{"id":18127,"date":"2022-07-01T00:57:43","date_gmt":"2022-07-01T04:57:43","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=18127"},"modified":"2025-07-21T02:54:01","modified_gmt":"2025-07-21T06:54:01","slug":"digitally-manage-law-enforcement-activities","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/law-enforcement-management\/digitally-manage-law-enforcement-activities\/","title":{"rendered":"Digitally Manage Law Enforcement Activities"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Law enforcement agencies are responsible for jails, courts, search &amp; rescue, and more. There are different divisions within the agency. The processing unit is among the most important, as it deals with offenders&#8217; intake and release. To avoid multiple entries for frequent offenders, many units have introduced fingerprint biometrics linked with Global Tel Link&#8217;s DSI Offenders Management System. This not only helps them to manage Law Enforcement Activities digitally but also avoids multiple entries.\u00a0\u00a0<\/span><\/p>\n<h2><b>The Problem with Multiple Entries\u00a0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Many law enforcement agencies face a similar issue. They manage a database of offenders, but frequent offenders may be registered under a name every time they are booked for a new crime. The law enforcement agencies always kept a note with images of offenders, but it was almost impossible to recall under which name they were previously registered. Due to the resulting misinformation, law enforcement agencies need to digitally authenticate the offenders to avoid any information gap.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As multiple offenses lead to more severe penalties, repeat offenders tend to register under different names. Law enforcement agencies need to know if the offenders have a criminal record. Matching the previous photographs with offenders and going through a pile of papers is not feasible, and the chance of booking one offender under multiple names is high.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"> In addition, it is not possible to remember the names of all the offenders who committed multiple offenses. This is one of the main reasons why law enforcement agencies need to implement an automated solution for the identification and authentication of offenders.<\/span><\/p>\n<h2><b>Fingerprint For Identification &amp; Authentication\u00a0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The problem law enforcement agencies are facing has only one solution: biometric identification. It is almost impossible to spoof biometric identification, and when you are inside a law enforcement facility, it is out of the question.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Law enforcement agencies implement fingerprint biometric identification linked to DSI OMS. This system manages offender information. When an offender checks into or out of the Sheriff&#8217;s Office, all sorts of information is stored, including the offender&#8217;s initial intake, charges, number of properties, and more. The authentication is taken care of by the DSI OMS fingerprint. Now there&#8217;s no chance of duplicating entries, and all related information is digital.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Offenders go through a fingerprint reader while taking their mug shots to maintain this digital database. This either identifies the offender or enrolls them into the system. Upon release from prison, offenders go through two readers. This time the person is only authenticated to make sure officers release the right person. If they release the wrong person, law enforcement&#8217;s reputation and public safety are at risk.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"> A <\/span><b>Mobile Unit <\/b><span style=\"font-weight: 400;\">has also been introduced for on-spot biometric identification during any incident. This helps Salt Lake County&#8217;s law enforcement make better decisions and quickly apprehend any frequent offenders.\u00a0<\/span><\/p>\n<h2><b>Benefits Of Digitally Managing Law Enforcement Activities<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The digital era has touched every aspect of our lives. Law enforcement agencies benefit more from automating the existing processes using biometric technology. The <a href=\"https:\/\/bit.ly\/3ugyKCo\" target=\"_blank\" rel=\"noopener noreferrer\">eGov platform by M2SYS<\/a> provides the necessary support to aid in this digital transformation. Digitally managing law enforcement activities powered by the eGov platform offers some additional benefits:<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<p><b>Highly Adaptable<br \/>\n<\/b><span style=\"font-weight: 400;\">Law enforcement activities are not constant. Though the core activities remain the same, you will notice significant differences between Salt Lake County Sheriff&#8217;s Office and other county sheriff&#8217;s offices. The solution offered by the M2SYS eGov platform is designed in such a way that you can bend it to fit any need. From adding new features to customizing the existing ones, it&#8217;s too easy with eGov.<\/span><\/p>\n<p><b>Rapid Deployment<br \/>\n<\/b><span style=\"font-weight: 400;\">It\u2019s no easy task to develop a complete solution for any law enforcement agency from scratch. Not to mention, developer dependencies can lead to delays in project completion. Why go for building something from the ground up when you can implement a ready solution?<\/span><\/p>\n<p><b>Unlimited Application<br \/>\n<\/b><span style=\"font-weight: 400;\">Law enforcement has its own set of work processes for each department. Therefore, they need web applications and a mobile app that provides mobility to manage their work digitally. However, developing web applications and mobile apps according to each specific need is quite a stretch. eGov platform by M2SYS offers tons of pre-developed applications that can be tailored to specific needs.\u00a0\u00a0\u00a0\u00a0<\/span><\/p>\n<p><b>Unmatched Accuracy<br \/>\n<\/b><span style=\"font-weight: 400;\">Biometrics is a colossal need of law enforcement agencies. It can be used for identification and authentication thanks to the easy use of multimodal biometrics capabilities. You can use the automated biometric identification system (ABIS) of any leading biometric service provider with CloudABIS. <\/span><\/p>\n<p><b>Extensive Devices<br \/>\n<\/b><span style=\"font-weight: 400;\">Fieldwork is one of the most critical parts of any law enforcement agency. To facilitate this, eGov supports all the leading biometric hardware. You can even turn your mobile phones into a biometric capture device. Then, with the power of biometric technology on hand, you can make spot identification to reach quick and accurate decisions.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/bit.ly\/3ugyKCo\" target=\"_blank\" rel=\"noopener noreferrer\">eGov platform by M2SYS<\/a> is a ready-to-deploy solution that fits the needs of various law enforcement agencies. No matter what the specification is, the solution can be adjusted to automate any manual workflow into a digital one. <a href=\"https:\/\/bit.ly\/3I3BloY\" target=\"_blank\" rel=\"noopener noreferrer\">Get in touch<\/a> with us today to get a glimpse into the future of law enforcement agencies.\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Law enforcement agencies are responsible for jails, courts, search &amp; rescue, and more. There are different divisions within the agency.<\/p>\n","protected":false},"author":425,"featured_media":18128,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"Manage Law Enforcement Activities","_yoast_wpseo_title":"How to Digitally Manage Law Enforcement Activities","_yoast_wpseo_metadesc":"To keep up with the offenders, you need to manage law enforcement activities digitally, as it is impossible to fake identities.","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[2248],"tags":[756,1797],"class_list":["post-18127","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-law-enforcement-management","tag-law-enforcement","tag-manage-law-enforcement-activities"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Digitally Manage Law Enforcement Activities<\/title>\n<meta name=\"description\" content=\"To keep up with the offenders, you need to manage law enforcement activities digitally, as it is impossible to fake identities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/law-enforcement-management\/digitally-manage-law-enforcement-activities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Digitally Manage Law Enforcement Activities\" \/>\n<meta property=\"og:description\" content=\"To keep up with the offenders, you need to manage law enforcement activities digitally, as it is impossible to fake identities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/law-enforcement-management\/digitally-manage-law-enforcement-activities\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-01T04:57:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-21T06:54:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2022\/07\/Digitally-Manage-Law-Enforcement-Activities.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"445\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Adam Willsey\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adam Willsey\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/law-enforcement-management\/digitally-manage-law-enforcement-activities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/law-enforcement-management\/digitally-manage-law-enforcement-activities\/\"},\"author\":{\"name\":\"Adam Willsey\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ea4c79d6761c94094046c16d52abef8a\"},\"headline\":\"Digitally Manage Law Enforcement Activities\",\"datePublished\":\"2022-07-01T04:57:43+00:00\",\"dateModified\":\"2025-07-21T06:54:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/law-enforcement-management\/digitally-manage-law-enforcement-activities\/\"},\"wordCount\":863,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"law enforcement\",\"Manage Law Enforcement Activities\"],\"articleSection\":[\"Law Enforcement Management\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/law-enforcement-management\/digitally-manage-law-enforcement-activities\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/law-enforcement-management\/digitally-manage-law-enforcement-activities\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/law-enforcement-management\/digitally-manage-law-enforcement-activities\/\",\"name\":\"How to Digitally Manage Law Enforcement Activities\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2022-07-01T04:57:43+00:00\",\"dateModified\":\"2025-07-21T06:54:01+00:00\",\"description\":\"To keep up with the offenders, you need to manage law enforcement activities digitally, as it is impossible to fake identities.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/law-enforcement-management\/digitally-manage-law-enforcement-activities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/law-enforcement-management\/digitally-manage-law-enforcement-activities\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/law-enforcement-management\/digitally-manage-law-enforcement-activities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Digitally Manage Law Enforcement Activities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ea4c79d6761c94094046c16d52abef8a\",\"name\":\"Adam Willsey\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/39999399f5bbdb3cb11f894d8a2e938f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/39999399f5bbdb3cb11f894d8a2e938f?s=96&d=mm&r=g\",\"caption\":\"Adam Willsey\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/ifran\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Digitally Manage Law Enforcement Activities","description":"To keep up with the offenders, you need to manage law enforcement activities digitally, as it is impossible to fake identities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/law-enforcement-management\/digitally-manage-law-enforcement-activities\/","og_locale":"en_US","og_type":"article","og_title":"How to Digitally Manage Law Enforcement Activities","og_description":"To keep up with the offenders, you need to manage law enforcement activities digitally, as it is impossible to fake identities.","og_url":"https:\/\/www.m2sys.com\/blog\/law-enforcement-management\/digitally-manage-law-enforcement-activities\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2022-07-01T04:57:43+00:00","article_modified_time":"2025-07-21T06:54:01+00:00","og_image":[{"width":800,"height":445,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2022\/07\/Digitally-Manage-Law-Enforcement-Activities.png","type":"image\/png"}],"author":"Adam Willsey","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Adam Willsey","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/law-enforcement-management\/digitally-manage-law-enforcement-activities\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/law-enforcement-management\/digitally-manage-law-enforcement-activities\/"},"author":{"name":"Adam Willsey","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ea4c79d6761c94094046c16d52abef8a"},"headline":"Digitally Manage Law Enforcement Activities","datePublished":"2022-07-01T04:57:43+00:00","dateModified":"2025-07-21T06:54:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/law-enforcement-management\/digitally-manage-law-enforcement-activities\/"},"wordCount":863,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["law enforcement","Manage Law Enforcement Activities"],"articleSection":["Law Enforcement Management"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/law-enforcement-management\/digitally-manage-law-enforcement-activities\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/law-enforcement-management\/digitally-manage-law-enforcement-activities\/","url":"https:\/\/www.m2sys.com\/blog\/law-enforcement-management\/digitally-manage-law-enforcement-activities\/","name":"How to Digitally Manage Law Enforcement Activities","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2022-07-01T04:57:43+00:00","dateModified":"2025-07-21T06:54:01+00:00","description":"To keep up with the offenders, you need to manage law enforcement activities digitally, as it is impossible to fake identities.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/law-enforcement-management\/digitally-manage-law-enforcement-activities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/law-enforcement-management\/digitally-manage-law-enforcement-activities\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/law-enforcement-management\/digitally-manage-law-enforcement-activities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Digitally Manage Law Enforcement Activities"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ea4c79d6761c94094046c16d52abef8a","name":"Adam Willsey","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/39999399f5bbdb3cb11f894d8a2e938f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/39999399f5bbdb3cb11f894d8a2e938f?s=96&d=mm&r=g","caption":"Adam Willsey"},"url":"https:\/\/www.m2sys.com\/blog\/author\/ifran\/"}]}},"modified_by":"David Villeda","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/18127"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/425"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=18127"}],"version-history":[{"count":2,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/18127\/revisions"}],"predecessor-version":[{"id":18711,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/18127\/revisions\/18711"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/18128"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=18127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=18127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=18127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}