{"id":42816,"date":"2020-07-22T23:46:59","date_gmt":"2020-07-22T23:46:59","guid":{"rendered":"https:\/\/www.ringcentral.com\/blog\/?p=34966"},"modified":"2024-10-08T22:45:42","modified_gmt":"2024-10-09T05:45:42","slug":"privacy-by-design-what-is-it-and-how-can-it-make-your-communications-more-secure","status":"publish","type":"post","link":"\/us\/en\/blog\/privacy-by-design-what-is-it-and-how-can-it-make-your-communications-more-secure\/","title":{"rendered":"Privacy by Design: What Is It and How Can It Make Your Communications More Secure?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">It\u2019s been said that security is only as strong as its weakest link.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With so much technological advancement, particularly in the cloud, security and data privacy routinely top lists of CIO concerns every year. With each new cloud app they add, companies rely on the prowess of that cloud provider to maintain strong security and protect valuable data, because data security incidents can result in significant business impacts.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Fortunately, many cloud providers continually invest in their security and privacy measures. In fact, recent Gartner research indicates that cloud providers aren\u2019t the biggest threat to security, by far. Gartner says 95% of <\/span><a href=\"https:\/\/www.gartner.com\/smarterwithgartner\/is-the-cloud-secure\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">cloud security failures<\/span><\/a><span style=\"font-weight: 400;\"> are caused by users rather than providers.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Of course, that doesn\u2019t mean cloud vendors are in the clear. Maintaining world-class security remains a labor-intensive process for any provider that takes security seriously. Doing so requires a constant process of evaluating both technical risks and market needs, and reflecting them in a provider\u2019s security capabilities. It also requires strong methodologies. One of those methodologies is called \u201cprivacy by design,\u201d a set of principles for designing high privacy standards into products. Partnering with cloud providers that use privacy-by-design philosophies makes sense to ensure that data and user privacy considerations are systematically considered throughout the products that your organization adopts.<\/span><\/p>\n<h2><strong>The integral parts of privacy by design<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">Privacy by design makes privacy a key foundation of the entire product development process. Privacy by design incorporates seven key principles:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Proactive vs. reactive: rather than wait for privacy issues to appear and then react, privacy by design evaluates the landscape and anticipates<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Privacy as the default setting: privacy shouldn\u2019t require a user to enable it. Data and user privacy should be protected by default<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Privacy embedded into design: rather than building add-on privacy features, these elements get embedded into the core of products<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Full functionality: increased privacy doesn\u2019t need to come at the expense of other product capabilities. Make privacy positive-sum instead of zero-sum.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">End-to-end security: privacy is protected, in part, by security embedded into the design of the <\/span><i><span style=\"font-weight: 400;\">entire<\/span><\/i><span style=\"font-weight: 400;\"> product, not just portions of it<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Visibility and transparency: data collection, data use, data sharing, and privacy measures, should be transparent to users and easy to understand<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Respect for user privacy: product behaviors need to be driven with the end-user\u2019s privacy in mind.<\/span><\/li>\n<\/ul>\n<h2><strong>Why is privacy by design important?<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">When considering cloud partners, working with providers who use privacy-by-design principles can be an important difference maker in the decision-making process for several reasons:<\/span><\/p>\n<h3><strong>Best practices<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">At its most basic level, privacy by design delivers a universal set of best practices that incorporates feedback from experts. Best practices often result in consistently stronger products.<\/span><\/p>\n<h3><strong>Identifying problem areas<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">An offshoot of adhering to privacy-by-design philosophies is that it makes it easier for providers to identify issues in data protection.<\/span><\/p>\n<h3><strong>Culture<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">A provider that uses privacy-by-design standards has likely developed a strong security and privacy culture that permeates all aspects of its product lifecycle.<\/span><\/p>\n<h2><strong>The benefits of privacy by design<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">Privacy-by-design philosophies provide several benefits for providers, companies, and end-users. Among them:<\/span><\/p>\n<h3><strong>Compliance<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Many security regulations, such as the General Data Protection Regulation, can require privacy measures. Privacy-by-design principles are an important part of achieving the goals of these regulations. In addition, following privacy-by-design concepts can help productions stay ahead of the regulatory curve. By using privacy by design and integrating tools like <a href=\"https:\/\/usercentrics.com\/knowledge-hub\/consent-management-platforms\/\">consent management platforms<\/a>, a company is more likely to comply with current and future regulations.<\/span><\/p>\n<h3><strong>Better sleep<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">While nothing can prevent every data breach, strong practices like privacy by design can reduce the associated stress of data privacy.\u00a0<\/span><\/p>\n<h2>RingCentral and privacy by design<\/h2>\n<p><span style=\"font-weight: 400;\">RingCentral uses privacy by design as a core element of systems engineering. Communications data has become the lifeblood of many organizations, a fact that RingCentral takes very seriously. The RingCentral <\/span><a href=\"https:\/\/netstorage.ringcentral.com\/documents\/cloud_communications_security.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">security culture<\/span><\/a><span style=\"font-weight: 400;\"> also goes beyond just privacy by design. \u201cYou also have things like data handling controls,\u201d says Michael Machado, RingCentral\u2019s assistant vice president of cybersecurity and compliance. \u201cThese are important concepts for us. Where and to whom am I communicating? Where am I communicating from? Where are my messages and recordings of my communications stored? What are the product\u2019s default settings?\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">RingCentral takes customer <\/span><a href=\"https:\/\/www.ringcentral.com\/legal\/last-update-October-15-2019\/privacy-notice.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">data privacy<\/span><\/a><span style=\"font-weight: 400;\"> very seriously, Machado says. \u201cWe don&#8217;t do any content-based targeting,\u201d he says. \u201cIt&#8217;s important to us that our customers know that&#8217;s one of our principles as well.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For more information on privacy by design and <\/span><a href=\"https:\/\/www.ringcentral.com\/trust-center.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">RingCentral\u2019s approach<\/span><\/a><span style=\"font-weight: 400;\">, listen to <\/span><a href=\"https:\/\/go.ringcentral.com\/privacy-by-design-principles-in-communications-webinar-registration.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Michael Machado\u2019s recent webinar<\/span><\/a><span style=\"font-weight: 400;\"> on the topic.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s been said that security is only as strong as its weakest link. With so much technological advancement, particularly in the cloud, security and data privacy routinely top lists of CIO concerns every year. With each new cloud app they add, companies rely on the prowess of that cloud provider to maintain strong security and &#8230;<\/p>\n","protected":false},"author":29,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18390,18391],"tags":[11256,2561,18408,1639,18410],"class_list":["post-42816","post","type-post","status-publish","format-standard","hentry","category-communication-and-collaboration","category-it-leadership","tag-cloud-communications-security","tag-cloud-security","tag-collaboration-apps-security","tag-ringcentral-security","tag-unified-communications-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v19.3 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Privacy by Design: What Is It and How Can It Make Your Communications More Secure? | RingCentral Blog<\/title>\n<meta name=\"description\" content=\"What is privacy by design and how can we better cloud security for businesses?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/privacy-by-design-what-is-it-and-how-can-it-make-your-communications-more-secure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy by Design: What Is It and How Can It Make Your Communications More Secure?\" \/>\n<meta property=\"og:description\" content=\"What is privacy by design and how can we better cloud security for businesses?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/privacy-by-design-what-is-it-and-how-can-it-make-your-communications-more-secure\/\" \/>\n<meta property=\"og:site_name\" content=\"RingCentral Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ringcentral\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-22T23:46:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-09T05:45:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2020\/08\/web_home_HOME_def.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"RingCentral Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:site\" content=\"@ringcentral\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"RingCentral Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/privacy-by-design-what-is-it-and-how-can-it-make-your-communications-more-secure\/#article\",\"isPartOf\":{\"@id\":\"\/us\/en\/blog\/privacy-by-design-what-is-it-and-how-can-it-make-your-communications-more-secure\/\"},\"author\":{\"name\":\"RingCentral Team\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358\"},\"headline\":\"Privacy by Design: What Is It and How Can It Make Your Communications More Secure?\",\"datePublished\":\"2020-07-22T23:46:59+00:00\",\"dateModified\":\"2024-10-09T05:45:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"\/us\/en\/blog\/privacy-by-design-what-is-it-and-how-can-it-make-your-communications-more-secure\/\"},\"wordCount\":773,\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"keywords\":[\"cloud communications security\",\"cloud security\",\"collaboration apps security\",\"RingCentral security\",\"unified communications security\"],\"articleSection\":[\"Communication &amp; collaboration\",\"IT leadership\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"\/us\/en\/blog\/privacy-by-design-what-is-it-and-how-can-it-make-your-communications-more-secure\/\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/privacy-by-design-what-is-it-and-how-can-it-make-your-communications-more-secure\/\",\"name\":\"Privacy by Design: What Is It and How Can It Make Your Communications More Secure? | RingCentral Blog\",\"isPartOf\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\"},\"datePublished\":\"2020-07-22T23:46:59+00:00\",\"dateModified\":\"2024-10-09T05:45:42+00:00\",\"description\":\"What is privacy by design and how can we better cloud security for businesses?\",\"breadcrumb\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/privacy-by-design-what-is-it-and-how-can-it-make-your-communications-more-secure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/privacy-by-design-what-is-it-and-how-can-it-make-your-communications-more-secure\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/privacy-by-design-what-is-it-and-how-can-it-make-your-communications-more-secure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"\/us\/en\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy by Design: What Is It and How Can It Make Your Communications More Secure?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"name\":\"RingCentral Blog\",\"description\":\"Intelligent Communications\",\"publisher\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization\",\"name\":\"RingCentral\",\"url\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"contentUrl\":\"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png\",\"width\":2048,\"height\":309,\"caption\":\"RingCentral\"},\"image\":{\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ringcentral\",\"https:\/\/x.com\/ringcentral\",\"https:\/\/www.linkedin.com\/company\/ringcentral\/\",\"https:\/\/www.instagram.com\/ringcentral\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358\",\"name\":\"RingCentral Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\",\"caption\":\"RingCentral Team\"},\"sameAs\":[\"https:\/\/www.ringcentral.com\"],\"url\":\"\/us\/en\/blog\/author\/ringcentral-team\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Privacy by Design: What Is It and How Can It Make Your Communications More Secure? | RingCentral Blog","description":"What is privacy by design and how can we better cloud security for businesses?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ringcentral.com\/us\/en\/blog\/privacy-by-design-what-is-it-and-how-can-it-make-your-communications-more-secure\/","og_locale":"en_US","og_type":"article","og_title":"Privacy by Design: What Is It and How Can It Make Your Communications More Secure?","og_description":"What is privacy by design and how can we better cloud security for businesses?","og_url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/privacy-by-design-what-is-it-and-how-can-it-make-your-communications-more-secure\/","og_site_name":"RingCentral Blog","article_publisher":"https:\/\/www.facebook.com\/ringcentral","article_published_time":"2020-07-22T23:46:59+00:00","article_modified_time":"2024-10-09T05:45:42+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/uploads\/2020\/08\/web_home_HOME_def.png","type":"image\/png"}],"author":"RingCentral Team","twitter_card":"summary_large_image","twitter_creator":"@ringcentral","twitter_site":"@ringcentral","twitter_misc":{"Written by":"RingCentral Team","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/privacy-by-design-what-is-it-and-how-can-it-make-your-communications-more-secure\/#article","isPartOf":{"@id":"\/us\/en\/blog\/privacy-by-design-what-is-it-and-how-can-it-make-your-communications-more-secure\/"},"author":{"name":"RingCentral Team","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358"},"headline":"Privacy by Design: What Is It and How Can It Make Your Communications More Secure?","datePublished":"2020-07-22T23:46:59+00:00","dateModified":"2024-10-09T05:45:42+00:00","mainEntityOfPage":{"@id":"\/us\/en\/blog\/privacy-by-design-what-is-it-and-how-can-it-make-your-communications-more-secure\/"},"wordCount":773,"publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"keywords":["cloud communications security","cloud security","collaboration apps security","RingCentral security","unified communications security"],"articleSection":["Communication &amp; collaboration","IT leadership"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"\/us\/en\/blog\/privacy-by-design-what-is-it-and-how-can-it-make-your-communications-more-secure\/","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/privacy-by-design-what-is-it-and-how-can-it-make-your-communications-more-secure\/","name":"Privacy by Design: What Is It and How Can It Make Your Communications More Secure? | RingCentral Blog","isPartOf":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website"},"datePublished":"2020-07-22T23:46:59+00:00","dateModified":"2024-10-09T05:45:42+00:00","description":"What is privacy by design and how can we better cloud security for businesses?","breadcrumb":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/privacy-by-design-what-is-it-and-how-can-it-make-your-communications-more-secure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/privacy-by-design-what-is-it-and-how-can-it-make-your-communications-more-secure\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/privacy-by-design-what-is-it-and-how-can-it-make-your-communications-more-secure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"\/us\/en\/blog\/"},{"@type":"ListItem","position":2,"name":"Privacy by Design: What Is It and How Can It Make Your Communications More Secure?"}]},{"@type":"WebSite","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#website","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","name":"RingCentral Blog","description":"Intelligent Communications","publisher":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#organization","name":"RingCentral","url":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/","url":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","contentUrl":"\/us\/en\/blog\/wp-content\/uploads\/2025\/04\/ringcentral-logo.png","width":2048,"height":309,"caption":"RingCentral"},"image":{"@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ringcentral","https:\/\/x.com\/ringcentral","https:\/\/www.linkedin.com\/company\/ringcentral\/","https:\/\/www.instagram.com\/ringcentral"]},{"@type":"Person","@id":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/#\/schema\/person\/65a168321317ffd562e0d77745f1b358","name":"RingCentral Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g","caption":"RingCentral Team"},"sameAs":["https:\/\/www.ringcentral.com"],"url":"\/us\/en\/blog\/author\/ringcentral-team\/"}]}},"rc_img_url":"https:\/\/www.ringcentral.com\/us\/en\/blog\/wp-content\/themes\/ringcentral\/assets\/images\/imgSample.jpg","rcblog_by_author":"<a href=\"\/us\/en\/blog\/author\/ringcentral-team\/amp\" data-dl-events-click=\"true\" data-dl-element=\"link\"><span class=\"image\"><img src=\"https:\/\/secure.gravatar.com\/avatar\/9a8d989fa7e72af5bd5cf487cf7080318b695de4be89de382c5e64305dd0249c?s=96&d=mm&r=g\" alt=\"\" width=\"30\" height=\"30\" layout=\"fixed\"><\/img><\/span><span class=\"by-author-name\">RingCentral Team<\/span><\/a>","rc_author_full_name":"RingCentral Team","rc_author_avatar":"\/us\/en\/blog\/wp-content\/uploads\/2022\/02\/ringcentral-logo-new.png","rc_author_link":"\/us\/en\/blog\/author\/ringcentral-team\/amp","rc_post_categories":"<a href=\"\/us\/en\/blog\/category\/trending\/communication-and-collaboration\/amp\">Communication &amp; collaboration<\/a><a href=\"\/us\/en\/blog\/category\/it-leadership\/amp\">, IT leadership<\/a>","amp_link":"\/us\/en\/blog\/privacy-by-design-what-is-it-and-how-can-it-make-your-communications-more-secure\/amp","excerpt_title":"Privacy by Design: What Is It and How Can It Make Your Co...","_links":{"self":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/42816","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/comments?post=42816"}],"version-history":[{"count":0,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/posts\/42816\/revisions"}],"wp:attachment":[{"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/media?parent=42816"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/categories?post=42816"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/newrcblog.wpengine.com\/us\/en\/blog\/wp-json\/wp\/v2\/tags?post=42816"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}