{"id":251813,"date":"2022-06-22T12:19:35","date_gmt":"2022-06-22T12:19:35","guid":{"rendered":"https:\/\/www.webscale.com\/?page_id=251813"},"modified":"2022-06-22T12:19:35","modified_gmt":"2022-06-22T12:19:35","slug":"information-security","status":"publish","type":"page","link":"https:\/\/www.webscale.com\/information-security\/","title":{"rendered":"Information Security Management Commitment"},"content":{"rendered":"
[et_pb_section fb_built=”1″ _builder_version=”4.16″ _module_preset=”default” locked=”off” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ _module_preset=”075a99c8-6db3-4eef-b4ec-8c7879984678″ custom_padding=”45px||45px||false|false” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” pac_dcm_carousel_specific_module_num=”0″ global_colors_info=”{}”][et_pb_text _builder_version=”4.19.5″ _module_preset=”0270faec-c4d6-43f9-a138-593c0e958406″ text_orientation=”center” global_colors_info=”{}”]<\/p>\n
[\/et_pb_text][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” text_orientation=”center” global_colors_info=”{}”]<\/p>\n
[\/et_pb_text][et_pb_text _builder_version=”4.18.0″ _module_preset=”default” link_font=”||||||||” link_text_color=”#5470ff” text_orientation=”center” global_colors_info=”{}”]Information Security<\/a> | Acceptable Use Policy<\/a> | Master SLA<\/a> | MSA<\/a> | DPA<\/a>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.19.5″ _module_preset=”3c235741-b8d5-4ac4-8de5-b30e3dc4c85d” background_color=”#F9F9F9″ global_colors_info=”{}”][et_pb_row module_class=”li-content” _builder_version=”4.19.5″ _module_preset=”default” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ _module_preset=”default” pac_dcm_carousel_specific_module_num=”0″ global_colors_info=”{}”][et_pb_text module_class=”li-content” _builder_version=”4.18.0″ _module_preset=”default” global_colors_info=”{}”]<\/p>\n Version 2.0 – Dated September 14, 2022<\/p>\n <\/p>\n 1. Commitment to Information Security<\/strong><\/p>\n <\/strong> With an understanding that ensuring information security is one of the most critical tasks of management, Webscale Networks will ensure that every person engaged in its operations will be committed to it.<\/p>\n 2. Information Security Policy<\/strong><\/p>\n <\/strong> To build an information security management system aimed at protecting information assets, Webscale Networks will set out an Information Security Policy that serves as a foundation for the system. It will comply with it and continuously review it to improve its services.<\/p>\n 3. Protection of Information Assets<\/strong><\/p>\n <\/strong> Webscale Networks will institute appropriate management measures according to the state of individual operations to unfailingly protect information assets from any threat to its confidentiality, integrity, and availability.<\/p>\n 4. Compliance with Laws and Regulations<\/strong><\/p>\n <\/strong> Webscale Networks will comply with applicable laws and regulations, other rules, and contractual requirements to ensure information security.<\/p>\n 5. Education and Training<\/strong><\/p>\n <\/strong> Webscale Networks will offer education and training to personnel engaged in its operations to improve their awareness of information security and familiarize them with the Information Security Policy.<\/p>\n 6. Prevention of Accidents and Actions<\/strong><\/p>\n <\/strong> Webscale Networks will run its information security management system to ensure that every employee works to prevent information security accidents from occurring. Should an accident take place, we will swiftly implement appropriate actions, including those for preventing recurrence.<\/p>\n 7. Auditing<\/strong><\/p>\n <\/strong> Webscale Networks will regularly audit the operation of its information security management system and carry out remedial actions as needed to maintain information security.<\/p>\n 8. Continuous Improvement<\/strong><\/p>\n <\/strong> Every year we set information security goals, define, and plan activities to achieve those objectives, then, according to periodical review results, set the following year\u2019s goals. In addition, we regularly evaluate and review our Information Security Policy, its related internal regulations, and our management system, pursuing continuous improvement of information security.\u200b\u200b<\/strong><\/p>\n 9. Webscale Platform Security Commitments:<\/strong><\/strong><\/p>\n 10. Data Security Measures<\/strong><\/p>\n Webscale has implemented and will maintain appropriate technical and organizational security measures to protect customer personal data from security incidents and to preserve the security and confidentiality of the customer personal data (\u201cSecurity Measures\u201d). The Security Measures applicable to the Services are as follows:<\/p>\n a) Web Application Penetration Test:<\/strong> Webscale shall continue to annually engage in web application penetration testing.<\/strong> Upon any customer\u2019s written request, we will provide the executive summary of the report to Customer. We will address all medium, critical and severe vulnerabilities in the findings of the report within a reasonable, risk-based timeframe.<\/p>\n b) Security Awareness Training:<\/strong> Webscale will provide annual security training to all personnel. \u201cSecurity Training\u201d<\/strong> shall address security topics to educate users about the importance of information security and safeguards against data loss, misuse or breach through physical, logical and social engineering mechanisms. Training materials will address industry standard topics which include, but are not limited to:<\/p>\n c) Vulnerability Scan:<\/strong> Webscale shall ensure that vulnerability scans are performed on servers continuously and network security scans are completed at a minimum biannually<\/strong>, in each case using an industry standard vulnerability scanning tool.<\/p>\n d) Employee-Related Policies:<\/strong><\/p>\n e) Process-Level Requirements:<\/strong> We will implement the following processes to ensure security and privacy:<\/p>\n f) Application-Level Requirements<\/strong><\/p>\n g) Data-Level Requirements<\/strong><\/p>\n h) End User Computing Level Requirements<\/strong><\/p>\n i) Compliance Requirements<\/strong><\/p>\n j) Personnel:<\/strong> Webscale restricts its personnel from downloading and\/or processing Customer Personal Data without authorization by Webscale as set forth in the Security Measures and shall ensure that any person who is authorized by Webscale to process Customer Personal Data is under an appropriate obligation of confidentiality.<\/p>\n k) Security Incident Response:<\/strong> Upon becoming aware of a Security Incident, Webscale will notify Customer without undue delay and, in any case, where feasible, within seventy-two (72) hours after becoming aware. Webscale will provide information relating to the Security Incident as it becomes known or as is reasonably requested by Customer to fulfill its obligations as controller and will also take reasonable steps to contain, investigate, and mitigate any Security Incident.<\/p>\n l) SOC 2 Certification:<\/strong> Webscale has earned SOC 2 type II certification<\/strong> and we go through an annual review.<\/p>\n m) Data Minimization:<\/strong> Webscale will ensure that the personal data it collects and processes will be adequate, relevant, and limited to what is necessary to provide the Services<\/p>\n n) Data Retention and Destruction:<\/strong> Webscale will have in place secured destruction processes and will delete Customer personal data utilizing secure methods (equivalent to or greater than that of NIST SP-800-88 Rev. 1 or its successor guidelines) that render the data unreadable and unrecoverable.<\/p>\n o) Security Incident Response:<\/strong> [\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":" LegalInformation Security Management CommitmentInformation Security | Acceptable Use Policy | Master SLA | MSA | DPAVersion 2.0 – Dated September 14, 2022 1. Commitment to Information Security With an understanding that ensuring information security is one of the most critical tasks of management, Webscale Networks will ensure that every person engaged in its operations […]<\/p>\n","protected":false},"author":34,"featured_media":0,"parent":0,"menu_order":19,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","rank_math_lock_modified_date":false,"_aioseo_description":"","_aioseo_keywords":"","_aioseo_og_article_section":"","_aioseo_og_article_tags":"","_aioseo_og_description":"","_aioseo_og_title":"","_aioseo_title":"","_aioseo_twitter_description":"","_aioseo_twitter_title":"","_author_photo":"","_doc_url":"","_dp_original":"","_et_autogenerated_title":"","_et_body_layout_enabled":"","_et_body_layout_id":"","_et_builder_dynamic_assets_loading_attr_threshold":"11","_et_builder_module_features_cache":null,"_et_builder_version":"VB|Divi|4.19.5","_et_default":"","_et_enabled":"","_et_footer_layout_enabled":"","_et_footer_layout_id":"","_et_header_layout_enabled":"","_et_header_layout_id":"","_et_pb_ab_current_shortcode":"[et_pb_split_track id=\"251813\" \/]","_et_pb_ab_subjects":"","_et_pb_built_for_post_type":"page","_et_pb_custom_css":".entry-content p strong {\n font-weight: 700;\n color: #231f20;\n}\n.et_pb_column_0 .et_pb_text_inner a:nth-child(1) {\n color: #999 !important;\n}\n.et_pb_column_0 .et_pb_text a {\n padding: 6px;\n}\n.et_pb_column_0 .et_pb_text p {\n color: #ccc;\n}\np:not(.has-background):last-of-type {\n padding-bottom: 1em;\n}\n#footer {\n border-top: 1px solid #f3f4f4;\n}","_et_pb_enable_shortcode_tracking":"","_et_pb_excluded_global_options":"","_et_pb_first_image":"","_et_pb_gutter_width":"2","_et_pb_module_type":"","_et_pb_page_layout":"et_right_sidebar","_et_pb_page_z_index":"","_et_pb_post_hide_nav":"default","_et_pb_row_layout":"","_et_pb_show_page_creation":"off","_et_pb_show_title":"","_et_pb_side_nav":"off","_et_pb_static_css_file":"","_et_pb_truncate_post":" Protect the confidentiality and integrity of Webscale\u2019s SaaS platform and sensitive information 10. Data Security Measures The importance of information security and proper handling of PII c) Vulnerability Scan: Webscale shall ensure that vulnerability scans are performed on servers continuously and network security scans are completed at a minimum biannually, in each case using an industry standard vulnerability scanning tool. Unauthorized persons will be prevented from gaining physical access to our premises and the rooms where data processing systems are located. e) Process-Level Requirements: We will implement the following processes to ensure security and privacy:<\/p>\n Webscale shall implement user termination controls that include access removal \/ disablement promptly upon termination of staff. f) Application-Level Requirements<\/p>\n Webscale shall maintain documentation on overall application architecture, process flows, and security features for applications handling customer personal data. g) Data-Level Requirements<\/p>\n Encryption and hashing protocols used for customer personal data in transit and at rest shall support NIST approved encryption standards (e.g. SSH, TLS). h) End User Computing Level Requirements<\/p>\n Webscale will require anti-virus scans with frequent signature updates for end-user computing devices to run at least weekly. i) Compliance Requirements<\/p>\n Webscale will implement building access control to control and track access to its networks and other equipment. j) Personnel: Webscale restricts its personnel from downloading and\/or processing Customer Personal Data without authorization by Webscale as set forth in the Security Measures and shall ensure that any person who is authorized by Webscale to process Customer Personal Data is under an appropriate obligation of confidentiality. Executives will immediately confer with each other and with legal counsel regarding any security incident to ensure compliance with legal and contractual obligations.\n
\n
\n
\n
\n
\n
\n
\n
Upon becoming aware of any incident in which it suspects that unauthorized access has been gained to Webscale\u2019s systems, the executives of the company at the highest levels will be immediately notified.<\/p>\n\n
\n
\n1. Commitment to Information Security
\n With an understanding that ensuring information security is one of the most critical tasks of management, Webscale Networks will ensure that every person engaged in its operations will be committed to it.
\n2. Information Security Policy
\n To build an information security management system aimed at protecting information assets, Webscale Networks will set out an Information Security Policy that serves as a foundation for the system. It will comply with it and continuously review it to improve its services.
\n3. Protection of Information Assets
\n Webscale Networks will institute appropriate management measures according to the state of individual operations to unfailingly protect information assets from any threat to its confidentiality, integrity, and availability.
\n4. Compliance with Laws and Regulations
\n Webscale Networks will comply with applicable laws and regulations, other rules, and contractual requirements to ensure information security.
\n5. Education and Training
\n Webscale Networks will offer education and training to personnel engaged in its operations to improve their awareness of information security and familiarize them with the Information Security Policy.
\n6. Prevention of Accidents and Actions
\n Webscale Networks will run its information security management system to ensure that every employee works to prevent information security accidents from occurring. Should an accident take place, we will swiftly implement appropriate actions, including those for preventing recurrence.
\n7. Auditing
\n Webscale Networks will regularly audit the operation of its information security management system and carry out remedial actions as needed to maintain information security.
\n8. Continuous Improvement
\n Every year we set information security goals, define, and plan activities to achieve those objectives, then, according to periodical review results, set the following year\u2019s goals. In addition, we regularly evaluate and review our Information Security Policy, its related internal regulations, and our management system, pursuing continuous improvement of information security.\u200b\u200b
\n9. Webscale Platform Security Commitments:<\/p>\n
\nProvide uptime and availability to the Platform and associated services as stated in customer agreements
\nEnsuring quality, accuracy, and security of the Platform and data therein
\nEnsuring security, confidentiality, and integrity of data coming in contact with third parties<\/p>\n
\nWebscale has implemented and will maintain appropriate technical and organizational security measures to protect customer personal data from security incidents and to preserve the security and confidentiality of the customer personal data (\u201cSecurity Measures\u201d). The Security Measures applicable to the Services are as follows:
\na) Web Application Penetration Test: Webscale shall continue to annually engage in web application penetration testing. Upon any customer\u2019s written request, we will provide the executive summary of the report to Customer. We will address all medium, critical and severe vulnerabilities in the findings of the report within a reasonable, risk-based timeframe.
\nb) Security Awareness Training: Webscale will provide annual security training to all personnel. \u201cSecurity Training\u201d shall address security topics to educate users about the importance of information security and safeguards against data loss, misuse or breach through physical, logical and social engineering mechanisms. Training materials will address industry standard topics which include, but are not limited to:<\/p>\n
\nPhysical controls such as visitor protocols, safeguarding portable devices and proper data destruction.
\nLogical controls related to strong password selection\/best practices.
\nHow to recognize social engineering attacks such as phishing.<\/p>\n
\nd) Employee-Related Policies:<\/p>\n
\nEmployees will only be allowed access to tasks assigned to them.
\nWe will ensure that all computers processing personal data (including computers with remote access) are password protected, both after booting up and when left, even for a short period.
\nWe will assign individual user passwords for authentication. Passwords must include at least 8 characters, with both upper and lower case characters, at least one digit, and one symbol.
\nWe will only grant system access to our authorized personnel and strictly limit their access to applications required for those personnel to fulfill their specific responsibilities.
\nWe will implement a password policy that prohibits the sharing of passwords, outlines procedures to follow after disclosure of a password, and requires that passwords be changed regularly.
\nWe will ensure that passwords are always stored in encrypted form.
\nWe will have adopted procedures to deactivate user accounts when an employee, agent, or administrator leaves our employ or moves to another responsibility within the company.
\nWe will be able to retrospectively examine and establish whether and by whom your customer personal data has been entered into data processing systems, modified or removed.
\nWe will log administrator and user activities. Logs will include the User Name, IP Address, Port Accessed, destination host access details. Webscale will retain the logs for 6 months.
\nWe will process the customer personal data received from different clients so that in each step of the processing the controller can be identified and so that data is always physically or logically separated.
\nEmployees are required to enable multi-factor authentication.<\/p>\n
\nWebscale shall have and maintain a patch management process to implement patches in a reasonable, risk-based timeframe.
\nWebscale shall use firewall(s), Security Groups\/VPCs, or similar technology to protect servers storing Customer Personal Data.
\nWhere Webscale handles customer personal data, servers shall be protected from unauthorized access with appropriate physical security mechanisms including, but not limited to, badge access control, secure perimeter, and enforced user provisioning controls (i.e. appropriate authorization of new accounts, timely account terminations and frequent user account reviews). These physical security mechanisms are provided by data center partners such as, but not limited to, AWS, Azure, and Google. All cloud-hosted systems shall be scanned, where applicable and where approved by the cloud service provider.
\nWebscale will virtually segregate all Customer Personal Data in accordance with its established procedures. The Customer instance of Services may be on servers used by other non-Customer instances.
\nWhenever an employee or contractor leaves or is terminated, that individual\u2019s access to customer user accounts shall be immediately terminated or disabled.<\/p>\n
\nWebscale shall employ industry standard scanning tools and\/or code review practices, as applicable, to identify application vulnerabilities.<\/p>\n
\nWebscale shall ensure that access to information and application system functions is restricted to authorized personnel only.
\nCustomer personal data stored on archive or backup systems shall be stored at the same level of security or better than the data stored on operating systems.<\/p>\n
\nWebscale will prohibit the use of removable media for storing or carrying customer personal data. Removable media include flash drives, CDs, and DVDs.<\/p>\n
\nWebscale will determine each year which officers and employees within the company will have access to which categories of data and shall review this list annually at the executive level.<\/p>\n
\nk) Security Incident Response: Upon becoming aware of a Security Incident, Webscale will notify Customer without undue delay and, in any case, where feasible, within seventy-two (72) hours after becoming aware. Webscale will provide information relating to the Security Incident as it becomes known or as is reasonably requested by Customer to fulfill its obligations as controller and will also take reasonable steps to contain, investigate, and mitigate any Security Incident.
\nl) SOC 2 Certification: Webscale has earned SOC 2 type II certification and we go through an annual review.
\nm) Data Minimization: Webscale will ensure that the personal data it collects and processes will be adequate, relevant, and limited to what is necessary to provide the Services
\nn) Data Retention and Destruction: Webscale will have in place secured destruction processes and will delete Customer personal data utilizing secure methods (equivalent to or greater than that of NIST SP-800-88 Rev. 1 or its successor guidelines) that render the data unreadable and unrecoverable.
\no) Security Incident Response:Upon becoming aware of any incident in which it suspects that unauthorized access has been gained to Webscale\u2019s systems, the executives of the company at the highest levels will be immediately notified.<\/p>\n
\nWe will notify the impacted customer(s) within seventy-two hours after learning of the incident.
\nWe will immediately investigate and mitigate any security incident.
\nWebscale will obtain and maintain reasonable insurance to cover itself for cyber liability.<\/div>\n\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div><\/p>\n","_et_pb_truncate_post_date":"2023-05-31 21:44:57","_et_post_bg_color":"","_et_post_bg_layout":"","_et_template":[],"_et_theme_builder_marked_as_unused":"","_et_use_on":"","_gallery_link_target":"","_global_colors_info":"[]","_lh_copy_from_url-original_file":"","_version_history":"","_wp_old_date":[],"_wpcode_auto_insert":"","_wpcode_auto_insert_number":"","_wpcode_conditional_logic":[],"_wpcode_conditional_logic_enabled":"","_wpcode_library_id":"","_wpcode_library_version":"","_wpcode_location_extra":"","_wpcode_note":"","_wpcode_priority":"","_wpcode_shortcode_attributes":[],"_wpmf_gallery_custom_image_link":"","ao_post_optimize":[],"author_photo":"","doc_url":"","et_enqueued_post_fonts":{"family":{"et-gf-lato":"Lato:100,100italic,300,300italic,regular,italic,700,700italic,900,900italic"},"subset":["latin","latin-ext"],"cache_key":"{\"gph\":0,\"divi\":\"4.24.1\",\"wp\":\"6.6.2\",\"enable_all_character_sets\":\"false\"}"},"rank_math_contentai_score":[],"rank_math_description":"Webscale Master SLA","rank_math_facebook_image":"","rank_math_facebook_image_id":"","rank_math_internal_links_processed":["1"],"rank_math_og_content_image":[],"rank_math_seo_score":"18","rank_math_title":"","version_history":"","wp-smpro-smush-data":[],"wp-smush-animated":"","wpmf_filetype":"","wpmf_order":"","wpmf_size":"","_":"","_bj_lazy_load_skip_post":[],"_divi_filters_post_type":"","_et_dynamic_cached_attributes":{"sticky_position":["top"],"use_custom_gutter":["on"],"button_icon":["$||divi||400"],"social_network":["facebook","twitter","linkedin","youtube","last_fm"],"header_2_font":"|800|||||||","header_2_font_size":"34px","header_2_text_align":"center","animation_intensity_slide":"10%","animation_duration":"800ms","animation_delay":"15ms","animation_intensity_zoom":"15%","animation_intensity_flip":"15%","animation_intensity_fold":"15%","animation_intensity_roll":"15%","animation_direction":"center","animation_style":"none","background_color_gradient_start":"rgba(255,255,255,0)","background_color_gradient_end":"#fafafa","custom_padding":"120px||0px||false|false","background_color_gradient_stops":"rgba(255,255,255,0) 0%|#fafafa 100%","custom_padding_last_edited":"on|desktop","custom_padding_tablet":"||30px||false|false","custom_padding_phone":"60px||||false|false"},"_et_dynamic_cached_shortcodes":["et_pb_contact_field","et_pb_signup_custom_field","et_pb_social_media_follow_network","et_pb_section","et_pb_row","et_pb_column","et_pb_blurb","et_pb_button","et_pb_code","et_pb_contact_form","et_pb_signup","et_pb_social_media_follow","et_pb_text"],"_et_pb_ab_bounce_rate_limit":"","_et_pb_ab_stats_refresh_interval":[],"_et_pb_content_area_background_color":"","_et_pb_dark_text_color":"","_et_pb_light_text_color":"","_et_pb_section_background_color":"","_job_location":"","_job_locations":"","_links_to":"","_links_to_target":"","_product_image_gallery":"","_schema_code":"","_synced_version":"","_wp_attachment_context":"","_wp_attachment_image_alt":[],"_wpie_source_url":"","_yoast_wpseo_content_score":"30","_yoast_wpseo_focuskeywords":"[]","_yoast_wpseo_metadesc":"Webscale Master SLA","_yoast_wpseo_opengraph-image":"","_yst_prominent_words_version":"1","inline_featured_image":["0","0","0"],"job_location":[],"job_locations":"","options":"","original-file":"","post_views_count":"","rank_math_analytic_object_id":"1774","rank_math_canonical_url":"","rank_math_focus_keyword":[],"rank_math_news_sitemap_robots":"index","rank_math_primary_category":"","rank_math_primary_ccategory":"","rank_math_primary_job_locations":"","rank_math_primary_partners_category":"","rank_math_primary_pr_category":"","rank_math_primary_press_release_year":"","rank_math_rich_snippet":"","rank_math_robots":["index"],"rank_math_schema_Article":[],"rank_math_schema_Organization":[],"rank_math_schema_VideoObject":[],"rank_math_shortcode_schema_s-23675683-fff5-4300-88fe-da8afc8b1bb9":"","rank_math_shortcode_schema_s-307bbc91-c6b1-41aa-950d-c50d435a949c":"","rank_math_shortcode_schema_s-63a052dbc0384":"","rank_math_shortcode_schema_s-63a052dbc039d":"","rank_math_shortcode_schema_s-63a052dbc03a6":"","rank_math_shortcode_schema_s-63a052dbc03aa":"","rank_math_shortcode_schema_s-63a052dbc03b5":"","rank_math_shortcode_schema_s-63a052dbc03ba":"","rank_math_shortcode_schema_s-63a052dbc03bd":"","rank_math_shortcode_schema_s-63b6dd7d53a96":"","rank_math_shortcode_schema_s-63b6dd7d53a9f":"","rank_math_shortcode_schema_s-63b6dd7d53aa2":"","rank_math_shortcode_schema_s-63b6dd7d53aa4":"","rank_math_shortcode_schema_s-63b6dd7d53aa7":"","rank_math_shortcode_schema_s-63b6dd7d53aa9":"","rank_math_shortcode_schema_s-63b6dd7d53aab":"","rank_math_shortcode_schema_s-63b6dd7d53aad":"","rank_math_shortcode_schema_s-63b6dd7d53aaf":"","rank_math_shortcode_schema_s-63c15fcf43311":"","rank_math_shortcode_schema_s-63c15fcf43322":"","rank_math_shortcode_schema_s-63c15fcf43325":"","rank_math_shortcode_schema_s-63c15fcf43327":"","rank_math_shortcode_schema_s-63c15fcf43329":"","rank_math_shortcode_schema_s-63c15fcf4332a":"","rank_math_shortcode_schema_s-63c15fcf4332c":"","rank_math_shortcode_schema_s-63c15fcf4332e":"","rank_math_shortcode_schema_s-63c15fcf43330":"","rank_math_shortcode_schema_s-63f52c5ed40bb":"","rank_math_shortcode_schema_s-6409f40a9b7d5":"","rank_math_shortcode_schema_s-64354a3892419":"","rank_math_shortcode_schema_s-6440158136148":"","rank_math_shortcode_schema_s-6446d2f9353ee":"","rank_math_shortcode_schema_s-6446d2f9353f3":"","rank_math_shortcode_schema_s-6447c0fe4673c":"","rank_math_shortcode_schema_s-64e4d743542d7":"","schema_code":"","smush-complete":"","smush-info":"","smush-stats":[],"synced_version":"","wpmf_remote_video_link":"","_exp":"","_inc":"","_mc4wp_settings":[],"_post-subtitle":"","_pwh_dcfh_contact_email":"","_pwh_dcfh_contact_form_id":"","_pwh_dcfh_form_fields":"","_pwh_dcfh_ip_address":"","_pwh_dcfh_page_id":"","_pwh_dcfh_read_by":"","_pwh_dcfh_referer_url":"","_pwh_dcfh_user_agent":[],"_section1_col1":"","_section1_col2":"","_section1_col3":"","_section1_col4":"","_section2_col1":"","_section2_col2":"","_section2_col3":"","_section2_col4":"","_section2_col5":"","_section2_col6":"","_section3_col1":"","_section3_col2":"","_section3_col3":"","_section3_col4":"","_section3_col5":"","_section3_col6":"","_section4_col1":"","_section4_col2":"","_section4_col3":"","_section4_col4":"","_section4_col5":"","_section4_col6":"","_section5_col1":"","_section5_col2":"","_section5_col3":"","_section5_col4":"","_section5_col5":"","_section5_col6":"","_section6_col1":"","_section6_col2":"","_section6_col3":"","_section6_col4":"","_section6_col5":"","_section6_col6":"","_select_author":"","_test":"","_wp_attachment_backup_sizes":[],"_yoast_wpseo_estimated-reading-time-minutes":[],"_yoast_wpseo_focuskw":[],"_yoast_wpseo_focuskw_text_input":[],"_yoast_wpseo_linkdex":[],"_yoast_wpseo_meta-robots-nofollow":[],"_yoast_wpseo_meta-robots-noindex":[],"_yoast_wpseo_primary_category":[],"_yoast_wpseo_title":[],"_yoast_wpseo_wordproof_timestamp":"","exp":"","inc":"","post-subtitle":[],"rank_math_schema_BlogPosting":[],"section1_col1":"","section1_col2":"","section1_col3":"","section1_col4":"","section2_col1":"","section2_col2":"","section2_col3":"","section2_col4":"","section2_col5":"","section2_col6":"","section3_col1":"","section3_col2":"","section3_col3":"","section3_col4":"","section3_col5":"","section3_col6":"","section4_col1":"","section4_col2":"","section4_col3":"","section4_col4":"","section4_col5":"","section4_col6":"","section5_col1":"","section5_col2":"","section5_col3":"","section5_col4":"","section5_col5":"","section5_col6":"","section6_col1":"","section6_col2":"","section6_col3":"","section6_col4":"","section6_col5":"","section6_col6":"","select_author":"","test":"","footnotes":""},"class_list":["post-251813","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.webscale.com\/wp-json\/wp\/v2\/pages\/251813"}],"collection":[{"href":"https:\/\/www.webscale.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.webscale.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.webscale.com\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/www.webscale.com\/wp-json\/wp\/v2\/comments?post=251813"}],"version-history":[{"count":0,"href":"https:\/\/www.webscale.com\/wp-json\/wp\/v2\/pages\/251813\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.webscale.com\/wp-json\/wp\/v2\/media?parent=251813"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}