{"id":18934,"date":"2025-12-24T17:28:33","date_gmt":"2025-12-24T22:28:33","guid":{"rendered":"https:\/\/www.iri.com\/blog\/?p=18934"},"modified":"2025-12-26T08:25:39","modified_gmt":"2025-12-26T13:25:39","slug":"protecting-sensitive-ree-data","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/","title":{"rendered":"Protecting Sensitive REE Data"},"content":{"rendered":"<p><em><b>Abstract: <span style=\"font-weight: 400;\">This article examines why automated data discovery and masking are becoming essential controls for the rare earth minerals industry and how <\/span><a href=\"https:\/\/www.iri.com\/products\/iri-data-protector\"><span style=\"font-weight: 400;\">IRI data discovery and masking software<\/span><\/a><span style=\"font-weight: 400;\"> enables companies, joint ventures, and government-aligned operators to protect sensitive information, reduce exposure, and maintain operational advantage without impeding analytics, collaboration, or innovation.<\/span><\/b><\/em><\/p>\n<p><span style=\"font-weight: 400;\">The rare earth elements (REE) industry sits at the intersection of national security, advanced manufacturing, and global supply chain competition. Organizations involved in exploration, extraction, processing, refining, recycling, and downstream manufacturing manage highly sensitive data\u2014ranging from proprietary geological surveys and processing formulas to government-regulated supply chain records and partner agreements.<\/span><\/p>\n<h5><b>Why Data Protection Is Mission-Critical in the REE Industry<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">Rare earth elements are foundational to defense systems, renewable energy technologies, electric vehicles, semiconductors, and advanced electronics. As governments seek to de-risk supply chains and reduce dependence on foreign sources, REE producers and processors are under increasing scrutiny from regulators, defense agencies, investors, and strategic partners.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-18939 aligncenter\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/sensitive-REE-1024x597.png\" alt=\"\" width=\"677\" height=\"395\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/sensitive-REE-1024x597.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/sensitive-REE-300x175.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/sensitive-REE-768x448.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/sensitive-REE-1536x895.png 1536w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/sensitive-REE.png 1656w\" sizes=\"(max-width: 677px) 100vw, 677px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Sensitive data in this sector typically includes:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Geological and geophysical survey data<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Reserve estimates, ore grades, and extraction yields<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Proprietary beneficiation, separation, and refining processes<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Pricing models, offtake agreements, and partner contracts<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Export control\u2013related documentation and country-of-origin data<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Environmental, safety, and compliance records<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">R&amp;D data supporting new alloys, magnets, batteries, and recycling techniques<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Exposure of this information\u2014whether through cyber incidents, insider misuse, or uncontrolled data sharing\u2014can result in loss of intellectual property, regulatory penalties, supply chain disruption, or national security implications.<\/span><\/p>\n<h5><b>The Hidden Risk: Uncontrolled Data Proliferation<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">Like many industrial sectors, the REE industry increasingly relies on:<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-18940 alignright\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Uncontrolled-Data-Proliferation-1024x656.png\" alt=\"\" width=\"547\" height=\"350\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Uncontrolled-Data-Proliferation-1024x656.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Uncontrolled-Data-Proliferation-300x192.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Uncontrolled-Data-Proliferation-768x492.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Uncontrolled-Data-Proliferation-1536x984.png 1536w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Uncontrolled-Data-Proliferation.png 1110w\" sizes=\"(max-width: 547px) 100vw, 547px\" \/><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Data lakes and analytics platforms<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cloud-based collaboration and document repositories<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Digital twins and simulation environments<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Third-party labs, logistics providers, and research partners<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">As data flows across these environments, sensitive values are often copied into non-production systems, shared externally, or retained longer than necessary. Without continuous visibility into <\/span><i><span style=\"font-weight: 400;\">what<\/span><\/i><span style=\"font-weight: 400;\"> sensitive data exists and <\/span><i><span style=\"font-weight: 400;\">where<\/span><\/i><span style=\"font-weight: 400;\">, organizations struggle to enforce least privilege and data minimization principles.<\/span><\/p>\n<h5><b>The Role of Data Discovery in Rare Earth Operations<\/b><\/h5>\n<h6><b>Automated Identification of Sensitive Data<\/b><\/h6>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.iri.com\/products\/darkshield\">IRI DarkShield\u00ae<\/a> performs high-speed discovery and classification of sensitive data across structured, semi-structured, and unstructured sources, including databases, file systems, object stores, and technical documents. Using pattern matching, dictionaries, contextual rules, and NLP techniques, DarkShield can identify:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Export-controlled identifiers and metadata<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Proprietary chemical compositions and process parameters<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Personally identifiable information (PII) related to employees, contractors, and landowners<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Contractual and partner-sensitive terms embedded in documents<\/span><\/li>\n<\/ul>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-18945\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Unveiling-Sensitive-Data-with-DarkShield-1024x572.png\" alt=\"\" width=\"618\" height=\"345\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Unveiling-Sensitive-Data-with-DarkShield-1024x572.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Unveiling-Sensitive-Data-with-DarkShield-300x167.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Unveiling-Sensitive-Data-with-DarkShield-768x429.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Unveiling-Sensitive-Data-with-DarkShield-1536x857.png 1536w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Unveiling-Sensitive-Data-with-DarkShield.png 1110w\" sizes=\"(max-width: 618px) 100vw, 618px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">For REE organizations, this capability establishes authoritative data awareness\u2014a prerequisite for both security and compliance.<\/span><\/p>\n<h5><b>Why Data Masking Is Essential Beyond Encryption<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">Encryption protects data from unauthorized access, but it does not address overexposure to authorized users or systems that do not require clear-text values. <\/span><a href=\"https:\/\/www.iri.com\/solutions\/data-masking\"><span style=\"font-weight: 400;\">Data masking<\/span><\/a><span style=\"font-weight: 400;\"> directly addresses this gap.<\/span><\/p>\n<h6><b>IRI Masking Capabilities<\/b><\/h6>\n<p><span style=\"font-weight: 400;\">Tools in the IRI Data Protector Suite\u2014namely, <\/span><a href=\"https:\/\/www.iri.com\/products\/fieldshield\"><span style=\"font-weight: 400;\">IRI FieldShield<\/span><\/a><span style=\"font-weight: 400;\">\u00a0and <\/span><a href=\"https:\/\/www.iri.com\/products\/darkshield\"><span style=\"font-weight: 400;\">IRI DarkShield <\/span><\/a><span style=\"font-weight: 400;\">\u2014 support:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Irreversible masking for high-risk datasets<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Pseudonymization and tokenization for analytics and modeling<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Format-preserving encryption to retain data usability<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Consistent masking across systems to preserve <\/span><a href=\"https:\/\/www.iri.com\/company\/faqs\/157\"><span style=\"font-weight: 400;\">referential integrity<\/span><\/a><\/li>\n<\/ul>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-18948\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/IRI-Data-Protection-Suite-Capabilities-1024x616.png\" alt=\"\" width=\"574\" height=\"345\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/IRI-Data-Protection-Suite-Capabilities-1024x616.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/IRI-Data-Protection-Suite-Capabilities-300x180.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/IRI-Data-Protection-Suite-Capabilities-768x462.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/IRI-Data-Protection-Suite-Capabilities-1536x924.png 1536w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/IRI-Data-Protection-Suite-Capabilities.png 1110w\" sizes=\"(max-width: 574px) 100vw, 574px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Masked data can be safely used in analytics, simulation, testing, AI\/ML training, and external collaboration without revealing sensitive details.<\/span><\/p>\n<h5><b>Mapping REE Data Risks to IRI Capabilities<\/b><\/h5>\n<table  class=\" table table-hover\" >\n<tbody>\n<tr>\n<td><b>REE Data Risk Area<\/b><\/td>\n<td><b>Example Sensitive Data<\/b><\/td>\n<td><b>IRI Capability<\/b><\/td>\n<td><b>Business &amp; Security Benefit<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Intellectual Property<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Processing formulas, yields<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Data definition, discovery + masking<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Protection of proprietary advantage<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Supply Chain Sensitivity<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Country-of-origin, offtake data<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Data classification + obfuscation<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Reduced geopolitical exposure<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Regulatory Compliance<\/span><\/td>\n<td><span style=\"font-weight: 400;\">ESG, safety, export records<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Policy-driven discovery<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Lower audit and penalty risk<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Workforce &amp; Landowner Data<\/span><\/td>\n<td><span style=\"font-weight: 400;\">PII in contracts and surveys<\/span><\/td>\n<td><span style=\"font-weight: 400;\">PII detection + masking<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Privacy compliance<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Analytics &amp; R&amp;D<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Simulation and test datasets<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Format-preserving masking<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Safe innovation enablement<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h5><b>Common Use Cases in the Rare Earth Elements Sector<\/b><\/h5>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Pre-merger or JV data discovery to understand and protect shared assets<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Safe analytics environments for yield optimization and process modeling<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Redaction and masking of technical documents shared with regulators or partners<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Supply chain transparency initiatives without exposing competitive details<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Secure AI and digital twin development using masked operational data<\/span><\/li>\n<\/ul>\n<h5><b>How Rare Earth Subsegments Benefit from Data Discovery and Masking<\/b><\/h5>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-18950 aligncenter\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Subsegment-Benefits-1024x609.png\" alt=\"\" width=\"615\" height=\"366\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Subsegment-Benefits-1024x609.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Subsegment-Benefits-300x178.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Subsegment-Benefits-768x457.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Subsegment-Benefits-1536x914.png 1536w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Subsegment-Benefits.png 1110w\" sizes=\"(max-width: 615px) 100vw, 615px\" \/><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Exploration &amp; Mining:<\/b><span style=\"font-weight: 400;\"> Automatically discover and protect geological surveys, reserve estimates, landowner PII, and exploration models while enabling collaborative interpretation and feasibility analysis.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Processing &amp; Refining:<\/b><span style=\"font-weight: 400;\"> Safeguard proprietary separation techniques, yields, and operational parameters while still supporting process optimization, quality control, and digital twin initiatives.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Magnet, Battery &amp; Advanced Materials Manufacturing:<\/b><span style=\"font-weight: 400;\"> Mask sensitive formulations, tolerances, and performance data to support testing, analytics, and supplier collaboration without IP leakage.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Recycling &amp; Circular Economy Operations:<\/b><span style=\"font-weight: 400;\"> Protect recovery processes, supplier inputs, and efficiency metrics while enabling sustainability reporting and regulatory transparency.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>R&amp;D Organizations and National Laboratories:<\/b><span style=\"font-weight: 400;\"> Enable secure data sharing across institutions using masked datasets that preserve scientific validity and repeatability.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Logistics, Trading &amp; Supply Chain Partners:<\/b><span style=\"font-weight: 400;\"> Reduce exposure of pricing, origin, routing, and offtake details while maintaining traceability and reporting integrity.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Pre-merger or JV data discovery<\/b><span style=\"font-weight: 400;\"> to understand and protect shared assets.<\/span><\/li>\n<li aria-level=\"1\"><b>Safe analytics environments<\/b><span style=\"font-weight: 400;\"> for yield optimization and process modeling.<\/span><\/li>\n<li aria-level=\"1\"><b>Redaction and masking of technical documents<\/b><span style=\"font-weight: 400;\"> shared with regulators or partners.<\/span><\/li>\n<li aria-level=\"1\"><b>Supply chain transparency initiatives<\/b><span style=\"font-weight: 400;\"> without exposing competitive details<\/span><\/li>\n<li aria-level=\"1\"><b>Secure AI and digital twin development<\/b><span style=\"font-weight: 400;\"> using masked operational data<\/span><\/li>\n<\/ul>\n<h5><b>Benefits for Government-Aligned and Commercial Operators<\/b><\/h5>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-18952 alignright\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/IRI-enables.png\" alt=\"\" width=\"183\" height=\"202\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/IRI-enables.png 603w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/IRI-enables-271x300.png 271w\" sizes=\"(max-width: 183px) 100vw, 183px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">For organizations supporting defense, energy transition, or strategic mineral initiatives, IRI data masking tools enable:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Reduced exposure of export-controlled or strategically sensitive data<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Stronger partner trust through demonstrable data controls<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Faster collaboration without lengthy manual redaction cycles<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Scalable protection across legacy systems and modern platforms<\/span><\/li>\n<\/ul>\n<h5><b>Alignment with Export Controls, Data Sovereignty, and National Security<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">While IRI does not provide legal compliance determinations, its data-centric controls support operational alignment with frameworks and strategic initiatives commonly affecting the rare earth elements industry, including:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Export Administration Regulations (EAR):<\/b><span style=\"font-weight: 400;\"> Through data classification \/ discovery and masking to help identify, segment, and restrict access to controlled technical data, process details, and country-of-origin information.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Defense and dual-use data protections:<\/b><span style=\"font-weight: 400;\"> Persistent (static data) masking reduces unauthorized exposure of materials and process data that are relevant to defense and advanced manufacturing applications.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Data sovereignty and localization requirements:<\/b><span style=\"font-weight: 400;\"> Policy-driven discovery and masking ensure sensitive datasets are appropriately segmented across jurisdictions and cloud environments.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>U.S. and allied critical minerals strategies:<\/b><span style=\"font-weight: 400;\"> Auditable data controls demonstrate responsible stewardship of strategically sensitive information across domestic and partner supply chains.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Government funding and oversight programs:<\/b><span style=\"font-weight: 400;\"> Repeatable discovery and protection provide evidence of due diligence, risk reduction, and operational maturity.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">These capabilities enable REE organizations to align their data protection practices with national supply chain resilience and security objectives.<\/span><\/p>\n<h5><b>FAQs: Data Discovery and Masking in the REE Industry<\/b><\/h5>\n<p><b>Q:\u00a0 Is data discovery really necessary if we know our systems?<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">A:\u00a0 \u00a0Yes. Sensitive data often exists in unexpected locations, formats, and copies.<\/span><\/p>\n<p><b>Q:\u00a0 Does this apply only to large mining companies?<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">A:\u00a0 \u00a0No. Juniors, processors, recyclers, and R&amp;D firms face similar risks.<\/span><\/p>\n<p><b>Q:\u00a0 Can IRI handle technical and scientific documents?<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">A:\u00a0 Yes, via IRI DarkShield, including PDFs, Office files, and scanned images.<\/span><\/p>\n<p><b>Q:\u00a0 Does masking affect analytical accuracy?<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">A:\u00a0 It need not. Format-preserving and rule-based masking maintain analytical validity.<\/span><\/p>\n<p><b>Q:\u00a0 Is this relevant for ESG and regulatory reporting?<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">A:\u00a0 Yes, by protecting sensitive inputs while supporting transparency.<\/span><\/p>\n<p><b>Q:\u00a0 How does this help protect IP?<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">A:\u00a0 By preventing unauthorized access to clear-text proprietary data.<\/span><\/p>\n<p><b>Q:\u00a0 Can discovery rules be customized for chemical or geological terms?<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">A:\u00a0 Yes, using extensible dictionaries and pattern libraries.<\/span><\/p>\n<p><b>Q:\u00a0 Is this compatible with cloud platforms?<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">A:\u00a0 Yes, across on-prem, cloud, and hybrid environments.<\/span><\/p>\n<p><b>Q:\u00a0 Does masking replace access controls?<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">A:\u00a0 No. It complements IAM by reducing unnecessary data exposure.<\/span><\/p>\n<p><b>Q:\u00a0 Can masked data be shared with partners safely?<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">A:\u00a0 Yes, enabling collaboration without disclosure risk.<\/span><\/p>\n<p><b>Q:\u00a0 How does this support insider risk reduction?<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">A:\u00a0 By ensuring sensitive values are never broadly visible.<\/span><\/p>\n<p><b>Q:\u00a0 Is discovery a one-time activity?<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">A:\u00a0 No. Continuous discovery supports evolving operations.<\/span><\/p>\n<p><b>Q:\u00a0 Can this support M&amp;A due diligence?<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">A:\u00a0 Yes, by identifying and protecting sensitive assets early.<\/span><\/p>\n<p><b>Q:\u00a0 Does IRI provide audit-ready reporting?<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">A:\u00a0 Yes, with detailed discovery and masking evidence; see <\/span><a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/verifying-compliance\"><span style=\"font-weight: 400;\">this page<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><b>Q:\u00a0 What is the business value beyond security?<\/b><b><br \/>\n<\/b><span style=\"font-weight: 400;\">A:\u00a0 Faster innovation, safer data reuse, and preserved competitive advantage.<\/span><\/p>\n<h5><b>Conclusion<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">In the rare earth elements industry, data is as strategically valuable as the minerals themselves. <\/span><a href=\"https:\/\/www.iri.com\/products\/iri-data-protector\"><span style=\"font-weight: 400;\">IRI data discovery and masking software<\/span><\/a><span style=\"font-weight: 400;\"> enables organizations to proactively protect sensitive information, comply with growing regulatory and geopolitical pressures, and collaborate securely across complex ecosystems. By integrating data-aware protection into daily operations, REE companies can safeguard their competitive advantage while accelerating innovation and growth.<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Abstract: This article examines why automated data discovery and masking are becoming essential controls for the rare earth minerals industry and how IRI data discovery and masking software enables companies, joint ventures, and government-aligned operators to protect sensitive information, reduce exposure, and maintain operational advantage without impeding analytics, collaboration, or innovation. The rare earth elements<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/\" title=\"Protecting Sensitive REE Data\">Read More<\/a><\/div>\n","protected":false},"author":3,"featured_media":18954,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8],"tags":[2358,2357,2166,2133,2343,1081,280,340,14,2365,2356,2359,2372,2354,2355,2346,2351,1493,2353,2362,2345,1388,2364,520,2360,2361,2373,2350,2347,2363,1815,2352,2341,2342,2107,2110,2366,2344,2349,2348],"class_list":["post-18934","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","tag-ai-training-data-security","tag-analytics-data-protection","tag-automated-data-discovery","tag-cloud-data-security","tag-critical-minerals-data-security","tag-data-classification","tag-data-discovery","tag-data-governance","tag-data-masking","tag-data-protector-suite","tag-data-sovereignty","tag-digital-twin-security","tag-document-masking","tag-esg-data-protection","tag-export-control-compliance","tag-export-controlled-data","tag-geological-data-protection","tag-image-masking","tag-industrial-cybersecurity","tag-industrial-data-risk","tag-intellectual-property-protection","tag-iri-darkshield","tag-iri-data-masking","tag-iri-fieldshield","tag-joint-venture-data-protection","tag-ma-data-due-diligence","tag-mining-data-protection","tag-mining-data-security","tag-national-security-data","tag-operational-data-security","tag-pii-protection","tag-proprietary-process-data","tag-rare-earth-elements","tag-ree-data-protection","tag-regulatory-compliance","tag-secure-data-sharing","tag-sensitive-document-redaction","tag-sensitive-industrial-data","tag-strategic-minerals","tag-supply-chain-data-protection"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Protecting Sensitive REE Data - IRI<\/title>\n<meta name=\"description\" content=\"Explore the essential role of automated data discovery and masking in the rare earth elements industry to protect sensitive information.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting Sensitive REE Data\" \/>\n<meta property=\"og:description\" content=\"Explore the essential role of automated data discovery and masking in the rare earth elements industry to protect sensitive information.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-24T22:28:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-26T13:25:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Featured-Image-REE-Blog.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1056\" \/>\n\t<meta property=\"og:image:height\" content=\"506\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"David Friedland\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Friedland\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/\"},\"author\":{\"name\":\"David Friedland\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/cdb89f0c0a9c88810b8516d4b140734a\"},\"headline\":\"Protecting Sensitive REE Data\",\"datePublished\":\"2025-12-24T22:28:33+00:00\",\"dateModified\":\"2025-12-26T13:25:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/\"},\"wordCount\":1409,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Featured-Image-REE-Blog.png\",\"keywords\":[\"AI training data security\",\"Analytics data protection\",\"Automated Data Discovery\",\"Cloud Data Security\",\"Critical minerals data security\",\"data classification\",\"data discovery\",\"data governance\",\"data masking\",\"Data Protector Suite\",\"Data sovereignty\",\"Digital twin security\",\"document masking\",\"ESG data protection\",\"Export control compliance\",\"Export-controlled data\",\"Geological data protection\",\"image masking\",\"Industrial cybersecurity\",\"Industrial data risk\",\"Intellectual property protection\",\"IRI DarkShield\",\"IRI data masking\",\"IRI FieldShield\",\"Joint venture data protection\",\"M&amp;A data due diligence\",\"mining data protection\",\"Mining data security\",\"National security data\",\"Operational data security\",\"PII protection\",\"Proprietary process data\",\"Rare Earth Elements\",\"REE data protection\",\"Regulatory Compliance\",\"Secure Data Sharing\",\"Sensitive document redaction\",\"Sensitive industrial data\",\"Strategic minerals\",\"Supply chain data protection\"],\"articleSection\":[\"Data Masking\/Protection\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/\",\"url\":\"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/\",\"name\":\"Protecting Sensitive REE Data - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Featured-Image-REE-Blog.png\",\"datePublished\":\"2025-12-24T22:28:33+00:00\",\"dateModified\":\"2025-12-26T13:25:39+00:00\",\"description\":\"Explore the essential role of automated data discovery and masking in the rare earth elements industry to protect sensitive information.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Featured-Image-REE-Blog.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Featured-Image-REE-Blog.png\",\"width\":1056,\"height\":506},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting Sensitive REE Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/cdb89f0c0a9c88810b8516d4b140734a\",\"name\":\"David Friedland\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/995ea08bc7d036da625671cb48a636eb?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/995ea08bc7d036da625671cb48a636eb?s=96&d=blank&r=g\",\"caption\":\"David Friedland\"},\"url\":\"https:\/\/www.iri.com\/blog\/author\/davidf\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Protecting Sensitive REE Data - IRI","description":"Explore the essential role of automated data discovery and masking in the rare earth elements industry to protect sensitive information.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/","og_locale":"en_US","og_type":"article","og_title":"Protecting Sensitive REE Data","og_description":"Explore the essential role of automated data discovery and masking in the rare earth elements industry to protect sensitive information.","og_url":"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/","og_site_name":"IRI","article_published_time":"2025-12-24T22:28:33+00:00","article_modified_time":"2025-12-26T13:25:39+00:00","og_image":[{"width":1056,"height":506,"url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Featured-Image-REE-Blog.png","type":"image\/png"}],"author":"David Friedland","twitter_card":"summary_large_image","twitter_misc":{"Written by":"David Friedland","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/"},"author":{"name":"David Friedland","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/cdb89f0c0a9c88810b8516d4b140734a"},"headline":"Protecting Sensitive REE Data","datePublished":"2025-12-24T22:28:33+00:00","dateModified":"2025-12-26T13:25:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/"},"wordCount":1409,"commentCount":0,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Featured-Image-REE-Blog.png","keywords":["AI training data security","Analytics data protection","Automated Data Discovery","Cloud Data Security","Critical minerals data security","data classification","data discovery","data governance","data masking","Data Protector Suite","Data sovereignty","Digital twin security","document masking","ESG data protection","Export control compliance","Export-controlled data","Geological data protection","image masking","Industrial cybersecurity","Industrial data risk","Intellectual property protection","IRI DarkShield","IRI data masking","IRI FieldShield","Joint venture data protection","M&amp;A data due diligence","mining data protection","Mining data security","National security data","Operational data security","PII protection","Proprietary process data","Rare Earth Elements","REE data protection","Regulatory Compliance","Secure Data Sharing","Sensitive document redaction","Sensitive industrial data","Strategic minerals","Supply chain data protection"],"articleSection":["Data Masking\/Protection"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/","url":"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/","name":"Protecting Sensitive REE Data - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Featured-Image-REE-Blog.png","datePublished":"2025-12-24T22:28:33+00:00","dateModified":"2025-12-26T13:25:39+00:00","description":"Explore the essential role of automated data discovery and masking in the rare earth elements industry to protect sensitive information.","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Featured-Image-REE-Blog.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Featured-Image-REE-Blog.png","width":1056,"height":506},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/data-protection\/protecting-sensitive-ree-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Protecting Sensitive REE Data"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/cdb89f0c0a9c88810b8516d4b140734a","name":"David Friedland","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/995ea08bc7d036da625671cb48a636eb?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/995ea08bc7d036da625671cb48a636eb?s=96&d=blank&r=g","caption":"David Friedland"},"url":"https:\/\/www.iri.com\/blog\/author\/davidf\/"}]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Featured-Image-REE-Blog.png","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/18934"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=18934"}],"version-history":[{"count":13,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/18934\/revisions"}],"predecessor-version":[{"id":18958,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/18934\/revisions\/18958"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/18954"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=18934"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=18934"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=18934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}