{"id":135,"date":"2013-03-18T20:22:14","date_gmt":"2013-03-18T20:22:14","guid":{"rendered":"http:\/\/www.digitaldanger.org\/?page_id=135"},"modified":"2013-04-12T21:35:47","modified_gmt":"2013-04-12T21:35:47","slug":"safety-program-for-parents","status":"publish","type":"page","link":"http:\/\/www.digitaldanger.org\/?page_id=135","title":{"rendered":"Safety Program for Parents"},"content":{"rendered":"<p>Learn strategies to keep your kids safe from digital danger. This program has been shared with over 6000 parents.<\/p>\n<p>Topics include:<\/p>\n<ul>\n<li>Creating digital rules<\/li>\n<li>Cyberbully prevention<\/li>\n<li>Monitoring online activity<\/li>\n<li>Intervening when your child breaks your digital rules<\/li>\n<\/ul>\n<p><a class=\"blue\" href=\"http:\/\/www.digitaldanger.org\/?page_id=15\"> Request a Presentation <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn strategies to keep your kids safe from digital danger. This program has been shared with over 6000 parents. Topics include: Creating digital rules Cyberbully prevention Monitoring online activity Intervening when your child breaks your digital rules Request a Presentation<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":128,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ngg_post_thumbnail":0,"jetpack_post_was_ever_published":false},"jetpack_shortlink":"https:\/\/wp.me\/P3oZZI-2b","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"http:\/\/www.digitaldanger.org\/index.php?rest_route=\/wp\/v2\/pages\/135"}],"collection":[{"href":"http:\/\/www.digitaldanger.org\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.digitaldanger.org\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.digitaldanger.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.digitaldanger.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=135"}],"version-history":[{"count":5,"href":"http:\/\/www.digitaldanger.org\/index.php?rest_route=\/wp\/v2\/pages\/135\/revisions"}],"predecessor-version":[{"id":192,"href":"http:\/\/www.digitaldanger.org\/index.php?rest_route=\/wp\/v2\/pages\/135\/revisions\/192"}],"up":[{"embeddable":true,"href":"http:\/\/www.digitaldanger.org\/index.php?rest_route=\/wp\/v2\/pages\/128"}],"wp:attachment":[{"href":"http:\/\/www.digitaldanger.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}