{"id":12975,"date":"2024-01-02T13:38:09","date_gmt":"2024-01-02T18:38:09","guid":{"rendered":"https:\/\/www.med.unc.edu\/it\/?page_id=12975"},"modified":"2026-03-12T10:19:21","modified_gmt":"2026-03-12T14:19:21","slug":"guidelines","status":"publish","type":"page","link":"https:\/\/www.med.unc.edu\/it\/services\/lecture-capture\/guidelines\/","title":{"rendered":"Lecture Capture Guidelines"},"content":{"rendered":"<h2>Guidelines for Using This Service:<\/h2>\n<ul>\n<li>UNC School of Medicine IT (SOM IT) cannot record, store, or stream any content that is in violation of state or federal laws, or <a href=\"https:\/\/www.med.unc.edu\/it\/about\/policies\/\">UNC and SOM IT Information Security Policies<\/a>. By adding files to this system, you confirm your use follows all related University policies and applicable laws, including <a href=\"https:\/\/policies.unc.edu\/TDClient\/2833\/Portal\/KB\/ArticleDet?ID=132138\">UNC Copyright Policy<\/a> and <a href=\"https:\/\/policies.unc.edu\/TDClient\/2833\/Portal\/KB\/ArticleDet?ID=131247\">Information Technology Acceptable Use<\/a>. Please see <a href=\"https:\/\/www.med.unc.edu\/it\/services\/lecture-capture\/guidelines\/#unc-policies\">UNC Policies and Procedures<\/a> below for additional resources.<\/li>\n<li><strong><span style=\"color: #ff0000;\">No Protected Health Information (PHI) can be included in Panopto recordings, even with authorization.<\/span><\/strong> Please ask presenters to remove any PHI from their presentations prior to recording.<\/li>\n<li>Please see <em>Platforms Approved for Sharing PHI<\/em>\u00a0on our <a style=\"background-color: #ffffff;\" href=\"https:\/\/www.med.unc.edu\/it\/services\/video-conferencing\/guidelines\/\">Video Conferencing Guidelines<\/a> page.<\/li>\n<li>Anyone entering or using UNC School of Medicine (SOM) public classrooms, auditoriums, and conference rooms may be recorded.<\/li>\n<li>Anyone recording in these spaces must adhere to <a href=\"https:\/\/www.med.unc.edu\/it\/services\/lecture-capture\/guidelines\/\">university and curriculum guidelines<\/a> for recording. We recommend making presenters and attendees aware of the recording prior to and during the event.\n<ul>\n<li><strong>If a presenter advises they do not want to be recorded, the recording must be canceled or deleted.<\/strong><\/li>\n<li>If an attendee advises they do not want to be recorded, please encourage them to not speak during the recording and to sit or stand in an area off camera.<\/li>\n<li>We recommend muting all mics before and after the presentations to prevent recording private conversations.<\/li>\n<\/ul>\n<\/li>\n<li>Any presenters not affiliated with the UNC School of Medicine (SOM) must sign our <a style=\"background-color: #ffffff;\" href=\"https:\/\/www.med.unc.edu\/it\/services\/lecture-capture\/recording-release-form\/\">Recording Release Form<\/a>. <strong>Each department is responsible for obtaining and retaining the original, signed documents.<\/strong><\/li>\n<li>All video\u202f<a href=\"https:\/\/digitalaccessibility.unc.edu\/captions-transcripts\/\">captions and transcripts<\/a>\u202fmust comply with Web Content Accessibility Guidelines (WCAG) 2.2 AA standards for digital accessibility by April 24, 2026.\u202fPlease visit the Digital Accessibility Office\u2019s <a href=\"https:\/\/digitalaccessibility.unc.edu\/ada-digital-accessibility-compliance-plan\/\">Digital Accessibility Compliance Plan<\/a> and <a href=\"https:\/\/digitalaccessibility.unc.edu\/training\/\">Training<\/a> webpages for helpful information and training resources. Please also visit the <a href=\"https:\/\/www.med.unc.edu\/it\/training\/som-digital-accessibility-hub\/\">SOM Digital Accessibility Hub<\/a> for support, training, and information specific to the School of Medicine.<\/li>\n<li>SOM IT will have no liability or responsibility in the event of any loss or interruption of services or recorded content due to causes beyond its reasonable control or ability to foresee.<\/li>\n<li>Panopto recordings are deleted automatically after two years of no usage.<\/li>\n<li><strong>Copy protection may cause a green screen to record in place of content when recording over HDMI.<\/strong> This happens automatically with Apple devices (e.g., Mac laptops, iPads), and with any devices when an app streaming encrypted content is open. Presenters should transfer their files to the room computer for presenting if they encounter problems with their device.<\/li>\n<li>Please see our <a href=\"https:\/\/www.med.unc.edu\/it\/services\/lecture-capture\/best-practices-and-faqs\/\">Best Practices and FAQs<\/a> page for helpful recording information.<\/li>\n<\/ul>\n<h2>Requesting a Scheduled Recording<\/h2>\n<p>Recordings can be pre-scheduled using our <a href=\"https:\/\/shibboleth-dept-atsstars.cloudapps.unc.edu\/ATSSite\/secure\/forms\/somcapture\/\">Request a Scheduled Recording<\/a> form.<\/p>\n<h3>Before Requesting a Recording<\/h3>\n<ul>\n<li>Requestors must receive <a href=\"https:\/\/www.med.unc.edu\/it\/services\/room-reservations\/\">Room Reservation<\/a> confirmation before requesting recordings. Recording start and end times cannot be outside of the room reservation times.<\/li>\n<li>Faculty, staff, and event coordinators can request scheduled recordings. Students can only request recordings of their <strong>Public<\/strong> Dissertation Defense Presentation.<\/li>\n<li>Recording requests should be made at least two business days in advance to allow time for proper scheduling. You will receive a confirmation email with a link to your recording folder.<\/li>\n<li>Panopto recordings are deleted automatically after two years of no usage.<\/li>\n<li><strong>Copy protection may cause a green screen to record in place of content when recording over HDMI.<\/strong> This happens automatically with Apple devices (e.g., Mac laptops, iPads), and with any devices when an app streaming encrypted content is open. Presenters should transfer their files to the room computer for presenting if they encounter problems with their device.<\/li>\n<\/ul>\n<h3>Recording Request Form User Agreement<\/h3>\n<p>When accessing the request form, requestors must agree to the following:<\/p>\n<ul>\n<li>UNC School of Medicine IT (SOM IT) cannot record, store, or stream any content that is in violation of state or federal laws, or <a href=\"https:\/\/www.med.unc.edu\/it\/about\/policies\/\">UNC and SOM IT Information Security Policies<\/a>. By adding files to this system, you confirm your use follows all related University policies and applicable laws, including <a href=\"https:\/\/policies.unc.edu\/TDClient\/2833\/Portal\/KB\/ArticleDet?ID=132138\">UNC Copyright Policy<\/a> and <a href=\"https:\/\/policies.unc.edu\/TDClient\/2833\/Portal\/KB\/ArticleDet?ID=131247\">Information Technology Acceptable Use<\/a>.<\/li>\n<li><strong><span style=\"color: #ff0000;\">No Protected Health Information (PHI) can be included in Panopto recordings, even with authorization.<\/span><\/strong> Please ask presenters to remove any PHI from their presentations prior to recording.<\/li>\n<li>Anyone entering or using UNC School of Medicine (SOM) public classrooms, auditoriums, and conference rooms may be recorded.<\/li>\n<li>Anyone recording in these spaces must adhere to <a href=\"https:\/\/www.med.unc.edu\/it\/services\/lecture-capture\/guidelines\/\">university and curriculum guidelines<\/a> for recording. We recommend making presenters and attendees aware of the recording prior to and during the event.\n<ul>\n<li><strong>If a presenter advises they do not want to be recorded, the recording must be canceled or deleted.<\/strong><\/li>\n<li>If an attendee advises they do not want to be recorded, please encourage them to not speak during the recording and to sit or stand in an area off camera.<\/li>\n<li>We recommend muting all mics before and after the presentations to prevent recording private conversations.<\/li>\n<\/ul>\n<\/li>\n<li>Any presenters not affiliated with the UNC School of Medicine (SOM) must sign our <a style=\"background-color: #ffffff;\" href=\"https:\/\/www.med.unc.edu\/it\/services\/lecture-capture\/recording-release-form\/\">Recording Release Form<\/a>. <strong>Each department is responsible for obtaining and retaining the original, signed documents.<\/strong><\/li>\n<li>SOM IT will have no liability or responsibility in the event of any loss or interruption of services or recorded content due to causes beyond its reasonable control or ability to foresee.<\/li>\n<\/ul>\n<h2><a id=\"unc-policies\"><\/a>UNC Policies and Procedures<\/h2>\n<ul>\n<li><a title=\"https:\/\/www.med.unc.edu\/it\/about\/policies\/\" href=\"https:\/\/www.med.unc.edu\/it\/about\/policies\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Link UNC IT and SOM IT Information Security Policies\">UNC IT and SOM IT Information Security Policies<\/a><\/li>\n<li><a title=\"https:\/\/www.med.unc.edu\/it\/about\/about-us\/it-security-office\/\" href=\"https:\/\/www.med.unc.edu\/it\/about\/about-us\/it-security-office\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Link School of Medicine IT Information Security &amp; Privacy\">School of Medicine IT Information Security<\/a><\/li>\n<li><a title=\"https:\/\/www.med.unc.edu\/patientprivacy\/policies-and-forms\/\" href=\"https:\/\/www.med.unc.edu\/patientprivacy\/policies-and-forms\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Link UNC Health Privacy Office Policies and Forms\">UNC Health Privacy Office Policies and Forms<\/a><\/li>\n<li><a title=\"https:\/\/datagov.unc.edu\/about\/datagov-overview\/\" href=\"https:\/\/datagov.unc.edu\/about\/datagov-overview\/\" target=\"_blank\" rel=\"noopener\"><span class=\"normaltextrun\">UNC Data Governance Oversight Group (DGOG)<\/span><\/a><\/li>\n<li><a title=\"https:\/\/privacy.unc.edu\/\" href=\"https:\/\/privacy.unc.edu\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Link UNC Privacy Office\">UNC Privacy Office<\/a><\/li>\n<li><a title=\"https:\/\/safecomputing.unc.edu\/\" href=\"https:\/\/safecomputing.unc.edu\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Link Safe Computing at UNC\">Safe Computing at UNC<\/a><\/li>\n<li><a title=\"https:\/\/policies.unc.edu\/TDClient\/2833\/Portal\/KB\/ArticleDet?ID=131247\" href=\"https:\/\/policies.unc.edu\/TDClient\/2833\/Portal\/KB\/ArticleDet?ID=131247\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Link UNC IT Acceptable Use Policy\">UNC IT Acceptable Use Policy<\/a><\/li>\n<li><a title=\"https:\/\/policies.unc.edu\/tdclient\/2833\/portal\/kb\/articledet?id=131260\" href=\"https:\/\/policies.unc.edu\/TDClient\/2833\/Portal\/KB\/ArticleDet?ID=131260\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Link UNC Transmission of Sensitive Information Standard\">UNC Transmission of Sensitive Information Standard<\/a><\/li>\n<li><a title=\"https:\/\/policies.unc.edu\/tdclient\/2833\/portal\/kb\/articledet?id=131245\" href=\"https:\/\/policies.unc.edu\/TDClient\/2833\/Portal\/KB\/ArticleDet?ID=131245\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Link UNC Information Security Controls Standard\">UNC Information Security Controls Standard<\/a><\/li>\n<li><a title=\"https:\/\/www.med.unc.edu\/security\/hipaa\/hipaa-train\/\" href=\"https:\/\/www.med.unc.edu\/security\/hipaa\/hipaa-train\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Link UNC School of Medicine IT Information Security &amp; Privacy HIPAA Online Training\">UNC School of Medicine IT Information Security &amp; Privacy HIPAA Online Training<\/a><\/li>\n<li><a href=\"https:\/\/policies.unc.edu\/TDClient\/2833\/Portal\/KB\/ArticleDet?ID=132138\" target=\"_blank\" rel=\"noopener\">Copyright Policy of the University of North Carolina at Chapel Hill<\/a><\/li>\n<li><a title=\"https:\/\/library.unc.edu\/scholcom\/\" href=\"https:\/\/library.unc.edu\/scholarly-communications\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Link UNC Libraries Scholarly Communications Office Copyright and Fair Use\">UNC Libraries Scholarly Communications<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Guidelines for Using This Service: UNC School of Medicine IT (SOM IT) cannot record, store, or stream any content that is in violation of state or federal laws, or UNC and SOM IT Information Security Policies. By adding files to this system, you confirm your use follows all related University policies and applicable laws, including &hellip; <a href=\"https:\/\/www.med.unc.edu\/it\/services\/lecture-capture\/guidelines\/\" aria-label=\"Read more about Lecture Capture Guidelines\">Read more<\/a><\/p>\n","protected":false},"author":112631,"featured_media":0,"parent":52,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"layout":"","cellInformation":"","apiCallInformation":"","footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-12975","page","type-page","status-publish","hentry","odd"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Lecture Capture Guidelines | Information Technology<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.med.unc.edu\/it\/services\/lecture-capture\/guidelines\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lecture Capture Guidelines | Information Technology\" \/>\n<meta property=\"og:description\" content=\"Guidelines for Using This Service: UNC School of Medicine IT (SOM IT) cannot record, store, or stream any content that is in violation of state or federal laws, or UNC and SOM IT Information Security Policies. By adding files to this system, you confirm your use follows all related University policies and applicable laws, including &hellip; Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.med.unc.edu\/it\/services\/lecture-capture\/guidelines\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-12T14:19:21+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/services\/lecture-capture\/guidelines\/\",\"url\":\"https:\/\/www.med.unc.edu\/it\/services\/lecture-capture\/guidelines\/\",\"name\":\"Lecture Capture Guidelines | Information Technology\",\"isPartOf\":{\"@id\":\"https:\/\/www.med.unc.edu\/it\/#website\"},\"datePublished\":\"2024-01-02T18:38:09+00:00\",\"dateModified\":\"2026-03-12T14:19:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.med.unc.edu\/it\/services\/lecture-capture\/guidelines\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.med.unc.edu\/it\/services\/lecture-capture\/guidelines\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/services\/lecture-capture\/guidelines\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.med.unc.edu\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\",\"item\":\"https:\/\/www.med.unc.edu\/it\/services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Lecture Capture\",\"item\":\"https:\/\/www.med.unc.edu\/it\/services\/lecture-capture\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Lecture Capture Guidelines\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/#website\",\"url\":\"https:\/\/www.med.unc.edu\/it\/\",\"name\":\"School of Medicine IT\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.med.unc.edu\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.med.unc.edu\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/#organization\",\"name\":\"UNC School of Medicine Information Technology\",\"url\":\"https:\/\/www.med.unc.edu\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/03\/InformationTechnology_logo_rgb_h.png\",\"contentUrl\":\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/03\/InformationTechnology_logo_rgb_h.png\",\"width\":1217,\"height\":151,\"caption\":\"UNC School of Medicine Information Technology\"},\"image\":{\"@id\":\"https:\/\/www.med.unc.edu\/it\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lecture Capture Guidelines | Information Technology","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.med.unc.edu\/it\/services\/lecture-capture\/guidelines\/","og_locale":"en_US","og_type":"article","og_title":"Lecture Capture Guidelines | Information Technology","og_description":"Guidelines for Using This Service: UNC School of Medicine IT (SOM IT) cannot record, store, or stream any content that is in violation of state or federal laws, or UNC and SOM IT Information Security Policies. By adding files to this system, you confirm your use follows all related University policies and applicable laws, including &hellip; Read more","og_url":"https:\/\/www.med.unc.edu\/it\/services\/lecture-capture\/guidelines\/","og_site_name":"Information Technology","article_modified_time":"2026-03-12T14:19:21+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.med.unc.edu\/it\/services\/lecture-capture\/guidelines\/","url":"https:\/\/www.med.unc.edu\/it\/services\/lecture-capture\/guidelines\/","name":"Lecture Capture Guidelines | Information Technology","isPartOf":{"@id":"https:\/\/www.med.unc.edu\/it\/#website"},"datePublished":"2024-01-02T18:38:09+00:00","dateModified":"2026-03-12T14:19:21+00:00","breadcrumb":{"@id":"https:\/\/www.med.unc.edu\/it\/services\/lecture-capture\/guidelines\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.med.unc.edu\/it\/services\/lecture-capture\/guidelines\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.med.unc.edu\/it\/services\/lecture-capture\/guidelines\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.med.unc.edu\/it\/"},{"@type":"ListItem","position":2,"name":"Services","item":"https:\/\/www.med.unc.edu\/it\/services\/"},{"@type":"ListItem","position":3,"name":"Lecture Capture","item":"https:\/\/www.med.unc.edu\/it\/services\/lecture-capture\/"},{"@type":"ListItem","position":4,"name":"Lecture Capture Guidelines"}]},{"@type":"WebSite","@id":"https:\/\/www.med.unc.edu\/it\/#website","url":"https:\/\/www.med.unc.edu\/it\/","name":"School of Medicine IT","description":"","publisher":{"@id":"https:\/\/www.med.unc.edu\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.med.unc.edu\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.med.unc.edu\/it\/#organization","name":"UNC School of Medicine Information Technology","url":"https:\/\/www.med.unc.edu\/it\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.med.unc.edu\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/03\/InformationTechnology_logo_rgb_h.png","contentUrl":"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/03\/InformationTechnology_logo_rgb_h.png","width":1217,"height":151,"caption":"UNC School of Medicine Information Technology"},"image":{"@id":"https:\/\/www.med.unc.edu\/it\/#\/schema\/logo\/image\/"}}]}},"_links_to":[],"_links_to_target":[],"_links":{"self":[{"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/pages\/12975","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/users\/112631"}],"replies":[{"embeddable":true,"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/comments?post=12975"}],"version-history":[{"count":7,"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/pages\/12975\/revisions"}],"predecessor-version":[{"id":13379,"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/pages\/12975\/revisions\/13379"}],"up":[{"embeddable":true,"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/pages\/52"}],"wp:attachment":[{"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/media?parent=12975"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}