
{"id":2577,"date":"2013-08-16T00:00:00","date_gmt":"2013-08-16T00:00:00","guid":{"rendered":"http:\/\/otava.test\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/"},"modified":"2013-08-16T00:00:00","modified_gmt":"2013-08-16T00:00:00","slug":"removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/","title":{"rendered":"Removing the &#8216;Cryptic&#8217; from &#8216;Encryption&#8217; &#8211; HIPAA and the Meaning of Secure PHI"},"content":{"rendered":"<p>Join Brian Balow of Dickinson Wright and April Sage of Online Tech as they discuss the HIPAA Breach Notification Rule and the implementation of HHS\u00a0<a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/encryption\">encryption<\/a>\u00a0standards to protect PHI.<\/p>\n<p><strong>Title:\u00a0<\/strong><em>Removing the &#8216;Cryptic&#8217; from &#8216;Encryption&#8217; &#8211; HIPAA and the Meaning of Secure PHI<\/em><br \/>\n<strong>When<\/strong>:\u00a0September 17, 2013 @ 2 P.M. ET<br \/>\n<strong>Register:\u00a0<\/strong><a href=\"https:\/\/info.onlinetech.com\/acton\/form\/5892\/0004:d-0002\/0\/index.htm\">Submit a Form Online<\/a><strong><a href=\"https:\/\/info.onlinetech.com\/acton\/form\/5892\/0004:d-0002\/0\/index.htm\"><br \/>\n<\/a><\/strong><strong>Who<\/strong>:\u00a0Brian Balow, Attorney with Dickinson Wright\u00a0and April Sage, Director of Healthcare Vertical and Marketing at Online Tech.<strong><br \/>\n<\/strong><strong>Description:\u00a0<\/strong>Join Brian Balow, Attorney, Dickinson Wright and April Sage, Director Healthcare Vertical, Online Tech for an informative webinar on the implementation of HHS encryption standards.<\/p>\n<p>In this webinar, Brian and April will review the HIPAA Breach Notification Rule, and specifically its carve-out for encrypted PHI. While seemingly straightforward, the implementation of the HHS encryption standards raises a host of questions for covered entities and business associates.<\/p>\n<p>We hope to address the most pressing of these questions in this webinar, and to encourage dialogue among participants regarding &#8220;real-world&#8221; challenges in this arena.<\/p>\n<hr \/>\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/brian-balow.jpg\" alt=\"Brian Balow\" width=\"100\" height=\"120\" \/>Brian Balow, Dickinson Wright Law Firm<\/strong><\/p>\n<p>Brian Balow is a member of the law firm Dickinson Wright PLLC, where he concentrates his practice in the areas of information technology, healthcare law, and intellectual property. Brian has worked with Fortune 100 clients over the last fifteen years on Information Technology-related matters, including the drafting and negotiation of agreements, formulation and implementation of policies and procedures for the management of IT (including outsourcing-related issues), counseling and advising on privacy and data security issues, and assisting clients in favorably resolving disputes with IT vendors (including disputes with the BSA and SIIA).<\/p>\n<p>More recently, Brian has spoken and written extensively on healthcare IT and telemedicine issues (including HIPAA\/HITECH issues). In 2012, Brian presented on social media in healthcare issues at HIMSS12 in Las Vegas and to the National Council of State Boards of Nursing in Idaho, on regulation of mHealth technology at the SoCal HIMSS Health IT Innovation Summit in Yorba Linda, California, and on BYOD issues at the HIMSS mHealth Summit in Washington, DC.\u00a0 In December of 2011, Brian contributed the chapter entitled \u201cAllocation and Mitigation of Liability\u201d to the ABA Health Law Section\u2019s \u201cE-Health, Privacy, and Security Law\u201d treatise.<\/p>\n<p>Brian is a 1988 cum laude graduate of the University of Georgia School of Law, where he was twice a scholarship recipient and was Managing Editor of the Georgia Journal of International and Comparative Law. Following graduation, Brian served as a judicial law clerk to the Hon. James Harvey in the United States District Court, Eastern District of Michigan.<\/p>\n<hr \/>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" title=\"002e7b8\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/right-april.jpg\" alt=\"AprilSage\" width=\"80\" height=\"120\" \/><\/p>\n<p><strong>April Sage, CPHIMS, Director Healthcare Vertical, Online Tech<\/strong><br \/>\nApril Sage has been involved in the IT industry for over two decades, initially founding a technology vocational program. In 2000, April founded a bioinformatics company that supported biotech, pharma, and bioinformatic companies in the development of research portals, drug discovery search engines, and other software systems.<\/p>\n<p>Since then, April has been involved in the development and implementation of online business plans and integrated marketing strategies across insurance, legal, entertainment, and retail industries until her current position as Director Healthcare Vertical of Online Tech.<\/p>\n<p><strong>Contact:\u00a0<\/strong><a href=\"mailto:asage@onlinetech.com\">asage@onlinetech.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Join Brian Balow of Dickinson Wright and April Sage of Online Tech as they discuss the HIPAA Breach Notification Rule and the implementation of HHS\u00a0encryption\u00a0standards to protect PHI. Title:\u00a0Removing the &#8216;Cryptic&#8217; from &#8216;Encryption&#8217; &#8211; HIPAA and the Meaning of Secure PHI When:\u00a0September 17, 2013 @ 2 P.M. ET Register:\u00a0Submit a Form Online Who:\u00a0Brian Balow, Attorney with Dickinson Wright\u00a0and April Sage, Director of Healthcare Vertical and Marketing at Online Tech. Description:\u00a0Join Brian Balow, Attorney, Dickinson Wright and April Sage, Director Healthcare Vertical, Online Tech for an informative webinar on the implementation of HHS encryption standards. In this webinar, Brian and April will review the HIPAA Breach Notification Rule, and specifically its carve-out for encrypted PHI. While seemingly straightforward, the implementation of the HHS encryption standards raises a host of questions for covered entities and business associates. We hope to address the most pressing of these questions in this webinar, and to encourage dialogue among participants regarding &#8220;real-world&#8221; challenges in this arena. Brian Balow, Dickinson Wright Law Firm Brian Balow is a member of the law firm Dickinson Wright PLLC, where he concentrates his practice in the areas of information technology, healthcare law, and intellectual property. Brian has worked with Fortune 100&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2577","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Removing the &#039;Cryptic&#039; from &#039;Encryption&#039; - HIPAA and the Meaning of Secure PHI | OTAVA<\/title>\n<meta name=\"description\" content=\"Join Brian us as we discuss the HIPAA Breach Notification Rule and the implementation of HHS\u00a0encryption\u00a0standards to protect PHI.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Removing the &#039;Cryptic&#039; from &#039;Encryption&#039; - HIPAA and the Meaning of Secure PHI\" \/>\n<meta property=\"og:description\" content=\"Join Brian us as we discuss the HIPAA Breach Notification Rule and the implementation of HHS\u00a0encryption\u00a0standards to protect PHI.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-08-16T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/brian-balow.jpg\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Removing the &#8216;Cryptic&#8217; from &#8216;Encryption&#8217; &#8211; HIPAA and the Meaning of Secure PHI\",\"datePublished\":\"2013-08-16T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/\"},\"wordCount\":527,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/brian-balow.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/\",\"url\":\"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/\",\"name\":\"Removing the 'Cryptic' from 'Encryption' - HIPAA and the Meaning of Secure PHI | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/brian-balow.jpg\",\"datePublished\":\"2013-08-16T00:00:00+00:00\",\"description\":\"Join Brian us as we discuss the HIPAA Breach Notification Rule and the implementation of HHS\u00a0encryption\u00a0standards to protect PHI.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/#primaryimage\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/brian-balow.jpg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/brian-balow.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Removing the &#8216;Cryptic&#8217; from &#8216;Encryption&#8217; &#8211; HIPAA and the Meaning of Secure PHI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Removing the 'Cryptic' from 'Encryption' - HIPAA and the Meaning of Secure PHI | OTAVA","description":"Join Brian us as we discuss the HIPAA Breach Notification Rule and the implementation of HHS\u00a0encryption\u00a0standards to protect PHI.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/","og_locale":"en_US","og_type":"article","og_title":"Removing the 'Cryptic' from 'Encryption' - HIPAA and the Meaning of Secure PHI","og_description":"Join Brian us as we discuss the HIPAA Breach Notification Rule and the implementation of HHS\u00a0encryption\u00a0standards to protect PHI.","og_url":"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/","og_site_name":"OTAVA","article_published_time":"2013-08-16T00:00:00+00:00","og_image":[{"url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/brian-balow.jpg","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Removing the &#8216;Cryptic&#8217; from &#8216;Encryption&#8217; &#8211; HIPAA and the Meaning of Secure PHI","datePublished":"2013-08-16T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/"},"wordCount":527,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/brian-balow.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/","url":"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/","name":"Removing the 'Cryptic' from 'Encryption' - HIPAA and the Meaning of Secure PHI | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/brian-balow.jpg","datePublished":"2013-08-16T00:00:00+00:00","description":"Join Brian us as we discuss the HIPAA Breach Notification Rule and the implementation of HHS\u00a0encryption\u00a0standards to protect PHI.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/#primaryimage","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/brian-balow.jpg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/brian-balow.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/removing-the-cryptic-from-encryption-hipaa-and-the-meaning-of-secure-phi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Removing the &#8216;Cryptic&#8217; from &#8216;Encryption&#8217; &#8211; HIPAA and the Meaning of Secure PHI"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2577","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2577"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2577\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2577"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2577"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2577"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2577"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}