{"id":446,"date":"2025-10-14T14:35:20","date_gmt":"2025-10-14T14:35:20","guid":{"rendered":"https:\/\/weiqdev.wpenginepowered.com\/?page_id=446"},"modified":"2025-10-14T14:37:20","modified_gmt":"2025-10-14T14:37:20","slug":"personal-data-processing-agreement","status":"publish","type":"page","link":"https:\/\/weiq.tech\/en\/personal-data-processing-agreement\/","title":{"rendered":"Personal Data Processing Agreement"},"content":{"rendered":"<div data-block=\"wysiwyg\" class=\"site-container mx-auto flex flex-col py-10 md:py-20 max-w-[880px] px-6 lg:px-0\">\n            <div class=\"wysiwyg-text wysiwyg-content\">\n            <p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">Personal Data Processing Agreement<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Annex 2 to the Main Agreement<\/span><\/p>\n<h4><b>1. PARTIES<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Between MEIQ Systems AB (org. no. 559148-4380), located at S\u00f6dra F\u00f6rstadsgatan 1, 211 43 Malm\u00f6, hereinafter the \u201dData Controller,\u201d and the customer, hereinafter the \u201dData Processor.\u201d.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If the parties have specifically agreed on a specification of security measures and\/or processing, it will be attached as an annex to the data processing agreement. In case of a conflict, this agreement takes precedence.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This agreement is Annex Two (2) of Two (2) to the Main Agreement, which is signed by the parties.<\/span><\/p>\n<h4><b>2. INTRODUCTION AND DESCRIPTION<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">This Data Processing Agreement governs the processing of personal data related to the agreed software (WEIQ), hereinafter referred to as the \u201dService.\u201d The Service is provided by MEIQ Systems AB (MEIQ Systems). This Data Processing Agreement is an annex to your agreement, together with the General Terms. Terms that begin with a capital letter are defined in the final section below if not directly defined in the text.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The customer (contracting party, as outlined in the agreement) gains access to the Service once this Data Processing Agreement, together with the general terms, is accepted, which happens when the agreement is signed. This data processing agreement and the General Terms apply regardless of whether the software is provided free of charge or for payment.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the <a href=\"https:\/\/weiqdev.wpenginepowered.com\/data-protection\/\"><span style=\"text-decoration: underline;\">WEIQ Privacy Policy<\/span><\/a><\/span><span style=\"font-weight: 400;\">, you can read about how we handle personal data. By using WEIQ, you accept that MEIQ Systems may use this data in accordance with the Privacy Policy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Personal data provided by the holder in connection with agreements and purchases via WEIQ, or otherwise registered in connection with them, is processed by WEIQ for the preparation and administration of WEIQ. WEIQ does not store any card information but uses third parties responsible for transactions. The personal data also serves as a basis for market and customer analysis, business follow-up, business and method development, and risk management.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If the data subject wishes to obtain information about the personal data processed by WEIQ about them, they can request this in writing by sending a letter to the above address or by email to privacy@weiq.tech. Anyone wishing to request the correction of incorrect or misleading information can contact WEIQ at the above address.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By signing the agreement with this annex, you consent to WEIQ using and storing the material you send for WEIQ's use.<\/span><\/p>\n<h4><b>2.1 Description of the Service<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">The WEIQ service offers software consisting of four instances: the User Application, Order Receiver Application, WEIQ Terminal, and an Admin Interface.<\/span><\/p>\n<h4><b>2.2 User Application Description<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Upon signing the agreement, your Seller (the location where the service is used, such as restaurants, bars, caf\u00e9s, food trucks, or similar) is added to the application, and your End Customers can check in at your location. The User Application is primarily used for ordering, viewing the menu, completing transactions, and receiving other information.<\/span><\/p>\n<h4><b>2.3 Description of the Order Receiver Application (WEIQ Order Hub)<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Secondly, there is a tablet-based application for bartenders or other order receivers. In this view, the order receiver can manage orders, notify the customer, complete (or reject) orders, modify the menu, open\/close the bar, and generate reports.<\/span><\/p>\n<h4><b>2.4 Description of the WEIQ Terminal<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">The WEIQ Terminal is a payment terminal that can also be used to take orders, create and update tabs, and print receipts. Staff members manage the terminal and can process payments through it.<\/span><\/p>\n<h4><b>2.5 Description of the Admin Interface<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">As a customer, you will also have access to the Admin Interface. In this web application, a \u201dsuperuser\u201d (often a restaurant owner) can manage their WEIQ system. This includes viewing sales, changing prices, adjusting opening hours, or editing information that will be displayed to end customers. You can also retrieve accounting documentation and other reports.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Together, these four components form the foundation of the WEIQ Service, with certain support and other services also included from MEIQ Systems.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h4><b>3. PURPOSE<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">3.1<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">The purpose of this Data Processing Agreement is to ensure that the Data Processor processes personal data within the scope of the Service for the Data Controller\u2019s account, solely in accordance with the Data Controller\u2019s instructions, in compliance with this agreement, and in accordance with the requirements of Article 28 of the General Data Protection Regulation (EU) 2016\/679.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">3.2<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">The subject of personal data processing under this agreement is the WEIQ Service. Processing will continue from the date of signature as long as the Data Processor stores or otherwise processes personal data on behalf of the Data Controller. This includes the processing of information about the end customer, including personal data as follows:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Email address from the end customer.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Customer's phone number.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Name of the end customer.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">End customer purchase and order history.<\/span><\/li>\n<\/ul>\n<h4><b>4. DEFINITIONS<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">This agreement shall be interpreted in accordance with and use the definitions provided in Article 4 of the General Data Protection Regulation.<\/span><\/p>\n<h4><b>5. DATA CONTROLLER<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">The Data Controller is obligated to comply with the General Data Protection Regulation regarding personal data processing and engaging a processor. The Data Controller has the right to direct the Data Processor\u2019s personal data processing and must provide documented instructions necessary for the processing.<\/span><\/p>\n<h4><b>6. DATA PROCESSOR'S RESPONSIBILITY<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">The Data Processor undertakes to process personal data solely in accordance with documented instructions from the Data Controller, as well as in compliance with this agreement and the Main Agreement.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">6.1<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">The Data Processor undertakes to comply with applicable law, particularly the General Data Protection Regulation, when processing personal data. Additionally, the Data Processor agrees to comply with regulations, rulings, and recommendations concerning permissible personal data handling, issued by the Data Protection Authority or relevant EU body.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">6.2<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">By signing this agreement, the Data Processor affirms that necessary technical and organizational measures will be taken to ensure that processing meets the requirements of the General Data Protection Regulation and protects the rights of the data subjects.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">6.3<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">The Data Processor shall, according to the Data Controller\u2019s instructions, promptly rectify, erase, or transfer incorrect, incomplete, or outdated personal data.<\/span><\/p>\n<h4><b>7. SECURITY MEASURES<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">The Data Processor must implement and maintain appropriate technical and organizational security measures to protect personal data, without any entitlement to special compensation for this.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">7.1<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">The security measures must provide a level of protection required by applicable law, particularly the General Data Protection Regulation, and must be appropriate considering technical possibilities, implementation costs, specific risks of processing, and the sensitivity of the personal data being processed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">7.2<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">The Data Processor is responsible for ensuring adequate information security practices in its operations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">7.3<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">The Data Processor must ensure that employees, consultants, and others who process or have access to personal data are bound by confidentiality agreements and informed about how personal data processing should occur according to the Data Controller\u2019s instructions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">7.4<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">The Data Processor's security measures must be implemented with consideration for the latest developments, implementation costs, the nature, scope, context, and purposes of the data processing, and the risks to the rights and freedoms of individuals.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">7.5<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Where appropriate, security measures must include pseudonymization and encryption of personal data, the ongoing ability to ensure the confidentiality, integrity, availability, and resilience of systems and services for processing personal data, and the ability to restore access to and availability of personal data within a reasonable time after a physical or technical incident.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">7.6<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">When assessing the appropriate level of security, special attention must be given to the risks of accidental or unlawful destruction, loss, alteration, unauthorized disclosure, or access to personal data.<\/span><\/p>\n<h4><b>8. INCIDENTS<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">The Data Processor must immediately investigate any data security incident, such as unauthorized access, destruction, alteration, or any other unauthorized action involving personal data. The Data Processor must take appropriate actions to rectify the incident and prevent its recurrence. The Data Processor must notify the Data Controller and provide an Incident Report.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">8.1<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">The Incident Report should include a description of the nature of the incident, categories of affected individuals, approximate number of data subjects and records affected, likely consequences, and actions taken to mitigate potential negative effects.<\/span><\/p>\n<h4><b>9. TRANSFER TO THIRD PARTIES<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">The Data Processor shall not transfer personal data to third parties or disclose information about the processing of personal data to third parties without prior written consent from the Data Controller. The Data Processor shall not extract or export personal data to any other system outside the software provided by the Data Controller.<\/span><\/p>\n<h4><b style=\"color: #e53872; font-size: 1.4rem; text-transform: uppercase;\">10. Subprocessors<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">For the engagement or replacement of a subprocessor for the performance of tasks involving personal data processing (Subprocessor), the Data Processor must first obtain written approval from an authorized representative of the Data Controller. Such a request should include the subprocessor\u2019s company name and contact details, type of service, location, and geographical placement of infrastructure relevant to the processing of personal data, as well as any other information about the subprocessor requested by the Data Controller. The Data Controller has the right to object, with binding effect, to the engagement of a particular subprocessor if there are reasonable grounds for doing so.<\/span><\/p>\n<h4><b style=\"color: #e53872; font-size: 1.4rem; text-transform: uppercase;\">11. ACCESS<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">In order to ensure the maintenance of an appropriate level of security and compliance with this data processing agreement, the Data Controller has the right to necessary access to the parts of the Data Processor\u2019s organization and systems related to personal data processing.<\/span><\/p>\n<h4><b>12. ADDITIONAL COMPENSATION<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">The Data Processor is not entitled to additional compensation for fulfilling the responsibilities and obligations under this data processing agreement or for following the instructions regarding personal data processing given by the Data Controller, unless this is explicitly stated in a written agreement.<\/span><\/p>\n<h4><b>13. LIABILITY FOR DAMAGE<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">If the Data Processor's processing of personal data or failure to do so, in violation of this data processing agreement or contrary to the instructions of the Data Controller, causes damage to the Data Controller, the Data Processor shall compensate for such damage.<\/span><\/p>\n<h4><b>14. ASSIGNMENT OF THE AGREEMENT<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">The assignment of this Data Processing Agreement may only occur in connection with the assignment of the Main Agreement and in accordance with the terms of the Main Agreement.<\/span><\/p>\n<h4><b>15. TERM OF THE AGREEMENT<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">This agreement is valid from the date of signature and as long as the Data Processor stores or otherwise processes personal data on behalf of the Data Controller.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Upon termination of the data processing agreement, the Data Processor, according to the Data Controller's instructions, must delete or return all data containing personal data on all media where personal data is stored, and thereafter delete any copies.<\/span><\/p>\n<h4><b>16. DISPUTES AND APPLICABLE LAW<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Swedish law applies to this agreement. Any disputes arising from this data processing agreement shall be resolved in accordance with the dispute resolution provisions of the Main Agreement.<\/span><\/p>\n<h4><b>17. CHANGES<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">MEIQ Systems AB reserves the right to make changes and additions to this data processing agreement.<\/span><span style=\"font-weight: 400;\">\u00a0If the Data Processor finds any changes or additions unsatisfactory, they are referred to terminate the Main Agreement.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This Data Processing Agreement was created in digital format as an annex to the Main Agreement. The parties acknowledge and agree that upon signing the Main Agreement, this Data Processing Agreement shall form part of the Main Agreement as Annex Two (2).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Last updated November 25, 2024.<\/span><\/p>\n\n        <\/div>\n    <\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"class_list":["post-446","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Personal Data Processing Agreement - WEIQ<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/weiq.tech\/en\/personal-data-processing-agreement\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Personal Data Processing Agreement - WEIQ\" \/>\n<meta property=\"og:url\" content=\"https:\/\/weiq.tech\/en\/personal-data-processing-agreement\/\" \/>\n<meta property=\"og:site_name\" content=\"WEIQ\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/weiqorders\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-14T14:37:20+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/weiq.tech\/personal-data-processing-agreement\/\",\"url\":\"https:\/\/weiq.tech\/personal-data-processing-agreement\/\",\"name\":\"Personal Data Processing Agreement - WEIQ\",\"isPartOf\":{\"@id\":\"https:\/\/weiq.tech\/es\/#website\"},\"datePublished\":\"2025-10-14T14:35:20+00:00\",\"dateModified\":\"2025-10-14T14:37:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/weiq.tech\/personal-data-processing-agreement\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/weiq.tech\/personal-data-processing-agreement\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/weiq.tech\/personal-data-processing-agreement\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/weiq.tech\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Personal Data Processing Agreement\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/weiq.tech\/es\/#website\",\"url\":\"https:\/\/weiq.tech\/es\/\",\"name\":\"WEIQ\",\"description\":\"Best\u00e4llningssystem f\u00f6r restauranger med QR &amp; terminal\",\"publisher\":{\"@id\":\"https:\/\/weiq.tech\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/weiq.tech\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/weiq.tech\/es\/#organization\",\"name\":\"WEIQ\",\"url\":\"https:\/\/weiq.tech\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/weiq.tech\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/weiq.tech\/wp-content\/uploads\/2025\/09\/WEIQ-Logo-Horizontal-Color-2-3.svg\",\"contentUrl\":\"https:\/\/weiq.tech\/wp-content\/uploads\/2025\/09\/WEIQ-Logo-Horizontal-Color-2-3.svg\",\"caption\":\"WEIQ\"},\"image\":{\"@id\":\"https:\/\/weiq.tech\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/weiqorders\/\",\"https:\/\/se.linkedin.com\/company\/weiq\",\"https:\/\/www.instagram.com\/weiq.tech\/\",\"https:\/\/www.youtube.com\/channel\/UCKLYtgK2IZaML0jxEDcg6IA\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Personal Data Processing Agreement - WEIQ","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/weiq.tech\/en\/personal-data-processing-agreement\/","og_locale":"en_US","og_type":"article","og_title":"Personal Data Processing Agreement - WEIQ","og_url":"https:\/\/weiq.tech\/en\/personal-data-processing-agreement\/","og_site_name":"WEIQ","article_publisher":"https:\/\/www.facebook.com\/weiqorders\/","article_modified_time":"2025-10-14T14:37:20+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/weiq.tech\/personal-data-processing-agreement\/","url":"https:\/\/weiq.tech\/personal-data-processing-agreement\/","name":"Personal Data Processing Agreement - WEIQ","isPartOf":{"@id":"https:\/\/weiq.tech\/es\/#website"},"datePublished":"2025-10-14T14:35:20+00:00","dateModified":"2025-10-14T14:37:20+00:00","breadcrumb":{"@id":"https:\/\/weiq.tech\/personal-data-processing-agreement\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/weiq.tech\/personal-data-processing-agreement\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/weiq.tech\/personal-data-processing-agreement\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/weiq.tech\/"},{"@type":"ListItem","position":2,"name":"Personal Data Processing Agreement"}]},{"@type":"WebSite","@id":"https:\/\/weiq.tech\/es\/#website","url":"https:\/\/weiq.tech\/es\/","name":"WEIQ","description":"Restaurant ordering system with QR &amp; terminal","publisher":{"@id":"https:\/\/weiq.tech\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/weiq.tech\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/weiq.tech\/es\/#organization","name":"WEIQ","url":"https:\/\/weiq.tech\/es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/weiq.tech\/es\/#\/schema\/logo\/image\/","url":"https:\/\/weiq.tech\/wp-content\/uploads\/2025\/09\/WEIQ-Logo-Horizontal-Color-2-3.svg","contentUrl":"https:\/\/weiq.tech\/wp-content\/uploads\/2025\/09\/WEIQ-Logo-Horizontal-Color-2-3.svg","caption":"WEIQ"},"image":{"@id":"https:\/\/weiq.tech\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/weiqorders\/","https:\/\/se.linkedin.com\/company\/weiq","https:\/\/www.instagram.com\/weiq.tech\/","https:\/\/www.youtube.com\/channel\/UCKLYtgK2IZaML0jxEDcg6IA"]}]}},"_links":{"self":[{"href":"https:\/\/weiq.tech\/en\/wp-json\/wp\/v2\/pages\/446","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/weiq.tech\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/weiq.tech\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/weiq.tech\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/weiq.tech\/en\/wp-json\/wp\/v2\/comments?post=446"}],"version-history":[{"count":0,"href":"https:\/\/weiq.tech\/en\/wp-json\/wp\/v2\/pages\/446\/revisions"}],"wp:attachment":[{"href":"https:\/\/weiq.tech\/en\/wp-json\/wp\/v2\/media?parent=446"}],"curies":[{"name":"WP","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}