{"id":566,"date":"2016-09-19T10:52:57","date_gmt":"2016-09-19T16:52:57","guid":{"rendered":"https:\/\/dsiohn098w.mpqhf.org\/blog\/?p=566"},"modified":"2017-03-28T10:22:17","modified_gmt":"2017-03-28T16:22:17","slug":"hts-mu-security-risk-assessments-needed-mu","status":"publish","type":"post","link":"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu\/","title":{"rendered":"HTS &#8211; MU: Security Risk Assessments Needed for MU"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-579 size-full\" src=\"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-content\/uploads\/2016\/09\/Draft-Banner.png\" alt=\"Draft-Banner\" width=\"1200\" height=\"300\" srcset=\"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-content\/uploads\/2016\/09\/Draft-Banner.png 1200w, https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-content\/uploads\/2016\/09\/Draft-Banner-300x75.png 300w, https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-content\/uploads\/2016\/09\/Draft-Banner-768x192.png 768w, https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-content\/uploads\/2016\/09\/Draft-Banner-1024x256.png 1024w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<h1>MU: Security Risk Assessments Needed for Meaningful Use<\/h1>\n<h5>September 19, 2016<\/h5>\n<h6>Written by Patty Kosednar<\/h6>\n<p>Hey everyone, this is just a friendly reminder that a security risk assessment is required as part of meaningful use (MU) for EVERY reporting year.\u00a0 Below is text regarding this requirement from the <a href=\"https:\/\/www.cms.gov\/Regulations-and-Guidance\/Legislation\/EHRIncentivePrograms\/Downloads\/2016_SecurityRiskAnalysis.pdf\" target=\"_blank\">CMS Security Risk Analysis Tip Sheet<\/a>.<\/p>\n<p>\u201cConducting a security risk analysis (SRA) is required when certified EHR technology is adopted in the first reporting year. \u00a0In subsequent reporting years, or when changes to the practice or electronic systems occur, a review must be conducted. \u00a0It is acceptable for the security risk analysis to be conducted outside the EHR reporting period.\u00a0 However, the analysis must be conducted for the certified EHR technology used during the EHR reporting period and the analysis or review must be conducted on an annual basis prior to the date of attestation. In other words, the provider must conduct a unique analysis or review applicable for the EHR reporting period and the scope of the analysis or review must include the full EHR reporting period. \u00a0Any security updates and deficiencies that are identified in the review should be included in the provider\u2019s risk management process and implemented or corrected as dictated by that process\u201d<\/p>\n<p><strong>Resource Link<\/strong><\/p>\n<p><a href=\"https:\/\/www.cms.gov\/Regulations-and-Guidance\/Legislation\/EHRIncentivePrograms\/Downloads\/2016_SecurityRiskAnalysis.pdf\" target=\"_blank\">CMS SRA Tip Sheet<\/a><\/p>\n<p>If you need assistance or have questions regarding the requirements of the MU SRA, please contact my HTS colleague, Susan Clarke, who is a certified Health Care Information Security and Privacy Practitioner at 307-248-8179 or visit our HTS <a href=\"http:\/\/www.mpqhf.org\/corporate\/health-and-technology-services\/hipaa-privacy-and-security\/\" target=\"_blank\">HIPAA Privacy and Security<\/a> web page.<\/p>\n<p><strong>HIPAA Readiness Quiz<\/strong><\/p>\n<div>Are you 100% confident in your organization\u2019s HIPAA compliance efforts?\u00a0 Take our short HIPAA Readiness Quiz to find out. \u00a0Take the <style type=\"text\/css\">#AnythingPopup_BoxContainer14\t{width:450px;height:175px;max-width:80%;background:#FFFFFF;border:1px solid #FFFFFF;padding:0;position:fixed;z-index:99999;cursor:default;-moz-border-radius: 10px;-webkit-border-radius: 10px;-khtml-border-radius: 10px;border-radius: 10px;   display:none;} #AnythingPopup_BoxContainerHeader14 {height:30px;background:#00539B;border-top-right-radius:10px;-moz-border-radius-topright:10px;-webkit-border-top-right-radius:10px;-khtml-border-top-right-radius: 10px;border-top-left-radius:10px;-moz-border-radius-topleft:10px;-webkit-border-top-left-radius:10px;-khtml-border-top-left-radius: 10px;} #AnythingPopup_BoxContainerHeader14 a {color:#FFFFFF;font-family:Verdana,Arial;font-size:10pt;font-weight:bold;} #AnythingPopup_BoxTitle14 {float:left; margin:5px;color:#FFFFFF;font-family:Verdana,Arial;font-size:12pt;font-weight:bold;} #AnythingPopup_BoxClose14 {float:right;width:50px;margin:5px;} #AnythingPopup_BoxContainerBody14 {margin:10px;overflow:auto;height:115px;} #AnythingPopup_BoxContainerFooter14 {position: fixed;top:0;left:0;bottom:0;right:0;opacity: .3;-moz-opacity: .3;filter: alpha(opacity=30);z-index:999;display:none;} <\/style><a href='javascript:AnythingPopup_OpenForm(\"AnythingPopup_BoxContainer14\",\"AnythingPopup_BoxContainerBody14\",\"AnythingPopup_BoxContainerFooter14\",\"450\",\"175\");'>HIPAA Readiness Quiz<\/a><div style=\"display: none;\" id=\"AnythingPopup_BoxContainer14\"><div id=\"AnythingPopup_BoxContainerHeader14\"><div id=\"AnythingPopup_BoxTitle14\">You are leaving our site.<\/div><div id=\"AnythingPopup_BoxClose14\"><a href=\"javascript:AnythingPopup_HideForm('AnythingPopup_BoxContainer14','AnythingPopup_BoxContainerFooter14');\">Close<\/a><\/div><\/div><div id=\"AnythingPopup_BoxContainerBody14\">Mountain-Pacific guarantees neither the authenticity, accuracy, appropriateness nor security of the link, website or content.\r<br \/>\r<br \/><a href=\"http:\/\/quiz.hipaaone.com\/hts\/index.html\" target=\"_blank\">Click to continue.<\/a>\r<br \/><\/div><\/div><div style=\"display: none;\" id=\"AnythingPopup_BoxContainerFooter14\"><\/div> Now.<\/div>\n<p><strong>Other Resource Links<\/strong><\/p>\n<p><a href=\"http:\/\/www.mpqhf.org\/corporate\/health-and-technology-services\/meaningful-use\/\" target=\"_blank\">HTS MU Resources<\/a><\/p>\n<p><a href=\"https:\/\/www.cms.gov\/Regulations-and-Guidance\/Legislation\/EHRIncentivePrograms\/index.html\" target=\"_blank\">CMS EHR Incentive Program website<\/a><\/p>\n<p>Leave a reply, ask a question or share information using the \u201cLeave a Reply\u201d section below, or email <a href=\"mailto:pkosednar@mpqhf.org?subject=MU Blog Website\" target=\"_blank\">Patty Kosednar<\/a> directly with your questions or comments.<\/p>\n<p><a href=\"https:\/\/dsiohn098w.mpqhf.org\/blog\/mu\/\" target=\"_blank\">Read all previous posts<\/a><\/p>\n<p><a href=\"https:\/\/dsiohn098w.mpqhf.org\/blog\/pqrs\/\" target=\"_blank\">See PQRS Blog<\/a><\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n<p><strong>Subscribe to the HTS Meaningful Use Blog<\/strong><br \/>\n<a href=\"http:\/\/eepurl.com\/b-xSTj\" class=\"su-button su-button-style-flat\" style=\"color:#ffffff;background-color:#385173;border-color:#2d415c;border-radius:5px\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"color:#ffffff;padding:0px 30px;font-size:22px;line-height:44px;border-color:#74869d;border-radius:5px;text-shadow:0px 0px 0px #f4f4f4\"> Subscribe<\/span><\/a>\n<p>&nbsp;<\/p>\n<hr \/>\n<div id=\"boxzero\">\n<section id=\"boxone\">\n<p id=\"boxparagraph\"><strong>See a list of upcoming webinars<\/strong><\/p>\n<p><a href=\"http:\/\/www.mpqhf.org\/corporate\/health-and-technology-services\/upcoming-webinars\/\"><span class=\"link-spanner\">See a list of upcoming webinars<\/span><\/a><br \/>\n<\/section>\n<section id=\"boxtwo\">\n<p id=\"boxparagraph\"><strong>Check out any webinars you missed<\/strong><\/p>\n<p><a href=\"http:\/\/www.mpqhf.org\/corporate\/health-and-technology-services\/webinar-materials\/\"><span class=\"link-spanner\">Check out any webinars you missed<\/span><\/a><br \/>\n<\/section>\n<aside id=\"boxthree\">\n<p id=\"boxparagraph\"><strong>See our MU resources<\/strong><\/p>\n<p><a href=\"http:\/\/www.mpqhf.org\/corporate\/health-and-technology-services\/meaningful-use\/\"><span class=\"link-spanner\">See our MU resources<\/span><\/a><br \/>\n<\/aside>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>MU: Security Risk Assessments Needed for Meaningful Use September 19, 2016 Written by Patty Kosednar Hey everyone, this is just a friendly reminder that a security risk assessment is required as part of meaningful use (MU) for EVERY reporting year.\u00a0 Below is text regarding this requirement from the CMS Security Risk Analysis Tip Sheet. \u201cConducting [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":180,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[136],"tags":[14,26,7,6,113,64],"class_list":{"0":"post-566","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-meaningful-use-2016","8":"tag-ehr","9":"tag-hipaa","10":"tag-meaningful-use","11":"tag-mu","12":"tag-security-risk-analysis","13":"tag-sra","14":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>HTS - MU: Security Risk Assessments Needed for MU - Mountain Pacific Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"HTS - MU: Security Risk Assessments Needed for MU - Mountain Pacific Blog\" \/>\n<meta property=\"og:description\" content=\"MU: Security Risk Assessments Needed for Meaningful Use September 19, 2016 Written by Patty Kosednar Hey everyone, this is just a friendly reminder that a security risk assessment is required as part of meaningful use (MU) for EVERY reporting year.\u00a0 Below is text regarding this requirement from the CMS Security Risk Analysis Tip Sheet. \u201cConducting [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu\/\" \/>\n<meta property=\"og:site_name\" content=\"Mountain Pacific Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-19T16:52:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-03-28T16:22:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-content\/uploads\/2016\/07\/1-Thumbnail.png\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Dale Applegate\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dale Applegate\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu\/\",\"url\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu\/\",\"name\":\"HTS - MU: Security Risk Assessments Needed for MU - Mountain Pacific Blog\",\"isPartOf\":{\"@id\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-content\/uploads\/2016\/07\/1-Thumbnail.png\",\"datePublished\":\"2016-09-19T16:52:57+00:00\",\"dateModified\":\"2017-03-28T16:22:17+00:00\",\"author\":{\"@id\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/#\/schema\/person\/8242c32ae4d347d6d34fedf54fe5b348\"},\"breadcrumb\":{\"@id\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu\/#primaryimage\",\"url\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-content\/uploads\/2016\/07\/1-Thumbnail.png\",\"contentUrl\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-content\/uploads\/2016\/07\/1-Thumbnail.png\",\"width\":200,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"HTS &#8211; MU: Security Risk Assessments Needed for MU\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/#website\",\"url\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/\",\"name\":\"Mountain Pacific Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/#\/schema\/person\/8242c32ae4d347d6d34fedf54fe5b348\",\"name\":\"Dale Applegate\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6498a62b7e7415e8adb03ec6eb186bd8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6498a62b7e7415e8adb03ec6eb186bd8?s=96&d=mm&r=g\",\"caption\":\"Dale Applegate\"},\"url\":\"https:\/\/dsiohn098w.mpqhf.org\/blog\/author\/dale_admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"HTS - MU: Security Risk Assessments Needed for MU - Mountain Pacific Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu\/","og_locale":"en_US","og_type":"article","og_title":"HTS - MU: Security Risk Assessments Needed for MU - Mountain Pacific Blog","og_description":"MU: Security Risk Assessments Needed for Meaningful Use September 19, 2016 Written by Patty Kosednar Hey everyone, this is just a friendly reminder that a security risk assessment is required as part of meaningful use (MU) for EVERY reporting year.\u00a0 Below is text regarding this requirement from the CMS Security Risk Analysis Tip Sheet. \u201cConducting [&hellip;]","og_url":"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu\/","og_site_name":"Mountain Pacific Blog","article_published_time":"2016-09-19T16:52:57+00:00","article_modified_time":"2017-03-28T16:22:17+00:00","og_image":[{"width":200,"height":200,"url":"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-content\/uploads\/2016\/07\/1-Thumbnail.png","type":"image\/png"}],"author":"Dale Applegate","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dale Applegate","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu\/","url":"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu\/","name":"HTS - MU: Security Risk Assessments Needed for MU - Mountain Pacific Blog","isPartOf":{"@id":"https:\/\/dsiohn098w.mpqhf.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu\/#primaryimage"},"image":{"@id":"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu\/#primaryimage"},"thumbnailUrl":"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-content\/uploads\/2016\/07\/1-Thumbnail.png","datePublished":"2016-09-19T16:52:57+00:00","dateModified":"2017-03-28T16:22:17+00:00","author":{"@id":"https:\/\/dsiohn098w.mpqhf.org\/blog\/#\/schema\/person\/8242c32ae4d347d6d34fedf54fe5b348"},"breadcrumb":{"@id":"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu\/#primaryimage","url":"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-content\/uploads\/2016\/07\/1-Thumbnail.png","contentUrl":"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-content\/uploads\/2016\/07\/1-Thumbnail.png","width":200,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/dsiohn098w.mpqhf.org\/blog\/hts-mu-security-risk-assessments-needed-mu\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dsiohn098w.mpqhf.org\/blog\/"},{"@type":"ListItem","position":2,"name":"HTS &#8211; MU: Security Risk Assessments Needed for MU"}]},{"@type":"WebSite","@id":"https:\/\/dsiohn098w.mpqhf.org\/blog\/#website","url":"https:\/\/dsiohn098w.mpqhf.org\/blog\/","name":"Mountain Pacific Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dsiohn098w.mpqhf.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/dsiohn098w.mpqhf.org\/blog\/#\/schema\/person\/8242c32ae4d347d6d34fedf54fe5b348","name":"Dale Applegate","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dsiohn098w.mpqhf.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6498a62b7e7415e8adb03ec6eb186bd8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6498a62b7e7415e8adb03ec6eb186bd8?s=96&d=mm&r=g","caption":"Dale Applegate"},"url":"https:\/\/dsiohn098w.mpqhf.org\/blog\/author\/dale_admin\/"}]}},"_links":{"self":[{"href":"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-json\/wp\/v2\/posts\/566"}],"collection":[{"href":"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-json\/wp\/v2\/comments?post=566"}],"version-history":[{"count":0,"href":"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-json\/wp\/v2\/posts\/566\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-json\/wp\/v2\/media\/180"}],"wp:attachment":[{"href":"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-json\/wp\/v2\/media?parent=566"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-json\/wp\/v2\/categories?post=566"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dsiohn098w.mpqhf.org\/blog\/wp-json\/wp\/v2\/tags?post=566"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}