
{"id":2388,"date":"2013-04-15T00:00:00","date_gmt":"2013-04-15T00:00:00","guid":{"rendered":"http:\/\/otava.test\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/"},"modified":"2013-04-15T00:00:00","modified_gmt":"2013-04-15T00:00:00","slug":"2013-state-of-hipaa-encryption-authentication-for-healthcare","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/","title":{"rendered":"2013 State of HIPAA Encryption &#038; Authentication for Healthcare"},"content":{"rendered":"<p id=\"internal-source-marker_0.21440178855227954\" dir=\"ltr\">According to the Healthcare Information Security Today report, <em>2013 Outlook: Survey Offers Update on Safeguarding Patient Information<\/em>, most healthcare organizations believe that encryption would greatly improve their data security. Forty-one percent plan to encrypt all mobile devices and removable media, while 35 percent plan to encrypt all end-user devices.<\/p>\n<p dir=\"ltr\"><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/2013-hipaa-encryption\/\" rel=\"attachment wp-att-10781\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-10781\" title=\"2013 HIPAA Encryption\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/2013-HIPAA-Encryption.png\" alt=\"2013 HIPAA Encryption\" width=\"754\" height=\"504\" \/><\/a><\/p>\n<p dir=\"ltr\">Currently, nearly 60 percent encrypt mobile devices, and only 45 percent encrypt servers or databases. For guidance on encryption to meet <a href=\"https:\/\/otavawebsite.wpengine.com\/reference\/what-is-hipaa-compliance\/\">HIPAA compliance<\/a>, the latest Office for Civil Rights (OCR) Audit Protocol provides a description of the actual HIPAA Security Rule standard:<\/p>\n<p><strong>\u00a7164.312(a)(1): Access Control<\/strong><br \/>\n<em>\u00a7164.312(a)(2)(iv) Implement a mechanism to encrypt and decrypt electronic protected health information.<\/em><\/p>\n<p dir=\"ltr\">The auditor\u2019s actual procedures for determining if an organization has met the standard or not includes (straight from the OCR):<\/p>\n<ul>\n<li>Inquire of management as to whether an encryption mechanism is in place to protect ePHI.<\/li>\n<li>Obtain and review formal or informal policies and procedures and evaluate the content relative to the specified criteria to determine that encryption standards exist to protect ePHI.<\/li>\n<li>Based on the complexity of the entity, elements to consider include but are not limited to: type(s) of encryption used; how encryption keys are protected; access to modify or create keys is restricted to appropriate personnel; and how keys are managed.<\/li>\n<\/ul>\n<p dir=\"ltr\">If the covered entity has chosen not to fully implement this specification, the entity must have documentation on where they have chosen not to fully implement this specification and their rationale for doing so. Evaluate this documentation if applicable.<\/p>\n<p dir=\"ltr\">So although encryption is addressable, it is considered best practice to encrypt protected health information (PHI), especially since breaches of unencrypted data must be reported to the Dept. of Health and Human Services and released to the public.<\/p>\n<p dir=\"ltr\">When it comes to authentication in order to gain access to electronic health records, the most popular type includes just a username and password (89 percent). Twenty-one percent require a digital certificate (<a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">SSL certificate<\/a>), and only 16 percent require <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">two-factor authentication<\/a>.<\/p>\n<p dir=\"ltr\"><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/2013-hipaa-authentication-trends\/\" rel=\"attachment wp-att-10784\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-10784\" title=\"2013 HIPAA Authentication Trends\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/2013-HIPAA-Authentication-Trends.png\" alt=\"2013 HIPAA Authentication Trends\" width=\"562\" height=\"419\" \/><\/a><\/p>\n<p dir=\"ltr\">Ideally, two-factor should be used for access to ePHI &#8211; although not required, it is also considered a best practice to meet HIPAA:<\/p>\n<p><strong>\u00a7164.312(d): Technical Safeguards &#8211; Person or Entity Authentication<\/strong><br \/>\n<em>Implement procedures to verify that a person or entity seeking access to electronic protected health information is the one claimed.<\/em><\/p>\n<p>In addition to authentication, the survey reports that only 27 percent of healthcare organizations offer patients access to their personal health records via a web portal. While 35 percent are working on it and will have one available soon, 28 percent responded that concerns about security issues have led them to delay a portal until they&#8217;re able to resolve said issues.<\/p>\n<p><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/2013-patient-portals\/\" rel=\"attachment wp-att-10786\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-10786\" title=\"2013 Patient Portals\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/2013-Patient-Portals.png\" alt=\"2013 Patient Portals\" width=\"459\" height=\"323\" \/><\/a><\/p>\n<p><strong>Have questions about patient portal security and privacy with regards to HIPAA?<\/strong> Join our free webinar tomorrow at 2 P.M. ET and submit your questions in advance. Attorney Brian Balow of Dickinson Wright will lead the discussion on security challenges and how to minimize risk while successfully deploying an electronic patient portal. <strong>Sign up online for <em><a href=\"https:\/\/otavawebsite.wpengine.com\/about\/events\/\">Security and Privacy Concerns with Patient Portals<\/a><\/em>.<\/strong><\/p>\n<p dir=\"ltr\"><a href=\"https:\/\/www.onlinetech.com\/resources\/white-papers\/hipaa-compliant-data-centers\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" title=\"HIPAA White Paper\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-hipaa.png\" alt=\"HIPAA White Paper\" width=\"221\" height=\"100\" \/><\/a>Find out more about the technical, physical and administrative security requirements of HIPAA compliance in our <a href=\"https:\/\/www.onlinetech.com\/resources\/white-papers\/hipaa-compliant-data-centers\">HIPAA Compliant Hosting white paper<\/a>.<\/p>\n<p>References:<br \/>\n<a href=\"https:\/\/docs.ismgcorp.com\/files\/handbooks\/HIS-Survey-2012\/HIS_Survey_Report_2012.pdf\">Healthcare Information Security Today &#8211; 2013 Outlook: Survey Offers Update on Safeguarding Patient Information<\/a> (PDF)<\/p>\n<p>Related Articles:<br \/>\n<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/encrypting-data-to-meet-hipaa-compliance\/\">Encrypting Data to Meet HIPAA Compliance<\/a><br \/>\n<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/overcoming-healthcare-cio-challenges-with-secure-scalable-hipaa-hosting\/\">Overcoming Healthcare CIO Challenges with Secure &amp; Scalable HIPAA Hosting<\/a><br \/>\n<a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/two-factor-authentication-helps-fight-unauthorized-access\/\">Two-Factor Authentication Helps Fight Unauthorized Access<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to the Healthcare Information Security Today report, 2013 Outlook: Survey Offers Update on Safeguarding Patient Information, most healthcare organizations believe that encryption would greatly improve their data security. Forty-one percent plan to encrypt all mobile devices and removable media, while 35 percent plan to encrypt all end-user devices. Currently, nearly 60 percent encrypt mobile devices, and only 45 percent encrypt servers or databases. For guidance on encryption to meet HIPAA compliance, the latest Office for Civil Rights (OCR) Audit Protocol provides a description of the actual HIPAA Security Rule standard: \u00a7164.312(a)(1): Access Control \u00a7164.312(a)(2)(iv) Implement a mechanism to encrypt and decrypt electronic protected health information. The auditor\u2019s actual procedures for determining if an organization has met the standard or not includes (straight from the OCR): Inquire of management as to whether an encryption mechanism is in place to protect ePHI. Obtain and review formal or informal policies and procedures and evaluate the content relative to the specified criteria to determine that encryption standards exist to protect ePHI. Based on the complexity of the entity, elements to consider include but are not limited to: type(s) of encryption used; how encryption keys are protected; access to modify or create keys is&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2388","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>HIPAA Encryption &amp; Authentication | Protected Health Information<\/title>\n<meta name=\"description\" content=\"The most popular authentication to gain access to protected health information, uses just a username and password.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2013 State of HIPAA Encryption &amp; Authentication for Healthcare\" \/>\n<meta property=\"og:description\" content=\"The most popular authentication to gain access to protected health information, uses just a username and password.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-04-15T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/2013-HIPAA-Encryption.png\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"2013 State of HIPAA Encryption &#038; Authentication for Healthcare\",\"datePublished\":\"2013-04-15T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/\"},\"wordCount\":564,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/2013-HIPAA-Encryption.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/\",\"url\":\"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/\",\"name\":\"HIPAA Encryption & Authentication | Protected Health Information\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/2013-HIPAA-Encryption.png\",\"datePublished\":\"2013-04-15T00:00:00+00:00\",\"description\":\"The most popular authentication to gain access to protected health information, uses just a username and password.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/#primaryimage\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/2013-HIPAA-Encryption.png\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/2013-HIPAA-Encryption.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2013 State of HIPAA Encryption &#038; Authentication for Healthcare\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"HIPAA Encryption & Authentication | Protected Health Information","description":"The most popular authentication to gain access to protected health information, uses just a username and password.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/","og_locale":"en_US","og_type":"article","og_title":"2013 State of HIPAA Encryption & Authentication for Healthcare","og_description":"The most popular authentication to gain access to protected health information, uses just a username and password.","og_url":"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/","og_site_name":"OTAVA","article_published_time":"2013-04-15T00:00:00+00:00","og_image":[{"url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/2013-HIPAA-Encryption.png","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"2013 State of HIPAA Encryption &#038; Authentication for Healthcare","datePublished":"2013-04-15T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/"},"wordCount":564,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/2013-HIPAA-Encryption.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/","url":"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/","name":"HIPAA Encryption & Authentication | Protected Health Information","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/2013-HIPAA-Encryption.png","datePublished":"2013-04-15T00:00:00+00:00","description":"The most popular authentication to gain access to protected health information, uses just a username and password.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/#primaryimage","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/2013-HIPAA-Encryption.png","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/2013-HIPAA-Encryption.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/2013-state-of-hipaa-encryption-authentication-for-healthcare\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"2013 State of HIPAA Encryption &#038; Authentication for Healthcare"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2388"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2388\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2388"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}