{"id":246544,"date":"2025-02-17T11:20:23","date_gmt":"2025-02-17T11:20:23","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/hipaa-secure-email\/"},"modified":"2025-02-17T11:20:23","modified_gmt":"2025-02-17T11:20:23","slug":"hipaa-secure-email","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/hipaa-secure-email\/","title":{"rendered":"What Makes Email HIPAA Secure?"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>In today&#039;s digital landscape, where our personal information is constantly at risk, the security of sensitive data has never been more crucial. One significant concern in the realm of <strong>cybersecurity<\/strong> is the <strong>leaked password<\/strong>, which has made headlines for its alarming frequency and the potential consequences for individuals and organizations alike. Leaked passwords often appear in massive <strong>data breaches<\/strong>, where hackers exploit vulnerabilities to gain access to private accounts. The significance of these leaks is profound; a single compromised password can lead to <strong>unauthorized access<\/strong> to sensitive information, <strong>financial fraud<\/strong>, and identity theft. For users, understanding the implications of leaked passwords is essential, as it highlights the need for <strong>robust security practices<\/strong> and the importance of using unique, complex passwords to safeguard their digital lives.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/hipaa-secure-email\/#Key_Highlights\" >Key Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/hipaa-secure-email\/#Understanding_HIPAA_Email_Security_Requirements\" >Understanding HIPAA Email Security Requirements<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/hipaa-secure-email\/#Essential_Encryption_Standards_for_Protected_Health_Information\" >Essential Encryption Standards for Protected Health Information<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/hipaa-secure-email\/#Access_Controls_and_Authentication_Methods\" >Access Controls and Authentication Methods<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/hipaa-secure-email\/#Audit_Trails_and_Documentation_Protocols\" >Audit Trails and Documentation Protocols<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/hipaa-secure-email\/#Business_Associate_Agreements_and_Third-Party_Compliance\" >Business Associate Agreements and Third-Party Compliance<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/hipaa-secure-email\/#Best_Practices_for_Secure_Email_Communication_in_Healthcare\" >Best Practices for Secure Email Communication in Healthcare<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/hipaa-secure-email\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/hipaa-secure-email\/#Can_Healthcare_Providers_Use_Personal_Email_Accounts_for_Patient_Communication\" >Can Healthcare Providers Use Personal Email Accounts for Patient Communication?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/hipaa-secure-email\/#How_Long_Should_Encrypted_Healthcare_Emails_Be_Retained\" >How Long Should Encrypted Healthcare Emails Be Retained?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/hipaa-secure-email\/#What_Happens_if_a_Hipaa-Compliant_Email_Is_Accidentally_Sent_to_Wrong_Recipient\" >What Happens if a Hipaa-Compliant Email Is Accidentally Sent to Wrong Recipient?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/hipaa-secure-email\/#Are_Patient-Initiated_Unsecure_Email_Communications_Considered_HIPAA_Violations\" >Are Patient-Initiated Unsecure Email Communications Considered HIPAA Violations?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/hipaa-secure-email\/#Can_Mobile_Devices_Be_Used_to_Send_Hipaa-Compliant_Emails\" >Can Mobile Devices Be Used to Send Hipaa-Compliant Emails?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/logmeonce.com\/resources\/hipaa-secure-email\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Highlights\"><\/span>Key Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>End-to-end encryption protects sensitive health information by converting messages into coded data that only authorized recipients can read.<\/li>\n<li>Two-factor authentication adds an extra security layer by requiring multiple verification steps before accessing health information.<\/li>\n<li>Business Associate Agreements ensure all parties handling protected health information follow HIPAA security requirements.<\/li>\n<li>Audit trails track and document all email access, providing a record of who accessed health information and when.<\/li>\n<li>TLS encryption secures email transmission between servers, preventing unauthorized interception of protected health information during transit.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Understanding_HIPAA_Email_Security_Requirements\"><\/span>Understanding HIPAA Email Security Requirements<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>While you might send emails as easily as tossing a paper airplane, healthcare emails need special protection &#8211; just like how you&#039;d keep your secret diary under lock and key!<\/p>\n<p>Think of <strong>HIPAA email rules<\/strong> as special guards for your <strong>private health information<\/strong>. Just like how you wouldn&#039;t shout about having a tummy ache across the playground, doctors and nurses need to be super careful with your <strong>medical secrets<\/strong>!<\/p>\n<p>These rules make sure your health details stay safe, kind of like keeping your favorite stuffed animal in a special box.<\/p>\n<p>Want to know what makes an email HIPAA-safe? It needs <strong>strong passwords<\/strong> (like a magic spell!), <strong>special encryption<\/strong> (that&#039;s like turning words into secret code), and careful rules about who can read the message. Pretty cool, right?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Essential_Encryption_Standards_for_Protected_Health_Information\"><\/span>Essential Encryption Standards for Protected Health Information<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Just like a secret decoder ring helps you send hidden messages to your best friend, encryption keeps your health information super safe! It&#039;s like turning your medical info into a secret code that only special computers can read. Isn&#039;t that cool?<\/p>\n<p>Let me show you the three main types of encryption we use to protect your health information:<\/p>\n<table>\n<thead>\n<tr>\n<th style=\"text-align: center\">Type<\/th>\n<th style=\"text-align: center\">What It Does<\/th>\n<th style=\"text-align: center\">Fun Comparison<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"text-align: center\">AES<\/td>\n<td style=\"text-align: center\">Scrambles data<\/td>\n<td style=\"text-align: center\">Like mixing up puzzle pieces<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">TLS<\/td>\n<td style=\"text-align: center\">Protects emails<\/td>\n<td style=\"text-align: center\">Like a security guard<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">End-to-End<\/td>\n<td style=\"text-align: center\">Double protection<\/td>\n<td style=\"text-align: center\">Like a secret treehouse password<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Have you ever played telephone? Sometimes messages get mixed up! That&#039;s why we use strong encryption &#8211; it&#039;s like having a super-secret language that keeps your private information safe and sound. Want to know the best part? Only the right people can decode it!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Access_Controls_and_Authentication_Methods\"><\/span>Access Controls and Authentication Methods<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Keeping your <strong>health information safe<\/strong> is like having a special key to your own clubhouse! Just like you wouldn&#039;t want strangers walking into your room, we need <strong>special rules<\/strong> to protect your health records online.<\/p>\n<p>Think of it as having a <strong>super-secret password<\/strong> that only you and your doctor know!<\/p>\n<p>Here are some cool ways we keep your information safe:<\/p>\n<ul>\n<li>Two-factor authentication &#8211; it&#039;s like having a double lock, where you need both a key and a special code<\/li>\n<li>Strong passwords that mix letters, numbers, and symbols &#8211; kinda like making a secret recipe<\/li>\n<li>Time-outs that automatically log you out &#8211; similar to when your video game saves and closes if you stop playing<\/li>\n<\/ul>\n<p>Have you ever played &#034;Red Light, <strong>Green Light<\/strong>&#034;? That&#039;s how <strong>access controls<\/strong> work &#8211; only the right people get the &#034;green light&#034; to see your information! Additionally, using <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/mfa-passwords\/\">multi-factor authentication<\/a> is crucial in ensuring that only authorized users can access your health data.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Audit_Trails_and_Documentation_Protocols\"><\/span>Audit Trails and Documentation Protocols<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>After we secure our special <strong>digital clubhouse<\/strong>, we need to keep track of who visits!<\/p>\n<p>Think of it like having a <strong>magical guestbook<\/strong> that writes down everything that happens &#8211; just like when your teacher takes attendance in class.<\/p>\n<p>I&#039;ll show you how we track these digital footprints. Every time someone peeks at <strong>health information<\/strong>, our system writes down their name, what they looked at, and when they did it.<\/p>\n<p>It&#039;s like having a <strong>security camera<\/strong> that records everything in writing!<\/p>\n<p>You know how your parents keep report cards to show your progress? That&#039;s what we do with these records.<\/p>\n<p>We <strong>store them safely<\/strong> for at least six years &#8211; that&#039;s as long as you&#039;ve been alive! Pretty neat, right? <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/hipaa-mfa\/\">Regular audits<\/a> of these access logs are crucial to ensure compliance with HIPAA regulations.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Business_Associate_Agreements_and_Third-Party_Compliance\"><\/span>Business Associate Agreements and Third-Party Compliance<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Businesses need special friends to help take care of your <strong>health information<\/strong> &#8211; we call them &#034;business associates.&#034;<\/p>\n<p>Think of it like when you share your favorite toys with a friend. Just like you have rules when sharing toys, <strong>business associates<\/strong> must follow special <strong>HIPAA rules<\/strong> too!<\/p>\n<p>When we work with business associates, we make sure they promise to:<\/p>\n<ul>\n<li>Keep your health information super safe, like a treasure in a locked chest<\/li>\n<li>Only use the information to help you, just like how a doctor helps you feel better<\/li>\n<li>Tell us right away if something goes wrong, like when you spill milk on the floor<\/li>\n<\/ul>\n<p>Have you ever made a pinky promise? That&#039;s kind of what a <strong>Business Associate Agreement<\/strong> is! It&#039;s a <strong>special promise<\/strong> between companies to protect your health secrets.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Best_Practices_for_Secure_Email_Communication_in_Healthcare\"><\/span>Best Practices for Secure Email Communication in Healthcare<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When we send emails about <strong>health stuff<\/strong>, we need to be extra careful &#8211; just like <strong>secret agents<\/strong> protecting special messages!<\/p>\n<p>Think of your email like a special <strong>lockbox<\/strong> that keeps your secrets safe. Here&#039;s what you need to do to be a super-smart email protector:<\/p>\n<ol>\n<li>Always double-check the email address &#8211; just like making sure you&#039;re giving a note to the right friend at recess!<\/li>\n<li>Use strong passwords (like mixing your favorite superhero with your lucky number)<\/li>\n<li>Never open strange emails &#8211; they might be like those tricky &#034;poison apples&#034; from fairy tales<\/li>\n<li>Encrypt your messages (that means scrambling them so only the right person can read them)<\/li>\n<li>Log out when you&#039;re done, just like closing and locking your bedroom door at night<\/li>\n<\/ol>\n<p>Have you ever sent a secret message to a friend?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"Can_Healthcare_Providers_Use_Personal_Email_Accounts_for_Patient_Communication\"><\/span>Can Healthcare Providers Use Personal Email Accounts for Patient Communication?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll tell you straight up &#8211; healthcare providers shouldn&#039;t use <strong>personal email accounts<\/strong> for patient communication.<\/p>\n<p>It&#039;s just not safe! Think of it like keeping your secret diary &#8211; you wouldn&#039;t want everyone reading it, right?<\/p>\n<p>Doctors must use special <strong>secure email systems<\/strong> that protect your <strong>private health information<\/strong>.<\/p>\n<p>These systems have extra security features, like strong passwords and encryption, to keep your medical details safe from bad guys.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_Long_Should_Encrypted_Healthcare_Emails_Be_Retained\"><\/span>How Long Should Encrypted Healthcare Emails Be Retained?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll tell you a simple rule about <strong>keeping healthcare emails safe<\/strong>!<\/p>\n<p>Think of it like storing your favorite toys &#8211; you want to keep them in good shape, right?<\/p>\n<p>Most healthcare places need to <strong>save encrypted emails<\/strong> for at least 6 years. That&#039;s as long as from kindergarten through 5th grade!<\/p>\n<p>Some states want you to keep them even longer, like 10 years. Just check your <strong>state&#039;s rules<\/strong> to be sure!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Happens_if_a_Hipaa-Compliant_Email_Is_Accidentally_Sent_to_Wrong_Recipient\"><\/span>What Happens if a Hipaa-Compliant Email Is Accidentally Sent to Wrong Recipient?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>If you accidentally send a <strong>HIPAA email<\/strong> to the wrong person, you&#039;ll need to act fast!<\/p>\n<p>First, contact the recipient and ask them to delete it without opening it.<\/p>\n<p>Then, tell your <strong>privacy officer<\/strong> right away &#8211; they&#039;re like email safety superheroes!<\/p>\n<p>Document what happened, and they&#039;ll help decide if it&#039;s a <strong>breach that needs reporting<\/strong>.<\/p>\n<p>I&#039;ll also help you double-check email addresses next time to prevent mistakes!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Are_Patient-Initiated_Unsecure_Email_Communications_Considered_HIPAA_Violations\"><\/span>Are Patient-Initiated Unsecure Email Communications Considered HIPAA Violations?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll tell you something cool about patient emails!<\/p>\n<p>If you (the patient) send an email to your doctor using <strong>regular email<\/strong>, you&#039;re not breaking any <strong>HIPAA rules<\/strong>.<\/p>\n<p>That&#039;s because HIPAA mainly tells doctors and hospitals what to do, not patients. You can share your own <strong>health info<\/strong> however you want!<\/p>\n<p>But remember, regular email isn&#039;t super safe &#8211; it&#039;s like sending a postcard that others might peek at.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_Mobile_Devices_Be_Used_to_Send_Hipaa-Compliant_Emails\"><\/span>Can Mobile Devices Be Used to Send Hipaa-Compliant Emails?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, you can send HIPAA-compliant emails from your mobile device!<\/p>\n<p>I&#039;ll tell you how. First, you need a special <strong>secure email app<\/strong> that keeps patient info safe &#8211; like having a secret code lock on your phone.<\/p>\n<p>You&#039;ll also want to turn on <strong>encryption<\/strong> (that&#039;s like putting your message in an invisible envelope).<\/p>\n<p>Don&#039;t forget to use <strong>strong passwords<\/strong> and keep your device locked when you&#039;re not using it!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As we delve into the importance of making email <strong>HIPAA secure<\/strong>, we must also recognize that <strong>password security<\/strong> plays a vital role in safeguarding sensitive health information. <strong>Strong passwords<\/strong> and effective password management are essential components of any security strategy. By utilizing a <strong>password manager<\/strong>, you can generate and store complex passwords, ensuring that your accounts remain protected from unauthorized access. Additionally, consider implementing <strong>passkey management<\/strong> for an added layer of security. This not only enhances your <strong>compliance with HIPAA regulations<\/strong> but also fosters trust with your patients by safeguarding their private health information. I encourage you to take action now&#x2014;visit <a href=\"https:\/\/logmeonce.com\/\">LogmeOnce<\/a> and sign up for a free account. With their intuitive password management solutions, you can bolster your security posture and ensure that your practice remains compliant and secure. <strong>Protect your patients&#039; trust<\/strong> by prioritizing password security today!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>From encrypted messages to access controls, discover the essential safeguards that protect your health information in HIPAA-compliant emails.<\/p>\n","protected":false},"author":5,"featured_media":246543,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[37036,37037,36166],"class_list":["post-246544","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-two-factor-authentication","tag-encrypted-emails-2","tag-health-information","tag-hipaa-compliance-2"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/246544","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=246544"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/246544\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/246543"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=246544"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=246544"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=246544"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}