
{"id":1923,"date":"2012-05-22T00:00:00","date_gmt":"2012-05-22T00:00:00","guid":{"rendered":"http:\/\/otava.test\/in-the-wake-of-a-healthcare-data-breach\/"},"modified":"2012-05-22T00:00:00","modified_gmt":"2012-05-22T00:00:00","slug":"in-the-wake-of-a-healthcare-data-breach","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/","title":{"rendered":"In the Wake of a Healthcare Data Breach"},"content":{"rendered":"<p>We hear all about what went wrong when a (typically unencrypted) <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/hipaa-compliant-hosting\/resources\/what-is-a-hipaa-violation\">HIPAA violation<\/a> occurs &#8211; who left what mobile device where &#8211; what data was made publicly available, who\u2019s to blame. But what\u2019s more important is remediation, and how someone or some organization chooses to react after the event in order to prevent future incidents.<\/p>\n<p>HealthCareInfoSecurity.com reports on the recent Utah Department of Health breach in which foreign hackers were able to access and remove 24,000 files of electronic protected health information (ePHI) on a server due to a configuration error [<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/server-hack-leads-to-hipaa-violation-by-utah-department-of-health\/\">read more about\u00a0Server Hack Leads to HIPAA Violation by Utah Department of Health<\/a>]. Utah Gov. Gary Herbert recently announced his action plan toward security and compliance:<\/p>\n<ol>\n<li>Replaced the state\u2019s chief technology officer<\/li>\n<li>Hired Deloitte &amp; Touche to conduct an independent security audit (also known as an <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">independent HIPAA audit<\/a>) across all of the state agencies<\/li>\n<li>Encryption of not just data in transit, but all stored data<\/li>\n<li>Plans to hire a public relations firm to help handle crisis communications<\/li>\n<li>Improvement of security controls, including network monitoring and intrusion detection capabilities<\/li>\n<li>Created a new position &#8211; a health data security ombudsman (may also be known as a privacy and security officer) to deal with affected individuals<\/li>\n<\/ol>\n<p>The Office of the National Coordinator for Health Information Technology (ONC) recently revealed a ten-step plan for healthcare organizations to follow in order to protect PHI &#8211; the second step requires compliance-minded companies to:<\/p>\n<p><em><strong>Step #2 &#8211; Provide Leadership<\/strong><\/em><br \/>\n<em>Designate a privacy and security officer. This person will be responsible for developing and maintaining your privacy and security practices to meet HIPAA requirements. This person should be part of your EHR adoption team and be able to work effectively with others. In a very small practice, you may be the privacy and security officer or your practice manager may carry both roles. Be sure to:<\/em><\/p>\n<ul>\n<li><em>Record the assignment in a new security documentation, even if you are the officer.<\/em><\/li>\n<li><em>Discuss your expectations and their accountability. Note that you, as a covered health care provider, retain ultimate responsibility for HIPAA compliance.<\/em><\/li>\n<li><em>Enable your designated security person to develop a full understanding of the HIPAA Rules so (s)he can succeed in his\/her role.<\/em><\/li>\n<\/ul>\n<figure id=\"attachment_7022\" aria-describedby=\"caption-attachment-7022\" style=\"width: 131px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-7022 \" title=\"Guide to Privacy and Security of Health Information\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Guide-to-Privacy-and-Security-of-Health-Information.png\" alt=\"Guide to Privacy and Security of Health Information\" width=\"131\" height=\"170\" \/><figcaption id=\"caption-attachment-7022\" class=\"wp-caption-text\">Guide to Privacy and Security of Health Information<\/figcaption><\/figure>\n<p>While HIPAA has been around for 16 years, it hasn\u2019t always been available in the form of an actionable plan, or even very easy to understand. The ONC has created a <a href=\"https:\/\/www.healthit.gov\/sites\/default\/files\/pdf\/privacy\/privacy-and-security-guide.pdf\">Guide to Privacy and Security of Health Information<\/a> as a comprehensive roadmap to compliance and to understanding the implementation of the more complex legal requirements.<\/p>\n<p>Another great guide to outsourcing your <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA hosting<\/a> to a third-party business associate is Online Tech\u2019s <a href=\"https:\/\/www.onlinetech.com\/resources\/white-papers\/hipaa-compliant-data-centers\">HIPAA Data Centers white paper<\/a>. The document addresses cost-benefits and other advantages of outsourcing while weighing them against the risks.<\/p>\n<figure style=\"width: 155px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" class=\" \" title=\"HIPAA White Paper\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/hipaa-white-paper.gif\" alt=\"HIPAA White Paper\" width=\"155\" height=\"113\" \/><figcaption class=\"wp-caption-text\">HIPAA White Paper<\/figcaption><\/figure>\n<p>It also provides valuable technical and business advice for any healthcare organization that needs to secure ePHI while meeting compliance standards, with an example BAA (business associate agreement) and a data center cheat sheet simplifying what each audit means. Download the white paper <a href=\"https:\/\/www.onlinetech.com\/resources\/white-papers\/hipaa-compliant-data-centers\">here<\/a>.<\/p>\n<p>If you prefer to hear a dialogue between experts on the subject, including attorneys specializing in Health IT, sign up for our free, upcoming webinars scheduled in June. Find more details here:<br \/>\n<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/fda-regulation-of-mobile-health-devices\/\">FDA Regulation of Mobile Health Devices<\/a><br \/>\n<a href=\"https:\/\/otavawebsite.wpengine.com\/about\/events\/\"> Healthcare Security Vulnerabilities<\/a><\/p>\n<p>References:<br \/>\n<a href=\"https:\/\/www.healthcareinfosecurity.com\/utah-breach-governor-takes-action-a-4775\">Utah Breach: Governor Takes Action<\/a><br \/>\n<a href=\"https:\/\/www.healthit.gov\/sites\/default\/files\/pdf\/privacy\/privacy-and-security-guide.pdf\">ONC\u2019s Guide to Privacy and Security of Health Information<\/a> (PDF)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We hear all about what went wrong when a (typically unencrypted) HIPAA violation occurs &#8211; who left what mobile device where &#8211; what data was made publicly available, who\u2019s to blame. But what\u2019s more important is remediation, and how someone or some organization chooses to react after the event in order to prevent future incidents. HealthCareInfoSecurity.com reports on the recent Utah Department of Health breach in which foreign hackers were able to access and remove 24,000 files of electronic protected health information (ePHI) on a server due to a configuration error [read more about\u00a0Server Hack Leads to HIPAA Violation by Utah Department of Health]. Utah Gov. Gary Herbert recently announced his action plan toward security and compliance: Replaced the state\u2019s chief technology officer Hired Deloitte &amp; Touche to conduct an independent security audit (also known as an independent HIPAA audit) across all of the state agencies Encryption of not just data in transit, but all stored data Plans to hire a public relations firm to help handle crisis communications Improvement of security controls, including network monitoring and intrusion detection capabilities Created a new position &#8211; a health data security ombudsman (may also be known as a privacy and security officer)&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-1923","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>In the Wake of a Healthcare Data Breach | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"In the Wake of a Healthcare Data Breach\" \/>\n<meta property=\"og:description\" content=\"We hear all about what went wrong when a (typically unencrypted) HIPAA violation occurs &#8211; who left what mobile device where &#8211; what data was made publicly available, who\u2019s to blame. But what\u2019s more important is remediation, and how someone or some organization chooses to react after the event in order to prevent future incidents. HealthCareInfoSecurity.com reports on the recent Utah Department of Health breach in which foreign hackers were able to access and remove 24,000 files of electronic protected health information (ePHI) on a server due to a configuration error [read more about\u00a0Server Hack Leads to HIPAA Violation by Utah Department of Health]. Utah Gov. Gary Herbert recently announced his action plan toward security and compliance: Replaced the state\u2019s chief technology officer Hired Deloitte &amp; Touche to conduct an independent security audit (also known as an independent HIPAA audit) across all of the state agencies Encryption of not just data in transit, but all stored data Plans to hire a public relations firm to help handle crisis communications Improvement of security controls, including network monitoring and intrusion detection capabilities Created a new position &#8211; a health data security ombudsman (may also be known as a privacy and security officer)...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2012-05-22T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Guide-to-Privacy-and-Security-of-Health-Information.png\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"In the Wake of a Healthcare Data Breach\",\"datePublished\":\"2012-05-22T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/\"},\"wordCount\":600,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Guide-to-Privacy-and-Security-of-Health-Information.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/\",\"url\":\"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/\",\"name\":\"In the Wake of a Healthcare Data Breach | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Guide-to-Privacy-and-Security-of-Health-Information.png\",\"datePublished\":\"2012-05-22T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/#primaryimage\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Guide-to-Privacy-and-Security-of-Health-Information.png\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Guide-to-Privacy-and-Security-of-Health-Information.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"In the Wake of a Healthcare Data Breach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"In the Wake of a Healthcare Data Breach | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/","og_locale":"en_US","og_type":"article","og_title":"In the Wake of a Healthcare Data Breach","og_description":"We hear all about what went wrong when a (typically unencrypted) HIPAA violation occurs &#8211; who left what mobile device where &#8211; what data was made publicly available, who\u2019s to blame. But what\u2019s more important is remediation, and how someone or some organization chooses to react after the event in order to prevent future incidents. HealthCareInfoSecurity.com reports on the recent Utah Department of Health breach in which foreign hackers were able to access and remove 24,000 files of electronic protected health information (ePHI) on a server due to a configuration error [read more about\u00a0Server Hack Leads to HIPAA Violation by Utah Department of Health]. Utah Gov. Gary Herbert recently announced his action plan toward security and compliance: Replaced the state\u2019s chief technology officer Hired Deloitte &amp; Touche to conduct an independent security audit (also known as an independent HIPAA audit) across all of the state agencies Encryption of not just data in transit, but all stored data Plans to hire a public relations firm to help handle crisis communications Improvement of security controls, including network monitoring and intrusion detection capabilities Created a new position &#8211; a health data security ombudsman (may also be known as a privacy and security officer)...","og_url":"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/","og_site_name":"OTAVA","article_published_time":"2012-05-22T00:00:00+00:00","og_image":[{"url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Guide-to-Privacy-and-Security-of-Health-Information.png","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"In the Wake of a Healthcare Data Breach","datePublished":"2012-05-22T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/"},"wordCount":600,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Guide-to-Privacy-and-Security-of-Health-Information.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/","url":"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/","name":"In the Wake of a Healthcare Data Breach | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Guide-to-Privacy-and-Security-of-Health-Information.png","datePublished":"2012-05-22T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/#primaryimage","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Guide-to-Privacy-and-Security-of-Health-Information.png","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/Guide-to-Privacy-and-Security-of-Health-Information.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"In the Wake of a Healthcare Data Breach"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/1923","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=1923"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/1923\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=1923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=1923"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=1923"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=1923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}