  {"id":331,"date":"2026-01-14T14:17:47","date_gmt":"2026-01-14T20:17:47","guid":{"rendered":"https:\/\/uwm.edu\/ai\/?page_id=331"},"modified":"2026-03-19T12:50:02","modified_gmt":"2026-03-19T17:50:02","slug":"policy-analysis","status":"publish","type":"page","link":"https:\/\/uwm.edu\/ai\/policy-analysis\/","title":{"rendered":"Policy Analysis"},"content":{"rendered":"\n<div class=\"uwm-l-row\">\n<div class=\"uwm-l-col\">\n<p>Many&nbsp;individuals&nbsp;across the university face challenges in using Generative AI tools safely and ethically within the bounds of State law, as well as UW Regent, UW-System, and 51ÁÔÆæ policies. The goal of this page is to do the following:&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Outline relevant laws and policies&nbsp;and&nbsp;how they apply to Generative AI usage.<\/li>\n\n\n\n<li>Work to&nbsp;address&nbsp;common questions&nbsp;and issues for students, faculty, staff, and researchers,&nbsp;that apply to a particular policy&nbsp;while&nbsp;presenting&nbsp;51ÁÔÆæ-approved responses to typical scenarios involving Generative AI use.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><strong>Please note that as privacy and security conditions&nbsp;for Generative AI&nbsp;tools&nbsp;evolve, elements of this page may change.<\/strong>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-applicable-laws-and-policies\">Applicable Laws and Policies<\/h2>\n\n\n\n<div class=\"uwm-p-accordion\" data-accordion-prefix-classes=\"uwm\" data-accordion-cool-selectors=\"1\"><button class=\"uwm-p-accordion--toggle-button size-p-md\">Expand All<\/button>\n<div class=\"uwm-p-accordion--header\">Chapter UWS 14, Student Academic Disciplinary Procedures<\/div><div class=\"uwm-p-accordion--panel\"><div class=\"uwm-p-accordion--panel-inner uwm-u-clear\">\n<p><a href=\"https:\/\/docs.legis.wisconsin.gov\/code\/admin_code\/uws\/14\">Chapter&nbsp;14 of the Wisconsin Administrative Code<\/a> defines Student Academic Disciplinary Procedures for the UW System, including academic misconduct and integrity violations. These rules apply to unauthorized use of Generative AI tools.<\/p>\n\n\n\n<p>Faculty are strongly encouraged to use CASL\u2019s&nbsp;<a href=\"https:\/\/uwm.edu\/cetl\/syllabus-statements-guiding-student-generative-ai-usage-in-your-class\/\" target=\"_blank\" rel=\"noreferrer noopener\">guidance<\/a>&nbsp;on Generative AI and include a clear syllabus statement outlining classroom expectations. This helps reduce student uncertainty. Students should review their syllabus and contact their professor with questions. Faculty should avoid using AI detectors due to high false positive rates and consult the Dean of Students Office for any academic misconduct concerns related to Generative AI.&nbsp;<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"uwm-p-accordion--header\">Information Security (Regent Policy Document 25-5)<\/div><div class=\"uwm-p-accordion--panel\"><div class=\"uwm-p-accordion--panel-inner uwm-u-clear\">\n<p><a href=\"https:\/\/www.wisconsin.edu\/regents\/policies\/information-technology-information-security\/\">UW System Regent Policy Document 25-5<\/a> sets information security expectations for all institutions, covering assets like student records, health data, and confidential information. It&nbsp;establishes&nbsp;a framework for acceptable IT use and protects sensitive data.<\/p>\n\n\n\n<p>Generative AI tools often process all shared data and may be used to train models unless users opt out. Review third-party vendors\u2019 privacy policies before use. Faculty and staff must&nbsp;comply with&nbsp;laws like&nbsp;FERPA;&nbsp;unauthorized sharing of student or sensitive data with AI tools can lead to serious violations and penalties.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"uwm-p-accordion--header\">Acceptable Use Policy (Regent Policy Document 25-3)<\/div><div class=\"uwm-p-accordion--panel\"><div class=\"uwm-p-accordion--panel-inner uwm-u-clear\">\n<p>The <a href=\"https:\/\/www.wisconsin.edu\/regents\/policies\/acceptable-use-of-information-technology-resources\/\">Acceptable Use Policy<\/a> outlines the expectations of the Board of Regents&nbsp;regarding&nbsp;the acceptable use of IT resources by authorized users and is used to&nbsp;establish&nbsp;the parameters for the use of IT resources.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Generative AI tools on university systems should only be used for approved academic, research, or official purposes.&nbsp;Misuse&nbsp;of Generative AI tools&nbsp;to bypass policies or laws is prohibited. Students must follow syllabus rules, and no one should use AI to create misleading or harmful content. Faculty and staff should not upload confidential university data to public AI platforms.&nbsp;<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"uwm-p-accordion--header\">Privacy Policy (UW System Administrative Policy 1040)<\/div><div class=\"uwm-p-accordion--panel\"><div class=\"uwm-p-accordion--panel-inner uwm-u-clear\">\n<p><a href=\"https:\/\/www.wisconsin.edu\/uw-policies\/uw-system-administrative-policies\/information-security-privacy-policy\/\">UWSA Policy 1040<\/a> sets standards for handling personal data in the UW System, limiting its collection, use, sharing, and storage to&nbsp;what&#8217;s&nbsp;necessary for academic, research, administrative, or legally permitted&nbsp;purposes.&nbsp;&nbsp;<\/p>\n\n\n\n<p>When using Generative AI tools on university systems or networks, users should limit data sharing to use cases that support their academic, research, or official duties. Many tools may use the prompts and responses users provide&nbsp;to train&nbsp;the underlying Large Language Model.&nbsp;&nbsp;Recent cyberattacks&nbsp;have&nbsp;demonstrated&nbsp;the ability to&nbsp;expose&nbsp;a model\u2019s training&nbsp;data.&nbsp;Individuals should always be cautious when sharing information with Generative AI systems. This&nbsp;caution also applies when integrating AI with services like email or OneDrive, which may grant access to all user files,&nbsp;including those shared by others,&nbsp;risking unauthorized data exposure.&nbsp;<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"uwm-p-accordion--header\">Data Classification (UW System Administrative Policy 1031)<\/div><div class=\"uwm-p-accordion--panel\"><div class=\"uwm-p-accordion--panel-inner uwm-u-clear\">\n<p><a href=\"https:\/\/www.wisconsin.edu\/uw-policies\/uw-system-administrative-policies\/information-security-data-classification-and-protection\/\">UWSA Policy 1031<\/a> outlines the various classification levels that apply to data processed, stored, or used by UW System entities, and helps inform which technical, administrative, and physical controls should be applied to protect the data from theft, alteration, loss of integrity, and\/or misuse.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Users must not enter confidential or restricted data (e.g., student records, research, financial info) into public AI platforms, which may store or reuse inputs. For example, uploading proprietary research or analyzing student data without safeguards may violate policies like FERPA and lead to serious compliance issues.&nbsp;&nbsp;<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"uwm-p-accordion--header\">Risk Management (UW System Administrative Policy 1039)<\/div><div class=\"uwm-p-accordion--panel\"><div class=\"uwm-p-accordion--panel-inner uwm-u-clear\">\n<p><a href=\"https:\/\/www.wisconsin.edu\/uw-policies\/uw-system-administrative-policies\/information-security-risk-management\/\">UWSA Policy 1039<\/a> provides a framework for&nbsp;identifying, assessing, and managing information security risks across the UW System. It aims to protect IT assets by ensuring confidentiality, integrity, and availability, while&nbsp;maintaining&nbsp;compliance with regulations and guidelines.&nbsp;&nbsp;<\/p>\n\n\n\n<p>When using Generative AI, users must assess risks like data leakage, bias, and misinformation. For example, inaccurate AI summaries of sensitive legal documents or unreviewed AI-generated content on university platforms can cause legal or reputational harm. A risk assessment should be completed before integrating AI into teaching, research, or administrative systems.&nbsp;<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"uwm-p-accordion--header\">51ÁÔÆæ Code of Conduct (SAAP 7-3)<\/div><div class=\"uwm-p-accordion--panel\"><div class=\"uwm-p-accordion--panel-inner uwm-u-clear\">\n<p>The <a href=\"https:\/\/uwm.edu\/policy\/library\/faculty-staff-code-of-conduct\/\">51ÁÔÆæ Code of Conduct (SAAP 7-3)<\/a> outlines expectations for integrity, respect, stewardship, and compliance for all individuals acting on behalf of the university.\u00a0\u00a0<\/p>\n\n\n\n<p>In practical terms, this policy&nbsp;promotes the&nbsp;responsible use of Generative AI, requiring honesty and transparency in academic and administrative content.&nbsp;Misrepresenting AI-generated work as entirely original could violate principles of integrity and trustworthiness.&nbsp;Uploading non-public university data (such as student records or internal documents) into public AI platforms may breach confidentiality obligations.&nbsp;Additionally,&nbsp;the policy discourages&nbsp;the&nbsp;misuse of university resources,&nbsp;including&nbsp;generative AI tools. No one&nbsp;should use&nbsp;Generative AI tools&nbsp;in ways that compromise the university\u2019s mission or reputation.&nbsp;<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"uwm-p-accordion--header\">51ÁÔÆæ System Administrative Policy 1305 (Formerly G10\/SYS 190) &#8211; Computer Software Ownership<\/div><div class=\"uwm-p-accordion--panel\"><div class=\"uwm-p-accordion--panel-inner uwm-u-clear\">\n<p>The UW System\u2019s <a href=\"https:\/\/www.wisconsin.edu\/uw-policies\/uw-system-administrative-policies\/computer-software-ownership\/\">Computer Software Ownership Policy<\/a> outlines who owns software developed within the university.&nbsp;&nbsp;<\/p>\n\n\n\n<p>When using Generative AI, content created independently by faculty or students\u2014like teaching aids or research tools\u2014is typically owned by the creator. However, if developed under a job assignment or university contract, the university may claim ownership. Users should also review licensing and attribution rules, as AI-generated code or content may affect project ownership rights.&nbsp;&nbsp;<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"uwm-p-accordion--header\">UW System Administrative Policy 1310 (Formerly G27\/SYS 191) &#8211; Copyrightable Instructions Materials Ownership, Use, and Control<\/div><div class=\"uwm-p-accordion--panel\"><div class=\"uwm-p-accordion--panel-inner uwm-u-clear\">\n<p>The UW System Administrative <a href=\"https:\/\/www.wisconsin.edu\/uw-policies\/uw-system-administrative-policies\/copyrightable-instructions-materials-ownership-use-and-control\/\">Policy on Copyrightable Instructional Materials<\/a> outlines how ownership and usage rights are&nbsp;determined&nbsp;for educational content created within the university system.&nbsp;&nbsp;<\/p>\n\n\n\n<p>When using Generative AI to create instructional materials, ownership typically belongs to the creator if minimal university resources are used. However, if substantial support (like released time, equipment, or staff) is provided, the university may claim ownership or require a formal agreement. Written agreements are encouraged when institutional resources are involved, and transparency is essential in distributing AI-assisted materials.&nbsp;&nbsp;<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"uwm-p-accordion--header\">Regent Policy Document 4-1 (Formerly 77-5) &#8211; Copying and Recording of Instructional Materials or Lectures<\/div><div class=\"uwm-p-accordion--panel\"><div class=\"uwm-p-accordion--panel-inner uwm-u-clear\">\n<p>The <a href=\"https:\/\/www.wisconsin.edu\/regents\/policies\/recording-of-lectures\/\">Regent Policy Document 4-1<\/a> states that \u201cThe Board of Regents recognizes the right of individual instructors to set reasonable policies and practices in regard to the use, copying or recording of instructional materials or lectures that are developed as a part of an academic course, event or program.\u201d&nbsp;With a noticeable emphasis on helping to provide access for students with reasonable accommodations. This policy may also apply to the use of AI, including AI notetaking apps.<\/p>\n<\/div><\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-additional-resources\">Additional Resources<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-use-of-ai-in-classrooms\">Use of AI in Classrooms<\/h3>\n\n\n\n<p><a href=\"https:\/\/uwm.edu\/deanofstudents\/conduct\/academic-misconduct\/\">Academic Misconduct (Dean of Students)<\/a> \u2014 Suspected misuse of AI in a way that violates instructor expectations may be considered academic misconduct. Procedures for how academic misconduct is handled can be found in the link above.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-resources-for-instructors\">Resources for Instructors<\/h3>\n\n\n\n<p><a href=\"https:\/\/uwm.edu\/advancing-learning\/\">The Center for Advancing Student Learning (CASL)<\/a> provides several sample syllabi that can be used to set expectations on AI usage within a course. Additional information on the intersection of teaching and Generative AI can be found in the resources linked below:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/view.officeapps.live.com\/op\/view.aspx?src=https%3A%2F%2Fuwm.edu%2Facademicaffairs%2Fwp-content%2Fuploads%2Fsites%2F32%2F2024%2F11%2FSyllabus-Template.docx&amp;wdOrigin=BROWSELINK\">Syllabus (DOCX)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/guides.library.uwm.edu\/citationstyles\/ai\">Citation Guide (51ÁÔÆæ Libraries)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/advancing-learning\/resources\/artificial-intelligence-teaching\/\">AI and Teaching (including instructions on citation)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/uwm.edu\/advancing-learning\/tag\/ai\/\">AI Events<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/kb.uwm.edu\/advancing-learning\/internal\/page.php?id=150853\">Detecting Generative AI<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"uwm-l-col uwm-l-col--4 uwm-l-offset--1\"><div class=\"uwm-block-otp-nav \"><\/div><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":38638,"featured_media":0,"parent":0,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"","uwm_wg_additional_authors":[]},"class_list":["post-331","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Policy Analysis - AI at 51ÁÔÆæ<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uwm.edu\/ai\/policy-analysis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Policy Analysis\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uwm.edu\/ai\/policy-analysis\/\" \/>\n<meta property=\"og:site_name\" content=\"AI at 51ÁÔÆæ\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-19T17:50:02+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/ai\\\/policy-analysis\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/ai\\\/policy-analysis\\\/\",\"name\":\"Policy Analysis - AI at 51ÁÔÆæ\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/ai\\\/#website\"},\"datePublished\":\"2026-01-14T20:17:47+00:00\",\"dateModified\":\"2026-03-19T17:50:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/ai\\\/policy-analysis\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uwm.edu\\\/ai\\\/policy-analysis\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/ai\\\/policy-analysis\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uwm.edu\\\/ai\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Policy Analysis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/ai\\\/#website\",\"url\":\"https:\\\/\\\/uwm.edu\\\/ai\\\/\",\"name\":\"AI at 51ÁÔÆæ\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/ai\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uwm.edu\\\/ai\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/ai\\\/#organization\",\"name\":\"University of Wisconsin - Milwaukee\",\"url\":\"https:\\\/\\\/uwm.edu\\\/ai\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/ai\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/ai\\\/wp-content\\\/uploads\\\/sites\\\/699\\\/2020\\\/11\\\/uwm-seo-logo.jpg\",\"contentUrl\":\"https:\\\/\\\/uwm.edu\\\/ai\\\/wp-content\\\/uploads\\\/sites\\\/699\\\/2020\\\/11\\\/uwm-seo-logo.jpg\",\"width\":225,\"height\":224,\"caption\":\"University of Wisconsin - Milwaukee\"},\"image\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/ai\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Policy Analysis - AI at 51ÁÔÆæ","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uwm.edu\/ai\/policy-analysis\/","og_locale":"en_US","og_type":"article","og_title":"Policy Analysis","og_url":"https:\/\/uwm.edu\/ai\/policy-analysis\/","og_site_name":"AI at 51ÁÔÆæ","article_modified_time":"2026-03-19T17:50:02+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/uwm.edu\/ai\/policy-analysis\/","url":"https:\/\/uwm.edu\/ai\/policy-analysis\/","name":"Policy Analysis - AI at 51ÁÔÆæ","isPartOf":{"@id":"https:\/\/uwm.edu\/ai\/#website"},"datePublished":"2026-01-14T20:17:47+00:00","dateModified":"2026-03-19T17:50:02+00:00","breadcrumb":{"@id":"https:\/\/uwm.edu\/ai\/policy-analysis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uwm.edu\/ai\/policy-analysis\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/uwm.edu\/ai\/policy-analysis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uwm.edu\/ai\/"},{"@type":"ListItem","position":2,"name":"Policy Analysis"}]},{"@type":"WebSite","@id":"https:\/\/uwm.edu\/ai\/#website","url":"https:\/\/uwm.edu\/ai\/","name":"AI at 51ÁÔÆæ","description":"","publisher":{"@id":"https:\/\/uwm.edu\/ai\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uwm.edu\/ai\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/uwm.edu\/ai\/#organization","name":"University of Wisconsin - Milwaukee","url":"https:\/\/uwm.edu\/ai\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/uwm.edu\/ai\/#\/schema\/logo\/image\/","url":"https:\/\/uwm.edu\/ai\/wp-content\/uploads\/sites\/699\/2020\/11\/uwm-seo-logo.jpg","contentUrl":"https:\/\/uwm.edu\/ai\/wp-content\/uploads\/sites\/699\/2020\/11\/uwm-seo-logo.jpg","width":225,"height":224,"caption":"University of Wisconsin - Milwaukee"},"image":{"@id":"https:\/\/uwm.edu\/ai\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/uwm.edu\/ai\/wp-json\/wp\/v2\/pages\/331","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uwm.edu\/ai\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/uwm.edu\/ai\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/uwm.edu\/ai\/wp-json\/wp\/v2\/users\/38638"}],"replies":[{"embeddable":true,"href":"https:\/\/uwm.edu\/ai\/wp-json\/wp\/v2\/comments?post=331"}],"version-history":[{"count":28,"href":"https:\/\/uwm.edu\/ai\/wp-json\/wp\/v2\/pages\/331\/revisions"}],"predecessor-version":[{"id":658,"href":"https:\/\/uwm.edu\/ai\/wp-json\/wp\/v2\/pages\/331\/revisions\/658"}],"wp:attachment":[{"href":"https:\/\/uwm.edu\/ai\/wp-json\/wp\/v2\/media?parent=331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}