
{"id":2108,"date":"2012-10-22T00:00:00","date_gmt":"2012-10-22T00:00:00","guid":{"rendered":"http:\/\/otava.test\/improving-michigan-healthcare-it-security\/"},"modified":"2012-10-22T00:00:00","modified_gmt":"2012-10-22T00:00:00","slug":"improving-michigan-healthcare-it-security","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/","title":{"rendered":"Improving Michigan Healthcare IT Security"},"content":{"rendered":"<figure id=\"attachment_8471\" aria-describedby=\"caption-attachment-8471\" style=\"width: 193px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-8471\" title=\"MiHIN\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/MiHIN.png\" alt=\"MiHIN\" width=\"193\" height=\"95\" \/><figcaption id=\"caption-attachment-8471\" class=\"wp-caption-text\">Michigan Health Information Network<\/figcaption><\/figure>\n<p>In the quest to further secure patient health data with strong access controls, Michigan healthcare providers can now use biometrics to verify patient identity prior to allowing access to their medical record. PatientSecure works by scanning a patient\u2019s palm vein pattern and linking them to their unique medical record.The Michigan Health Information Network Shared Services (MiHIN) announced a partnership with the patient identity management company and developer of PatientSecure, HT Systems, to provide the security system to statewide healthcare providers.<\/p>\n<p>This system is interesting because it provides a way for patients to securely access their medical record as they move between healthcare systems and doesn\u2019t require a badge or access code that could be potentially stolen and used for identity theft.<\/p>\n<p>Technology is emerging (or at least being implemented more readily) as a response to the data breaches that have recently plagued the healthcare industry in droves &#8211; the <a href=\"https:\/\/www.hhs.gov\/ocr\/privacy\/hipaa\/administrative\/breachnotificationrule\/breachtool.html\">HHS Wall of Shame<\/a> reports over 21 million individuals have been affected by an unsecured data breach dating back to 2009. In 2012, 119 breaches, each affecting over 500 individuals and involving unsecured data have been reported, totaling to over 2 million affected individuals.<\/p>\n<p>Michigan healthcare organizations account for 118,000 of the total affected individuals nationwide. Ranging from the largest healthcare systems to individual physician practices, the majority of the Michigan data breaches were due to the theft or loss of portable media devices, specifically, laptops that contained unencrypted patient data. These are a few of the documented Michigan breaches:<\/p>\n<ul>\n<li>Dating back to 2009, the Detroit Department of Health and Wellness Promotion reported a desktop and four laptop computers stolen from their locked facility. The computers had patient data stored locally. In remediation, they switched to storing their billing information in a secure patient management system and beefed up their physical security controls; installing security cameras with alarms and new office door locks with assigned keys.<\/li>\n<li>A small physician practice also suffered a data breach when a laptop containing patient data was stolen from the physican\u2019s personal residence. In remediation, the physician installed encryption software for its billing software.<\/li>\n<\/ul>\n<p>Implementing and maintaining IT security can be a costly endeavor, and not every business can do it in-house. Outsourcing allows organizations to take advantage of <a href=\"https:\/\/otavawebsite.wpengine.com\/\">Michigan managed hosting<\/a> providers\u2019 investments in physical, technical and administrative security. It also ensures that patient data is never stored locally on an individual device, but instead stored on a secure server in a secure, <a href=\"https:\/\/otavawebsite.wpengine.com\/operations\/locations\/michigan-cloud-and-data-centers\/\/compliance\/hipaa-compliant-data-centers\">HIPAA compliant data center<\/a>.<\/p>\n<hr \/>\n<p><a href=\"https:\/\/www.onlinetech.com\/resources\/white-papers\/hipaa-compliant-data-centers\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/hipaa-white-paper.gif\" alt=\"HIPAA Compliant Data Centers\" width=\"150\" height=\"110\" \/><\/a>Looking for more information on HIPAA IT requirements, recommendations, and the foundation of a secure HIPAA compliant data center?<\/p>\n<p><a href=\"https:\/\/www.onlinetech.com\/resources\/white-papers\/hipaa-compliant-data-centers\">Download our HIPAA Compliant Hosting white paper<\/a>\u00a0now for a complete guide to HIPAA hosting with IT vendors.\u00a0With 36 pages of statistics, diagrams and researched information sourced from engineers and a CHSS (Certified HIPAA Security Specialist), this white paper is your complete guide to HIPAA hosting.<\/p>\n<div>\n<p><strong>Still have questions?\u00a0<\/strong><a href=\"https:\/\/otavawebsite.wpengine.com\/contact\/\">Contact us<\/a>\u00a0or\u00a0<a href=\"https:\/\/hostedusa6.whoson.com\/chat\/chatstart.htm?domain=www.onlinetech.com\">chat<\/a>\u00a0with us now. Find out more about our fully compliant,\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA hosting solutions<\/a>, or\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">submit a quote request<\/a>\u00a0for your project today.<\/p>\n<hr \/>\n<p>Related Links:<br \/>\n<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/2012-hipaa-violations-and-audits\/\"> 2012 HIPAA Violations and Audits<\/a><br \/>\n<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/business-associate-related-hipaa-violation-results-in-750000-fines\/\">Business Associate-Related HIPAA Violation Results in $750,000 Fines<\/a><br \/>\n<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/in-the-wake-of-a-healthcare-data-breach\/\">In the Wake of a Healthcare Data Breach<\/a><br \/>\n<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/keep-ephi-on-secure-networks-not-mobile-devices-recommends-ocr\/\">Keep ePHI on Secure Networks, Not Mobile Devices, Recommends OCR<\/a><\/p>\n<p>References:<br \/>\n<a href=\"https:\/\/www.infosecurity-magazine.com\/view\/28466\/michigan-healthcare-providers-turn-to-biometrics-for-patient-data-security\/\">Michigan Healthcare Providers Turn to Biometrics for Patient Data Security<\/a><br \/>\n<a href=\"https:\/\/www.redorbit.com\/news\/health\/1112700371\/health-information-technology-cyber-security-advances-in-michigan\/\">Health Information Technology Cyber Security Advances in Michigan<\/a><br \/>\n<a href=\"https:\/\/www.mihinss.net\/\">Michigan Health Information Network Shared Services<\/a><br \/>\n<a href=\"https:\/\/www.hhs.gov\/ocr\/privacy\/hipaa\/administrative\/breachnotificationrule\/breachtool.html\">Breaches Affecting 500 or More Individuals<\/a><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In the quest to further secure patient health data with strong access controls, Michigan healthcare providers can now use biometrics to verify patient identity prior to allowing access to their medical record. PatientSecure works by scanning a patient\u2019s palm vein pattern and linking them to their unique medical record.The Michigan Health Information Network Shared Services (MiHIN) announced a partnership with the patient identity management company and developer of PatientSecure, HT Systems, to provide the security system to statewide healthcare providers. This system is interesting because it provides a way for patients to securely access their medical record as they move between healthcare systems and doesn\u2019t require a badge or access code that could be potentially stolen and used for identity theft. Technology is emerging (or at least being implemented more readily) as a response to the data breaches that have recently plagued the healthcare industry in droves &#8211; the HHS Wall of Shame reports over 21 million individuals have been affected by an unsecured data breach dating back to 2009. In 2012, 119 breaches, each affecting over 500 individuals and involving unsecured data have been reported, totaling to over 2 million affected individuals. Michigan healthcare organizations account for 118,000 of&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2108","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Improving Michigan Healthcare IT Security | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Improving Michigan Healthcare IT Security\" \/>\n<meta property=\"og:description\" content=\"In the quest to further secure patient health data with strong access controls, Michigan healthcare providers can now use biometrics to verify patient identity prior to allowing access to their medical record. PatientSecure works by scanning a patient\u2019s palm vein pattern and linking them to their unique medical record.The Michigan Health Information Network Shared Services (MiHIN) announced a partnership with the patient identity management company and developer of PatientSecure, HT Systems, to provide the security system to statewide healthcare providers. This system is interesting because it provides a way for patients to securely access their medical record as they move between healthcare systems and doesn\u2019t require a badge or access code that could be potentially stolen and used for identity theft. Technology is emerging (or at least being implemented more readily) as a response to the data breaches that have recently plagued the healthcare industry in droves &#8211; the HHS Wall of Shame reports over 21 million individuals have been affected by an unsecured data breach dating back to 2009. In 2012, 119 breaches, each affecting over 500 individuals and involving unsecured data have been reported, totaling to over 2 million affected individuals. Michigan healthcare organizations account for 118,000 of...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2012-10-22T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/MiHIN.png\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Improving Michigan Healthcare IT Security\",\"datePublished\":\"2012-10-22T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/\"},\"wordCount\":579,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/MiHIN.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/\",\"url\":\"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/\",\"name\":\"Improving Michigan Healthcare IT Security | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/MiHIN.png\",\"datePublished\":\"2012-10-22T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/#primaryimage\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/MiHIN.png\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/MiHIN.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Improving Michigan Healthcare IT Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Improving Michigan Healthcare IT Security | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/","og_locale":"en_US","og_type":"article","og_title":"Improving Michigan Healthcare IT Security","og_description":"In the quest to further secure patient health data with strong access controls, Michigan healthcare providers can now use biometrics to verify patient identity prior to allowing access to their medical record. PatientSecure works by scanning a patient\u2019s palm vein pattern and linking them to their unique medical record.The Michigan Health Information Network Shared Services (MiHIN) announced a partnership with the patient identity management company and developer of PatientSecure, HT Systems, to provide the security system to statewide healthcare providers. This system is interesting because it provides a way for patients to securely access their medical record as they move between healthcare systems and doesn\u2019t require a badge or access code that could be potentially stolen and used for identity theft. Technology is emerging (or at least being implemented more readily) as a response to the data breaches that have recently plagued the healthcare industry in droves &#8211; the HHS Wall of Shame reports over 21 million individuals have been affected by an unsecured data breach dating back to 2009. In 2012, 119 breaches, each affecting over 500 individuals and involving unsecured data have been reported, totaling to over 2 million affected individuals. Michigan healthcare organizations account for 118,000 of...","og_url":"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/","og_site_name":"OTAVA","article_published_time":"2012-10-22T00:00:00+00:00","og_image":[{"url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/MiHIN.png","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Improving Michigan Healthcare IT Security","datePublished":"2012-10-22T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/"},"wordCount":579,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/MiHIN.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/","url":"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/","name":"Improving Michigan Healthcare IT Security | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/MiHIN.png","datePublished":"2012-10-22T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/#primaryimage","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/MiHIN.png","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/MiHIN.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/improving-michigan-healthcare-it-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Improving Michigan Healthcare IT Security"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2108","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2108"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2108\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2108"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}