{"id":17572,"date":"2025-03-06T22:38:48","date_gmt":"2025-03-06T22:38:48","guid":{"rendered":"https:\/\/medsafe5stg.wpenginepowered.com\/?page_id=17572"},"modified":"2025-05-09T16:56:56","modified_gmt":"2025-05-09T20:56:56","slug":"security-risk-assessment","status":"publish","type":"page","link":"https:\/\/medsafe.com\/security-risk-assessment\/","title":{"rendered":"Security Risk Assessment"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"17572\" class=\"elementor elementor-17572\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b7c3ffd e-flex e-con-boxed e-con e-parent\" data-id=\"b7c3ffd\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9aa3c96 elementor-widget elementor-widget-heading\" data-id=\"9aa3c96\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Security Risk Assessment<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eed6298 elementor-align-left elementor-widget elementor-widget-breadcrumbs\" data-id=\"eed6298\" data-element_type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/medsafe.com\/\">Home<\/a><\/span><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0b592b1 e-flex e-con-boxed e-con e-parent\" data-id=\"0b592b1\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a4cc7bb elementor-widget elementor-widget-heading\" data-id=\"a4cc7bb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Assessment Systems\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a43df6e elementor-widget__width-initial contr elementor-widget elementor-widget-text-editor\" data-id=\"a43df6e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Most every healthcare organization must have physical safeguards in place to guard data integrity, confidentiality, and availability of Electronic Protected Health Information (EPHI). They must limit physical access to their electronic information systems while ensuring employees can still perform their jobs properly.<\/p><p>In general, physical safeguards are the mechanisms needed to protect electronic systems, equipment and data from threats, environmental hazards, and unauthorized intrusion.This includes restricting access to EPHI and retaining off-site computer backups. \u2028\u2028Areas of concern include access controls, workstation use and security, and device and media controls.\u00a0Each PDA, laptop, and desktop system should be reviewed.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0aba3a1 elementor-widget elementor-widget-heading\" data-id=\"0aba3a1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Security Measures\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-431d2bd elementor-widget__width-initial contr elementor-widget elementor-widget-text-editor\" data-id=\"431d2bd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tSecurity measures are also needed to protect EPHI when transmitting data over electronic communications networks. \u2028\u2028Healthcare organizations should review current methods used to transmit EPHI, such as e-mail, over the Internet, or other means, and then identify ways to protect it as it is transmitted. Wireless devices can pose a significant threat. \u2028\u2028Employees should not be using e-mail to send EPHI outside the organization unless it is encrypted. The Security Rule doesn\u2019t prohibit e-mail, but expects healthcare organizations to guard against unauthorized access. If a system breach occurs with unencrypted e-mail, the affected patients must be notified.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-54ead43 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"54ead43\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/contact-us\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get Started with Compliance Solutions<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0bbb709 e-flex e-con-boxed e-con e-parent\" data-id=\"0bbb709\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-a0177b7 e-con-full e-flex e-con e-child\" data-id=\"a0177b7\" data-element_type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-9d54746 e-con-full e-flex e-con e-child\" data-id=\"9d54746\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1aa5284 elementor-widget elementor-widget-heading\" data-id=\"1aa5284\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ready to Get Started?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb375e7 porgh elementor-widget elementor-widget-text-editor\" data-id=\"bb375e7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Contact us today to learn how we can help your practice maintain complete compliance.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27b0410 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"27b0410\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/contact-us\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Schedule a Consultation<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-de3b708 e-con-full e-flex e-con e-child\" data-id=\"de3b708\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-1d5c3bc e-con-full e-flex e-con e-child\" data-id=\"1d5c3bc\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-854b448 e-con-full e-flex e-con e-child\" data-id=\"854b448\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e39dd8f elementor-widget elementor-widget-counter\" data-id=\"e39dd8f\" data-element_type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">Expert Support<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"24\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">\/7<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-94565be e-con-full e-flex e-con e-child\" data-id=\"94565be\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-51a7184 elementor-widget elementor-widget-counter\" data-id=\"51a7184\" data-element_type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">Compliance Rate<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"100\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">%<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6e69875 e-con-full e-flex e-con e-child\" data-id=\"6e69875\" data-element_type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-996d4f4 e-con-full e-flex e-con e-child\" data-id=\"996d4f4\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ce539c7 elementor-widget elementor-widget-counter\" data-id=\"ce539c7\" data-element_type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">Years Experience<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"25\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">+<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8aee8fb e-con-full e-flex e-con e-child\" data-id=\"8aee8fb\" data-element_type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b21515e elementor-widget elementor-widget-counter\" data-id=\"b21515e\" data-element_type=\"widget\" data-widget_type=\"counter.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-counter\">\n\t\t\t<div class=\"elementor-counter-title\">Satisfied Clients<\/div>\t\t\t<div class=\"elementor-counter-number-wrapper\">\n\t\t\t\t<span class=\"elementor-counter-number-prefix\"><\/span>\n\t\t\t\t<span class=\"elementor-counter-number\" data-duration=\"2000\" data-to-value=\"1100\" data-from-value=\"0\" data-delimiter=\",\">0<\/span>\n\t\t\t\t<span class=\"elementor-counter-number-suffix\">+<\/span>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Security Risk Assessment Assessment Systems Most every healthcare organization must have physical safeguards in place to guard data integrity, confidentiality, and availability of Electronic Protected Health Information (EPHI). They must [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-17572","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Risk Assessment | MedSafe<\/title>\n<meta name=\"description\" content=\"Explore Security Risk Assessment from MedSafe \u2014a trusted resource for healthcare compliance solutions tailored to your needs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/medsafe.com\/security-risk-assessment\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Risk Assessment\" \/>\n<meta property=\"og:description\" content=\"Explore Security Risk Assessment from MedSafe \u2014a trusted resource for healthcare compliance solutions tailored to your needs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/medsafe.com\/security-risk-assessment\/\" \/>\n<meta property=\"og:site_name\" content=\"MedSafe\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/MedSafeCompliance\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-09T20:56:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/medsafe.com\/wp-content\/uploads\/2025\/05\/medsafe-organization-logo.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"696\" \/>\n\t<meta property=\"og:image:height\" content=\"696\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/medsafe.com\/security-risk-assessment\/\",\"url\":\"https:\/\/medsafe.com\/security-risk-assessment\/\",\"name\":\"Security Risk Assessment | MedSafe\",\"isPartOf\":{\"@id\":\"https:\/\/medsafe.com\/#website\"},\"datePublished\":\"2025-03-06T22:38:48+00:00\",\"dateModified\":\"2025-05-09T20:56:56+00:00\",\"description\":\"Explore Security Risk Assessment from MedSafe \u2014a trusted resource for healthcare compliance solutions tailored to your needs.\",\"breadcrumb\":{\"@id\":\"https:\/\/medsafe.com\/security-risk-assessment\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/medsafe.com\/security-risk-assessment\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/medsafe.com\/security-risk-assessment\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/medsafe.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Risk Assessment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/medsafe.com\/#website\",\"url\":\"https:\/\/medsafe.com\/\",\"name\":\"MedSafe\",\"description\":\"The Total Compliance Solution\",\"publisher\":{\"@id\":\"https:\/\/medsafe.com\/#organization\"},\"alternateName\":\"MedSafe Healthcare Compliance\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/medsafe.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/medsafe.com\/#organization\",\"name\":\"MedSafe\",\"url\":\"https:\/\/medsafe.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/medsafe.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/medsafe.com\/wp-content\/uploads\/2025\/05\/medsafe-organization-logo.webp\",\"contentUrl\":\"https:\/\/medsafe.com\/wp-content\/uploads\/2025\/05\/medsafe-organization-logo.webp\",\"width\":696,\"height\":696,\"caption\":\"MedSafe\"},\"image\":{\"@id\":\"https:\/\/medsafe.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/MedSafeCompliance\",\"https:\/\/www.instagram.com\/medsafetcs\/\",\"https:\/\/www.youtube.com\/@MedSafeTCS\/featured\",\"https:\/\/www.linkedin.com\/company\/medsafe-the-total-compliance-solution-\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security Risk Assessment | MedSafe","description":"Explore Security Risk Assessment from MedSafe \u2014a trusted resource for healthcare compliance solutions tailored to your needs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/medsafe.com\/security-risk-assessment\/","og_locale":"en_US","og_type":"article","og_title":"Security Risk Assessment","og_description":"Explore Security Risk Assessment from MedSafe \u2014a trusted resource for healthcare compliance solutions tailored to your needs.","og_url":"https:\/\/medsafe.com\/security-risk-assessment\/","og_site_name":"MedSafe","article_publisher":"https:\/\/www.facebook.com\/MedSafeCompliance","article_modified_time":"2025-05-09T20:56:56+00:00","og_image":[{"width":696,"height":696,"url":"https:\/\/medsafe.com\/wp-content\/uploads\/2025\/05\/medsafe-organization-logo.webp","type":"image\/webp"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/medsafe.com\/security-risk-assessment\/","url":"https:\/\/medsafe.com\/security-risk-assessment\/","name":"Security Risk Assessment | MedSafe","isPartOf":{"@id":"https:\/\/medsafe.com\/#website"},"datePublished":"2025-03-06T22:38:48+00:00","dateModified":"2025-05-09T20:56:56+00:00","description":"Explore Security Risk Assessment from MedSafe \u2014a trusted resource for healthcare compliance solutions tailored to your needs.","breadcrumb":{"@id":"https:\/\/medsafe.com\/security-risk-assessment\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/medsafe.com\/security-risk-assessment\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/medsafe.com\/security-risk-assessment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/medsafe.com\/"},{"@type":"ListItem","position":2,"name":"Security Risk Assessment"}]},{"@type":"WebSite","@id":"https:\/\/medsafe.com\/#website","url":"https:\/\/medsafe.com\/","name":"MedSafe","description":"The Total Compliance Solution","publisher":{"@id":"https:\/\/medsafe.com\/#organization"},"alternateName":"MedSafe Healthcare Compliance","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/medsafe.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/medsafe.com\/#organization","name":"MedSafe","url":"https:\/\/medsafe.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/medsafe.com\/#\/schema\/logo\/image\/","url":"https:\/\/medsafe.com\/wp-content\/uploads\/2025\/05\/medsafe-organization-logo.webp","contentUrl":"https:\/\/medsafe.com\/wp-content\/uploads\/2025\/05\/medsafe-organization-logo.webp","width":696,"height":696,"caption":"MedSafe"},"image":{"@id":"https:\/\/medsafe.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/MedSafeCompliance","https:\/\/www.instagram.com\/medsafetcs\/","https:\/\/www.youtube.com\/@MedSafeTCS\/featured","https:\/\/www.linkedin.com\/company\/medsafe-the-total-compliance-solution-\/"]}]}},"_links":{"self":[{"href":"https:\/\/medsafe.com\/wp-json\/wp\/v2\/pages\/17572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/medsafe.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/medsafe.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/medsafe.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/medsafe.com\/wp-json\/wp\/v2\/comments?post=17572"}],"version-history":[{"count":0,"href":"https:\/\/medsafe.com\/wp-json\/wp\/v2\/pages\/17572\/revisions"}],"wp:attachment":[{"href":"https:\/\/medsafe.com\/wp-json\/wp\/v2\/media?parent=17572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}