{"id":20434,"date":"2023-06-16T09:24:13","date_gmt":"2023-06-16T07:24:13","guid":{"rendered":"https:\/\/stage.autorolasolutions.com\/digital-ecosystem\/features\/it-data-security\/"},"modified":"2024-03-13T09:16:29","modified_gmt":"2024-03-13T08:16:29","slug":"it-data-security","status":"publish","type":"page","link":"https:\/\/stage.autorolasolutions.com\/au\/digital-ecosystem\/features\/it-data-security\/","title":{"rendered":"IT &#038; Data Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"20434\" class=\"elementor elementor-20434 elementor-13861\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-33692a2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"33692a2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0fa72e1\" data-id=\"0fa72e1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ba481b5 elementor-widget elementor-widget-text-editor\" data-id=\"ba481b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1>IT &amp; Data Security<\/h1>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0351764 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0351764\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-902f9d7\" data-id=\"902f9d7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-44fd9bd elementor-widget elementor-widget-text-editor\" data-id=\"44fd9bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2><strong>Information Security<\/strong><\/h2><div><p data-renderer-start-pos=\"15308\">Autorolas information security practices are governed by a set of fundamental principles, ensuring alignment with industry standards, a cohesive and robust security framework, and a commitment to safeguarding sensitive data while enabling our business to thrive and maintain a positive reputation.<\/p><p><strong>Compliance with International Standards: <\/strong>Our information security management system adheres to globally recognized best practices, such as ISO 27001, ISO 27002, and ISO 27005.<\/p><p><strong>Leadership and Guidance<\/strong>: The Chief Information Security Officer (CISO) leads the Information Security function, responsible for creating the Information Security Manual, encompassing policies, standards, procedures, and guidelines. This function serves as an internal center of excellence, providing leadership and guidance on all information security matters.<\/p><p><strong>Prudent Investment in Security:<\/strong> We make wise investments in proven information security controls based on lifecycle cost\/benefit assessments and risk analyses.<\/p><p><strong>Organization-Wide Responsibility:<\/strong> Information security is embedded throughout the entire organization, safeguarding all information assets under our care, including those we own and those entrusted to us. It is integrated into our IT architecture, operational processes, and management procedures, making every individual accountable for information security.<\/p><p><strong>Integral to Corporate Governance:<\/strong> Information security is a core element of corporate governance, closely intertwined with IT management, physical site security, risk management, legal and regulatory compliance, and business continuity. It fulfills our obligations to employees, business partners, and the broader community.<\/p><p><strong>Business Enabler:<\/strong> Information security serves as a business enabler, allowing us to confidently pursue and maintain relationships, markets, and opportunities that might otherwise seem too risky. By minimizing losses from security breaches, it supports our financial well-being and enhances our corporate image as a trustworthy, open, honest, and ethical organization.<\/p><p><strong>Sensitive Data Protection:<\/strong> We prioritize the protection of sensitive data as defined by GDPR Article 9 and Article 10. Registration of personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, trade-union membership, genetic data, biometric data for unique identification, health data, and data concerning sex life or sexual orientation is strictly prohibited. Exceptions only apply to preapproved registration of trade-union and required health information of employees when necessary.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-55295d6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"55295d6\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-74f7b71\" data-id=\"74f7b71\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7342aec elementor--h-position-center elementor--v-position-middle elementor-arrows-position-inside elementor-pagination-position-inside elementor-widget elementor-widget-slides\" data-id=\"7342aec\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;transition&quot;:&quot;slide&quot;,&quot;transition_speed&quot;:500}\" data-widget_type=\"slides.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper\">\n\t\t\t\t\t<div class=\"elementor-slides-wrapper elementor-main-swiper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Slides\" dir=\"ltr\" data-animation=\"fadeInUp\">\n\t\t\t\t<div class=\"swiper-wrapper elementor-slides\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-repeater-item-1509634 swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\"><\/div><div class=\"swiper-slide-inner\" ><div class=\"swiper-slide-contents\"><div class=\"elementor-slide-heading\">GDPR compliance<\/div><div class=\"elementor-slide-description\">At our organization, we are committed to upholding the key principles of the GDPR when processing personal data to fulfill our obligations to both our customers and the data subjects. We take full responsibility for implementing and maintaining this policy to ensure compliance with the GDPR. Our approach to processing personal data ensures appropriate security and confidentiality. We protect against unauthorized access, unlawful use, accidental loss, destruction, or damage of personal data and the processing equipment, employing suitable technical and organizational measures.<\/div><\/div><\/div><\/div><div class=\"elementor-repeater-item-3b1e66b swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\"><\/div><div class=\"swiper-slide-inner\" ><div class=\"swiper-slide-contents\"><div class=\"elementor-slide-heading\">Data rights<\/div><div class=\"elementor-slide-description\">Our employees and data processors with access to personal data are bound by strict confidentiality obligations. We always aim to accommodate data subject requests, even if not legally mandated, to uphold their rights. We process personal data lawfully and fairly, ensuring transparency in all communications related to the processing of our customers' personal data. We use clear and plain language to make information easily accessible and understandable.<\/div><\/div><\/div><\/div><div class=\"elementor-repeater-item-8117355 swiper-slide\" role=\"group\" aria-roledescription=\"slide\"><div class=\"swiper-slide-bg\"><\/div><div class=\"swiper-slide-inner\" ><div class=\"swiper-slide-contents\"><div class=\"elementor-slide-heading\">Personal data<\/div><div class=\"elementor-slide-description\">Personal data is collected for specific, explicit, and legitimate purposes, and we do not use it in ways incompatible with these purposes. The reasons for processing personal data are explicit and determined at the time of collection. We process personal data only to the extent necessary for the intended purposes, ensuring adequacy and relevance. The storage period for personal data is kept to a strict minimum. Personal data is not retained beyond the legally permissible and required period. We store personal data only as long as necessary for the processing purposes.<\/div><\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\" aria-label=\"Previous slide\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"eicon-chevron-left\"><\/i>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\" aria-label=\"Next slide\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"eicon-chevron-right\"><\/i>\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>IT &amp; Data Security Information Security Autorolas information security practices are governed by a set of fundamental principles, ensuring alignment with industry standards, a cohesive and robust security framework, and a commitment to safeguarding sensitive data while enabling our business to thrive and maintain a positive reputation. Compliance with International Standards: Our information security management [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":20427,"menu_order":7,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-20434","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IT Data Security Features | Safeguarding Automotive Digital Operations<\/title>\n<meta name=\"description\" content=\"Safeguard your automotive digital operations with our IT data security features. Protect sensitive information and ensure the integrity of your business processes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/stage.autorolasolutions.com\/uk\/digital-ecosystem\/features\/it-data-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Data Security Features | Safeguarding Automotive Digital Operations\" \/>\n<meta property=\"og:description\" content=\"Safeguard your automotive digital operations with our IT data security features. Protect sensitive information and ensure the integrity of your business processes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/stage.autorolasolutions.com\/uk\/digital-ecosystem\/features\/it-data-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Autorola Solutions\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-13T08:16:29+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/stage.autorolasolutions.com\/uk\/digital-ecosystem\/features\/it-data-security\/\",\"url\":\"https:\/\/stage.autorolasolutions.com\/uk\/digital-ecosystem\/features\/it-data-security\/\",\"name\":\"IT Data Security Features | Safeguarding Automotive Digital Operations\",\"isPartOf\":{\"@id\":\"https:\/\/stage.autorolasolutions.com\/#website\"},\"datePublished\":\"2023-06-16T07:24:13+00:00\",\"dateModified\":\"2024-03-13T08:16:29+00:00\",\"description\":\"Safeguard your automotive digital operations with our IT data security features. Protect sensitive information and ensure the integrity of your business processes.\",\"breadcrumb\":{\"@id\":\"https:\/\/stage.autorolasolutions.com\/uk\/digital-ecosystem\/features\/it-data-security\/#breadcrumb\"},\"inLanguage\":\"au-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/stage.autorolasolutions.com\/uk\/digital-ecosystem\/features\/it-data-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/stage.autorolasolutions.com\/uk\/digital-ecosystem\/features\/it-data-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/stage.autorolasolutions.com\/au\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Digital Ecosystem\",\"item\":\"https:\/\/stage.autorolasolutions.com\/uk\/digital-ecosystem\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Features\",\"item\":\"https:\/\/stage.autorolasolutions.com\/uk\/digital-ecosystem\/features\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"IT &#038; Data Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/stage.autorolasolutions.com\/#website\",\"url\":\"https:\/\/stage.autorolasolutions.com\/\",\"name\":\"Autorola Solutions\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/stage.autorolasolutions.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/stage.autorolasolutions.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"au-AU\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/stage.autorolasolutions.com\/#organization\",\"name\":\"Autorola Solutions\",\"url\":\"https:\/\/stage.autorolasolutions.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"au-AU\",\"@id\":\"https:\/\/stage.autorolasolutions.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/stage.autorolasolutions.com\/wp-content\/uploads\/2025\/01\/Autorola_Solutions_Logo_Left_Screen_RGB.svg\",\"contentUrl\":\"https:\/\/stage.autorolasolutions.com\/wp-content\/uploads\/2025\/01\/Autorola_Solutions_Logo_Left_Screen_RGB.svg\",\"width\":143,\"height\":44,\"caption\":\"Autorola Solutions\"},\"image\":{\"@id\":\"https:\/\/stage.autorolasolutions.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/autorolasolutions\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Data Security Features | Safeguarding Automotive Digital Operations","description":"Safeguard your automotive digital operations with our IT data security features. Protect sensitive information and ensure the integrity of your business processes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/stage.autorolasolutions.com\/uk\/digital-ecosystem\/features\/it-data-security\/","og_locale":"en_US","og_type":"article","og_title":"IT Data Security Features | Safeguarding Automotive Digital Operations","og_description":"Safeguard your automotive digital operations with our IT data security features. Protect sensitive information and ensure the integrity of your business processes.","og_url":"https:\/\/stage.autorolasolutions.com\/uk\/digital-ecosystem\/features\/it-data-security\/","og_site_name":"Autorola Solutions","article_modified_time":"2024-03-13T08:16:29+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/stage.autorolasolutions.com\/uk\/digital-ecosystem\/features\/it-data-security\/","url":"https:\/\/stage.autorolasolutions.com\/uk\/digital-ecosystem\/features\/it-data-security\/","name":"IT Data Security Features | Safeguarding Automotive Digital Operations","isPartOf":{"@id":"https:\/\/stage.autorolasolutions.com\/#website"},"datePublished":"2023-06-16T07:24:13+00:00","dateModified":"2024-03-13T08:16:29+00:00","description":"Safeguard your automotive digital operations with our IT data security features. Protect sensitive information and ensure the integrity of your business processes.","breadcrumb":{"@id":"https:\/\/stage.autorolasolutions.com\/uk\/digital-ecosystem\/features\/it-data-security\/#breadcrumb"},"inLanguage":"au-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/stage.autorolasolutions.com\/uk\/digital-ecosystem\/features\/it-data-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/stage.autorolasolutions.com\/uk\/digital-ecosystem\/features\/it-data-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/stage.autorolasolutions.com\/au\/"},{"@type":"ListItem","position":2,"name":"Digital Ecosystem","item":"https:\/\/stage.autorolasolutions.com\/uk\/digital-ecosystem\/"},{"@type":"ListItem","position":3,"name":"Features","item":"https:\/\/stage.autorolasolutions.com\/uk\/digital-ecosystem\/features\/"},{"@type":"ListItem","position":4,"name":"IT &#038; Data Security"}]},{"@type":"WebSite","@id":"https:\/\/stage.autorolasolutions.com\/#website","url":"https:\/\/stage.autorolasolutions.com\/","name":"Autorola Solutions","description":"","publisher":{"@id":"https:\/\/stage.autorolasolutions.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/stage.autorolasolutions.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"au-AU"},{"@type":"Organization","@id":"https:\/\/stage.autorolasolutions.com\/#organization","name":"Autorola Solutions","url":"https:\/\/stage.autorolasolutions.com\/","logo":{"@type":"ImageObject","inLanguage":"au-AU","@id":"https:\/\/stage.autorolasolutions.com\/#\/schema\/logo\/image\/","url":"https:\/\/stage.autorolasolutions.com\/wp-content\/uploads\/2025\/01\/Autorola_Solutions_Logo_Left_Screen_RGB.svg","contentUrl":"https:\/\/stage.autorolasolutions.com\/wp-content\/uploads\/2025\/01\/Autorola_Solutions_Logo_Left_Screen_RGB.svg","width":143,"height":44,"caption":"Autorola Solutions"},"image":{"@id":"https:\/\/stage.autorolasolutions.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/autorolasolutions\/"]}]}},"_links":{"self":[{"href":"https:\/\/stage.autorolasolutions.com\/au\/wp-json\/wp\/v2\/pages\/20434","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stage.autorolasolutions.com\/au\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/stage.autorolasolutions.com\/au\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/stage.autorolasolutions.com\/au\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/stage.autorolasolutions.com\/au\/wp-json\/wp\/v2\/comments?post=20434"}],"version-history":[{"count":1,"href":"https:\/\/stage.autorolasolutions.com\/au\/wp-json\/wp\/v2\/pages\/20434\/revisions"}],"predecessor-version":[{"id":20470,"href":"https:\/\/stage.autorolasolutions.com\/au\/wp-json\/wp\/v2\/pages\/20434\/revisions\/20470"}],"up":[{"embeddable":true,"href":"https:\/\/stage.autorolasolutions.com\/au\/wp-json\/wp\/v2\/pages\/20427"}],"wp:attachment":[{"href":"https:\/\/stage.autorolasolutions.com\/au\/wp-json\/wp\/v2\/media?parent=20434"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}