
{"id":1740,"date":"2012-01-24T00:00:00","date_gmt":"2012-01-24T00:00:00","guid":{"rendered":"http:\/\/otava.test\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/"},"modified":"2012-01-24T00:00:00","modified_gmt":"2012-01-24T00:00:00","slug":"tactical-mobile-device-security-measures-to-meet-hipaa-compliance","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/","title":{"rendered":"Tactical Mobile Device Security Measures to Meet HIPAA Compliance"},"content":{"rendered":"<p>Mobile devices are becoming ubiquitous in the healthcare industry \u2013 from quickly filing e-prescriptions to collecting and sending patient health information (PHI) directly to an EHR\/EMR (electronic health or medical record) system, the use of smartphones, tablets and other portable devices is changing the quality of patient care for the better across the nation.<\/p>\n<p>But when it comes to securing your mobile devices and meeting strict <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA compliance<\/a> standards, physicians and other healthcare professionals may not realize the security precautions they need to take to prevent a data breach and <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/hipaa-compliant-hosting\/resources\/what-is-a-hipaa-violation\">HIPAA violation<\/a>.<\/p>\n<p>One example of recommended best practices can be found in Yale University\u2019s HIPAA guide for mobile device security (intended for its covered components, such as the Schools of Medicine, Health Services, etc.) including:<\/p>\n<figure id=\"attachment_4525\" aria-describedby=\"caption-attachment-4525\" style=\"width: 203px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-4525 \" title=\"Smartphone Security\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Smartphones.jpg\" alt=\"Smartphone Security\" width=\"203\" height=\"320\" \/><figcaption id=\"caption-attachment-4525\" class=\"wp-caption-text\">Smartphone Security<\/figcaption><\/figure>\n<ul>\n<li><strong>Passwords \u2013 <\/strong>Yale recommends users have a password with a minimum of four characters. They also recommend implementing a lock-out setting after 10 failed attempts to enter a password.<\/li>\n<li><strong>Encryption \u2013 <\/strong>Data must be encrypted at rest and in transit, including backup data.<\/li>\n<li><strong>Message Storage \u2013 <\/strong>The storage limit is capped at 200 messages at one time or 14 days of messages.<\/li>\n<li><strong>Applications<\/strong> \u2013 All applications that create, store, access, send or receive PHI must meet HIPAA security standards. Yale also has a <a href=\"https:\/\/security.yale.edu\/sdr\/\">Security Design Review<\/a> service that can check out any custom developed apps for compliance (although the website really needs to update its language regarding Application Service Providers and the required <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/soc-1-2-3-compliant-cloud\/\">SAS 70<\/a> Type II documentation \u2013 <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/soc-1-2-3-compliant-cloud\/\">SSAE 16<\/a>\/<a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/soc-1-2-3-compliant-cloud\/\">SOC 1<\/a> have since replaced the SAS 70 standard).<\/li>\n<li><strong>Software \u2013 <\/strong>Apply security updates frequently and use the most recent OS available.<\/li>\n<li><strong>Remote Management and Tracking \u2013<\/strong> Mobile devices must have a remote deletion and tracking feature or you have to sign up for a service that can wipe it if it is stolen or lost. For the iPhone, that can mean installing the Find My iPhone app. Yale provides a <a href=\"https:\/\/www.yale.edu\/its\/mobile-technology\/erase.html\">comprehensive \u00a0guide<\/a> to locating and wiping iPhones, Blackberrys (<a href=\"https:\/\/crackberry.com\/great-plural-blackberry-debate\">read this, grammar nerds<\/a>) and other smartphone devices.<\/li>\n<li><strong>No Circumvention \u2013 <\/strong>This refers to protecting the security of mobile devices by prohibiting users from using unauthorized software and hardware, etc.<\/li>\n<li><strong>Wireless \u2013 <\/strong>Yale requires the use of VPN services when using digital cellular to connect to the Yale network and if not using one of Yale\u2019s cell carriers. For Bluetooth&#x2122;, passwords or PINs are required to secure connections.<\/li>\n<li><strong>Thumb Drives and Other Portable Media Devices \u2013 <\/strong>Storing PHI is prohibited unless the devices meet the Yale encryption standards.<\/li>\n<li><strong>File-Sharing \u2013 <\/strong>Users that need to send or exchange PHI outside of the network have to use a secure file transfer tool, or secure file transfer protocol (SFTP).<\/li>\n<li><strong>Servers \u2013 <\/strong>Naturally Yale recommends using their IT department-owned servers to store all PHI. Their requirements are aligned with the HIPAA breach notification rules that require reports of data breaches if it affects 500 or more patients.<\/li>\n<li><strong>Privacy Filters \u2013 <\/strong>Computer screens that display PHI must have privacy filters installed if they\u2019re viewable by the public.<\/li>\n<li><strong>Device Disposal &#8211; <\/strong>When upgrading or getting rid of your mobile devices, you must first securely destroy or delete PHI.<\/li>\n<li><strong>Email \u2013 <\/strong>Configuring email accounts to auto-forward to a non-Yale email account is prohibited if the email account may have PHI in its inbox.<\/li>\n<\/ul>\n<p>This is a great start when it comes to documenting and specifying the security measures your organization needs to take, but don\u2019t just copy and paste these policies. Every company has different needs that require a customized plan to keep PHI safe.<\/p>\n<p>Also, not every device is created equal. Last year, <a href=\"https:\/\/www.bgr.com\/2011\/09\/30\/major-security-flaw-lets-anyone-bypass-att-samsung-galaxy-s-ii-security-video\/\">BGR.com<\/a> found a major security flaw in the security lock design of AT&amp;T\u2019s Samsung Galaxy S II cellphone that left it open to a simple workaround, allowing users to bypass the PIN or unlock feature. If you tap the lock button to wake it, wait for it to time out and go black, then tap the lock button again, the phone is suddenly accessible and the PIN rendered useless.<\/p>\n<p>Make sure you know your device and its features, and deploy similar security measures as found above to stay compliant even on the go.<\/p>\n<p>For more on IT security and best practices, read <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/hipaa-compliant-it-security-and-best-practices\/\">HIPAA Compliant IT Security and Best Practices<\/a>. Or for more about smartphone security, read <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/mobile-security-how-safe-is-your-data\/\">Mobile Security: How Safe is Your Data?<\/a><\/p>\n<p>References:<br \/>\n<a href=\"https:\/\/hipaa.yale.edu\/guidance\/policy.html\">Yale University\u2019s HIPAA Security Updates and Reminders<\/a><br \/>\n<a href=\"https:\/\/www.bgr.com\/2011\/09\/30\/major-security-flaw-lets-anyone-bypass-att-samsung-galaxy-s-ii-security-video\/\">Major Security Flaw Lets Anyone Bypass AT&amp;T Samsun Galaxy S II Security<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mobile devices are becoming ubiquitous in the healthcare industry \u2013 from quickly filing e-prescriptions to collecting and sending patient health information (PHI) directly to an EHR\/EMR (electronic health or medical record) system, the use of smartphones, tablets and other portable devices is changing the quality of patient care for the better across the nation. But when it comes to securing your mobile devices and meeting strict HIPAA compliance standards, physicians and other healthcare professionals may not realize the security precautions they need to take to prevent a data breach and HIPAA violation. One example of recommended best practices can be found in Yale University\u2019s HIPAA guide for mobile device security (intended for its covered components, such as the Schools of Medicine, Health Services, etc.) including: Passwords \u2013 Yale recommends users have a password with a minimum of four characters. They also recommend implementing a lock-out setting after 10 failed attempts to enter a password. Encryption \u2013 Data must be encrypted at rest and in transit, including backup data. Message Storage \u2013 The storage limit is capped at 200 messages at one time or 14 days of messages. Applications \u2013 All applications that create, store, access, send or receive PHI must&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-1740","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Tactical Mobile Device Security Measures to Meet HIPAA Compliance | OTAVA<\/title>\n<meta name=\"description\" content=\"When it comes to securing your mobile devices and meeting strict HIPAA compliance standards, there are security precautions needed to prevent a violation.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tactical Mobile Device Security Measures to Meet HIPAA Compliance\" \/>\n<meta property=\"og:description\" content=\"When it comes to securing your mobile devices and meeting strict HIPAA compliance standards, there are security precautions needed to prevent a violation.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2012-01-24T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Smartphones.jpg\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Tactical Mobile Device Security Measures to Meet HIPAA Compliance\",\"datePublished\":\"2012-01-24T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/\"},\"wordCount\":743,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Smartphones.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/\",\"url\":\"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/\",\"name\":\"Tactical Mobile Device Security Measures to Meet HIPAA Compliance | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Smartphones.jpg\",\"datePublished\":\"2012-01-24T00:00:00+00:00\",\"description\":\"When it comes to securing your mobile devices and meeting strict HIPAA compliance standards, there are security precautions needed to prevent a violation.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/#primaryimage\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Smartphones.jpg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Smartphones.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tactical Mobile Device Security Measures to Meet HIPAA Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Tactical Mobile Device Security Measures to Meet HIPAA Compliance | OTAVA","description":"When it comes to securing your mobile devices and meeting strict HIPAA compliance standards, there are security precautions needed to prevent a violation.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/","og_locale":"en_US","og_type":"article","og_title":"Tactical Mobile Device Security Measures to Meet HIPAA Compliance","og_description":"When it comes to securing your mobile devices and meeting strict HIPAA compliance standards, there are security precautions needed to prevent a violation.","og_url":"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/","og_site_name":"OTAVA","article_published_time":"2012-01-24T00:00:00+00:00","og_image":[{"url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Smartphones.jpg","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Tactical Mobile Device Security Measures to Meet HIPAA Compliance","datePublished":"2012-01-24T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/"},"wordCount":743,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Smartphones.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/","url":"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/","name":"Tactical Mobile Device Security Measures to Meet HIPAA Compliance | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Smartphones.jpg","datePublished":"2012-01-24T00:00:00+00:00","description":"When it comes to securing your mobile devices and meeting strict HIPAA compliance standards, there are security precautions needed to prevent a violation.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/#primaryimage","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Smartphones.jpg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Smartphones.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/tactical-mobile-device-security-measures-to-meet-hipaa-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Tactical Mobile Device Security Measures to Meet HIPAA Compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/1740","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=1740"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/1740\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=1740"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=1740"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=1740"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=1740"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}