{"id":3398,"date":"2026-03-30T10:28:27","date_gmt":"2026-03-30T10:28:27","guid":{"rendered":"https:\/\/www.progressive.in\/blog\/?p=3398"},"modified":"2026-04-07T05:03:16","modified_gmt":"2026-04-07T05:03:16","slug":"dpdp-data-breach-notification-guide","status":"publish","type":"post","link":"https:\/\/www.progressive.in\/blog\/dpdp-data-breach-notification-guide\/","title":{"rendered":"Data Breach Notification Under the DPDP Act: The 72-Hour Imperative"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1536\" height=\"865\" src=\"https:\/\/www.progressive.in\/blog\/wp-content\/uploads\/2026\/03\/Data-Breach-Notification-1.webp\" alt=\"Data-Breach-Notification\" class=\"wp-image-3514\" style=\"width:840px\" srcset=\"https:\/\/www.progressive.in\/blog\/wp-content\/uploads\/2026\/03\/Data-Breach-Notification-1.webp 1536w, https:\/\/www.progressive.in\/blog\/wp-content\/uploads\/2026\/03\/Data-Breach-Notification-1-300x169.webp 300w, https:\/\/www.progressive.in\/blog\/wp-content\/uploads\/2026\/03\/Data-Breach-Notification-1-1024x577.webp 1024w, https:\/\/www.progressive.in\/blog\/wp-content\/uploads\/2026\/03\/Data-Breach-Notification-1-768x433.webp 768w\" sizes=\"auto, (max-width: 1536px) 100vw, 1536px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>India\u2019s DPDP Act introduces mandatory data breach notification for the first time in Indian law. Prior to this legislation, there was no clear legal obligation to report data breaches to regulators or affected individuals. The CERT-In reporting requirements existed but were primarily focused on cybersecurity incidents rather than personal data breaches.<\/p>\n\n\n\n<p>Under the new framework, every Data Fiduciary must notify both the Data Protection Board of India and each affected Data Principal when a personal data breach occurs. The obligation is unambiguous: notification must happen without delay. For the detailed report to the DPBI, the deadline is seventy-two hours from becoming aware of the breach.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">What Must Be Communicated<\/h2>\n\n\n\n<p>Notifications to affected Data Principals must include a description of the breach (nature, extent, timing); the consequences likely to arise from the breach; measures the Data Fiduciary has taken or is taking to mitigate risk; safety steps the individual can take to protect their interests; and contact information for a person who can respond to queries.<\/p>\n\n\n\n<p>The communication must be concise, clear, and delivered through the individual\u2019s user account or any registered communication channel. This is not the place for legal jargon or corporate deflection \u2014 the Act demands plain-language transparency.<\/p>\n\n\n\n<p>The report to the DPBI has two stages. The first, immediate notification must describe the breach\u2019s nature, extent, timing, location, and likely impact. The second, due within seventy-two hours, must provide updated details, the circumstances and root cause, mitigation measures, findings about the responsible party, remedial actions, and a report on individual notifications sent.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Building a Breach Response Capability<\/h2>\n\n\n\n<p>Meeting the seventy-two-hour deadline requires preparation. Organisations should establish a cross-functional incident response team with clear roles and escalation paths. Deploy monitoring and detection systems that provide real-time visibility into data access and anomalies. Create pre-approved notification templates that can be quickly customised for specific incidents. Conduct regular breach simulation exercises to test readiness. Maintain comprehensive logs of data access and processing for at least one year, as required by Rule 6. Incident management platforms with automated workflows can streamline the process, enabling bulk notifications to Data Principals and the DPBI through configurable templates. The goal is to turn a chaotic emergency response into a structured, practised process.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>India\u2019s DPDP Act introduces mandatory data breach notification for the first time in Indian law. Prior to this legislation, there was no clear legal obligation to report data breaches to regulators or affected individuals. The CERT-In reporting requirements existed but were primarily focused on cybersecurity incidents rather than personal data breaches. Under the new framework, [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":3546,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[68],"tags":[],"class_list":["post-3398","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-dpdp-act"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DPDP Data Breach Notification Guide<\/title>\n<meta name=\"description\" content=\"Learn DPDP data breach notification rules, 72-hour reporting timeline, and how to respond effectively to personal data breaches.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.progressive.in\/blog\/dpdp-data-breach-notification-guide\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DPDP Data Breach Notification Guide\" \/>\n<meta property=\"og:description\" content=\"Learn DPDP data breach notification rules, 72-hour reporting timeline, and how to respond effectively to personal data breaches.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.progressive.in\/blog\/dpdp-data-breach-notification-guide\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-30T10:28:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-07T05:03:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.progressive.in\/blog\/wp-content\/uploads\/2026\/03\/DPDP-Blog-7.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"865\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Progressive Infotech\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Progressive Infotech\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/dpdp-data-breach-notification-guide\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/dpdp-data-breach-notification-guide\\\/\"},\"author\":{\"name\":\"Progressive Infotech\",\"@id\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/#\\\/schema\\\/person\\\/1f44e0c7f6a0c0adb91bb3a48cd96311\"},\"headline\":\"Data Breach Notification Under the DPDP Act: The 72-Hour Imperative\",\"datePublished\":\"2026-03-30T10:28:27+00:00\",\"dateModified\":\"2026-04-07T05:03:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/dpdp-data-breach-notification-guide\\\/\"},\"wordCount\":378,\"publisher\":{\"@id\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/dpdp-data-breach-notification-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/DPDP-Blog-7.webp\",\"articleSection\":[\"DPDP Act\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/dpdp-data-breach-notification-guide\\\/\",\"url\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/dpdp-data-breach-notification-guide\\\/\",\"name\":\"DPDP Data Breach Notification Guide\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/dpdp-data-breach-notification-guide\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/dpdp-data-breach-notification-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/DPDP-Blog-7.webp\",\"datePublished\":\"2026-03-30T10:28:27+00:00\",\"dateModified\":\"2026-04-07T05:03:16+00:00\",\"description\":\"Learn DPDP data breach notification rules, 72-hour reporting timeline, and how to respond effectively to personal data breaches.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/dpdp-data-breach-notification-guide\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.progressive.in\\\/blog\\\/dpdp-data-breach-notification-guide\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/dpdp-data-breach-notification-guide\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/DPDP-Blog-7.webp\",\"contentUrl\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/DPDP-Blog-7.webp\",\"width\":1536,\"height\":865},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/dpdp-data-breach-notification-guide\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Breach Notification Under the DPDP Act: The 72-Hour Imperative\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/\",\"name\":\"Progressive\",\"description\":\"We serve the digital workplace 24x7\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/#organization\",\"name\":\"Progressive Infotech\",\"url\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Logo.webp\",\"contentUrl\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/02\\\/Logo.webp\",\"width\":1228,\"height\":249,\"caption\":\"Progressive Infotech\"},\"image\":{\"@id\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/#\\\/schema\\\/person\\\/1f44e0c7f6a0c0adb91bb3a48cd96311\",\"name\":\"Progressive Infotech\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3e9c20ca3985249498e847e8a8ad596483150c3601ac8a4790d736cad29b9025?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3e9c20ca3985249498e847e8a8ad596483150c3601ac8a4790d736cad29b9025?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3e9c20ca3985249498e847e8a8ad596483150c3601ac8a4790d736cad29b9025?s=96&d=mm&r=g\",\"caption\":\"Progressive Infotech\"},\"sameAs\":[\"https:\\\/\\\/www.progressive.in\\\/blog\"],\"url\":\"https:\\\/\\\/www.progressive.in\\\/blog\\\/author\\\/progressive-infotech\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DPDP Data Breach Notification Guide","description":"Learn DPDP data breach notification rules, 72-hour reporting timeline, and how to respond effectively to personal data breaches.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.progressive.in\/blog\/dpdp-data-breach-notification-guide\/","og_locale":"en_US","og_type":"article","og_title":"DPDP Data Breach Notification Guide","og_description":"Learn DPDP data breach notification rules, 72-hour reporting timeline, and how to respond effectively to personal data breaches.","og_url":"https:\/\/www.progressive.in\/blog\/dpdp-data-breach-notification-guide\/","article_published_time":"2026-03-30T10:28:27+00:00","article_modified_time":"2026-04-07T05:03:16+00:00","og_image":[{"width":1536,"height":865,"url":"https:\/\/www.progressive.in\/blog\/wp-content\/uploads\/2026\/03\/DPDP-Blog-7.webp","type":"image\/webp"}],"author":"Progressive Infotech","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Progressive Infotech","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.progressive.in\/blog\/dpdp-data-breach-notification-guide\/#article","isPartOf":{"@id":"https:\/\/www.progressive.in\/blog\/dpdp-data-breach-notification-guide\/"},"author":{"name":"Progressive Infotech","@id":"https:\/\/www.progressive.in\/blog\/#\/schema\/person\/1f44e0c7f6a0c0adb91bb3a48cd96311"},"headline":"Data Breach Notification Under the DPDP Act: The 72-Hour Imperative","datePublished":"2026-03-30T10:28:27+00:00","dateModified":"2026-04-07T05:03:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.progressive.in\/blog\/dpdp-data-breach-notification-guide\/"},"wordCount":378,"publisher":{"@id":"https:\/\/www.progressive.in\/blog\/#organization"},"image":{"@id":"https:\/\/www.progressive.in\/blog\/dpdp-data-breach-notification-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/www.progressive.in\/blog\/wp-content\/uploads\/2026\/03\/DPDP-Blog-7.webp","articleSection":["DPDP Act"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.progressive.in\/blog\/dpdp-data-breach-notification-guide\/","url":"https:\/\/www.progressive.in\/blog\/dpdp-data-breach-notification-guide\/","name":"DPDP Data Breach Notification Guide","isPartOf":{"@id":"https:\/\/www.progressive.in\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.progressive.in\/blog\/dpdp-data-breach-notification-guide\/#primaryimage"},"image":{"@id":"https:\/\/www.progressive.in\/blog\/dpdp-data-breach-notification-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/www.progressive.in\/blog\/wp-content\/uploads\/2026\/03\/DPDP-Blog-7.webp","datePublished":"2026-03-30T10:28:27+00:00","dateModified":"2026-04-07T05:03:16+00:00","description":"Learn DPDP data breach notification rules, 72-hour reporting timeline, and how to respond effectively to personal data breaches.","breadcrumb":{"@id":"https:\/\/www.progressive.in\/blog\/dpdp-data-breach-notification-guide\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.progressive.in\/blog\/dpdp-data-breach-notification-guide\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.progressive.in\/blog\/dpdp-data-breach-notification-guide\/#primaryimage","url":"https:\/\/www.progressive.in\/blog\/wp-content\/uploads\/2026\/03\/DPDP-Blog-7.webp","contentUrl":"https:\/\/www.progressive.in\/blog\/wp-content\/uploads\/2026\/03\/DPDP-Blog-7.webp","width":1536,"height":865},{"@type":"BreadcrumbList","@id":"https:\/\/www.progressive.in\/blog\/dpdp-data-breach-notification-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.progressive.in\/blog\/"},{"@type":"ListItem","position":2,"name":"Data Breach Notification Under the DPDP Act: The 72-Hour Imperative"}]},{"@type":"WebSite","@id":"https:\/\/www.progressive.in\/blog\/#website","url":"https:\/\/www.progressive.in\/blog\/","name":"Progressive","description":"We serve the digital workplace 24x7","publisher":{"@id":"https:\/\/www.progressive.in\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.progressive.in\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.progressive.in\/blog\/#organization","name":"Progressive Infotech","url":"https:\/\/www.progressive.in\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.progressive.in\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.progressive.in\/blog\/wp-content\/uploads\/2026\/02\/Logo.webp","contentUrl":"https:\/\/www.progressive.in\/blog\/wp-content\/uploads\/2026\/02\/Logo.webp","width":1228,"height":249,"caption":"Progressive Infotech"},"image":{"@id":"https:\/\/www.progressive.in\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.progressive.in\/blog\/#\/schema\/person\/1f44e0c7f6a0c0adb91bb3a48cd96311","name":"Progressive Infotech","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3e9c20ca3985249498e847e8a8ad596483150c3601ac8a4790d736cad29b9025?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3e9c20ca3985249498e847e8a8ad596483150c3601ac8a4790d736cad29b9025?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3e9c20ca3985249498e847e8a8ad596483150c3601ac8a4790d736cad29b9025?s=96&d=mm&r=g","caption":"Progressive Infotech"},"sameAs":["https:\/\/www.progressive.in\/blog"],"url":"https:\/\/www.progressive.in\/blog\/author\/progressive-infotech\/"}]}},"_links":{"self":[{"href":"https:\/\/www.progressive.in\/blog\/wp-json\/wp\/v2\/posts\/3398","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.progressive.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.progressive.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.progressive.in\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.progressive.in\/blog\/wp-json\/wp\/v2\/comments?post=3398"}],"version-history":[{"count":6,"href":"https:\/\/www.progressive.in\/blog\/wp-json\/wp\/v2\/posts\/3398\/revisions"}],"predecessor-version":[{"id":3531,"href":"https:\/\/www.progressive.in\/blog\/wp-json\/wp\/v2\/posts\/3398\/revisions\/3531"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.progressive.in\/blog\/wp-json\/wp\/v2\/media\/3546"}],"wp:attachment":[{"href":"https:\/\/www.progressive.in\/blog\/wp-json\/wp\/v2\/media?parent=3398"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.progressive.in\/blog\/wp-json\/wp\/v2\/categories?post=3398"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.progressive.in\/blog\/wp-json\/wp\/v2\/tags?post=3398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}