{"id":9208,"date":"2021-01-30T13:46:06","date_gmt":"2021-01-30T12:46:06","guid":{"rendered":"https:\/\/www.techregulation.com\/extra-sensitive-data\/"},"modified":"2021-01-30T13:46:06","modified_gmt":"2021-01-30T12:46:06","slug":"extra-sensitive-data","status":"publish","type":"post","link":"https:\/\/www.techregulation.com\/sv\/extra-sensitive-data\/","title":{"rendered":"Extra sensitive data"},"content":{"rendered":"<p>Extra sensitive data, or special categories of personal data, is data that is considered extra worthy of protection, like information about health, ethnic origin or political opinions. Learn what is defined as extra sensitive and the basics of how to protect the data. What is extra sensitive data? Extra sensitive data is personal data that,&#8230;<\/p>\n<p> Read the full article at the site dedicated to GDPR: <a href=\"https:\/\/www.gdprsummary.com\/extra-sensitive-data\/\" target=\"_blank\" rel=\"noopener\">GDPR Summary<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Extra sensitive data, or special categories of personal data, is data that is considered extra worthy of protection, like information about health, ethnic origin or political opinions. Learn what is defined as extra sensitive and the basics of how to protect the data. What is extra sensitive data? Extra sensitive data is personal data that,&#8230; [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":9049,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[],"class_list":["post-9208","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-gdpr"],"pp_statuses_selecting_workflow":false,"pp_workflow_action":"current","pp_status_selection":"publish","yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.6 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Extra sensitive data - Tech Regulation Hub<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"sv_SE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Extra sensitive data\" \/>\n<meta property=\"og:description\" content=\"Extra sensitive data, or special categories of personal data, is data that is considered extra worthy of protection, like information about health, ethnic origin or political opinions. Learn what is defined as extra sensitive and the basics of how to protect the data. What is extra sensitive data? Extra sensitive data is personal data that,&#8230; [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techregulation.com\/sv\/extra-sensitive-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Tech Regulation Hub\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-30T12:46:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.techregulation.com\/wp-content\/uploads\/2021\/01\/luke-chesser-22256-unsplash-150x150-FJIgSc.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"gdprsummary\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/gdprsummary\" \/>\n<meta name=\"twitter:site\" content=\"@techreghub\" \/>\n<meta name=\"twitter:label1\" content=\"Skriven av\" \/>\n\t<meta name=\"twitter:data1\" content=\"gdprsummary\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/extra-sensitive-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/extra-sensitive-data\\\/\"},\"author\":{\"name\":\"gdprsummary\",\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/#\\\/schema\\\/person\\\/0a87c3577244c3effa8a61a48415ec4d\"},\"headline\":\"Extra sensitive data\",\"datePublished\":\"2021-01-30T12:46:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/extra-sensitive-data\\\/\"},\"wordCount\":70,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/extra-sensitive-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.techregulation.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/luke-chesser-22256-unsplash-150x150-FJIgSc.jpeg\",\"articleSection\":[\"GDPR\"],\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/extra-sensitive-data\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/extra-sensitive-data\\\/\",\"url\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/extra-sensitive-data\\\/\",\"name\":\"Extra sensitive data - Tech Regulation Hub\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/extra-sensitive-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/extra-sensitive-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.techregulation.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/luke-chesser-22256-unsplash-150x150-FJIgSc.jpeg\",\"datePublished\":\"2021-01-30T12:46:06+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/#\\\/schema\\\/person\\\/0a87c3577244c3effa8a61a48415ec4d\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/extra-sensitive-data\\\/#breadcrumb\"},\"inLanguage\":\"sv-SE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/extra-sensitive-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/extra-sensitive-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.techregulation.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/luke-chesser-22256-unsplash-150x150-FJIgSc.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.techregulation.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/luke-chesser-22256-unsplash-150x150-FJIgSc.jpeg\",\"width\":150,\"height\":150},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/extra-sensitive-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/?page_id=139&preview_id=139\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Extra sensitive data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/#website\",\"url\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/\",\"name\":\"Tech Regulation Hub\",\"description\":\"Empowering Compliance in the Digital Age\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sv-SE\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/#\\\/schema\\\/person\\\/0a87c3577244c3effa8a61a48415ec4d\",\"name\":\"gdprsummary\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sv-SE\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3e2539856ff7ef4abd124d293fc4f532790048075533439d04a2333aa311158b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3e2539856ff7ef4abd124d293fc4f532790048075533439d04a2333aa311158b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3e2539856ff7ef4abd124d293fc4f532790048075533439d04a2333aa311158b?s=96&d=mm&r=g\",\"caption\":\"gdprsummary\"},\"sameAs\":[\"https:\\\/\\\/www.gdprsummary.com\\\/\",\"https:\\\/\\\/x.com\\\/https:\\\/\\\/twitter.com\\\/gdprsummary\",\"https:\\\/\\\/www.youtube.com\\\/@GDPRSummary\"],\"url\":\"https:\\\/\\\/www.techregulation.com\\\/sv\\\/author\\\/gdprsummary\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Extra sensitive data - Tech Regulation Hub","robots":{"index":"noindex","follow":"follow"},"og_locale":"sv_SE","og_type":"article","og_title":"Extra sensitive data","og_description":"Extra sensitive data, or special categories of personal data, is data that is considered extra worthy of protection, like information about health, ethnic origin or political opinions. Learn what is defined as extra sensitive and the basics of how to protect the data. What is extra sensitive data? Extra sensitive data is personal data that,&#8230; [&hellip;]","og_url":"https:\/\/www.techregulation.com\/sv\/extra-sensitive-data\/","og_site_name":"Tech Regulation Hub","article_published_time":"2021-01-30T12:46:06+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.techregulation.com\/wp-content\/uploads\/2021\/01\/luke-chesser-22256-unsplash-150x150-FJIgSc.jpeg","type":"image\/jpeg"}],"author":"gdprsummary","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/gdprsummary","twitter_site":"@techreghub","twitter_misc":{"Skriven av":"gdprsummary"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techregulation.com\/sv\/extra-sensitive-data\/#article","isPartOf":{"@id":"https:\/\/www.techregulation.com\/sv\/extra-sensitive-data\/"},"author":{"name":"gdprsummary","@id":"https:\/\/www.techregulation.com\/sv\/#\/schema\/person\/0a87c3577244c3effa8a61a48415ec4d"},"headline":"Extra sensitive data","datePublished":"2021-01-30T12:46:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techregulation.com\/sv\/extra-sensitive-data\/"},"wordCount":70,"commentCount":0,"image":{"@id":"https:\/\/www.techregulation.com\/sv\/extra-sensitive-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techregulation.com\/wp-content\/uploads\/2021\/01\/luke-chesser-22256-unsplash-150x150-FJIgSc.jpeg","articleSection":["GDPR"],"inLanguage":"sv-SE","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.techregulation.com\/sv\/extra-sensitive-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.techregulation.com\/sv\/extra-sensitive-data\/","url":"https:\/\/www.techregulation.com\/sv\/extra-sensitive-data\/","name":"Extra sensitive data - Tech Regulation Hub","isPartOf":{"@id":"https:\/\/www.techregulation.com\/sv\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techregulation.com\/sv\/extra-sensitive-data\/#primaryimage"},"image":{"@id":"https:\/\/www.techregulation.com\/sv\/extra-sensitive-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techregulation.com\/wp-content\/uploads\/2021\/01\/luke-chesser-22256-unsplash-150x150-FJIgSc.jpeg","datePublished":"2021-01-30T12:46:06+00:00","author":{"@id":"https:\/\/www.techregulation.com\/sv\/#\/schema\/person\/0a87c3577244c3effa8a61a48415ec4d"},"breadcrumb":{"@id":"https:\/\/www.techregulation.com\/sv\/extra-sensitive-data\/#breadcrumb"},"inLanguage":"sv-SE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techregulation.com\/sv\/extra-sensitive-data\/"]}]},{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/www.techregulation.com\/sv\/extra-sensitive-data\/#primaryimage","url":"https:\/\/www.techregulation.com\/wp-content\/uploads\/2021\/01\/luke-chesser-22256-unsplash-150x150-FJIgSc.jpeg","contentUrl":"https:\/\/www.techregulation.com\/wp-content\/uploads\/2021\/01\/luke-chesser-22256-unsplash-150x150-FJIgSc.jpeg","width":150,"height":150},{"@type":"BreadcrumbList","@id":"https:\/\/www.techregulation.com\/sv\/extra-sensitive-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techregulation.com\/sv\/?page_id=139&preview_id=139"},{"@type":"ListItem","position":2,"name":"Extra sensitive data"}]},{"@type":"WebSite","@id":"https:\/\/www.techregulation.com\/sv\/#website","url":"https:\/\/www.techregulation.com\/sv\/","name":"Tech Regulation Hub","description":"Empowering Compliance in the Digital Age","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techregulation.com\/sv\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sv-SE"},{"@type":"Person","@id":"https:\/\/www.techregulation.com\/sv\/#\/schema\/person\/0a87c3577244c3effa8a61a48415ec4d","name":"gdprsummary","image":{"@type":"ImageObject","inLanguage":"sv-SE","@id":"https:\/\/secure.gravatar.com\/avatar\/3e2539856ff7ef4abd124d293fc4f532790048075533439d04a2333aa311158b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3e2539856ff7ef4abd124d293fc4f532790048075533439d04a2333aa311158b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3e2539856ff7ef4abd124d293fc4f532790048075533439d04a2333aa311158b?s=96&d=mm&r=g","caption":"gdprsummary"},"sameAs":["https:\/\/www.gdprsummary.com\/","https:\/\/x.com\/https:\/\/twitter.com\/gdprsummary","https:\/\/www.youtube.com\/@GDPRSummary"],"url":"https:\/\/www.techregulation.com\/sv\/author\/gdprsummary\/"}]}},"_links":{"self":[{"href":"https:\/\/www.techregulation.com\/sv\/wp-json\/wp\/v2\/posts\/9208","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.techregulation.com\/sv\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techregulation.com\/sv\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techregulation.com\/sv\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techregulation.com\/sv\/wp-json\/wp\/v2\/comments?post=9208"}],"version-history":[{"count":0,"href":"https:\/\/www.techregulation.com\/sv\/wp-json\/wp\/v2\/posts\/9208\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techregulation.com\/sv\/wp-json\/wp\/v2\/media\/9049"}],"wp:attachment":[{"href":"https:\/\/www.techregulation.com\/sv\/wp-json\/wp\/v2\/media?parent=9208"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techregulation.com\/sv\/wp-json\/wp\/v2\/categories?post=9208"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techregulation.com\/sv\/wp-json\/wp\/v2\/tags?post=9208"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}