{"id":2839,"date":"2012-03-15T16:48:10","date_gmt":"2012-03-15T20:48:10","guid":{"rendered":"http:\/\/www.healthit.gov\/buzz-blog\/?p=2839"},"modified":"2026-01-05T21:37:48","modified_gmt":"2026-01-05T21:37:48","slug":"mobile-device-privacy-and-security-good-practices","status":"publish","type":"post","link":"https:\/\/healthit.gov\/blog\/insights-updates\/mobile-device-privacy-and-security-good-practices\/","title":{"rendered":"Mobile Device Privacy and Security Good Practices for Health Information"},"content":{"rendered":"\n<p>zRecent surveys and research show that the health care sector is rapidly adopting mobile technology, and it\u2019s only expected to have more significant uptake in the future. This isn\u2019t surprising. Laptops, tablets, and smart phones are fast and convenient means of communicating all sorts of data including health information.<\/p>\n\n\n\n<p>Unfortunately, polls also show that mobile device security &nbsp;has not kept pace with adoption. In fact, there have been a number of security incidents related to the use of mobile devices that are used to access, store, or exchange health information. Given the rapid adoption of mobile devices against the backdrop of the breach incidents reported, there\u2019s been a growing concern about the use of these devices in the health field because of their vulnerability.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-mobile-device-privacy-and-security-good-practices\"><strong>Mobile Device Privacy and Security Good Practices<\/strong><\/h2>\n\n\n\n<p>Recognizing this evolving issue, ONC\u2019s Office of the Chief Privacy Officer (OCPO) along with the Office for Civil Rights (OCR) recently launched a project designed to identify mobile device privacy and security good practices. The project is intended to build on the previously released <a href=\"https:\/\/www.hhs.gov\/ocr\/privacy\/hipaa\/administrative\/securityrule\/remoteuse.pdf\">Health and Human Services\u2019 HIPAA Security Rule &#8211; Remote Use Guidance<\/a>.<\/p>\n\n\n\n<p>To kick off the discussion on this important topic, OCPO and OCR are co-hosting a free, public <a href=\"https:\/\/healthit.gov\/health-it-basics\/video\/mobile-devices-healthcare-challenges-and-expectations-practitioners \">Mobile Devices Roundtable<\/a> on securing and protecting health information while using mobile devices such as laptops, tablet computers, PDAs, and smart phones.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-upcoming-mobile-devices-roundtable-you-can-participate\"><strong>Upcoming Mobile Devices Roundtable: You Can Participate <\/strong><\/h2>\n\n\n\n<p>The <a href=\"https:\/\/healthit.gov\/health-it-basics\/video\/mobile-devices-healthcare-challenges-and-expectations-practitioners \">Mobile Devices Roundtable<\/a> will be held on March 16, 2012 at the Hubert H. Humphrey Building in Washington, D.C. and via Webcast. It will feature three panels comprised of federal agency representatives, providers, and members of research, provider and industry organizations. The event will include interaction between the panelists and the audience. Questions from the audience will be accepted in-person, through email, and via Twitter.<\/p>\n\n\n\n<p>The purpose of the Roundtable is to gather public, industry, and subject matter experts together to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Summarize the current federal privacy and security legal framework for mobile devices accessing, storing and\/or transmitting health information;<\/li>\n\n\n\n<li>Discuss real world usage of mobile devices by providers and other health care delivery professionals in order to understand their expectations, attitudes, challenges and needs;<\/li>\n\n\n\n<li>Gather input regarding the information (and format) providers and other health care delivery professionals want and need to help them safeguard health information on their mobile devices; and<\/li>\n\n\n\n<li>Gather input on existing and emerging mobile device privacy and security good practices, and strategies and technologies for safeguarding data on mobile devices.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-register-for-the-roundtable-and-learn-about-mobile-device-privacy-and-security-good-practices\"><strong>Register for the Roundtable and Learn About Mobile Device Privacy and Security Good Practices <\/strong><\/h2>\n\n\n\n<p>Be sure to register for the free Roundtable event to join either in-person, by audio, or via Webcast. Registration can be completed at <a href=\"https:\/\/healthit.gov\/health-it-basics\/video\/mobile-devices-healthcare-challenges-and-expectations-practitioners \">https:\/\/healthit.hhs.gov\/blog\/mobile-devices-roundtable\/<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-to-submit-comments-and-questions\"><strong>How to Submit Comments and Questions<\/strong><\/h2>\n\n\n\n<p>You can also submit comments and questions on our <a href=\"https:\/\/healthit.gov\/health-it-basics\/video\/mobile-devices-healthcare-challenges-and-expectations-practitioners \">website.<\/a><\/p>\n\n\n\n<p>We look forward to partnering with you to safeguard health information across mobile devices. Please share with us your challenges, successes, and ideas.<\/p>\n\n\n\n<p>Together, we can build a culture where privacy and security are respected and valued to inspire confidence and trust in health IT and electronic health information exchange by protecting the confidentiality, integrity, and availability of health information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>zRecent surveys and research show that the health care sector is rapidly adopting mobile technology, [&hellip;]<\/p>\n","protected":false},"author":619,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_selected_menu":"","_show_breadcrumbs":"true","_blog_show_featured_image":false,"footnotes":""},"categories":[],"archived-category":[],"featured":[],"topics":[438,425,436,437,435],"class_list":["post-2839","post","type-post","status-publish","format-standard","hentry","topics-hipaa-compliance","topics-hit-policy","topics-privacy","topics-security","topics-security-privacy"],"acf":{"blog_authors":[{"blog_author_profiles":"198446"}],"hp_news_hide":false},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.3 (Yoast SEO v24.8.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Mobile Device Security Best Practices for Health Information<\/title>\n<meta name=\"description\" content=\"Want to learn about mobile device security best practices? Register for a free public Mobile Device Roundtable to discuss mobile health information security\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/healthit.gov\/blog\/privacy-and-security\/mobile-device-privacy-and-security-good-practices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Device Privacy and Security Good Practices for Health Information\" \/>\n<meta property=\"og:description\" content=\"Want to learn about mobile device security best practices? Register for a free public Mobile Device Roundtable to discuss mobile health information security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/healthit.gov\/blog\/privacy-and-security\/mobile-device-privacy-and-security-good-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"ONC Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-03-15T20:48:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-05T21:37:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/healthit.gov\/blog\/wp-content\/uploads\/sites\/4\/2025\/08\/ONC.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"sleigh\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"sleigh\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/healthit.gov\/blog\/privacy-and-security\/mobile-device-privacy-and-security-good-practices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/healthit.gov\/blog\/privacy-and-security\/mobile-device-privacy-and-security-good-practices\/\"},\"author\":{\"name\":\"sleigh\",\"@id\":\"https:\/\/healthit.gov\/blog\/#\/schema\/person\/0719592fcc77f0e269f191216da0aae7\"},\"headline\":\"Mobile Device Privacy and Security Good Practices for Health Information\",\"datePublished\":\"2012-03-15T20:48:10+00:00\",\"dateModified\":\"2026-01-05T21:37:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/healthit.gov\/blog\/privacy-and-security\/mobile-device-privacy-and-security-good-practices\/\"},\"wordCount\":542,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/healthit.gov\/blog\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/healthit.gov\/blog\/privacy-and-security\/mobile-device-privacy-and-security-good-practices\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/healthit.gov\/blog\/privacy-and-security\/mobile-device-privacy-and-security-good-practices\/\",\"url\":\"https:\/\/healthit.gov\/blog\/privacy-and-security\/mobile-device-privacy-and-security-good-practices\/\",\"name\":\"Mobile Device Security Best Practices for Health Information\",\"isPartOf\":{\"@id\":\"https:\/\/healthit.gov\/blog\/#website\"},\"datePublished\":\"2012-03-15T20:48:10+00:00\",\"dateModified\":\"2026-01-05T21:37:48+00:00\",\"description\":\"Want to learn about mobile device security best practices? Register for a free public Mobile Device Roundtable to discuss mobile health information security\",\"breadcrumb\":{\"@id\":\"https:\/\/healthit.gov\/blog\/privacy-and-security\/mobile-device-privacy-and-security-good-practices\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/healthit.gov\/blog\/privacy-and-security\/mobile-device-privacy-and-security-good-practices\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/healthit.gov\/blog\/privacy-and-security\/mobile-device-privacy-and-security-good-practices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/healthit.gov\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Device Privacy and Security Good Practices for Health Information\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/healthit.gov\/blog\/#website\",\"url\":\"https:\/\/healthit.gov\/blog\/\",\"name\":\"ONC - Office of the National Coordinator for Health IT\",\"description\":\"Better health enabled by data\",\"publisher\":{\"@id\":\"https:\/\/healthit.gov\/blog\/#organization\"},\"alternateName\":\"ONC\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/healthit.gov\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/healthit.gov\/blog\/#organization\",\"name\":\"ONC - Office of the National Coordinator for Health IT\",\"alternateName\":\"ONC\",\"url\":\"https:\/\/healthit.gov\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/healthit.gov\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/healthit.gov\/blog\/wp-content\/uploads\/sites\/4\/2025\/08\/Logo-ONC-Transparent.png\",\"contentUrl\":\"https:\/\/healthit.gov\/blog\/wp-content\/uploads\/sites\/4\/2025\/08\/Logo-ONC-Transparent.png\",\"width\":800,\"height\":176,\"caption\":\"ONC - Office of the National Coordinator for Health IT\"},\"image\":{\"@id\":\"https:\/\/healthit.gov\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/healthit.gov\/blog\/#\/schema\/person\/0719592fcc77f0e269f191216da0aae7\",\"name\":\"sleigh\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/healthit.gov\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/afb1f0138c0c71ff7a91448bb10269ef95df9b5a5cceb7a5aabd43dd26e1a978?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/afb1f0138c0c71ff7a91448bb10269ef95df9b5a5cceb7a5aabd43dd26e1a978?s=96&d=mm&r=g\",\"caption\":\"sleigh\"},\"url\":\"https:\/\/healthit.gov\/blog\/author\/sleigh\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Mobile Device Security Best Practices for Health Information","description":"Want to learn about mobile device security best practices? Register for a free public Mobile Device Roundtable to discuss mobile health information security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/healthit.gov\/blog\/privacy-and-security\/mobile-device-privacy-and-security-good-practices\/","og_locale":"en_US","og_type":"article","og_title":"Mobile Device Privacy and Security Good Practices for Health Information","og_description":"Want to learn about mobile device security best practices? Register for a free public Mobile Device Roundtable to discuss mobile health information security","og_url":"https:\/\/healthit.gov\/blog\/privacy-and-security\/mobile-device-privacy-and-security-good-practices\/","og_site_name":"ONC Blog","article_published_time":"2012-03-15T20:48:10+00:00","article_modified_time":"2026-01-05T21:37:48+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/healthit.gov\/blog\/wp-content\/uploads\/sites\/4\/2025\/08\/ONC.jpg","type":"image\/jpeg"}],"author":"sleigh","twitter_card":"summary_large_image","twitter_misc":{"Written by":"sleigh","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/healthit.gov\/blog\/privacy-and-security\/mobile-device-privacy-and-security-good-practices\/#article","isPartOf":{"@id":"https:\/\/healthit.gov\/blog\/privacy-and-security\/mobile-device-privacy-and-security-good-practices\/"},"author":{"name":"sleigh","@id":"https:\/\/healthit.gov\/blog\/#\/schema\/person\/0719592fcc77f0e269f191216da0aae7"},"headline":"Mobile Device Privacy and Security Good Practices for Health Information","datePublished":"2012-03-15T20:48:10+00:00","dateModified":"2026-01-05T21:37:48+00:00","mainEntityOfPage":{"@id":"https:\/\/healthit.gov\/blog\/privacy-and-security\/mobile-device-privacy-and-security-good-practices\/"},"wordCount":542,"commentCount":2,"publisher":{"@id":"https:\/\/healthit.gov\/blog\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/healthit.gov\/blog\/privacy-and-security\/mobile-device-privacy-and-security-good-practices\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/healthit.gov\/blog\/privacy-and-security\/mobile-device-privacy-and-security-good-practices\/","url":"https:\/\/healthit.gov\/blog\/privacy-and-security\/mobile-device-privacy-and-security-good-practices\/","name":"Mobile Device Security Best Practices for Health Information","isPartOf":{"@id":"https:\/\/healthit.gov\/blog\/#website"},"datePublished":"2012-03-15T20:48:10+00:00","dateModified":"2026-01-05T21:37:48+00:00","description":"Want to learn about mobile device security best practices? Register for a free public Mobile Device Roundtable to discuss mobile health information security","breadcrumb":{"@id":"https:\/\/healthit.gov\/blog\/privacy-and-security\/mobile-device-privacy-and-security-good-practices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/healthit.gov\/blog\/privacy-and-security\/mobile-device-privacy-and-security-good-practices\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/healthit.gov\/blog\/privacy-and-security\/mobile-device-privacy-and-security-good-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/healthit.gov\/blog\/"},{"@type":"ListItem","position":2,"name":"Mobile Device Privacy and Security Good Practices for Health Information"}]},{"@type":"WebSite","@id":"https:\/\/healthit.gov\/blog\/#website","url":"https:\/\/healthit.gov\/blog\/","name":"ONC - Office of the National Coordinator for Health IT","description":"Better health enabled by data","publisher":{"@id":"https:\/\/healthit.gov\/blog\/#organization"},"alternateName":"ONC","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/healthit.gov\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/healthit.gov\/blog\/#organization","name":"ONC - Office of the National Coordinator for Health IT","alternateName":"ONC","url":"https:\/\/healthit.gov\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/healthit.gov\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/healthit.gov\/blog\/wp-content\/uploads\/sites\/4\/2025\/08\/Logo-ONC-Transparent.png","contentUrl":"https:\/\/healthit.gov\/blog\/wp-content\/uploads\/sites\/4\/2025\/08\/Logo-ONC-Transparent.png","width":800,"height":176,"caption":"ONC - Office of the National Coordinator for Health IT"},"image":{"@id":"https:\/\/healthit.gov\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/healthit.gov\/blog\/#\/schema\/person\/0719592fcc77f0e269f191216da0aae7","name":"sleigh","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/healthit.gov\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/afb1f0138c0c71ff7a91448bb10269ef95df9b5a5cceb7a5aabd43dd26e1a978?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/afb1f0138c0c71ff7a91448bb10269ef95df9b5a5cceb7a5aabd43dd26e1a978?s=96&d=mm&r=g","caption":"sleigh"},"url":"https:\/\/healthit.gov\/blog\/author\/sleigh\/"}]}},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/healthit.gov\/blog\/insights-updates\/mobile-device-privacy-and-security-good-practices\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Mobile Device Privacy and Security Good Practices for Health Information","url":"http:\/\/healthit.gov\/blog\/insights-updates\/mobile-device-privacy-and-security-good-practices\/","mainEntityOfPage":{"@type":"WebPage","@id":"http:\/\/healthit.gov\/blog\/insights-updates\/mobile-device-privacy-and-security-good-practices\/"},"thumbnailUrl":"","image":{"@type":"ImageObject","url":""},"articleSection":"Insights &amp; Updates","author":[{"@type":"Person","name":"sleigh"}],"creator":["sleigh"],"publisher":{"@type":"Organization","name":"ONC Blog","logo":""},"keywords":[],"dateCreated":"2012-03-15T20:48:10Z","datePublished":"2012-03-15T20:48:10Z","dateModified":"2026-01-05T21:37:48Z"},"rendered":"<script type=\"application\/ld+json\" class=\"wp-parsely-metadata\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"NewsArticle\",\"headline\":\"Mobile Device Privacy and Security Good Practices for Health Information\",\"url\":\"http:\\\/\\\/healthit.gov\\\/blog\\\/insights-updates\\\/mobile-device-privacy-and-security-good-practices\\\/\",\"mainEntityOfPage\":{\"@type\":\"WebPage\",\"@id\":\"http:\\\/\\\/healthit.gov\\\/blog\\\/insights-updates\\\/mobile-device-privacy-and-security-good-practices\\\/\"},\"thumbnailUrl\":\"\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"\"},\"articleSection\":\"Insights &amp; Updates\",\"author\":[{\"@type\":\"Person\",\"name\":\"sleigh\"}],\"creator\":[\"sleigh\"],\"publisher\":{\"@type\":\"Organization\",\"name\":\"ONC Blog\",\"logo\":\"\"},\"keywords\":[],\"dateCreated\":\"2012-03-15T20:48:10Z\",\"datePublished\":\"2012-03-15T20:48:10Z\",\"dateModified\":\"2026-01-05T21:37:48Z\"}<\/script>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/healthit.gov\/p.js"},"_links":{"self":[{"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/posts\/2839","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/users\/619"}],"replies":[{"embeddable":true,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/comments?post=2839"}],"version-history":[{"count":11,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/posts\/2839\/revisions"}],"predecessor-version":[{"id":177520,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/posts\/2839\/revisions\/177520"}],"wp:attachment":[{"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/media?parent=2839"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/categories?post=2839"},{"taxonomy":"archived-category","embeddable":true,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/archived-category?post=2839"},{"taxonomy":"featured","embeddable":true,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/featured?post=2839"},{"taxonomy":"topics","embeddable":true,"href":"https:\/\/healthit.gov\/blog\/wp-json\/wp\/v2\/topics?post=2839"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}