{"id":11478,"date":"2025-10-28T20:10:23","date_gmt":"2025-10-28T09:10:23","guid":{"rendered":"https:\/\/insight.thomsonreuters.com.au\/legal\/?p=11478"},"modified":"2025-11-14T11:28:55","modified_gmt":"2025-11-14T00:28:55","slug":"operational-security-for-mid-sized-law-firms","status":"publish","type":"post","link":"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/operational-security-for-mid-sized-law-firms","title":{"rendered":"Operational Security for Mid-Sized Law Firms"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Why Local Processing Matters More Than Ever<\/h3>\n\n\n\n<p>In the <a href=\"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/the-roi-of-legal-tech-ai\">ROI of Legal Tech &amp; AI report<\/a> released earlier this year, when law firms were asked what their top priorities were for the next 12 months, 65% reported accelerating digital transformation, but a close second at 63% was enhancing cyber security resilience and data protections.<br><br>However, when quizzed on the most significant challenges they face, 68% reported keeping up with client shifting expectations on legal services should be provided and 61% reported competition from alternative legal service providers.<br><br>As law firms further digitise their operations, operational security becomes a growing, and increasingly important concern for organisations while they battle to stay competitive.<br><br>Mid-sized law firms face a unique operational security challenge. They&#8217;re too large to rely on basic security measures, yet too small to employ dedicated teams. This can create a dangerous vulnerability gap where not only is sensitive client data, privileged communications, and confidential business information at risk, but so too is safeguarding your organisation\u2019s IP.<br><br>Recent data breaches across the legal sector have made one thing clear: operational security isn&#8217;t just an IT concern \u2013 it&#8217;s a business, and reputational, survival issue. When any business suffers a breach, the consequences extend far beyond immediate financial losses to include regulatory penalties, professional liability claims, and irreparable damage to client trust and brand reputation. When it\u2019s a law firm, these impacts are heightened.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Critical Elements of Legal Operational Security<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Data Residency and Control<\/h3>\n\n\n\n<p>The foundation of operational security begins with knowing exactly where your data resides and who has access to it. For legal professionals, this means ensuring client information never leaves controlled environments and remains subject to Australian privacy laws and professional privilege protections. Data residency isn&#8217;t just about compliance \u2013 it&#8217;s about maintaining the fundamental trust relationship between lawyer and client.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Access Control and Authentication<\/h3>\n\n\n\n<p>Mid-sized firms require secure authentication that balances robust protection with ease of use. Implementing Single Sign-On (SSO) or Direct Logins with embedded Multi-Factor Authentication (MFA) enables role-based access controls, ensuring only authorised personnel can access specific client matters. This approach supports regulatory compliance and traceability, while avoiding the complexity that often leads to insecure workarounds.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Encryption and Data Protection<\/h3>\n\n\n\n<p>Legal data must be protected both in transit and at rest using industry-standard encryption. However, encryption alone isn&#8217;t sufficient; firms need comprehensive data protection strategies that include secure backup procedures, version control, and automatic redaction of sensitive information during processing.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Compliance and Regulatory Alignment<\/h3>\n\n\n\n<p>Australian law firms operate under strict professional standards and privacy regulations. Operational security frameworks must align with these requirements while ensuring transparency and traceability to support regulatory review. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Incident Response and Business Continuity<\/h3>\n\n\n\n<p>When incidents occur, mid-sized firms need established response capabilities and clear recovery procedures. This requires not just technical solutions but also staff training, communication protocols, and partnerships with security experts who understand the legal sector.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The AI Security Challenge<\/h3>\n\n\n\n<p>The rise of AI in legal practice has introduced new operational security complexities. Many AI solutions process data through overseas servers or use client information to train their models \u2013 practices that violate the fundamental principles of client confidentiality and professional privilege.<br><br>Generic AI tools pose particular risks for legal professionals. When law firms use consumer-grade AI services, they often unknowingly expose confidential information to third-party training algorithms, create data residency issues, and lose control over how sensitive information is processed and stored.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">CoCounsel&#8217;s Australian Processing Advantage<\/h2>\n\n\n\n<p>Thomson Reuters <a href=\"https:\/\/www.thomsonreuters.com.au\/en-au\/products\/cocounsel.html\">CoCounsel <\/a>addresses these operational security challenges through local AI processing by LLMs, that keeps sensitive information within Australian borders and under Australian legal protections.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Local Hosting<\/h3>\n\n\n\n<p>CoCounsel is hosted in Australia, ensuring that client data stays in the country and remains subject to Australian privacy laws. This approach to data residency means mid-sized firms can confidently use CoCounsel\u2019s AI capabilities while maintaining full compliance with professional obligations and regulatory requirements.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Zero Training Policy<\/h3>\n\n\n\n<p>Unlike consumer-grade AI services, CoCounsel never uses client data to train its Large Language Models (LLMs). This commitment means that confidential information remains confidential, and firms can leverage AI capabilities without compromising professional privilege or client trust.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Enterprise-Grade Security Controls<\/h3>\n\n\n\n<p>CoCounsel implements comprehensive security measures including end-to-end encryption, role-based access controls, and transparency and traceability. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Professional Standards Compliance<\/h3>\n\n\n\n<p>Built specifically for legal professionals, CoCounsel&#8217;s security framework aligns with Australian legal industry standards and professional obligations. This includes automated compliance monitoring, transparency and traceability, and built-in safeguards that protect attorney-client privilege.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Certified so you know you can trust it<\/h3>\n\n\n\n<p>CoCounsel was one of the first generative AI systems in the professional services space to achieve <a href=\"https:\/\/www.thomsonreuters.com\/en-us\/posts\/innovation\/cocounsel-achieves-iso-iec-420012023-certification-another-milestone-in-trusted-ai\/\">ISO\/IEC 42001:2023 Certification<\/a>. This achievement reflects our commitment to ethics, transparency and accountability in AI so you can feel assured that security of your, and your clients, data is safe. CoCounsel is also ISO\/IEC 27001:2022 certified.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Competitive Advantage of Secure AI<\/h2>\n\n\n\n<p>For mid-sized law firms, operational security is about risk mitigation, but it&#8217;s also about competitive advantage. Firms that can demonstrate robust security frameworks and responsible AI usage are better positioned to win complex clients, handle highly sensitive matters, and be one a level playing field with larger firms.<br><br>CoCounsel&#8217;s Australian processing enables mid-sized firms to offer clients the efficiency benefits of AI while maintaining the security standards they expect from their legal advisors. In an environment where security breaches can end careers and close firms \u2013 operational security has become one of the foundations upon which successful legal practices are built. CoCounsel\u2019s local Australian AI processing by LLMs empowers mid-sized firms to confidently embrace an AI-powered future, ensuring sensitive legal data remains within Australian borders and under local legal protections.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Why Local Processing Matters More Than Ever In the ROI of Legal Tech &amp; AI report released earlier this year, when law firms were asked what their top priorities were&hellip;<\/p>\n","protected":false},"author":425,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[576,644,602],"tags":[],"insight_job_role":[1475,1560,1476,1477,607],"insight_practice_area":[],"class_list":["entry","author-clydenetto","post-11478","post","type-post","status-publish","format-standard","category-business-management","category-data-security","category-innovation-and-technology","insight_job_role-chief-information-officer","insight_job_role-chief-operations-officer","insight_job_role-chief-risk-officer","insight_job_role-compliance-risk-manager","insight_job_role-legal-operations-manager","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Operational Security for Mid-Sized Law Firms - TR - Legal Insight Australia<\/title>\n<meta name=\"description\" content=\"As law firms further digitise their operations, operational security becomes a growing, and increasingly important concern for organisations while they battle to stay competitive. Local data processing is an important part of keeping their, and their clients, data safe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/operational-security-for-mid-sized-law-firms\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Operational Security for Mid-Sized Law Firms - TR - Legal Insight Australia\" \/>\n<meta property=\"og:description\" content=\"As law firms further digitise their operations, operational security becomes a growing, and increasingly important concern for organisations while they battle to stay competitive. Local data processing is an important part of keeping their, and their clients, data safe.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/operational-security-for-mid-sized-law-firms\" \/>\n<meta property=\"og:site_name\" content=\"TR - Legal Insight Australia\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-28T09:10:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-14T00:28:55+00:00\" \/>\n<meta name=\"author\" content=\"Clyde Netto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Clyde Netto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/operational-security-for-mid-sized-law-firms#article\",\"isPartOf\":{\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/operational-security-for-mid-sized-law-firms\"},\"author\":{\"name\":\"Clyde Netto\",\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/#\/schema\/person\/b2709ebe5f832f44fc5fd53954b3a5f1\"},\"headline\":\"Operational Security for Mid-Sized Law Firms\",\"datePublished\":\"2025-10-28T09:10:23+00:00\",\"dateModified\":\"2025-11-14T00:28:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/operational-security-for-mid-sized-law-firms\"},\"wordCount\":941,\"articleSection\":[\"Business Management\",\"Data Security\",\"Innovation and Technology\"],\"inLanguage\":\"en-AU\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/operational-security-for-mid-sized-law-firms\",\"url\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/operational-security-for-mid-sized-law-firms\",\"name\":\"Operational Security for Mid-Sized Law Firms - TR - Legal Insight Australia\",\"isPartOf\":{\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/#website\"},\"datePublished\":\"2025-10-28T09:10:23+00:00\",\"dateModified\":\"2025-11-14T00:28:55+00:00\",\"author\":{\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/#\/schema\/person\/b2709ebe5f832f44fc5fd53954b3a5f1\"},\"description\":\"As law firms further digitise their operations, operational security becomes a growing, and increasingly important concern for organisations while they battle to stay competitive. Local data processing is an important part of keeping their, and their clients, data safe.\",\"breadcrumb\":{\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/operational-security-for-mid-sized-law-firms#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/operational-security-for-mid-sized-law-firms\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/operational-security-for-mid-sized-law-firms#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Operational Security for Mid-Sized Law Firms\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/#website\",\"url\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/\",\"name\":\"TR - Legal Insight Australia\",\"description\":\"Just another Legal Hub site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-AU\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/#\/schema\/person\/b2709ebe5f832f44fc5fd53954b3a5f1\",\"name\":\"Clyde Netto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"caption\":\"Clyde Netto\"},\"description\":\"Clyde Netto is the Regional Head of Technology and Cyber Security for Asia and Emerging Markets at Thomson Reuters. With over 25 years of experience, Clyde has held diverse leadership roles spanning Software Development, Engineering, Cyber Security, Governance, Compliance, and Strategic Technology Management. A Certified Information Systems Security Professional (CISSP) and a Certified Cyber Security Professional recognised by the Australian Computer Society, Clyde is committed to building and securing intelligent systems that streamline complex legal and tax workflows, driving operational efficiency across these sectors. Before joining Thomson Reuters, Clyde spent a significant portion of his career within the in-house IT team of a major Australian law firm, gaining deep insight into the intersection of technology, security, and legal practice. Clyde is an active contributor to the cyber security community. He serves as a Governing Body Member of the Melbourne CIO\/CISO Community at Gartner C-Level Communities and participates in the CREST Leaders Forum in Australia. As a public speaker, panellist, and thought leader, Clyde is passionate about advancing the field of cyber security and fostering collaboration across industries.\",\"url\":\"https:\/\/insight.thomsonreuters.com.au\/legal\/contributors\/clydenetto\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Operational Security for Mid-Sized Law Firms - TR - Legal Insight Australia","description":"As law firms further digitise their operations, operational security becomes a growing, and increasingly important concern for organisations while they battle to stay competitive. Local data processing is an important part of keeping their, and their clients, data safe.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/operational-security-for-mid-sized-law-firms","og_locale":"en_US","og_type":"article","og_title":"Operational Security for Mid-Sized Law Firms - TR - Legal Insight Australia","og_description":"As law firms further digitise their operations, operational security becomes a growing, and increasingly important concern for organisations while they battle to stay competitive. Local data processing is an important part of keeping their, and their clients, data safe.","og_url":"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/operational-security-for-mid-sized-law-firms","og_site_name":"TR - Legal Insight Australia","article_published_time":"2025-10-28T09:10:23+00:00","article_modified_time":"2025-11-14T00:28:55+00:00","author":"Clyde Netto","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Clyde Netto","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/operational-security-for-mid-sized-law-firms#article","isPartOf":{"@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/operational-security-for-mid-sized-law-firms"},"author":{"name":"Clyde Netto","@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/#\/schema\/person\/b2709ebe5f832f44fc5fd53954b3a5f1"},"headline":"Operational Security for Mid-Sized Law Firms","datePublished":"2025-10-28T09:10:23+00:00","dateModified":"2025-11-14T00:28:55+00:00","mainEntityOfPage":{"@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/operational-security-for-mid-sized-law-firms"},"wordCount":941,"articleSection":["Business Management","Data Security","Innovation and Technology"],"inLanguage":"en-AU"},{"@type":"WebPage","@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/operational-security-for-mid-sized-law-firms","url":"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/operational-security-for-mid-sized-law-firms","name":"Operational Security for Mid-Sized Law Firms - TR - Legal Insight Australia","isPartOf":{"@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/#website"},"datePublished":"2025-10-28T09:10:23+00:00","dateModified":"2025-11-14T00:28:55+00:00","author":{"@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/#\/schema\/person\/b2709ebe5f832f44fc5fd53954b3a5f1"},"description":"As law firms further digitise their operations, operational security becomes a growing, and increasingly important concern for organisations while they battle to stay competitive. Local data processing is an important part of keeping their, and their clients, data safe.","breadcrumb":{"@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/operational-security-for-mid-sized-law-firms#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/operational-security-for-mid-sized-law-firms"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/operational-security-for-mid-sized-law-firms#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insight.thomsonreuters.com.au\/legal\/"},{"@type":"ListItem","position":2,"name":"Operational Security for Mid-Sized Law Firms"}]},{"@type":"WebSite","@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/#website","url":"https:\/\/insight.thomsonreuters.com.au\/legal\/","name":"TR - Legal Insight Australia","description":"Just another Legal Hub site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insight.thomsonreuters.com.au\/legal\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"},{"@type":"Person","@id":"https:\/\/insight.thomsonreuters.com.au\/legal\/#\/schema\/person\/b2709ebe5f832f44fc5fd53954b3a5f1","name":"Clyde Netto","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","caption":"Clyde Netto"},"description":"Clyde Netto is the Regional Head of Technology and Cyber Security for Asia and Emerging Markets at Thomson Reuters. With over 25 years of experience, Clyde has held diverse leadership roles spanning Software Development, Engineering, Cyber Security, Governance, Compliance, and Strategic Technology Management. A Certified Information Systems Security Professional (CISSP) and a Certified Cyber Security Professional recognised by the Australian Computer Society, Clyde is committed to building and securing intelligent systems that streamline complex legal and tax workflows, driving operational efficiency across these sectors. Before joining Thomson Reuters, Clyde spent a significant portion of his career within the in-house IT team of a major Australian law firm, gaining deep insight into the intersection of technology, security, and legal practice. Clyde is an active contributor to the cyber security community. He serves as a Governing Body Member of the Melbourne CIO\/CISO Community at Gartner C-Level Communities and participates in the CREST Leaders Forum in Australia. As a public speaker, panellist, and thought leader, Clyde is passionate about advancing the field of cyber security and fostering collaboration across industries.","url":"https:\/\/insight.thomsonreuters.com.au\/legal\/contributors\/clydenetto"}]}},"_links":{"self":[{"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/posts\/11478","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/users\/425"}],"replies":[{"embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/comments?post=11478"}],"version-history":[{"count":0,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/posts\/11478\/revisions"}],"wp:attachment":[{"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/media?parent=11478"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/categories?post=11478"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/tags?post=11478"},{"taxonomy":"insight_job_role","embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/insight_job_role?post=11478"},{"taxonomy":"insight_practice_area","embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/legal\/wp-json\/wp\/v2\/insight_practice_area?post=11478"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}