{"version":"1.0","provider_name":"Miller Thomson","provider_url":"https:\/\/www.millerthomson.com\/en\/","author_name":"Katherine Chan","author_url":"https:\/\/www.millerthomson.com\/en\/author\/chank\/","title":"Technology, IP and Privacy Law Firm | Miller Thomson","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"j9LyrGrqrE\"><a href=\"https:\/\/www.millerthomson.com\/en\/expertise\/technology-ip-and-privacy\/\">Technology, IP and Privacy<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.millerthomson.com\/en\/expertise\/technology-ip-and-privacy\/embed\/#?secret=j9LyrGrqrE\" width=\"600\" height=\"338\" title=\"&#8220;Technology, IP and Privacy&#8221; &#8212; Miller Thomson\" data-secret=\"j9LyrGrqrE\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.millerthomson.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.millerthomson.com\/wp-content\/uploads\/2024\/09\/Expertise_Technology-IP-and-Privacy_Featured.jpg","thumbnail_width":1920,"thumbnail_height":1098,"description":"We advise cutting-edge companies on a range of matters concerning the development of digital commerce and online business strategies, enforcement and commercialization of intellectual property rights, as well as mitigating the inherent risks associated with privacy, security and the increasingly complex regulatory regimes growing around them."}