{"version":"1.0","provider_name":"Information Technology","provider_url":"https:\/\/www.med.unc.edu\/it","author_name":"Amy Rogers","author_url":"https:\/\/www.med.unc.edu\/it\/author\/arog\/","title":"Information Security | Information Technology","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"N6cESAbzsa\"><a href=\"https:\/\/www.med.unc.edu\/it\/about\/about-us\/it-security-office\/\">Information Security<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.med.unc.edu\/it\/about\/about-us\/it-security-office\/embed\/#?secret=N6cESAbzsa\" width=\"600\" height=\"338\" title=\"&#8220;Information Security&#8221; &#8212; Information Technology\" data-secret=\"N6cESAbzsa\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"Working collaboratively to ensure the confidentiality, integrity, and availability of data to enable UNC School of Medicine faculty, staff, and students to safely pursue academic and research activities. The Information Security Team\u00a0is responsible for promoting a secure information technology environment in the School of Medicine.\u00a0 Our goal is to protect the confidentiality, integrity and availability &hellip; Read more"}