{"id":14527,"date":"2013-11-11T09:53:00","date_gmt":"2013-11-11T14:53:00","guid":{"rendered":"https:\/\/medsafe5stg.wpenginepowered.com\/?p=14527"},"modified":"2025-04-22T00:40:39","modified_gmt":"2025-04-21T16:40:39","slug":"the-security-risk-analysis-an-essential-step-towards-hipaa-compliance","status":"publish","type":"post","link":"https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/","title":{"rendered":"The Security Risk Analysis: An Essential Step Towards HIPAA Compliance"},"content":{"rendered":"\n<p><em>This article was written by Karen Pass, Senior Compliance Specialist with MedSafe.<\/em><\/p>\n\n\n\n<p>There are many important elements to implementing an effective HIPAA Program, but none are more important than completing a security risk analysis. Conducting a risk analysis will give your practice an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity and availability of your electronic protected health information.<\/p>\n\n\n\n<p>Completing a security risk analysis is a required element. This means that most specifications must be evaluated and if applicable, implemented, in order to achieve compliance with the Security Rule. It is important to remember that certain specifications in the risk analysis are considered addressable, meaning it is up to the covered entity to determine (in writing) if the specification is a \u201creasonable and appropriate\u201d safeguard for its environment, taking into consideration how it will protect ePHI.<\/p>\n\n\n\n<p>According to the Security Rule, your security risk analysis should be broken down into the implementation of 3 categories of electronic protected health information safeguards: Administrative, Physical and Technical. The following is an overview of each category, including differentiation between those specifications that are required and those that are addressable.<\/p>\n\n\n\n<p><strong>ADMINISTRATIVE SAFEGUARDS<\/strong><\/p>\n\n\n\n<p>Administrative safeguards are administrative actions and functions to manage the security measures in place that protect electronic protected health information. Administrative safeguards must state how the covered entity will conduct oversight and management of staff members who have access to, and handle ePHI. Administrative safeguards include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Risk Assessment (R)<\/li>\n\n\n\n<li>Sanctions Policy (R)<\/li>\n\n\n\n<li>Information System Activity Review (R)<\/li>\n\n\n\n<li>Security Officer Assignment (R)<\/li>\n\n\n\n<li>Security Awareness and Training (A)<\/li>\n\n\n\n<li>Security Incident Procedures (R)<\/li>\n\n\n\n<li>Disaster Recovery and Data Backup Plan (R)<\/li>\n\n\n\n<li>Periodic Security Evaluations (R)<\/li>\n\n\n\n<li>Business Associate Contracts (R)<\/li>\n<\/ul>\n\n\n\n<p><strong>PHYSICAL SAFEGUARDS<\/strong><\/p>\n\n\n\n<p>Physical safeguards are the mechanisms required to protect electronic systems, equipment, and the data they hold from threats, environmental hazards and unauthorized intrusion. It includes restricted access to ePHI and retaining off-site computer backups. Applying physical safeguards means establishing:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Facility Access Controls (A)<\/li>\n\n\n\n<li>Workstation Use and Controls (R)<\/li>\n\n\n\n<li>Device and Media Controls (R)<\/li>\n<\/ul>\n\n\n\n<p><strong>TECHNICAL SAFEGUARDS<\/strong><\/p>\n\n\n\n<p>Technical safeguards are the automated processes used to protect and control access to data. They include using authentication controls to verify that the person signing onto a computer is authorized to access that ePHI, or encrypting and decrypting data as it is being stored and\/or transmitted. Technical Safeguards are:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Unique User Login (R)<\/li>\n\n\n\n<li>Emergency Access Procedures (R)<\/li>\n\n\n\n<li>Automatic Logoff (A)<\/li>\n\n\n\n<li>Encryption and Decryption (A)<\/li>\n\n\n\n<li>Audit Controls (R)<\/li>\n\n\n\n<li>Authentication of Integrity of ePHI (A)<\/li>\n\n\n\n<li>Authentication of Person or Entity (R)<\/li>\n\n\n\n<li>Transmission Security (A)<\/li>\n<\/ul>\n\n\n\n<p>Completing your security risk analysis is not only an essential component of your HIPAA program, but it will enable you to identify and rectify any risks and vulnerabilities to the access and confidentiality of your electronic protected health information. The results of your risk analysis will be used to determine the appropriate security measures to be taken. Be sure and revaluate your risk analysis periodically, especially if there have been any known or suspected threats to your security program.<\/p>\n\n\n\n<p>&nbsp;<strong>About the Author<\/strong><\/p>\n\n\n\n<p>Karen Pass is a Senior Compliance Specialist with MedSafe: The Total Compliance Solution. Throughout her 14 years with MedSafe, she has conducted thousands of safety and compliance audits and trainings for a variety of healthcare clients. Karen has worked in healthcare for over 25 years, more recently as a Regional Director of Operations for a national imaging company. She holds a BS from the University of Saint Francis and is registered as a medical sonographer and in radiologic technology with a certification in mammography. Karen is also certified in healthcare compliance through the Healthcare Compliance Association.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article was written by Karen Pass, Senior Compliance Specialist with MedSafe. There are many important elements to implementing an effective HIPAA Program, but none are more important than completing [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":14985,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[18],"tags":[],"class_list":["post-14527","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hipaa-compliance"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Security Risk Analysis an Essential Step Towards HIPAA<\/title>\n<meta name=\"description\" content=\"Gain insights from Karen Pass, a Senior Compliance Specialist with extensive experience in healthcare compliance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Security Risk Analysis: An Essential Step Towards HIPAA Compliance\" \/>\n<meta property=\"og:description\" content=\"Gain insights from Karen Pass, a Senior Compliance Specialist with extensive experience in healthcare compliance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"MedSafe\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/MedSafeCompliance\" \/>\n<meta property=\"article:published_time\" content=\"2013-11-11T14:53:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-21T16:40:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/medsafe.com\/wp-content\/uploads\/2013\/11\/Blog_76_HIPAA_Risk_Assessment-01.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"881\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Tyler Howard\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tyler Howard\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/\"},\"author\":{\"name\":\"Tyler Howard\",\"@id\":\"https:\/\/medsafe.com\/#\/schema\/person\/8e449dab4624185a0388141159b08c10\"},\"headline\":\"The Security Risk Analysis: An Essential Step Towards HIPAA Compliance\",\"datePublished\":\"2013-11-11T14:53:00+00:00\",\"dateModified\":\"2025-04-21T16:40:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/\"},\"wordCount\":605,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/medsafe.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/medsafe.com\/wp-content\/uploads\/2013\/11\/Blog_76_HIPAA_Risk_Assessment-01.webp\",\"articleSection\":[\"HIPAA Compliance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/\",\"url\":\"https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/\",\"name\":\"The Security Risk Analysis an Essential Step Towards HIPAA\",\"isPartOf\":{\"@id\":\"https:\/\/medsafe.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/medsafe.com\/wp-content\/uploads\/2013\/11\/Blog_76_HIPAA_Risk_Assessment-01.webp\",\"datePublished\":\"2013-11-11T14:53:00+00:00\",\"dateModified\":\"2025-04-21T16:40:39+00:00\",\"description\":\"Gain insights from Karen Pass, a Senior Compliance Specialist with extensive experience in healthcare compliance.\",\"breadcrumb\":{\"@id\":\"https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/#primaryimage\",\"url\":\"https:\/\/medsafe.com\/wp-content\/uploads\/2013\/11\/Blog_76_HIPAA_Risk_Assessment-01.webp\",\"contentUrl\":\"https:\/\/medsafe.com\/wp-content\/uploads\/2013\/11\/Blog_76_HIPAA_Risk_Assessment-01.webp\",\"width\":1920,\"height\":881,\"caption\":\"Blog_76_HIPAA_Risk_Assessment\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/medsafe.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Security Risk Analysis: An Essential Step Towards HIPAA Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/medsafe.com\/#website\",\"url\":\"https:\/\/medsafe.com\/\",\"name\":\"MedSafe\",\"description\":\"The Total Compliance Solution\",\"publisher\":{\"@id\":\"https:\/\/medsafe.com\/#organization\"},\"alternateName\":\"MedSafe Healthcare Compliance\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/medsafe.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/medsafe.com\/#organization\",\"name\":\"MedSafe\",\"url\":\"https:\/\/medsafe.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/medsafe.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/medsafe.com\/wp-content\/uploads\/2025\/05\/medsafe-organization-logo.webp\",\"contentUrl\":\"https:\/\/medsafe.com\/wp-content\/uploads\/2025\/05\/medsafe-organization-logo.webp\",\"width\":696,\"height\":696,\"caption\":\"MedSafe\"},\"image\":{\"@id\":\"https:\/\/medsafe.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/MedSafeCompliance\",\"https:\/\/www.instagram.com\/medsafetcs\/\",\"https:\/\/www.youtube.com\/@MedSafeTCS\/featured\",\"https:\/\/www.linkedin.com\/company\/medsafe-the-total-compliance-solution-\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/medsafe.com\/#\/schema\/person\/8e449dab4624185a0388141159b08c10\",\"name\":\"Tyler Howard\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/medsafe.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6bf709312d28530eb3e3156e3916ce52728f96c99a0b4795127070d6ddde124b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6bf709312d28530eb3e3156e3916ce52728f96c99a0b4795127070d6ddde124b?s=96&d=mm&r=g\",\"caption\":\"Tyler Howard\"},\"description\":\"Tyler Howard is a passionate writer and industry expert with a keen eye for technology, business insights, and digital innovation. With years of experience in content creation, he brings engaging and informative articles that keep readers ahead of the curve. Whether exploring emerging trends or offering practical advice, Tyler's work aims to educate, inspire, and empower his audience. Stay tuned for his latest insights and thought-provoking discussions.\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Security Risk Analysis an Essential Step Towards HIPAA","description":"Gain insights from Karen Pass, a Senior Compliance Specialist with extensive experience in healthcare compliance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/","og_locale":"en_US","og_type":"article","og_title":"The Security Risk Analysis: An Essential Step Towards HIPAA Compliance","og_description":"Gain insights from Karen Pass, a Senior Compliance Specialist with extensive experience in healthcare compliance.","og_url":"https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/","og_site_name":"MedSafe","article_publisher":"https:\/\/www.facebook.com\/MedSafeCompliance","article_published_time":"2013-11-11T14:53:00+00:00","article_modified_time":"2025-04-21T16:40:39+00:00","og_image":[{"width":1920,"height":881,"url":"https:\/\/medsafe.com\/wp-content\/uploads\/2013\/11\/Blog_76_HIPAA_Risk_Assessment-01.webp","type":"image\/webp"}],"author":"Tyler Howard","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Tyler Howard","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/#article","isPartOf":{"@id":"https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/"},"author":{"name":"Tyler Howard","@id":"https:\/\/medsafe.com\/#\/schema\/person\/8e449dab4624185a0388141159b08c10"},"headline":"The Security Risk Analysis: An Essential Step Towards HIPAA Compliance","datePublished":"2013-11-11T14:53:00+00:00","dateModified":"2025-04-21T16:40:39+00:00","mainEntityOfPage":{"@id":"https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/"},"wordCount":605,"commentCount":0,"publisher":{"@id":"https:\/\/medsafe.com\/#organization"},"image":{"@id":"https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/medsafe.com\/wp-content\/uploads\/2013\/11\/Blog_76_HIPAA_Risk_Assessment-01.webp","articleSection":["HIPAA Compliance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/","url":"https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/","name":"The Security Risk Analysis an Essential Step Towards HIPAA","isPartOf":{"@id":"https:\/\/medsafe.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/#primaryimage"},"image":{"@id":"https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/medsafe.com\/wp-content\/uploads\/2013\/11\/Blog_76_HIPAA_Risk_Assessment-01.webp","datePublished":"2013-11-11T14:53:00+00:00","dateModified":"2025-04-21T16:40:39+00:00","description":"Gain insights from Karen Pass, a Senior Compliance Specialist with extensive experience in healthcare compliance.","breadcrumb":{"@id":"https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/#primaryimage","url":"https:\/\/medsafe.com\/wp-content\/uploads\/2013\/11\/Blog_76_HIPAA_Risk_Assessment-01.webp","contentUrl":"https:\/\/medsafe.com\/wp-content\/uploads\/2013\/11\/Blog_76_HIPAA_Risk_Assessment-01.webp","width":1920,"height":881,"caption":"Blog_76_HIPAA_Risk_Assessment"},{"@type":"BreadcrumbList","@id":"https:\/\/medsafe.com\/hipaa-compliance\/the-security-risk-analysis-an-essential-step-towards-hipaa-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/medsafe.com\/"},{"@type":"ListItem","position":2,"name":"The Security Risk Analysis: An Essential Step Towards HIPAA Compliance"}]},{"@type":"WebSite","@id":"https:\/\/medsafe.com\/#website","url":"https:\/\/medsafe.com\/","name":"MedSafe","description":"The Total Compliance Solution","publisher":{"@id":"https:\/\/medsafe.com\/#organization"},"alternateName":"MedSafe Healthcare Compliance","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/medsafe.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/medsafe.com\/#organization","name":"MedSafe","url":"https:\/\/medsafe.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/medsafe.com\/#\/schema\/logo\/image\/","url":"https:\/\/medsafe.com\/wp-content\/uploads\/2025\/05\/medsafe-organization-logo.webp","contentUrl":"https:\/\/medsafe.com\/wp-content\/uploads\/2025\/05\/medsafe-organization-logo.webp","width":696,"height":696,"caption":"MedSafe"},"image":{"@id":"https:\/\/medsafe.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/MedSafeCompliance","https:\/\/www.instagram.com\/medsafetcs\/","https:\/\/www.youtube.com\/@MedSafeTCS\/featured","https:\/\/www.linkedin.com\/company\/medsafe-the-total-compliance-solution-\/"]},{"@type":"Person","@id":"https:\/\/medsafe.com\/#\/schema\/person\/8e449dab4624185a0388141159b08c10","name":"Tyler Howard","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/medsafe.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6bf709312d28530eb3e3156e3916ce52728f96c99a0b4795127070d6ddde124b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6bf709312d28530eb3e3156e3916ce52728f96c99a0b4795127070d6ddde124b?s=96&d=mm&r=g","caption":"Tyler Howard"},"description":"Tyler Howard is a passionate writer and industry expert with a keen eye for technology, business insights, and digital innovation. With years of experience in content creation, he brings engaging and informative articles that keep readers ahead of the curve. Whether exploring emerging trends or offering practical advice, Tyler's work aims to educate, inspire, and empower his audience. Stay tuned for his latest insights and thought-provoking discussions."}]}},"_links":{"self":[{"href":"https:\/\/medsafe.com\/wp-json\/wp\/v2\/posts\/14527","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/medsafe.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/medsafe.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/medsafe.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/medsafe.com\/wp-json\/wp\/v2\/comments?post=14527"}],"version-history":[{"count":0,"href":"https:\/\/medsafe.com\/wp-json\/wp\/v2\/posts\/14527\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/medsafe.com\/wp-json\/wp\/v2\/media\/14985"}],"wp:attachment":[{"href":"https:\/\/medsafe.com\/wp-json\/wp\/v2\/media?parent=14527"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/medsafe.com\/wp-json\/wp\/v2\/categories?post=14527"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/medsafe.com\/wp-json\/wp\/v2\/tags?post=14527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}