
{"id":2372,"date":"2013-04-01T00:00:00","date_gmt":"2013-04-01T00:00:00","guid":{"rendered":"http:\/\/otava.test\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/"},"modified":"2013-04-01T00:00:00","modified_gmt":"2013-04-01T00:00:00","slug":"hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/","title":{"rendered":"HIPAA Breach Lessons Learned: Store PHI in HIPAA Compliant Data Centers; Not Locally"},"content":{"rendered":"<p>While no records were broken when it comes to number of health records disclosed per data breach, the top HIPAA breaches of last year still come with some hard lessons learned about technical and physical security. Learn from their mistakes and protect your healthcare organization from suffering the same fate:<\/p>\n<p><strong>Who<\/strong>: Crescent Healthcare, a Walgreens company that manages and delivers pharmacy and nursing solutions in alternate site settings.<br \/>\n<strong>What<\/strong>: Last December, someone broke into Crescent\u2019s billing center and stole a desktop computer, according to HealthCareITNews.com and the HHS reported breaches data. The desktop computer may have contained names, addresses, phone numbers, Social Security numbers, health insurance data, birthdates and clinical diagnoses. Over 100,000 individuals were affected.<br \/>\n<strong>Remediation<\/strong>: The company is retaining employees and service providers on security, and enhancing security policies and procedures.<br \/>\n<strong>Lessons Learned<\/strong>: Don\u2019t store ePHI (electronic protected health information) locally on devices. Storing health data in a secure, offsite <a href=\"https:\/\/otavawebsite.wpengine.com\/operations\/locations\/michigan-cloud-and-data-centers\/\/compliance\/hipaa-compliant-data-centers\">HIPAA compliant data center<\/a> with limited, protected access could have prevented this data breach. Check that your <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA hosting provider<\/a> can supply a HIPAA report on compliance to ensure data is safe.<\/p>\n<figure style=\"width: 216px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" class=\" \" title=\"Two-Factor Authentication\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/two-factor-authentication.png\" alt=\"Two-Factor Authentication\" width=\"216\" height=\"216\" \/><figcaption class=\"wp-caption-text\">Two-Factor Authentication<\/figcaption><\/figure>\n<p><strong>Who<\/strong>: Howard University Hospital<br \/>\n<strong>What<\/strong>: In early 2012, a former contractor that downloaded patient data (in violation of hospital policy) onto their personal laptop reported the theft of the unencrypted device from their vehicle. Names, addresses, IDs, medical record numbers, birthdates, admission\/discharge dates and diagnoses information for over 66,000 patients were all saved locally on the laptop.<br \/>\n<strong>Remediation<\/strong>: The hospital extended its policy of encrypting all laptops to include contractor data\/laptops.<br \/>\n<strong>Lesson Learned<\/strong>: Employee data security policies should cover all employees that have access to ePHI, not just full-time staff. Encrypting data is key. And again, keeping sensitive data off of devices and using a security tool like <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">two-factor authentication<\/a> for VPN (Virtual Private Network) access cuts down on risk of unauthorized access.<\/p>\n<p><strong>Who<\/strong>: Apria Healthcare, Inc., provider of home medical equipment.<br \/>\n<strong>What<\/strong>: Last June, an Apria employee had their laptop stolen from their locked car &#8211; billing information for 65,700 patients was stored on the laptop\u2019s hard drive.<br \/>\n<strong>Remediation<\/strong>: Apria is working on its internal patient privacy security program and encrypting company laptops.<br \/>\n<strong>Lesson Learned<\/strong>: Why do people leave laptops in their cars? Even if locked you\u2019re running a big risk. Aside from that, employee security training may have raised awareness about the dangers of leaving electronics vulnerable, and again, keeping data off of portable devices.<\/p>\n<p><strong>Who<\/strong>: University of Miami Hospital<br \/>\n<strong>What<\/strong>: Two employees were accessing patient information from registration \u2018face sheets\u2019 and may have sold information to a third party. Face sheets contain name, address, birthdate, insurance policy numbers and the reason for the visit. According to HHS.gov, over 64,000 individuals were affected.<br \/>\n<strong>Remediation<\/strong>: The employees were identified and fired.<br \/>\n<strong>Lesson Learned<\/strong>: Background checks and employee HIPAA training may have prevented this incident, but often insider threats are the most difficult to detect. <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/file-integrity-monitoring-fim\">File integrity monitoring<\/a> (FIM) is a service that can be configured and customized to monitor certain folders and files in order to protect ePHI from being altered or destroyed, and fulfills the HIPAA requirement to implement hardware or software to record and examine activity in systems that contain ePHI.<\/p>\n<p dir=\"ltr\">While using the technical services of a <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA hosting provider<\/a> may have prevented or reduced the risk of a data breach in the above top HHS breach cases of 2012, as a covered entity, you need to ensure you can trust your business associates\u2019 security practices. Read <a href=\"https:\/\/otavawebsite.wpengine.com\/reference\/five-questions-to-ask-your-hipaa-hosting-provider\/\">Five Questions to Ask Your HIPAA Hosting Provider<\/a> for a checklist of questions and answers.<\/p>\n<p dir=\"ltr\">References:<\/p>\n<p><a href=\"https:\/\/www.healthcareitnews.com\/news\/walgreens-company-announces-data-breach\">Walgreens Company Announces Data Breach<\/a><br \/>\n<a href=\"https:\/\/www.healthdatamanagement.com\/news\/breach-notification-hipaa-privacy-security-ocr-44263-1.html\">Howard University Laptop Theft Affects 34,000+<\/a><br \/>\n<a href=\"https:\/\/www.scmagazine.com\/stolen-laptop-at-apria-healthcare-exposes-patient-data\/article\/254939\/\">Stolen Laptop at Apria Healthcare Exposes Patient Data<\/a><br \/>\n<a href=\"https:\/\/www.umhdataincident.med.miami.edu\/\">University of Miami Hospital Data Incident<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>While no records were broken when it comes to number of health records disclosed per data breach, the top HIPAA breaches of last year still come with some hard lessons learned about technical and physical security. Learn from their mistakes and protect your healthcare organization from suffering the same fate: Who: Crescent Healthcare, a Walgreens company that manages and delivers pharmacy and nursing solutions in alternate site settings. What: Last December, someone broke into Crescent\u2019s billing center and stole a desktop computer, according to HealthCareITNews.com and the HHS reported breaches data. The desktop computer may have contained names, addresses, phone numbers, Social Security numbers, health insurance data, birthdates and clinical diagnoses. Over 100,000 individuals were affected. Remediation: The company is retaining employees and service providers on security, and enhancing security policies and procedures. Lessons Learned: Don\u2019t store ePHI (electronic protected health information) locally on devices. Storing health data in a secure, offsite HIPAA compliant data center with limited, protected access could have prevented this data breach. Check that your HIPAA hosting provider can supply a HIPAA report on compliance to ensure data is safe. Who: Howard University Hospital What: In early 2012, a former contractor that downloaded patient data (in&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2372","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>HIPAA Breach Lessons Learned: Store PHI in HIPAA Compliant Data Centers; Not Locally | OTAVA<\/title>\n<meta name=\"description\" content=\"the top HIPAA breaches of last year still come with lessons learned about technical and physical security. Learn from their mistakes regarding PHI.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HIPAA Breach Lessons Learned: Store PHI in HIPAA Compliant Data Centers; Not Locally\" \/>\n<meta property=\"og:description\" content=\"the top HIPAA breaches of last year still come with lessons learned about technical and physical security. Learn from their mistakes regarding PHI.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-04-01T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/two-factor-authentication.png\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"HIPAA Breach Lessons Learned: Store PHI in HIPAA Compliant Data Centers; Not Locally\",\"datePublished\":\"2013-04-01T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/\"},\"wordCount\":638,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/two-factor-authentication.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/\",\"url\":\"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/\",\"name\":\"HIPAA Breach Lessons Learned: Store PHI in HIPAA Compliant Data Centers; Not Locally | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/two-factor-authentication.png\",\"datePublished\":\"2013-04-01T00:00:00+00:00\",\"description\":\"the top HIPAA breaches of last year still come with lessons learned about technical and physical security. Learn from their mistakes regarding PHI.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/#primaryimage\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/two-factor-authentication.png\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/two-factor-authentication.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"HIPAA Breach Lessons Learned: Store PHI in HIPAA Compliant Data Centers; Not Locally\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"HIPAA Breach Lessons Learned: Store PHI in HIPAA Compliant Data Centers; Not Locally | OTAVA","description":"the top HIPAA breaches of last year still come with lessons learned about technical and physical security. Learn from their mistakes regarding PHI.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/","og_locale":"en_US","og_type":"article","og_title":"HIPAA Breach Lessons Learned: Store PHI in HIPAA Compliant Data Centers; Not Locally","og_description":"the top HIPAA breaches of last year still come with lessons learned about technical and physical security. Learn from their mistakes regarding PHI.","og_url":"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/","og_site_name":"OTAVA","article_published_time":"2013-04-01T00:00:00+00:00","og_image":[{"url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/two-factor-authentication.png","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"HIPAA Breach Lessons Learned: Store PHI in HIPAA Compliant Data Centers; Not Locally","datePublished":"2013-04-01T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/"},"wordCount":638,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/two-factor-authentication.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/","url":"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/","name":"HIPAA Breach Lessons Learned: Store PHI in HIPAA Compliant Data Centers; Not Locally | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/two-factor-authentication.png","datePublished":"2013-04-01T00:00:00+00:00","description":"the top HIPAA breaches of last year still come with lessons learned about technical and physical security. Learn from their mistakes regarding PHI.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/#primaryimage","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/two-factor-authentication.png","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/two-factor-authentication.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/hipaa-breach-lessons-learned-store-phi-in-hipaa-compliant-data-centers-not-locally\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"HIPAA Breach Lessons Learned: Store PHI in HIPAA Compliant Data Centers; Not Locally"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2372","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2372"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2372\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2372"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2372"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2372"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}