{"id":426,"date":"2025-08-21T19:31:48","date_gmt":"2025-08-21T19:31:48","guid":{"rendered":"https:\/\/qa.www.purdue.edu\/vpec\/policies\/?page_id=426"},"modified":"2026-03-16T19:49:32","modified_gmt":"2026-03-16T19:49:32","slug":"viib8","status":"publish","type":"page","link":"https:\/\/www.purdue.edu\/vpec\/policies\/information-technology\/viib8\/","title":{"rendered":"Information Security and Privacy (VII.B.8)"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":9,"featured_media":0,"parent":201,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-card.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-426","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.purdue.edu\/vpec\/policies\/wp-json\/wp\/v2\/pages\/426","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.purdue.edu\/vpec\/policies\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.purdue.edu\/vpec\/policies\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.purdue.edu\/vpec\/policies\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.purdue.edu\/vpec\/policies\/wp-json\/wp\/v2\/comments?post=426"}],"version-history":[{"count":8,"href":"https:\/\/www.purdue.edu\/vpec\/policies\/wp-json\/wp\/v2\/pages\/426\/revisions"}],"predecessor-version":[{"id":2565,"href":"https:\/\/www.purdue.edu\/vpec\/policies\/wp-json\/wp\/v2\/pages\/426\/revisions\/2565"}],"up":[{"embeddable":true,"href":"https:\/\/www.purdue.edu\/vpec\/policies\/wp-json\/wp\/v2\/pages\/201"}],"wp:attachment":[{"href":"https:\/\/www.purdue.edu\/vpec\/policies\/wp-json\/wp\/v2\/media?parent=426"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}