
{"id":2909,"date":"2014-10-03T00:00:00","date_gmt":"2014-10-03T00:00:00","guid":{"rendered":"http:\/\/otava.test\/5-tools-to-protect-patient-data\/"},"modified":"2014-10-03T00:00:00","modified_gmt":"2014-10-03T00:00:00","slug":"5-tools-to-protect-patient-data","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/","title":{"rendered":"5 tools to protect patient data"},"content":{"rendered":"<p>As HIPAA regulations increase and cybersecurity threats advance, the healthcare industry\u2019s effort to protect patient data gets more complex. Online Tech recently contributed to a <a href=\"https:\/\/bloghipaa.com\/5-great-tools-help-achieve-hipaa-compliance\/#.VCrHRxY0-uM\">story posted on BlogHIPAA.com<\/a> that covers five tools to help protect patient information and ease the compliance burden:<\/p>\n<ul>\n<li>Email encryption<\/li>\n<li>Mobile phone BYOD protection<\/li>\n<li>HIPAA-compliant storage<\/li>\n<li>HIPAA-compliant hosting<\/li>\n<li>Compliance tracking solution<\/li>\n<\/ul>\n<p>BlogHIPAA spoke with representatives from industry-leading organizations in each of these areas, each of them focused on compliance. They each provided insight into why these areas are vital components of a <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\" target=\"_blank\" rel=\"noopener noreferrer\">HIPAA compliance <\/a>strategy.<\/p>\n<p><strong>EMAIL ENCRYPTION<\/strong><\/p>\n<p>Bob Janacek, the CTO at DataMotion, explained that \u201cunencrypted email messages and files hop from point to point through routes over the Internet until they reach their destination. At any of those points, data is open for scrutiny and can be copied or breached by unauthorized users. When encryption is used, data traverses the points between the sender and the recipient in a secure manner, shielded from prying eyes.\u201d<\/p>\n<p>He offered these best practices to help reduce the chance of protected data from being exposed through email or file transfers. Each is described in full on <a href=\"https:\/\/bloghipaa.com\/5-great-tools-help-achieve-hipaa-compliance\/#.VCrIChY0-uM\">the BlogHIPAA post<\/a>:<\/p>\n<ol>\n<li>Keep your email encryption system simple.<\/li>\n<li>Use policy-based gateway filtering.<\/li>\n<li>Look for exceptional handling of file attachments.<\/li>\n<li>Make use of extensive logging and reporting<\/li>\n<li>Require seamless mobile integration<\/li>\n<\/ol>\n<p><strong>MOBILE PHONE BYOD PROTECTION<\/strong><\/p>\n<p>People lose their phones and tablets. If employees\u2019 personal devices contain PHI, a HIPAA breach is virtually guaranteed. From the massive Advocate data breach to the Affinity Health Plan photocopier breach, healthcare executives finally had to face the music and tighten information security controls in a post HIPAA\/HITECH Omnibus world.<\/p>\n<p>The folks at Qliqsoft, which provides a HIPAA-compliant messaging platform, say to \u201cprovide secure communications in an increasingly unsecure world, one must constantly engage in an open dialogue with industry experts and customers to determine how best to address efficient communication between providers, patients and caregivers at a time where BYOD and text messaging is the norm. One way to ensure security is to cut out unnecessary cloud-based messaging hosts. Utilizing \u201ccloud pass-thru\u201d technology is one powerful way to minimizing the number of potential security risks.\u201d<\/p>\n<p><strong>HIPAA-COMPLIANT STORAGE<\/strong><\/p>\n<p>More than 25 percent of healthcare organizations use some type of external storage for PHI. Dropbox is the most popular cloud storage and synchronization solution, but it does not offer safeguards for HIPAA compliance. Sookasa uses transparent on-device encryption to enable HIPAA and FERPA compliance for Dropbox.<\/p>\n<p>Sookasa CEO and co-founder Asaf Cidon says whichever storage solution you use, there are some tips to follow, starting with a signed business associate agreement. But, wait, there\u2019s more!<\/p>\n<p>\u201cIt\u2019s a common misconception that signing a BAA is sufficient to maintain HIPAA compliance. A signed BAA is an important requirement but is not sufficient to guarantee that your data will be safe in the cloud-connected mobile world,\u201d Cidon says. He notes some cloud storage services offer a BAA, but do not offer data protection for PHI when accessed on a device.<\/p>\n<p>Cidon\u2019s key requirements for preventing HIPAA breaches for cloud storage are:<\/p>\n<ul>\n<li><strong>Encryption:<\/strong> Encryption of files both on the cloud and on mobile devices and desktops.<\/li>\n<li><strong>Access control:<\/strong> Central control of who on your team can access files, even if a device is taken offline.<\/li>\n<li><strong>Audit trails:<\/strong> Full audit trails for every file access on the cloud and on mobile.<\/li>\n<\/ul>\n<p><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/up-your-hipaa-iq-with-a-little-hipaa-faq\/download-hipaa\/\" rel=\"attachment wp-att-9198\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-9198\" title=\"Download HIPAA Hosting White Paper\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-hipaa.png\" alt=\"Download HIPAA Hosting White Paper\" width=\"315\" height=\"143\" \/><\/a>HIPAA-COMPLIANT HOSTING<\/strong><\/p>\n<p>Hey, this is where we come in!<\/p>\n<p>Online Tech\u2019s Director of Healthcare IT April Sage provided insight into what to look for in a HIPAA-compliant hosting partner. Keeping patient data secure within a <a href=\"https:\/\/otavawebsite.wpengine.com\/operations\/locations\/\" target=\"_blank\" rel=\"noopener noreferrer\">data center<\/a> can reduce risks of having data on portable devices. If an organization focuses on delivering healthcare applications but doesn\u2019t want the burden of maintaining server infrastructure, Sage suggests looking for a hosting provider that embraces and delivers on their responsibility to protect patient data.<\/p>\n<p>Sage said along with making sure a hosting provider can meet an organization\u2019s technical specifications, key things to look for beyond the technology include:<\/p>\n<ul>\n<li>Will they sign a Business Associate Agreement (BAA)?<\/li>\n<li>Have they been independently audited against the U.S. Department of Health &amp; Human Services\u2019 Office for Civil Rights HIPAA audit protocol?<\/li>\n<li>Will they share documentation of the audit with the auditor\u2019s opinion of compliance?<\/li>\n<li>Do their people, processes, and technology align to demonstrate a culture of compliance? Don\u2019t underestimate the importance of an on-site visit to see for yourself where your patient data will reside.<\/li>\n<\/ul>\n<p><strong>COMPLIANCE TRACKING SOLUTION<\/strong><\/p>\n<p>End-to-end compliance software allows organizations to achieve compliance, protecting PHI and reducing liability by illustrating to auditors a good faith effort in regard to being compliant.<\/p>\n<p>Bob Grant, a former HIPAA auditor who is now the Chief Compliance Officer at the Compliancy Group said the need for an end-to-end compliance solution is ever increasing.<\/p>\n<p>\u201cProtection of your PHI and reducing your liability is key for your business,\u201d he said. \u201cUsing HIPAA compliance tracking software can help you illustrate to auditors that you have done everything necessary to comply with the regulations.\u201d<\/p>\n<p>Grant said the main focuses of HIPAA compliance software should include:<\/p>\n<ul>\n<li>Business Associate Management<\/li>\n<li>Gap Analysis<\/li>\n<li>Remediation Management<\/li>\n<li>Incident Management<\/li>\n<li>Policy &amp; Procedure creation (Templates)<\/li>\n<li>Policy &amp; Procedure Management (Version Control)<\/li>\n<li>Attestation Management (Staff attesting to policies, procedures and training)<\/li>\n<\/ul>\n<p>\u201cCompliance is no longer a three ringed binder up behind someone\u2019s desk; it needs to be a living, breathing solution that everyone in the organization can access,\u201d Grant said.<\/p>\n<hr \/>\n<p><strong>RELATED CONTENT<\/strong><\/p>\n<p><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/up-your-hipaa-iq-with-a-little-hipaa-faq\/\" target=\"_blank\" rel=\"noopener noreferrer\">Up your HIPAA IQ with a little HIPAA FAQ<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As HIPAA regulations increase and cybersecurity threats advance, the healthcare industry\u2019s effort to protect patient data gets more complex. Online Tech recently contributed to a story posted on BlogHIPAA.com that covers five tools to help protect patient information and ease the compliance burden: Email encryption Mobile phone BYOD protection HIPAA-compliant storage HIPAA-compliant hosting Compliance tracking solution BlogHIPAA spoke with representatives from industry-leading organizations in each of these areas, each of them focused on compliance. They each provided insight into why these areas are vital components of a HIPAA compliance strategy. EMAIL ENCRYPTION Bob Janacek, the CTO at DataMotion, explained that \u201cunencrypted email messages and files hop from point to point through routes over the Internet until they reach their destination. At any of those points, data is open for scrutiny and can be copied or breached by unauthorized users. When encryption is used, data traverses the points between the sender and the recipient in a secure manner, shielded from prying eyes.\u201d He offered these best practices to help reduce the chance of protected data from being exposed through email or file transfers. Each is described in full on the BlogHIPAA post: Keep your email encryption system simple. Use policy-based gateway&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2909","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>5 tools to protect patient data | OTAVA<\/title>\n<meta name=\"description\" content=\"We recently contributed to a story posted on BlogHIPAA.com that covers five tools to help protect patient information and ease the compliance burden.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 tools to protect patient data\" \/>\n<meta property=\"og:description\" content=\"We recently contributed to a story posted on BlogHIPAA.com that covers five tools to help protect patient information and ease the compliance burden.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2014-10-03T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-hipaa.png\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"5 tools to protect patient data\",\"datePublished\":\"2014-10-03T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/\"},\"wordCount\":927,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-hipaa.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/\",\"url\":\"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/\",\"name\":\"5 tools to protect patient data | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-hipaa.png\",\"datePublished\":\"2014-10-03T00:00:00+00:00\",\"description\":\"We recently contributed to a story posted on BlogHIPAA.com that covers five tools to help protect patient information and ease the compliance burden.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/#primaryimage\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-hipaa.png\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-hipaa.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 tools to protect patient data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"5 tools to protect patient data | OTAVA","description":"We recently contributed to a story posted on BlogHIPAA.com that covers five tools to help protect patient information and ease the compliance burden.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/","og_locale":"en_US","og_type":"article","og_title":"5 tools to protect patient data","og_description":"We recently contributed to a story posted on BlogHIPAA.com that covers five tools to help protect patient information and ease the compliance burden.","og_url":"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/","og_site_name":"OTAVA","article_published_time":"2014-10-03T00:00:00+00:00","og_image":[{"url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-hipaa.png","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"5 tools to protect patient data","datePublished":"2014-10-03T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/"},"wordCount":927,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-hipaa.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/","url":"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/","name":"5 tools to protect patient data | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-hipaa.png","datePublished":"2014-10-03T00:00:00+00:00","description":"We recently contributed to a story posted on BlogHIPAA.com that covers five tools to help protect patient information and ease the compliance burden.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/#primaryimage","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-hipaa.png","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-hipaa.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/5-tools-to-protect-patient-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"5 tools to protect patient data"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2909","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2909"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2909\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2909"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2909"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2909"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2909"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}