{"id":1337,"date":"2022-07-08T09:44:04","date_gmt":"2022-07-08T09:44:04","guid":{"rendered":"https:\/\/privacyassembly.org\/?p=1337"},"modified":"2022-08-18T12:27:30","modified_gmt":"2022-08-18T12:27:30","slug":"video-how-do-igos-balance-the-demands-of-data-protection-and-scientific-research","status":"publish","type":"post","link":"https:\/\/privacyassembly.org\/index.php\/2022\/07\/08\/video-how-do-igos-balance-the-demands-of-data-protection-and-scientific-research\/","title":{"rendered":"VIDEO: How do IGOs balance the demands of data protection and scientific research?"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" width=\"1024\" height=\"779\" src=\"https:\/\/privacyassembly.org\/wp-content\/uploads\/2022\/07\/How-do-IGOs-balance-the-demands-of-data-protection-and-scientific-research-7min-IGOPA-1024x779.png\" alt=\"\" class=\"wp-image-1338\" srcset=\"https:\/\/privacyassembly.org\/wp-content\/uploads\/2022\/07\/How-do-IGOs-balance-the-demands-of-data-protection-and-scientific-research-7min-IGOPA-1024x779.png 1024w, https:\/\/privacyassembly.org\/wp-content\/uploads\/2022\/07\/How-do-IGOs-balance-the-demands-of-data-protection-and-scientific-research-7min-IGOPA-300x228.png 300w, https:\/\/privacyassembly.org\/wp-content\/uploads\/2022\/07\/How-do-IGOs-balance-the-demands-of-data-protection-and-scientific-research-7min-IGOPA-768x584.png 768w, https:\/\/privacyassembly.org\/wp-content\/uploads\/2022\/07\/How-do-IGOs-balance-the-demands-of-data-protection-and-scientific-research-7min-IGOPA.png 1479w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-dailymotion wp-block-embed-dailymotion\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"How do IGOs balance the demands of data protection and scientific research 7min IGOPA\" frameborder=\"0\" width=\"1140\" height=\"641\" src=\"https:\/\/www.dailymotion.com\/embed\/video\/x8cln5s?pubtool=oembed\" allowfullscreen allow=\"autoplay\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false},"categories":[20],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/privacyassembly.org\/index.php\/wp-json\/wp\/v2\/posts\/1337"}],"collection":[{"href":"https:\/\/privacyassembly.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/privacyassembly.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/privacyassembly.org\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/privacyassembly.org\/index.php\/wp-json\/wp\/v2\/comments?post=1337"}],"version-history":[{"count":2,"href":"https:\/\/privacyassembly.org\/index.php\/wp-json\/wp\/v2\/posts\/1337\/revisions"}],"predecessor-version":[{"id":1351,"href":"https:\/\/privacyassembly.org\/index.php\/wp-json\/wp\/v2\/posts\/1337\/revisions\/1351"}],"wp:attachment":[{"href":"https:\/\/privacyassembly.org\/index.php\/wp-json\/wp\/v2\/media?parent=1337"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/privacyassembly.org\/index.php\/wp-json\/wp\/v2\/categories?post=1337"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/privacyassembly.org\/index.php\/wp-json\/wp\/v2\/tags?post=1337"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}