d99b18fbb45ff6d458b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c0691fdf289a8540abf11dabefe94b90e1896aef23be8d99b18fbb45ff6d458b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c0691fdf289a8540abf11dabefe94b90e1896aef23be8d99b18fbb45ff6d458b?s=96&d=mm&r=g\",\"caption\":\"Justi Veenhof\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The 5 Most Frequently Asked Questions About the Cyber Resilience Act (CRA) in Biometric Access Control | Recogtech - Biometrische beveiliging","description":"Recogtech answers the 5 most frequently asked questions from organizations about the Cyber Resilience Act. The authority in access control.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/recogtech.com\/en\/insights-en\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\/","og_locale":"en_US","og_type":"article","og_title":"The 5 Most Frequently Asked Questions About the Cyber Resilience Act (CRA) in Biometric Access Control | Recogtech - Biometrische beveiliging","og_description":"Recogtech answers the 5 most frequently asked questions from organizations about the Cyber Resilience Act. The authority in access control.","og_url":"https:\/\/recogtech.com\/en\/insights-en\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\/","og_site_name":"Recogtech - Biometrische beveiliging","article_published_time":"2026-03-30T07:25:30+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/recogtech.com\/wp-content\/uploads\/2026\/03\/FAQ-CRA.jpg","type":"image\/jpeg"}],"author":"Justi Veenhof","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Justi Veenhof","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/recogtech.com\/en\/insights-en\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\/#article","isPartOf":{"@id":"https:\/\/recogtech.com\/en\/insights-en\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\/"},"author":{"name":"Justi Veenhof","@id":"https:\/\/recogtech.com\/en\/#\/schema\/person\/aabb0d9a4b473b0a549126d6b30b6735"},"headline":"The 5 Most Frequently Asked Questions About the Cyber Resilience Act (CRA) in Biometric Access Control","datePublished":"2026-03-30T07:25:30+00:00","mainEntityOfPage":{"@id":"https:\/\/recogtech.com\/en\/insights-en\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\/"},"wordCount":141,"publisher":{"@id":"https:\/\/recogtech.com\/en\/#organization"},"image":{"@id":"https:\/\/recogtech.com\/en\/insights-en\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\/#primaryimage"},"thumbnailUrl":"https:\/\/recogtech.com\/wp-content\/uploads\/2026\/03\/FAQ-CRA.jpg","articleSection":["Insights"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/recogtech.com\/en\/insights-en\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\/","url":"https:\/\/recogtech.com\/en\/insights-en\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\/","name":"The 5 Most Frequently Asked Questions About the Cyber Resilience Act (CRA) in Biometric Access Control | Recogtech - Biometrische beveiliging","isPartOf":{"@id":"https:\/\/recogtech.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/recogtech.com\/en\/insights-en\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\/#primaryimage"},"image":{"@id":"https:\/\/recogtech.com\/en\/insights-en\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\/#primaryimage"},"thumbnailUrl":"https:\/\/recogtech.com\/wp-content\/uploads\/2026\/03\/FAQ-CRA.jpg","datePublished":"2026-03-30T07:25:30+00:00","description":"Recogtech answers the 5 most frequently asked questions from organizations about the Cyber Resilience Act. The authority in access control.","breadcrumb":{"@id":"https:\/\/recogtech.com\/en\/insights-en\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/recogtech.com\/en\/insights-en\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/recogtech.com\/en\/insights-en\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\/#primaryimage","url":"https:\/\/recogtech.com\/wp-content\/uploads\/2026\/03\/FAQ-CRA.jpg","contentUrl":"https:\/\/recogtech.com\/wp-content\/uploads\/2026\/03\/FAQ-CRA.jpg","width":800,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/recogtech.com\/en\/insights-en\/the-5-most-frequently-asked-questions-about-the-cyber-resilience-act-cra-in-biometric-access-control\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/recogtech.com\/en\/"},{"@type":"ListItem","position":2,"name":"The 5 Most Frequently Asked Questions About the Cyber Resilience Act (CRA) in Biometric Access Control"}]},{"@type":"WebSite","@id":"https:\/\/recogtech.com\/en\/#website","url":"https:\/\/recogtech.com\/en\/","name":"Recogtech - Biometrische beveiliging","description":"High-end Biometric Security","publisher":{"@id":"https:\/\/recogtech.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/recogtech.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/recogtech.com\/en\/#organization","name":"Recogtech B.V.","url":"https:\/\/recogtech.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/recogtech.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/recogtech-weblogo-blauw-rood.png","contentUrl":"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/recogtech-weblogo-blauw-rood.png","width":600,"height":111,"caption":"Recogtech B.V."},"image":{"@id":"https:\/\/recogtech.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/recogtech.com\/en\/#\/schema\/person\/aabb0d9a4b473b0a549126d6b30b6735","name":"Justi Veenhof","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c0691fdf289a8540abf11dabefe94b90e1896aef23be8d99b18fbb45ff6d458b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c0691fdf289a8540abf11dabefe94b90e1896aef23be8d99b18fbb45ff6d458b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c0691fdf289a8540abf11dabefe94b90e1896aef23be8d99b18fbb45ff6d458b?s=96&d=mm&r=g","caption":"Justi Veenhof"}}]}},"_links":{"self":[{"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/posts\/365428","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/comments?post=365428"}],"version-history":[{"count":0,"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/posts\/365428\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/media\/365405"}],"wp:attachment":[{"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/media?parent=365428"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/categories?post=365428"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/tags?post=365428"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}