{"id":3569,"date":"2025-12-02T01:02:38","date_gmt":"2025-12-02T06:02:38","guid":{"rendered":"https:\/\/it-prosolution.com\/?page_id=3569"},"modified":"2025-12-02T01:40:38","modified_gmt":"2025-12-02T06:40:38","slug":"hipaa-compliance","status":"publish","type":"page","link":"https:\/\/it-prosolution.com\/trust-center\/compliance-and-regulation\/hipaa-compliance\/","title":{"rendered":"HIPAA Compliance"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3569\" class=\"elementor elementor-3569\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6eef123 elementor-reverse-mobile elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"6eef123\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2f3d814\" data-id=\"2f3d814\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8c56587 elementor-widget elementor-widget-aux_modern_heading\" data-id=\"8c56587\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_heading.default\">\n\t\t\t\t\t<section class=\"aux-widget-modern-heading\">\n            <div class=\"aux-widget-inner\"><h1 class=\"aux-modern-heading-primary\"><\/h1><h3 class=\"aux-modern-heading-secondary\"><span class=\"aux-head-before\">HIPAA<\/span><span class=\"aux-head-highlight\">Compliance<\/span><\/h3><\/div>\n        <\/section>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a1060fc elementor-widget elementor-widget-text-editor\" data-id=\"a1060fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a broad national standard that places protections around healthcare and health insurance in the United States of America. While the standard touches many different aspects of patient care, there are specific provisions or \u201crules\u201d designed to protect sensitive patient health information from improper use and disclosure. The rules were required by HIPAA to be developed by the Secretary of the U.S. Department of Health and Human Services (HHS). The rules included the\u00a0<strong>HIPAA Privacy Rule,<\/strong>\u00a0and a subset of requirements labeled the\u00a0<strong>HIPAA Security Rule<\/strong>. The outcome for not adhering to HIPAA requirements can result in civil and even criminal penalties.<\/p><p>The two rules outlined above set the overall requirement for\u00a0<strong>administrative, technical, and physical safeguards<\/strong>\u00a0as they relate to HIPAA. It is these types of controls that our consultants help organizations to achieve.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1957c04 elementor-align-left elementor-mobile-align-center elementor-widget elementor-widget-button\" data-id=\"1957c04\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/it-prosolution.com\/booking\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Talk with Us<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2bcf969\" data-id=\"2bcf969\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-34b9c84 elementor-widget elementor-widget-image\" data-id=\"34b9c84\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"940\" height=\"788\" src=\"https:\/\/it-prosolution.com\/trust-center\/wp-content\/uploads\/sites\/19\/2024\/07\/HIPAA.png\" class=\"attachment-large size-large wp-image-4577\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a0a8029 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"a0a8029\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3109be1\" data-id=\"3109be1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b0e4bc4 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"b0e4bc4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wide\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-3dd3fb7\" data-id=\"3dd3fb7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-db3da4a elementor-widget elementor-widget-icon-box\" data-id=\"db3da4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"#\" >\n\t\t\t\t\t\t\tAdministrative Safeguards\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t    <ul>\n        <li>Risk Assessment<\/li>\n        <li>Risk Management Program Development<\/li>\n        <li>Virtual Risk Officer<\/li>\n        <li>HIPAA \/ HITECH Gap Assessments<\/li>\n        <li>HIPAA Security Policies<\/li>\n        <li>Sanction Policies<\/li>\n        <li>Information Security Policy Development<\/li>\n        <li>Policy Reviews<\/li>\n        <li>Information Systems Assessment and Reviews<\/li>\n        <li>Security Awareness Training<\/li>\n        <li>Business Continuity Plan Development<\/li>\n        <li>Vendor Risk Assessments<\/li>\n    <\/ul>\n<br>\n<br>\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-7bfd2b2\" data-id=\"7bfd2b2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7554aff elementor-widget elementor-widget-icon-box\" data-id=\"7554aff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"#\" >\n\t\t\t\t\t\t\tTechnical Safeguards\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t<ul>\n    <li>Vulnerability Assessments<\/li>\n    <li>Penetration Testing Services<\/li>\n    <li>Incident Response Plan<\/li>\n    <li>Data Breach and Forensic Investigation Services<\/li>\n    <li>Network Access Control (NAC) Services<\/li>\n    <li>Dynamic Segmentation Security Programs<\/li>\n    <li>Identity and Access Management Solutions<\/li>\n    <li>Security Log Monitoring<\/li>\n    <li>Endpoint Detection and Response Solutions<\/li>\n    <li>Encryption Solutions<\/li>\n    <li>Virtual Chief Information Security Officer<\/li>\n    <li>Virtual Privacy Officer Services<\/li>\n    <li>Medical Device Risk Assessments<\/li>\n<\/ul>\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-281b219\" data-id=\"281b219\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ab64dab elementor-widget elementor-widget-icon-box\" data-id=\"ab64dab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"#\" >\n\t\t\t\t\t\t\tPhysical Safeguards\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t<ul>\n    <li>Physical Security Assessments<\/li>\n    <li>Site Visits<\/li>\n    <li>Social Engineering Testing Services<\/li>\n    <li>Fraud Assessment Services<\/li>\n    <li>Business Continuity and Contingency Planning Services<\/li>\n    <li>Building Access Control Planning Services<\/li>\n    <li>Data Disposal Plan and Solutions<\/li>\n    <li>Electronic<\/li>\n    <li>Physical Media<\/li>\n    <li>Data Backup Plan and Solutions<\/li>\n<\/ul>\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-378005f elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"378005f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2c60180\" data-id=\"2c60180\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7ffb80c elementor-widget elementor-widget-aux_modern_heading\" data-id=\"7ffb80c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"aux_modern_heading.default\">\n\t\t\t\t\t<section class=\"aux-widget-modern-heading\">\n            <div class=\"aux-widget-inner\"><h2 class=\"aux-modern-heading-primary\"><\/h2><h3 class=\"aux-modern-heading-secondary\"><span class=\"aux-head-before\">IPS Strengths<\/span><span class=\"aux-head-highlight\"> At A Glance<\/span><\/h3><\/div>\n        <\/section>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-102fe88 aux-appear-watch-animation aux-fade-in-right elementor-widget elementor-widget-text-editor\" data-id=\"102fe88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<div class=\"aux-bus2-title-divider\">\u00a0<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5cb03b elementor-widget elementor-widget-text-editor\" data-id=\"b5cb03b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>IPS has been helping organizations meet HIPAA compliance requirements since 2013. We work with clients to meet the administrative, technical, and physical safeguards required by HIPAA.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-38c6e4b elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no\" data-id=\"38c6e4b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0ef6dd6\" data-id=\"0ef6dd6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d05780c elementor-widget elementor-widget-icon-box\" data-id=\"d05780c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<a href=\"#\" >\n\t\t\t\t\t\t\tRisk And Compliance\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tAt IPS, we help with your Risk and Compliance programs. We also setup standards that make sense for your industry. If a program already exists, we piggyback off of what you are currently doing and make adjustments as needed.<br><br>\n\n    <ul>\n        <li>SOC 2 Type I and 2 Planning<\/li>\n        <li>ISO 27001:2022 Delivery<\/li>\n        <li>Risk Assessments<\/li>\n        <li>Governance, Risk, and Compliance (GRC) Setup<\/li>\n        <li>Internal Audit of Controls<\/li>\n        <li>PCI, HIPAA, FERPA, FACTA, GLBA Programs<\/li>\n        <li>ISO 27001, NIST Cybersecurity Framework, CMMC and NIST 800-161 Programs<\/li>\n    <\/ul>\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"aux-parallax-section elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-65e6cd0\" data-id=\"65e6cd0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7a08763 elementor-widget elementor-widget-icon-box\" data-id=\"7a08763\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tThreat Protection And Response\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tWe understand that vCISO is focused on strategic risk and compliance objectives throughout the year, but some organizations require hands-on cybersecurity expertise. Our team of professionals are ready to jump in where you need us the most. Our experts are assigned based on your specific needs. <br><br>\n\n    <ul style=\"color:white\">\n        <li>Threat Hunting<\/li>\n        <li>Incident Response Program<\/li>\n        <li>Incident Tabletop Exercises (TTX)<\/li>\n        <li>Ransomware Prevention Program<\/li>\n        <li>Vulnerability Scanning and Vulnerability Management<\/li>\n        <li>Security Engineering and Architecture Assistance<\/li>\n        <li>Identity &amp; Access Management<\/li>\n        <li>Managed Detection and Response (MDR) with CrowdStrike<\/li>\n    <\/ul>\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>HIPAACompliance The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a broad national standard that places protections around healthcare and health insurance in the United States of America. While the standard touches many different aspects of patient care, there are specific provisions or \u201crules\u201d designed to protect sensitive patient health information from improper use and disclosure. The rules were required by HIPAA to be developed by the Secretary of the U.S. Department of Health and Human Services (HHS). The rules included the\u00a0HIPAA Privacy Rule,\u00a0and a subset of requirements labeled the\u00a0HIPAA Security Rule. The outcome for not adhering to HIPAA requirements can result in civil and even criminal penalties. The two rules outlined above set the overall requirement for\u00a0administrative, technical, and physical safeguards\u00a0as they relate to HIPAA. It is these types of controls that our consultants help organizations to achieve. Talk with Us Administrative Safeguards Risk Assessment Risk Management Program Development Virtual Risk Officer HIPAA \/ HITECH Gap Assessments HIPAA Security Policies Sanction Policies Information Security Policy Development Policy Reviews Information Systems Assessment and Reviews Security Awareness Training Business Continuity Plan Development Vendor Risk Assessments Technical Safeguards Vulnerability Assessments Penetration Testing Services Incident Response Plan Data Breach and Forensic Investigation Services Network Access Control (NAC) Services Dynamic Segmentation Security Programs Identity and Access Management Solutions Security Log Monitoring Endpoint Detection and Response Solutions Encryption Solutions Virtual Chief Information Security Officer Virtual Privacy Officer Services Medical Device Risk Assessments Physical Safeguards Physical Security Assessments Site Visits Social Engineering Testing Services Fraud Assessment Services Business Continuity and Contingency Planning Services Building Access Control Planning Services Data Disposal Plan and Solutions Electronic Physical Media Data Backup Plan and Solutions IPS Strengths At A Glance \u00a0 IPS has been helping organizations meet HIPAA compliance requirements since 2013. We work with clients to meet the administrative, technical, and physical safeguards required by HIPAA.\u00a0 Risk And Compliance At IPS, we help with your Risk and Compliance programs. We also setup standards that make sense for your industry. If a program already exists, we piggyback off of what you are currently doing and make adjustments as needed. SOC 2 Type I and 2 Planning ISO 27001:2022 Delivery Risk Assessments Governance, Risk, and Compliance (GRC) Setup Internal Audit of Controls PCI, HIPAA, FERPA, FACTA, GLBA Programs ISO 27001, NIST Cybersecurity Framework, CMMC and NIST 800-161 Programs Threat Protection And Response We understand that vCISO is focused on strategic risk and compliance objectives throughout the year, but some organizations require hands-on cybersecurity expertise. Our team of professionals are ready to jump in where you need us the most. Our experts are assigned based on your specific needs. Threat Hunting Incident Response Program Incident Tabletop Exercises (TTX) Ransomware Prevention Program Vulnerability Scanning and Vulnerability Management Security Engineering and Architecture Assistance Identity &amp; Access Management Managed Detection and Response (MDR) with CrowdStrike<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":409,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3569","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/pages\/3569","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/comments?post=3569"}],"version-history":[{"count":1,"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/pages\/3569\/revisions"}],"predecessor-version":[{"id":31598,"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/pages\/3569\/revisions\/31598"}],"up":[{"embeddable":true,"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/pages\/409"}],"wp:attachment":[{"href":"https:\/\/it-prosolution.com\/trust-center\/wp-json\/wp\/v2\/media?parent=3569"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}