{"id":497,"date":"2020-02-14T15:55:01","date_gmt":"2020-02-14T15:55:01","guid":{"rendered":"https:\/\/www.med.unc.edu\/security\/?page_id=497"},"modified":"2020-02-14T15:55:01","modified_gmt":"2020-02-14T15:55:01","slug":"sitemap","status":"publish","type":"page","link":"https:\/\/www.med.unc.edu\/security\/sitemap\/","title":{"rendered":"Sitemap"},"content":{"rendered":"<div class=\"toc_sitemap\"><h3 class=\"toc_sitemap_pages\">Pages<\/h3><ul class=\"toc_sitemap_pages_list\"><li class=\"page_item page-item-120\"><a href=\"https:\/\/www.med.unc.edu\/security\/policies-guidelines\/\">Policies &#038; Guidelines<\/a><\/li>\n<li class=\"page_item page-item-7 page_item_has_children\"><a href=\"https:\/\/www.med.unc.edu\/security\/hipaa\/hipaa-train\/\">School of Medicine HIPAA Training<\/a>\n<ul class='children'>\n\t<li class=\"page_item page-item-105\"><a href=\"https:\/\/www.med.unc.edu\/security\/hipaa\/hipaa-train\/\">HIPAA Online Training<\/a><\/li>\n\t<li class=\"page_item page-item-212\"><a href=\"https:\/\/www.med.unc.edu\/security\/hipaa\/policies\/\">Security Policies<\/a><\/li>\n\t<li class=\"page_item page-item-213\"><a href=\"https:\/\/www.med.unc.edu\/security\/hipaa\/sending-secure-outgoing-email-messages\/\">Sending Secure Outgoing Email Messages<\/a><\/li>\n\t<li class=\"page_item page-item-215\"><a href=\"https:\/\/www.med.unc.edu\/security\/hipaa\/shred-it-bins\/\">Shred-It<\/a><\/li>\n\t<li class=\"page_item page-item-127\"><a href=\"https:\/\/www.med.unc.edu\/security\/hipaa\/business-associate-agreements\/\">Business Associate Agreements<\/a><\/li>\n<\/ul>\n<\/li>\n<li class=\"page_item page-item-2\"><a href=\"https:\/\/www.med.unc.edu\/security\/\">Security<\/a><\/li>\n<li class=\"page_item page-item-123\"><a href=\"https:\/\/www.med.unc.edu\/security\/security-privacy-awareness\/\">Security Awareness<\/a><\/li>\n<li class=\"page_item page-item-118\"><a href=\"https:\/\/www.med.unc.edu\/security\/news-alerts\/\">Security News &amp; Alerts<\/a><\/li>\n<li class=\"page_item page-item-497\"><a href=\"https:\/\/www.med.unc.edu\/security\/sitemap\/\">Sitemap<\/a><\/li>\n<li class=\"page_item page-item-126\"><a href=\"https:\/\/www.med.unc.edu\/security\/security-2\/\">Welcome to the Information Security &#038; Privacy Web Site<\/a><\/li>\n<li class=\"page_item page-item-129\"><a href=\"https:\/\/www.med.unc.edu\/security\/helpful-tips\/\">Helpful Tips<\/a><\/li>\n<li class=\"page_item page-item-222\"><a href=\"https:\/\/www.med.unc.edu\/security\/report-an-incident\/\">Report an Incident<\/a><\/li>\n<li class=\"page_item page-item-228\"><a href=\"http:\/\/www.med.unc.edu\/security\/laptopencryption\">Laptop Encryption<\/a><\/li>\n<\/ul><h3 class=\"toc_sitemap_categories\">Categories<\/h3><ul class=\"toc_sitemap_categories_list\"><li class=\"cat-item-none\">No categories<\/li><\/ul><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":79967,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-497","page","type-page","status-publish","hentry","odd"],"acf":[],"_links_to":[],"_links_to_target":[],"_links":{"self":[{"href":"https:\/\/www.med.unc.edu\/security\/wp-json\/wp\/v2\/pages\/497","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.med.unc.edu\/security\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.med.unc.edu\/security\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.med.unc.edu\/security\/wp-json\/wp\/v2\/users\/79967"}],"replies":[{"embeddable":true,"href":"https:\/\/www.med.unc.edu\/security\/wp-json\/wp\/v2\/comments?post=497"}],"version-history":[{"count":0,"href":"https:\/\/www.med.unc.edu\/security\/wp-json\/wp\/v2\/pages\/497\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.med.unc.edu\/security\/wp-json\/wp\/v2\/media?parent=497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}