{"id":10340,"date":"2022-03-26T04:12:53","date_gmt":"2022-03-26T04:12:53","guid":{"rendered":"https:\/\/ceid1.wpenginepowered.com\/disasterprooftexas\/?page_id=10340"},"modified":"2022-11-18T19:49:31","modified_gmt":"2022-11-18T19:49:31","slug":"summary-vulnerability-assessment-landing-page","status":"publish","type":"page","link":"https:\/\/ceid.utsa.edu\/disasterprooftexas\/summary-vulnerability-assessment-landing-page\/","title":{"rendered":"Summary Vulnerability Assessment Landing Page"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"10340\" class=\"elementor elementor-10340\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-501bae96 elementor-section-height-min-height elementor-hidden-tablet elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"501bae96\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;mountains&quot;,&quot;shape_divider_bottom&quot;:&quot;mountains&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" opacity=\"0.33\" d=\"M473,67.3c-203.9,88.3-263.1-34-320.3,0C66,119.1,0,59.7,0,59.7V0h1000v59.7 c0,0-62.1,26.1-94.9,29.3c-32.8,3.3-62.8-12.3-75.8-22.1C806,49.6,745.3,8.7,694.9,4.7S492.4,59,473,67.3z\"\/>\n\t<path class=\"elementor-shape-fill\" opacity=\"0.66\" d=\"M734,67.3c-45.5,0-77.2-23.2-129.1-39.1c-28.6-8.7-150.3-10.1-254,39.1 s-91.7-34.4-149.2,0C115.7,118.3,0,39.8,0,39.8V0h1000v36.5c0,0-28.2-18.5-92.1-18.5C810.2,18.1,775.7,67.3,734,67.3z\"\/>\n\t<path class=\"elementor-shape-fill\" d=\"M766.1,28.9c-200-57.5-266,65.5-395.1,19.5C242,1.8,242,5.4,184.8,20.6C128,35.8,132.3,44.9,89.9,52.5C28.6,63.7,0,0,0,0 h1000c0,0-9.9,40.9-83.6,48.1S829.6,47,766.1,28.9z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" opacity=\"0.33\" d=\"M473,67.3c-203.9,88.3-263.1-34-320.3,0C66,119.1,0,59.7,0,59.7V0h1000v59.7 c0,0-62.1,26.1-94.9,29.3c-32.8,3.3-62.8-12.3-75.8-22.1C806,49.6,745.3,8.7,694.9,4.7S492.4,59,473,67.3z\"\/>\n\t<path class=\"elementor-shape-fill\" opacity=\"0.66\" d=\"M734,67.3c-45.5,0-77.2-23.2-129.1-39.1c-28.6-8.7-150.3-10.1-254,39.1 s-91.7-34.4-149.2,0C115.7,118.3,0,39.8,0,39.8V0h1000v36.5c0,0-28.2-18.5-92.1-18.5C810.2,18.1,775.7,67.3,734,67.3z\"\/>\n\t<path class=\"elementor-shape-fill\" d=\"M766.1,28.9c-200-57.5-266,65.5-395.1,19.5C242,1.8,242,5.4,184.8,20.6C128,35.8,132.3,44.9,89.9,52.5C28.6,63.7,0,0,0,0 h1000c0,0-9.9,40.9-83.6,48.1S829.6,47,766.1,28.9z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-60cda477\" data-id=\"60cda477\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7f344fe elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7f344fe\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-1388b53\" data-id=\"1388b53\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-969d4ba elementor-align-center elementor-widget elementor-widget-button\" data-id=\"969d4ba\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/ceid.utsa.edu\/disasterprooftexas\/wp-content\/uploads\/sites\/109\/2022\/07\/Summary-Vulnerability-Assessment.xlsx\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download a Blank UTSA Summary Vulnerability Assessment<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1ee68325 elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1ee68325\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-4dfd332\" data-id=\"4dfd332\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5147df42 elementor-widget elementor-widget-heading\" data-id=\"5147df42\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Summary Vulnerability Assessment<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-74f1476 elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"74f1476\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-f19be79\" data-id=\"f19be79\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3e511b8 elementor-widget elementor-widget-text-editor\" data-id=\"3e511b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Summary Vulnerability Assessment offers a systematic method for an experienced professional to quickly gauge vulnerabilities of a building and property to the specific threat of hurricanes and floods we are exposed to in the Gulf Coast Region. The Summary Vulnerability Assessment was developed by UTSA to assess vulnerabilities before a disaster strikes. The potentially vulnerable parts of your property are identified, measured, and documented. The outcome is identification of specific strategies and technologies to enhance resilience.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-db82b59\" data-id=\"db82b59\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8b64ba1 elementor-widget elementor-widget-image\" data-id=\"8b64ba1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"569\" height=\"745\" src=\"https:\/\/ceid.utsa.edu\/disasterprooftexas\/wp-content\/uploads\/sites\/109\/2022\/04\/CroppedSurveyForm-01.svg\" class=\"attachment-large size-large wp-image-11406\" alt=\"Rapid Assessment Form\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-10fc0ee elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"10fc0ee\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-f409754\" data-id=\"f409754\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4704d28 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"4704d28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/ceid.utsa.edu\/disasterprooftexas\/wp-content\/uploads\/sites\/109\/2022\/07\/Summary-Vulnerability-Assessment.xlsx\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download a Blank UTSA Summary Vulnerability Assessment<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-31e1f18 elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"31e1f18\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-804c888\" data-id=\"804c888\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5397e07 elementor-widget elementor-widget-text-editor\" data-id=\"5397e07\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: right\"><strong>How Do the Summary Vulnerability Assessment and the RPI Tool Differ?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ce1bce9\" data-id=\"ce1bce9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d5c3aea elementor-widget elementor-widget-text-editor\" data-id=\"d5c3aea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The RPI tool can be largely completed in under an hour by a person who has prior experience with site conditions. It shows overall strengths and weaknesses, and can be re-run to envision how a potential change would enhance the performance score. By contrast, UTSA\u2019s Summary Vulnerability Assessment requires several days of professional time in site inspection, research and writing. Though streamlined compared to a FEMA vulnerability assessment, it does provide specific priorities to enhance resilience at the subject property. The Summary Vulnerability Assessment results in a technical report that a congregation might undertake once every 10\u201320 years.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd61f15 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"bd61f15\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-45a3083 elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"45a3083\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-73ecb29\" data-id=\"73ecb29\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0f321ee elementor-widget elementor-widget-text-editor\" data-id=\"0f321ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: right\"><strong>Note for Users<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-48a632b\" data-id=\"48a632b\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-88f3f5a elementor-widget elementor-widget-text-editor\" data-id=\"88f3f5a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Both the RPI and the Summary Vulnerability Assessment forms are electronic and include multiple pull-down menus for consistency of terminology. For best results, complete these forms using Excel software on an electronic device. Additionally, the RPI runs macros to calculate a numerical score and generate a visual graphic of results.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e5f6de elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"0e5f6de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-45e5fbb elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"45e5fbb\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-bd3273b\" data-id=\"bd3273b\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5c3616f elementor-widget elementor-widget-text-editor\" data-id=\"5c3616f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center\"><strong>Other Helpful Tools<br \/><\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-1bf5f14 elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1bf5f14\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-2980452\" data-id=\"2980452\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ea0f988 elementor-widget elementor-widget-text-editor\" data-id=\"ea0f988\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center\"><strong>The Texas Historical Commission <\/strong>assessment is designed for the National Register nomination process.\u00a0<a href=\"https:\/\/www.thc.texas.gov\/preserve\/projects-and-programs\/historic-resources-survey\/useful-survey-tools\" target=\"_blank\" rel=\"noopener\">Click to download.<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-1daf9df\" data-id=\"1daf9df\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-feeae67 elementor-widget elementor-widget-text-editor\" data-id=\"feeae67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center\"><strong>The National Center for Preservation Technology and Training <\/strong>tools are designed for post-disaster assessment. <br \/><a href=\"https:\/\/ncptt.nps.gov\/blog\/ncptts-updated-assessment-tools-aid-in-disaster-response-and-recovery\/\" target=\"_blank\" rel=\"noopener\">Click to download.<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b33c28 elementor-widget elementor-widget-text-editor\" data-id=\"2b33c28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: right\">Image credit: Photo of church interior by UTSA-CCS personnel.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e356d74 elementor-section-height-min-height elementor-hidden-desktop elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"e356d74\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;mountains&quot;,&quot;shape_divider_bottom&quot;:&quot;mountains&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" opacity=\"0.33\" d=\"M473,67.3c-203.9,88.3-263.1-34-320.3,0C66,119.1,0,59.7,0,59.7V0h1000v59.7 c0,0-62.1,26.1-94.9,29.3c-32.8,3.3-62.8-12.3-75.8-22.1C806,49.6,745.3,8.7,694.9,4.7S492.4,59,473,67.3z\"\/>\n\t<path class=\"elementor-shape-fill\" opacity=\"0.66\" d=\"M734,67.3c-45.5,0-77.2-23.2-129.1-39.1c-28.6-8.7-150.3-10.1-254,39.1 s-91.7-34.4-149.2,0C115.7,118.3,0,39.8,0,39.8V0h1000v36.5c0,0-28.2-18.5-92.1-18.5C810.2,18.1,775.7,67.3,734,67.3z\"\/>\n\t<path class=\"elementor-shape-fill\" d=\"M766.1,28.9c-200-57.5-266,65.5-395.1,19.5C242,1.8,242,5.4,184.8,20.6C128,35.8,132.3,44.9,89.9,52.5C28.6,63.7,0,0,0,0 h1000c0,0-9.9,40.9-83.6,48.1S829.6,47,766.1,28.9z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\">\n\t<path class=\"elementor-shape-fill\" opacity=\"0.33\" d=\"M473,67.3c-203.9,88.3-263.1-34-320.3,0C66,119.1,0,59.7,0,59.7V0h1000v59.7 c0,0-62.1,26.1-94.9,29.3c-32.8,3.3-62.8-12.3-75.8-22.1C806,49.6,745.3,8.7,694.9,4.7S492.4,59,473,67.3z\"\/>\n\t<path class=\"elementor-shape-fill\" opacity=\"0.66\" d=\"M734,67.3c-45.5,0-77.2-23.2-129.1-39.1c-28.6-8.7-150.3-10.1-254,39.1 s-91.7-34.4-149.2,0C115.7,118.3,0,39.8,0,39.8V0h1000v36.5c0,0-28.2-18.5-92.1-18.5C810.2,18.1,775.7,67.3,734,67.3z\"\/>\n\t<path class=\"elementor-shape-fill\" d=\"M766.1,28.9c-200-57.5-266,65.5-395.1,19.5C242,1.8,242,5.4,184.8,20.6C128,35.8,132.3,44.9,89.9,52.5C28.6,63.7,0,0,0,0 h1000c0,0-9.9,40.9-83.6,48.1S829.6,47,766.1,28.9z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-70cb33f\" data-id=\"70cb33f\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e6e9cff elementor-reverse-tablet elementor-reverse-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e6e9cff\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-6afb998\" data-id=\"6afb998\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e1acad6 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"e1acad6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/ceid.utsa.edu\/disasterprooftexas\/wp-content\/uploads\/sites\/109\/2022\/04\/UTSAsurveyAndassessmentForm.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download a Blank UTSA Summary Vulnerability Assessment<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-81a7795 elementor-widget elementor-widget-heading\" data-id=\"81a7795\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Summary Vulnerability Assessment<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-554b95b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"554b95b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-3aa654e\" data-id=\"3aa654e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a0e5379 elementor-widget elementor-widget-text-editor\" data-id=\"a0e5379\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Summary Vulnerability Assessment offers a systematic method for an experienced professional to quickly assess vulnerabilities of a building and property to the specific threats of hurricanes and floods we are exposed to in the Gulf Coast Region. The Summary Vulnerability Assessment was developed by UTSA to assess vulnerabilities before a disaster strikes. The potentially vulnerable parts of your property are identified, measured, and documented. The outcome is identification of specific strategies and technologies to enhance resilience.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7eb9c5e elementor-widget elementor-widget-image\" data-id=\"7eb9c5e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"569\" height=\"745\" src=\"https:\/\/ceid.utsa.edu\/disasterprooftexas\/wp-content\/uploads\/sites\/109\/2022\/04\/CroppedSurveyForm-01.svg\" class=\"attachment-large size-large wp-image-11406\" alt=\"Rapid Assessment Form\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bbabb58 elementor-widget elementor-widget-text-editor\" data-id=\"bbabb58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>How Do the Summary Vulnerability Assessment and the RPI Tool Differ?<\/strong><\/p><p>The RPI tool can be largely completed in under an hour by a person who has prior experience with site conditions. It shows overall strengths and weaknesses, and can be re-run to envision how a potential change would enhance the performance score. By contrast, UTSA\u2019s Summary Vulnerability Assessment requires several days of professional time in site inspection, research and writing. Though streamlined compared to a FEMA vulnerability assessment, it does provide specific priorities to enhance resilience at the subject property. The Summary Vulnerability Assessment results in a technical report that a congregation might undertake once every 10\u201320 years.<\/p><p><strong>Note for Users<\/strong><\/p><p>Both the RPI and the Summary Vulnerability Assessment forms are electronic and include multiple pull-down menus for consistency of terminology. For best results, complete these forms using Excel software on an electronic device. Additionally, the RPI runs macros to calculate a numerical score and generate a visual graphic of results.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9512c5b elementor-align-center elementor-widget elementor-widget-button\" data-id=\"9512c5b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-xs\" href=\"https:\/\/ceid.utsa.edu\/disasterprooftexas\/wp-content\/uploads\/sites\/109\/2022\/04\/UTSAsurveyAndassessmentForm.pdf\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download a Blank UTSA Summary Vulnerability Assessment<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c285673 elementor-widget elementor-widget-text-editor\" data-id=\"c285673\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Other Helpful Tools<\/strong><\/p><p>The Texas Historical Commission assessment is designed for the National Register nomination process.\u00a0<a href=\"https:\/\/www.thc.texas.gov\/preserve\/projects-and-programs\/historic-resources-survey\/useful-survey-tools\">Click to download.<\/a><\/p><p><strong>The National Center for Preservation Technology and Training <\/strong>tools are designed for post-disaster assessment. <br \/><a href=\"https:\/\/ncptt.nps.gov\/blog\/ncptts-updated-assessment-tools-aid-in-disaster-response-and-recovery\/\" target=\"_blank\" rel=\"noopener\">Click to download.<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Download a Blank UTSA Summary Vulnerability Assessment Summary Vulnerability Assessment The Summary Vulnerability Assessment offers a systematic method for an experienced professional to quickly gauge vulnerabilities of a building and property to the specific threat of hurricanes and floods we are exposed to in the Gulf Coast Region. The Summary Vulnerability Assessment was developed by<\/p>\n","protected":false},"author":156,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-10340","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Summary Vulnerability Assessment Landing Page - Disaster-Proof Texas<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ceid.utsa.edu\/disasterprooftexas\/summary-vulnerability-assessment-landing-page\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Summary Vulnerability Assessment Landing Page - Disaster-Proof Texas\" \/>\n<meta property=\"og:description\" content=\"Download a Blank UTSA Summary Vulnerability Assessment Summary Vulnerability Assessment The Summary Vulnerability Assessment offers a systematic method for an experienced professional to quickly gauge vulnerabilities of a building and property to the specific threat of hurricanes and floods we are exposed to in the Gulf Coast Region. The Summary Vulnerability Assessment was developed by\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ceid.utsa.edu\/disasterprooftexas\/summary-vulnerability-assessment-landing-page\/\" \/>\n<meta property=\"og:site_name\" content=\"Disaster-Proof Texas\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-18T19:49:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ceid.utsa.edu\/disasterprooftexas\/wp-content\/uploads\/sites\/109\/2022\/04\/CroppedSurveyForm-01.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/disasterprooftexas\\\/summary-vulnerability-assessment-landing-page\\\/\",\"url\":\"https:\\\/\\\/ceid.utsa.edu\\\/disasterprooftexas\\\/summary-vulnerability-assessment-landing-page\\\/\",\"name\":\"Summary Vulnerability Assessment Landing Page - Disaster-Proof Texas\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/disasterprooftexas\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/disasterprooftexas\\\/summary-vulnerability-assessment-landing-page\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/disasterprooftexas\\\/summary-vulnerability-assessment-landing-page\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ceid.utsa.edu\\\/disasterprooftexas\\\/wp-content\\\/uploads\\\/sites\\\/109\\\/2022\\\/04\\\/CroppedSurveyForm-01.svg\",\"datePublished\":\"2022-03-26T04:12:53+00:00\",\"dateModified\":\"2022-11-18T19:49:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/disasterprooftexas\\\/summary-vulnerability-assessment-landing-page\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ceid.utsa.edu\\\/disasterprooftexas\\\/summary-vulnerability-assessment-landing-page\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/disasterprooftexas\\\/summary-vulnerability-assessment-landing-page\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ceid.utsa.edu\\\/disasterprooftexas\\\/wp-content\\\/uploads\\\/sites\\\/109\\\/2022\\\/04\\\/CroppedSurveyForm-01.svg\",\"contentUrl\":\"https:\\\/\\\/ceid.utsa.edu\\\/disasterprooftexas\\\/wp-content\\\/uploads\\\/sites\\\/109\\\/2022\\\/04\\\/CroppedSurveyForm-01.svg\",\"width\":569,\"height\":745,\"caption\":\"Rapid Assessment Form\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/disasterprooftexas\\\/summary-vulnerability-assessment-landing-page\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ceid.utsa.edu\\\/disasterprooftexas\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Summary Vulnerability Assessment Landing Page\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/disasterprooftexas\\\/#website\",\"url\":\"https:\\\/\\\/ceid.utsa.edu\\\/disasterprooftexas\\\/\",\"name\":\"Disaster-Proof Texas\",\"description\":\"Disaster Resilience for Historic Houses of Worship in the Texas Gulf Coast Region\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ceid.utsa.edu\\\/disasterprooftexas\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Summary Vulnerability Assessment Landing Page - Disaster-Proof Texas","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ceid.utsa.edu\/disasterprooftexas\/summary-vulnerability-assessment-landing-page\/","og_locale":"en_US","og_type":"article","og_title":"Summary Vulnerability Assessment Landing Page - Disaster-Proof Texas","og_description":"Download a Blank UTSA Summary Vulnerability Assessment Summary Vulnerability Assessment The Summary Vulnerability Assessment offers a systematic method for an experienced professional to quickly gauge vulnerabilities of a building and property to the specific threat of hurricanes and floods we are exposed to in the Gulf Coast Region. The Summary Vulnerability Assessment was developed by","og_url":"https:\/\/ceid.utsa.edu\/disasterprooftexas\/summary-vulnerability-assessment-landing-page\/","og_site_name":"Disaster-Proof Texas","article_modified_time":"2022-11-18T19:49:31+00:00","og_image":[{"url":"https:\/\/ceid.utsa.edu\/disasterprooftexas\/wp-content\/uploads\/sites\/109\/2022\/04\/CroppedSurveyForm-01.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ceid.utsa.edu\/disasterprooftexas\/summary-vulnerability-assessment-landing-page\/","url":"https:\/\/ceid.utsa.edu\/disasterprooftexas\/summary-vulnerability-assessment-landing-page\/","name":"Summary Vulnerability Assessment Landing Page - Disaster-Proof Texas","isPartOf":{"@id":"https:\/\/ceid.utsa.edu\/disasterprooftexas\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ceid.utsa.edu\/disasterprooftexas\/summary-vulnerability-assessment-landing-page\/#primaryimage"},"image":{"@id":"https:\/\/ceid.utsa.edu\/disasterprooftexas\/summary-vulnerability-assessment-landing-page\/#primaryimage"},"thumbnailUrl":"https:\/\/ceid.utsa.edu\/disasterprooftexas\/wp-content\/uploads\/sites\/109\/2022\/04\/CroppedSurveyForm-01.svg","datePublished":"2022-03-26T04:12:53+00:00","dateModified":"2022-11-18T19:49:31+00:00","breadcrumb":{"@id":"https:\/\/ceid.utsa.edu\/disasterprooftexas\/summary-vulnerability-assessment-landing-page\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ceid.utsa.edu\/disasterprooftexas\/summary-vulnerability-assessment-landing-page\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ceid.utsa.edu\/disasterprooftexas\/summary-vulnerability-assessment-landing-page\/#primaryimage","url":"https:\/\/ceid.utsa.edu\/disasterprooftexas\/wp-content\/uploads\/sites\/109\/2022\/04\/CroppedSurveyForm-01.svg","contentUrl":"https:\/\/ceid.utsa.edu\/disasterprooftexas\/wp-content\/uploads\/sites\/109\/2022\/04\/CroppedSurveyForm-01.svg","width":569,"height":745,"caption":"Rapid Assessment Form"},{"@type":"BreadcrumbList","@id":"https:\/\/ceid.utsa.edu\/disasterprooftexas\/summary-vulnerability-assessment-landing-page\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ceid.utsa.edu\/disasterprooftexas\/"},{"@type":"ListItem","position":2,"name":"Summary Vulnerability Assessment Landing Page"}]},{"@type":"WebSite","@id":"https:\/\/ceid.utsa.edu\/disasterprooftexas\/#website","url":"https:\/\/ceid.utsa.edu\/disasterprooftexas\/","name":"Disaster-Proof Texas","description":"Disaster Resilience for Historic Houses of Worship in the Texas Gulf Coast Region","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ceid.utsa.edu\/disasterprooftexas\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/ceid.utsa.edu\/disasterprooftexas\/wp-json\/wp\/v2\/pages\/10340","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ceid.utsa.edu\/disasterprooftexas\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ceid.utsa.edu\/disasterprooftexas\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ceid.utsa.edu\/disasterprooftexas\/wp-json\/wp\/v2\/users\/156"}],"replies":[{"embeddable":true,"href":"https:\/\/ceid.utsa.edu\/disasterprooftexas\/wp-json\/wp\/v2\/comments?post=10340"}],"version-history":[{"count":0,"href":"https:\/\/ceid.utsa.edu\/disasterprooftexas\/wp-json\/wp\/v2\/pages\/10340\/revisions"}],"wp:attachment":[{"href":"https:\/\/ceid.utsa.edu\/disasterprooftexas\/wp-json\/wp\/v2\/media?parent=10340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}