{"id":7050,"date":"2024-12-24T11:07:30","date_gmt":"2024-12-24T11:07:30","guid":{"rendered":"https:\/\/www.tmill.co.th\/announcement\/information-technology-security-policy\/"},"modified":"2024-12-24T11:07:30","modified_gmt":"2024-12-24T11:07:30","slug":"information-technology-security-policy","status":"publish","type":"announcement","link":"https:\/\/www.tmill.co.th\/en\/announcement\/information-technology-security-policy\/","title":{"rendered":"Information Technology Security Policy"},"content":{"rendered":"","protected":false},"featured_media":0,"template":"","meta":{"_acf_changed":false},"announcement-category":[131],"class_list":["post-7050","announcement","type-announcement","status-publish","hentry","announcement-category-corporate-governance-and-economy"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.tmill.co.th\/en\/wp-json\/wp\/v2\/announcement\/7050","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tmill.co.th\/en\/wp-json\/wp\/v2\/announcement"}],"about":[{"href":"https:\/\/www.tmill.co.th\/en\/wp-json\/wp\/v2\/types\/announcement"}],"version-history":[{"count":0,"href":"https:\/\/www.tmill.co.th\/en\/wp-json\/wp\/v2\/announcement\/7050\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.tmill.co.th\/en\/wp-json\/wp\/v2\/media?parent=7050"}],"wp:term":[{"taxonomy":"announcement-category","embeddable":true,"href":"https:\/\/www.tmill.co.th\/en\/wp-json\/wp\/v2\/announcement-category?post=7050"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}