{"id":83,"date":"2025-07-15T08:43:56","date_gmt":"2025-07-15T08:43:56","guid":{"rendered":"https:\/\/wordpress.ecix.tech\/?page_id=83"},"modified":"2026-01-12T12:44:22","modified_gmt":"2026-01-12T11:44:22","slug":"politica-seguretat-de-la-informacio","status":"publish","type":"page","link":"https:\/\/ecix.tech\/ca\/politica-seguretat-de-la-informacio\/","title":{"rendered":"Pol\u00edtica seguretat de la informaci\u00f3"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"83\" class=\"elementor elementor-83\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4b4c7f4f elementor-section-height-min-height elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"4b4c7f4f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;trigger&quot;:&quot;firstChild&quot;,&quot;animationTarget&quot;:&quot;:scope &gt; .elementor-widget-wrap &gt; .elementor-element &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-section &gt; .elementor-container &gt; .elementor-column &gt; .elementor-widget-wrap &gt; .elementor-element:not(.lqd-el-has-inner-anim) &gt; .elementor-widget-container, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-lines .lqd-lines .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-words .lqd-words .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-hub_fancy_heading .lqd-split-chars .lqd-chars .split-inner, :scope &gt; .elementor-widget-wrap &gt; .elementor-widget-ld_custom_menu .lqd-fancy-menu &gt; ul &gt; li&quot;,&quot;ease&quot;:[&quot;power4.out&quot;],&quot;initValues&quot;:{&quot;y&quot;:&quot;70px&quot;,&quot;opacity&quot;:0,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;},&quot;animations&quot;:{&quot;y&quot;:&quot;0px&quot;,&quot;opacity&quot;:1,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}}\" class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-16514a3e\" data-id=\"16514a3e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div data-custom-animations=\"true\" data-ca-options=\"{&quot;addChildTimelines&quot;:false,&quot;trigger&quot;:&quot;firstChild&quot;,&quot;animationTarget&quot;:&quot;:scope &gt; .elementor-widget-container&quot;,&quot;duration&quot;:1800,&quot;delay&quot;:180,&quot;ease&quot;:[&quot;power4.out&quot;],&quot;initValues&quot;:{&quot;y&quot;:&quot;50px&quot;,&quot;opacity&quot;:0,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;},&quot;animations&quot;:{&quot;y&quot;:&quot;0px&quot;,&quot;opacity&quot;:1,&quot;transformOrigin&quot;:&quot;50% 50% 0px&quot;}}\" class=\"elementor-element elementor-element-750e9e26 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-hub_fancy_heading\" data-id=\"750e9e26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"hub_fancy_heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n\t\t<div id=\"ld-fancy-heading-69d9bd22bc4ef\" class=\"ld-fancy-heading pos-rel\">\n\t\t\t<h6 class=\"ld-fh-element d-inline-block pos-rel  elementor-heading-title ws-nowrap lqd-highlight-classic lqd-highlight-grow-left h6\"  > Principis generals de <br>seguretat de la informaci\u00f3<\/h6>\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-17c693d8 e-flex e-con-boxed e-con e-parent\" data-id=\"17c693d8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b23e3dd elementor-widget elementor-widget-text-editor\" data-id=\"1b23e3dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t\n<h1><span style=\"color: #294a2e;\"><strong>Pol\u00edtica Seguretat de la Informaci\u00f3<\/strong><\/span><\/h1>\n<p><span style=\"font-size: 16px;\">Aquesta Pol\u00edtica persegueix l&#039;adopci\u00f3, la implantaci\u00f3 i l&#039;operativitat continuada d&#039;accions destinades a preservar els components b\u00e0sics de la seguretat de la informaci\u00f3:<\/span><\/p>\n<ul class=\"wp-block-list\">\n<li><strong>Confidencialitat<\/strong>: Garantir que nom\u00e9s accedeixin a les dades i als sistemes les persones degudament autoritzades.<\/li>\n\n<li><strong>Integritat<\/strong>: Garantir l&#039;exactitud de la informaci\u00f3 i dels sistemes contra l&#039;alteraci\u00f3, la p\u00e8rdua o la destrucci\u00f3, ja sigui de forma accidental o intencionada.<\/li>\n\n<li><strong>Disponibilitat<\/strong>: Garantir que la informaci\u00f3 i els sistemes poden ser utilitzats en la forma i el temps requerits.<\/li>\n\n<li><strong>Resili\u00e8ncia<\/strong>: Garantir la capacitat de l&#039;organitzaci\u00f3 de suportar i recuperar-se davant de desastres i pertorbacions, cosa que implica un aprenentatge continu de situacions cr\u00edtiques que possibilitin una recuperaci\u00f3 de les mateixes en condicions refor\u00e7ades.<\/li>\n\n<li>La Pol\u00edtica \u00e9s aplicable en totes les fases del cicle de vida de la informaci\u00f3: generaci\u00f3, distribuci\u00f3, emmagatzematge, processament, transport, consulta i destrucci\u00f3, i dels sistemes que els processen: an\u00e0lisi, disseny, desenvolupament, implantaci\u00f3, explotaci\u00f3 i manteniment.<\/li>\n\n<li>La seguretat de la informaci\u00f3 incumbeix tot el personal de\u00a0<strong>ECIX TECH<\/strong>per tant, aquesta Pol\u00edtica ha de ser coneguda, compresa i assumida per tots els nivells de l&#039;Organitzaci\u00f3. La pol\u00edtica ha de ser comunicada fefaentment a tota l&#039;organitzaci\u00f3, tant al personal propi com a empreses col\u00b7laboradores externes, i ha d&#039;estar a disposici\u00f3 de les parts interessades.<\/li>\n\n<li>Les relacions amb terceres empreses col\u00b7laboradores han d&#039;estar emparades sempre pels corresponents contractes de prestaci\u00f3 de serveis, incloent-hi cl\u00e0usules de garanties en l&#039;\u00fas i el tractament de la informaci\u00f3.<\/li>\n<\/ul>\n<!-- \/wp:list --><!-- wp:heading {\"level\":3} -->\n<h3 class=\"wp-block-heading\"><span style=\"color: #294a2e;\"><strong>1.1 APLICACI\u00d3 DE LA POL\u00cdTICA DE SEGURETAT<\/strong><\/span><\/h3>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>Per tal d&#039;aplicar els principis exposats en aquesta pol\u00edtica, cal la definici\u00f3, l&#039;elaboraci\u00f3, la implantaci\u00f3 i el manteniment de Plans Estrat\u00e8gics de Seguretat. L&#039;elaboraci\u00f3 dels Plans Estrat\u00e8gics de Seguretat s&#039;ha d&#039;acompanyar de processos formals d&#039;an\u00e0lisi i de gesti\u00f3 de riscos que permetin implantar les solucions id\u00f2nies.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>A nivell operatiu,\u00a0<strong>ECIX TECH<\/strong>\u00a0desenvolupar\u00e0 els seus propis procediments, est\u00e0ndards i guies de seguretat, que garanteixin la integritat, confidencialitat, disponibilitat i resili\u00e8ncia de la informaci\u00f3.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>S&#039;han d&#039;implantar els processos de gesti\u00f3 de la seguretat necessaris, d&#039;acord amb l&#039;est\u00e0ndard ISO 27001 i l&#039;Esquema Nacional de Seguretat per assegurar el seguiment efectiu i eficient de les accions en seguretat, aix\u00ed com dels processos de revisi\u00f3 i millora dels projectes de seguretat i de les contramesures definides.<\/p>\n<!-- \/wp:paragraph --><!-- wp:heading {\"level\":3} -->\n<h3 class=\"wp-block-heading\"><span style=\"color: #294a2e;\">1.2 CONFORMITAT LEGAL<\/span><\/h3>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>Per la naturalesa i objecte del negoci de\u00a0<strong>ECIX TECH<\/strong>\u00a0cal observar el compliment de normes de rang superior (lleis, normes i disposicions legals) que tindran prefer\u00e8ncia, quan aix\u00f2 apliqui sobre les directrius d&#039;aquesta pol\u00edtica de seguretat de la informaci\u00f3:<\/p>\n<!-- \/wp:paragraph --><!-- wp:list -->\n<ul class=\"wp-block-list\"><!-- wp:list-item -->\n<li>Normes generals i\/o deontol\u00f2giques de\u00a0<strong>ECIX TECH<\/strong>.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Normativa espanyola que reguli aquesta activitat.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Normes espanyoles que provinguin d&#039;organismes supranacionals de qu\u00e8 Espanya sigui membre.<\/li>\n<!-- \/wp:list-item --><!-- wp:list-item -->\n<li>Normativa comunit\u00e0ria i\/o extracomunit\u00e0ria, per ra\u00f3 de les \u00e0rees de prestaci\u00f3 de serveis per part de\u00a0<strong>ECIX TECH<\/strong>.<\/li>\n<!-- \/wp:list-item --><\/ul>\n<!-- \/wp:list --><!-- wp:heading {\"level\":3} -->\n<h3 class=\"wp-block-heading\"><span style=\"color: #294a2e;\">1.3 CLASSIFICACI\u00d3 I TRACTAMENT DE LA INFORMACI\u00d3<\/span><\/h3>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>Tota informaci\u00f3 haur\u00e0 d&#039;estar classificada en virtut de la seva import\u00e0ncia per a l&#039;organitzaci\u00f3 i ha de ser tractada segons aquesta classificaci\u00f3, d&#039;acord amb el que disposa la normativa sobre classificaci\u00f3 i tractament de la informaci\u00f3.<\/p>\n<!-- \/wp:paragraph --><!-- wp:heading {\"level\":3} -->\n<h3 class=\"wp-block-heading\"><span style=\"color: #294a2e;\">1.4 FORMACI\u00d3 I CONSCIENCIACI\u00d3<\/span><\/h3>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>El m\u00e8tode m\u00e9s efectiu de millorar la seguretat \u00e9s mitjan\u00e7ant la formaci\u00f3 continuada i la incorporaci\u00f3 a l&#039;activitat laboral.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>Dins dels plans de formaci\u00f3 s&#039;hi inclouran cursos espec\u00edfics sobre seguretat de la informaci\u00f3 d&#039;acord amb l&#039;\u00e0rea destinat\u00e0ria: Direcci\u00f3, t\u00e8cnics, administradors i usuaris dels sistemes. Aix\u00ed mateix, es realitzaran campanyes de conscienciaci\u00f3 sobre seguretat adre\u00e7ades a tot el personal i prove\u00efdors a trav\u00e9s del medi que es consideri m\u00e9s efectiu.<\/p>\n<!-- \/wp:paragraph --><!-- wp:heading {\"level\":3} -->\n<h3 class=\"wp-block-heading\"><span style=\"color: #294a2e;\">1.5 AUDITORIA<\/span><\/h3>\n<!-- \/wp:heading --><!-- wp:paragraph -->\n<p>Els sistemes dinformaci\u00f3 se sotmetran peri\u00f2dicament a auditories internes i externes amb la finalitat de verificar el funcionament correcte dels plans de seguretat, determinant graus de compliment i recomanant mesures correctores, aconseguint, aix\u00ed, una millora cont\u00ednua.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>Data d&#039;actualitzaci\u00f3 12 de gener del 2026.<\/p>\n<!-- \/wp:paragraph --><!-- wp:paragraph -->\n<p>\u00a0<\/p>\n<!-- \/wp:paragraph -->\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Principios generales de seguridad de la informaci\u00f3n Pol\u00edtica Seguridad de la Informaci\u00f3n Esta Pol\u00edtica persigue la adopci\u00f3n, implantaci\u00f3n y operatividad continuada de acciones destinadas a preservar los componentes b\u00e1sicos de la seguridad de la informaci\u00f3n: 1.1 APLICACI\u00d3N DE LA POL\u00cdTICA DE SEGURIDAD Con objetivo de aplicar los principios expuestos en esta pol\u00edtica, se precisa la [&hellip;]<\/p>","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-83","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Pol\u00edtica seguridad de la informaci\u00f3n - ECIX TECH<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ecix.tech\/ca\/politica-seguretat-de-la-informacio\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pol\u00edtica seguridad de la informaci\u00f3n - ECIX TECH\" \/>\n<meta property=\"og:description\" content=\"Principios generales de seguridad de la informaci\u00f3n Pol\u00edtica Seguridad de la Informaci\u00f3n Esta Pol\u00edtica persigue la adopci\u00f3n, implantaci\u00f3n y operatividad continuada de acciones destinadas a preservar los componentes b\u00e1sicos de la seguridad de la informaci\u00f3n: 1.1 APLICACI\u00d3N DE LA POL\u00cdTICA DE SEGURIDAD Con objetivo de aplicar los principios expuestos en esta pol\u00edtica, se precisa la [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ecix.tech\/ca\/politica-seguretat-de-la-informacio\/\" \/>\n<meta property=\"og:site_name\" content=\"ECIX TECH\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-12T11:44:22+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ecix.tech\/ca\/politica-seguretat-de-la-informacio\/\",\"url\":\"https:\/\/ecix.tech\/ca\/politica-seguretat-de-la-informacio\/\",\"name\":\"Pol\u00edtica seguridad de la informaci\u00f3n - ECIX TECH\",\"isPartOf\":{\"@id\":\"https:\/\/pl.nextlgsdp.com\/es\/#website\"},\"datePublished\":\"2025-07-15T08:43:56+00:00\",\"dateModified\":\"2026-01-12T11:44:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ecix.tech\/ca\/politica-seguretat-de-la-informacio\/#breadcrumb\"},\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ecix.tech\/ca\/politica-seguretat-de-la-informacio\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ecix.tech\/ca\/politica-seguretat-de-la-informacio\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/54.247.110.102\/es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pol\u00edtica seguridad de la informaci\u00f3n\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pl.nextlgsdp.com\/es\/#website\",\"url\":\"https:\/\/pl.nextlgsdp.com\/es\/\",\"name\":\"ECIX TECH\",\"description\":\"Servicios y soluciones para el cumplimiento normativo\",\"publisher\":{\"@id\":\"https:\/\/pl.nextlgsdp.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pl.nextlgsdp.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/pl.nextlgsdp.com\/es\/#organization\",\"name\":\"ECIX TECH\",\"url\":\"https:\/\/pl.nextlgsdp.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\/\/pl.nextlgsdp.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ecix.tech\/wp-content\/uploads\/2025\/07\/Ecixtech-scaled.png\",\"contentUrl\":\"https:\/\/ecix.tech\/wp-content\/uploads\/2025\/07\/Ecixtech-scaled.png\",\"width\":2560,\"height\":677,\"caption\":\"ECIX TECH\"},\"image\":{\"@id\":\"https:\/\/pl.nextlgsdp.com\/es\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pol\u00edtica seguretat de la informaci\u00f3 - ECIX TECH","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ecix.tech\/ca\/politica-seguretat-de-la-informacio\/","og_locale":"ca_ES","og_type":"article","og_title":"Pol\u00edtica seguridad de la informaci\u00f3n - ECIX TECH","og_description":"Principios generales de seguridad de la informaci\u00f3n Pol\u00edtica Seguridad de la Informaci\u00f3n Esta Pol\u00edtica persigue la adopci\u00f3n, implantaci\u00f3n y operatividad continuada de acciones destinadas a preservar los componentes b\u00e1sicos de la seguridad de la informaci\u00f3n: 1.1 APLICACI\u00d3N DE LA POL\u00cdTICA DE SEGURIDAD Con objetivo de aplicar los principios expuestos en esta pol\u00edtica, se precisa la [&hellip;]","og_url":"https:\/\/ecix.tech\/ca\/politica-seguretat-de-la-informacio\/","og_site_name":"ECIX TECH","article_modified_time":"2026-01-12T11:44:22+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ecix.tech\/ca\/politica-seguretat-de-la-informacio\/","url":"https:\/\/ecix.tech\/ca\/politica-seguretat-de-la-informacio\/","name":"Pol\u00edtica seguretat de la informaci\u00f3 - ECIX TECH","isPartOf":{"@id":"https:\/\/pl.nextlgsdp.com\/es\/#website"},"datePublished":"2025-07-15T08:43:56+00:00","dateModified":"2026-01-12T11:44:22+00:00","breadcrumb":{"@id":"https:\/\/ecix.tech\/ca\/politica-seguretat-de-la-informacio\/#breadcrumb"},"inLanguage":"ca","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ecix.tech\/ca\/politica-seguretat-de-la-informacio\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ecix.tech\/ca\/politica-seguretat-de-la-informacio\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/54.247.110.102\/es\/"},{"@type":"ListItem","position":2,"name":"Pol\u00edtica seguridad de la informaci\u00f3n"}]},{"@type":"WebSite","@id":"https:\/\/pl.nextlgsdp.com\/es\/#website","url":"https:\/\/pl.nextlgsdp.com\/es\/","name":"ECIX TECH","description":"Serveis i solucions per al compliment normatiu","publisher":{"@id":"https:\/\/pl.nextlgsdp.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pl.nextlgsdp.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca"},{"@type":"Organization","@id":"https:\/\/pl.nextlgsdp.com\/es\/#organization","name":"ECIX TECH","url":"https:\/\/pl.nextlgsdp.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/pl.nextlgsdp.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/ecix.tech\/wp-content\/uploads\/2025\/07\/Ecixtech-scaled.png","contentUrl":"https:\/\/ecix.tech\/wp-content\/uploads\/2025\/07\/Ecixtech-scaled.png","width":2560,"height":677,"caption":"ECIX TECH"},"image":{"@id":"https:\/\/pl.nextlgsdp.com\/es\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/ecix.tech\/ca\/wp-json\/wp\/v2\/pages\/83","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ecix.tech\/ca\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ecix.tech\/ca\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ecix.tech\/ca\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ecix.tech\/ca\/wp-json\/wp\/v2\/comments?post=83"}],"version-history":[{"count":26,"href":"https:\/\/ecix.tech\/ca\/wp-json\/wp\/v2\/pages\/83\/revisions"}],"predecessor-version":[{"id":32405,"href":"https:\/\/ecix.tech\/ca\/wp-json\/wp\/v2\/pages\/83\/revisions\/32405"}],"wp:attachment":[{"href":"https:\/\/ecix.tech\/ca\/wp-json\/wp\/v2\/media?parent=83"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}