{"id":6978,"date":"2022-10-21T10:00:14","date_gmt":"2022-10-21T10:00:14","guid":{"rendered":"https:\/\/test.hypnotes.net\/blog\/?p=6978"},"modified":"2023-09-16T12:23:16","modified_gmt":"2023-09-16T20:23:16","slug":"what-is-protected-health-information-phi-hipaa","status":"publish","type":"post","link":"https:\/\/hypnotes.net\/blog\/what-is-protected-health-information-phi-hipaa\/","title":{"rendered":"What is Protected Health Information (PHI) and HIPAA?"},"content":{"rendered":"\n<p>Every time we go to the hospital for a medical checkup, book an appointment with a specialist, pay medical bills, etc., it all goes into our medical records. These activities are all private data that should be protected. In a world where data is the new gold, we need to understand how personal health data is protected.<\/p>\n\n\n\n<p>In this article, we will highlight the importance of data privacy and organizations that protect health information. Also, we will talk about what type of information is considered&nbsp;<strong>protected health information<\/strong>, how to avoid privacy violations, and the different ways we store&nbsp;<strong>PHI<\/strong>&nbsp;nowadays.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/test.hypnotes.net\/blog\/wp-content\/uploads\/2022\/12\/featured-image-practice-management-software-features-and-benefits-1024x536.jpg\" alt=\"Practice Management Software (PMS) Features and Benefits - Hypnotes\" class=\"wp-image-6984\" srcset=\"https:\/\/hypnotes.net\/blog\/wp-content\/uploads\/2022\/12\/featured-image-practice-management-software-features-and-benefits-1024x536.jpg 1024w, https:\/\/hypnotes.net\/blog\/wp-content\/uploads\/2022\/12\/featured-image-practice-management-software-features-and-benefits-300x157.jpg 300w, https:\/\/hypnotes.net\/blog\/wp-content\/uploads\/2022\/12\/featured-image-practice-management-software-features-and-benefits-768x402.jpg 768w, https:\/\/hypnotes.net\/blog\/wp-content\/uploads\/2022\/12\/featured-image-practice-management-software-features-and-benefits-1536x804.jpg 1536w, https:\/\/hypnotes.net\/blog\/wp-content\/uploads\/2022\/12\/featured-image-practice-management-software-features-and-benefits-24x13.jpg 24w, https:\/\/hypnotes.net\/blog\/wp-content\/uploads\/2022\/12\/featured-image-practice-management-software-features-and-benefits-36x19.jpg 36w, https:\/\/hypnotes.net\/blog\/wp-content\/uploads\/2022\/12\/featured-image-practice-management-software-features-and-benefits-48x25.jpg 48w, https:\/\/hypnotes.net\/blog\/wp-content\/uploads\/2022\/12\/featured-image-practice-management-software-features-and-benefits.jpg 2000w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Definitions-Related-Protected-Health-Information-(Phi)-Hipaa\"><span class=\"ez-toc-section\" id=\"Definitions_Related_Protected_Health_Information_Phi-Hipaa\"><\/span>Definitions Related Protected Health Information (Phi)-Hipaa<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>According to the&nbsp;<strong>HIPAA<\/strong>&nbsp;rule,&nbsp;<strong>Protected Health Information<\/strong>&nbsp;(<strong>PHI<\/strong>) is simply the identifiable health information of an individual. Identifiable health information of an individual is the Personally Identifiable Information&nbsp;<strong>(PII)<\/strong> on a person\u2019s medical record obtained while interacting with a covered entity.<\/p>\n\n\n\n<p>There is also Electronic Protected Health Information <strong>(EPHI)<\/strong>&nbsp;which is PHI stored, sent, and created in electronic form. HIPAA is a US law to protect&nbsp;<strong>protected health information<\/strong>. As we go forward, you will learn more about&nbsp;<strong>PHI HIPAA&nbsp;<\/strong>and how HIPAA helps avoid data breaches in the health sector.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"what-is-hipaa-law\">What is HIPAA Law? (Health Insurance Portability And Accountability Act)<\/h3>\n\n\n\n<p>HIPAA stands for Health Insurance Portability and Accountability Act, and it is federal legislation created by the government to protect the sensitive&nbsp;<strong>medical records<\/strong>&nbsp;of people.&nbsp;<strong>HIPAA law protects<\/strong>&nbsp;patients&#8217; information from being disclosed even without their consent. HIPAA Privacy law was passed in 1996, with the&nbsp;<strong>HIPAA primary purpose<\/strong>&nbsp;of creating national standards that will help prevent privacy or data breach.<\/p>\n\n\n\n<p><strong>Medical records<\/strong>, billing plans, and other&nbsp;<strong>protected health information<\/strong>&nbsp;are required by doctors, coding\/billing companies, <strong>healthcare professionals, healthcare organizations, health insurance companies, etc.<\/strong>&nbsp;HIPAA&nbsp;Privacy law provides a privacy standard to protect patients\u2019 data. To implement the requirements of HIPAA, the&nbsp;<strong>HIPAA Privacy Rule<\/strong>&nbsp;was issued by&nbsp;<a href=\"https:\/\/www.hhs.gov\/\" target=\"_blank\" rel=\"noreferrer noopener\">The US Department of Health and Services.<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/hypnotes.net\/static\/blog\/blog9\/hipaa-health-portability-and-accountability-act-image.jpg\" alt=\"HIPAA - Health Insurance Portability and Accountability Act image\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">The Privacy Rule of HIPAA<\/h4>\n\n\n\n<p>There are individuals, organizations, and agencies known as &#8216;covered&nbsp;<strong>entities<\/strong>, and they are anyone in&nbsp;<strong>health care<\/strong>&nbsp;that provides treatment, payment, and operations. The&nbsp;<strong>Privacy Rule<\/strong>&nbsp;was issued to regulate the use and disclosure of<strong>&nbsp;personal health information<\/strong>&nbsp;by a covered&nbsp;<strong>entity<\/strong>. The goal of&nbsp;the <strong>HIPAA medical privacy rule<\/strong>&nbsp;is to ensure that health information is protected and allow the free flow of health information needed by covered entities to improve healthcare.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"How-to-Become-HIPAA-Compliant?\">How to Become HIPAA-Compliant?<\/h4>\n\n\n\n<p>Being HIPAA compliant is important if you want to work with data or do business in the healthcare sector. Also, being&nbsp;HIPAA compliant means, you understand the following;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>-What HIPAA stands for<\/li>\n\n\n\n<li>-Strictly adhere to the Personal health information Act<\/li>\n\n\n\n<li>-You can prove to healthcare organizations that you have Implemented necessary measures to ensure the privacy of personal health information,<\/li>\n\n\n\n<li>-Maintain the integrity, provision, and confidentiality of any&nbsp;<strong>protected health information<\/strong>&nbsp;given access.<\/li>\n<\/ul>\n\n\n\n<p>The US Department of Health and Human Services Office for Civil Rights has condensed the full text of HIPAA (45 CFR Parts 160, 162, and 164) into 115 pages for businesses to apply if they want to become HIPAA&nbsp;compliant. There are penalties for HIPAA violations or breaches of&nbsp;<strong>patient privacy.<\/strong><\/p>\n\n\n\n<p>The&nbsp;<strong>HIPAA Compliance Checklist<\/strong>&nbsp;is a good starting point for a&nbsp;<strong>business<\/strong>&nbsp;that wants to provide services in the healthcare industry. The checklist helps businesses access the policies and safety measures to become HIPAA compliant. Some third-party HIPPA solution providers know&nbsp;<strong>all about HIPAA<\/strong>&nbsp;and help businesses confirm that their policies and methods do not violate&nbsp;HIPAA rules.<\/p>\n\n\n\n<p>To become&nbsp;<strong>HIPAA<\/strong>&nbsp;compliant, there are 4 rules that must be adhered to. These rules include;-HIPAA Privacy Rule-HIPAA Security Rule-HIPAA Enforcement Rule-HIPAA Breach Notification Rule<\/p>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"HIPAA-Privacy-Rule\">HIPAA Privacy Rule<\/h5>\n\n\n\n<p>The HIPAA privacy rules are laid down by federal guidelines created by the<strong>&nbsp;government&nbsp;<\/strong>to protect&nbsp;<strong>the privacy of health information<\/strong>. The&nbsp;<strong>HIPAA privacy rule regulates how protected covered entities access health information. Healthcare privacy rules<\/strong>&nbsp;are essential to prevent the misuse of data by&nbsp;<strong>phi healthcare providers.<\/strong>&nbsp;For example,&nbsp;<strong>billing information is protected under HIPAA<\/strong>.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"HIPAA-Security-Rule\">HIPAA Security Rule<\/h5>\n\n\n\n<p>The Security Rule is a subset of the Privacy Rule and applies to&nbsp;<strong>Protected health information<\/strong>. HIPAA security rule protects&nbsp;protected health information from external threats. The Security Rule charges covered entities to implement technical, physical, and administrative safety measures to safeguard&nbsp;<strong>protected health information<\/strong>. For example, physical safety measures require storing&nbsp;<strong>protected health information<\/strong>&nbsp;in a safe environment.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"HIPAA-Enforcement-Rule\">HIPAA Enforcement Rule<\/h5>\n\n\n\n<p>HIPAA Enforcement Rule spells out investigations, procedures, and penalties for violating HIPAA rules.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\" id=\"HIPAA-Breach-Notification-Rule\">HIPAA Breach Notification Rule<\/h5>\n\n\n\n<p>The final rule that must be followed is the HIPAA Breach Notification Rule which requires that when there is a breach affecting more than 50 people, covered entities should report it to the Human Health Services (HHS).<\/p>\n\n\n\n<p>The&nbsp;<a href=\"https:\/\/www.hipaajournal.com\/become-hipaa-compliant\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">HIPAA Journal<\/a>&nbsp;will help you learn more about how to become HIPAA Compliant.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"What-is-The-Meaning-Of-PHI?\">What is The Meaning Of PHI?<\/h3>\n\n\n\n<p><strong>PHI meaning in healthcare<\/strong> refers to personal information like Demographic location, physical and mental history, blood work and test results, insurance plan, and other relevant information of an individual that is obtained by a medical professional to identify that individual and to administer care.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/hypnotes.net\/static\/blog\/blog9\/protected-health-information-meaning-image.jpg\" alt=\"PHI-protected health information meaning image\"\/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">What is The Protected Health Information Under HIPAA?<\/h4>\n\n\n\n<p>Under&nbsp;the<strong> HIPAA Protected Health Information definition<\/strong>, goes beyond the personally identifiable information of an individual.&nbsp;<strong>HIPAA<\/strong>&nbsp;stands for Health Insurance Portability and Accountability Act, and it is a federal law by the US government that ensures the use, transit, and disclosure of&nbsp;<strong>PHI data.<\/strong>&nbsp;The&nbsp;<strong>definition of PHI under HIPAA&nbsp;<\/strong>states that phi is personally identifiable information (PII) that can be used to describe a person&#8217;s medical condition at any point in time.<\/p>\n\n\n\n<p><strong>Protected health information under HIPAA<\/strong>&nbsp;refers to the person&#8217;s medical records, name, and location.&nbsp;<strong>PHI and PII meaning&nbsp;<\/strong>relate to one another, and their examples are similar.&nbsp;<strong>Examples of PHI under HIPAA<\/strong>&nbsp;are names, email addresses, SSN, etc. Also, all&nbsp;<strong>PHI data<\/strong>&nbsp;that can be used to identify a person&#8217;s medical record is known as an identifier. <strong>HIPAA Protected Health Information identifiers<\/strong>&nbsp;cannot be regarded as PHI if they link to an individual&#8217;s medical record.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"Are-PHI-PII-and-IIHA-the-Same?\">Are PHI, PII, and IIHA the Same?<\/h3>\n\n\n\n<p>No, they are not all the same.&nbsp;<strong>PHI<\/strong>&nbsp;stands for&nbsp;Protected Health<strong>&nbsp;Information<\/strong>, and it is a term used in the context of healthcare.&nbsp;<strong>PII<\/strong>&nbsp;stands for Personal Identifiable Information. It is a piece of information like a passport used to identify an individual. PII is not a term used in the context of healthcare, and it may not be considered&nbsp;PHI.<strong>&nbsp;IIHA<\/strong>&nbsp;stands for Individually Identifiable Health, and it is similar to PHI. Therefore,&nbsp;<strong>PHI and PII&nbsp;<\/strong>information is not the same, but PHI and IIHA mean the same.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/hypnotes.net\/static\/blog\/blog9\/difference-between-phi-and-pii-protected-health-information-and-personel-identifiable-information-image.jpg\" alt=\"Difference between protected health information (phi) and personal identifiable information (pii) image \"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"What-is-ePHI-Electronic-Protected-Health-Information?\">What is ePHI Electronic Protected Health Information?<\/h3>\n\n\n\n<p>Electronic Protected Health Information has simply Protected<strong> Health Information<\/strong>&nbsp;(PHI) in electronic form.&nbsp;<strong>ePHI is defined as<\/strong>&nbsp;data that is produced, saved, and transmitted electronically.&nbsp;<strong>HIPAA electronic Protected Health Information (ePHI)<\/strong>&nbsp;is covered under the&nbsp;<a href=\"https:\/\/www.hipaajournal.com\/become-hipaa-compliant\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">HIPAA rule<\/a>&nbsp;of 1996, and there are penalties for violation<\/p>\n\n\n\n<p>Individuals, Organizations that work with&nbsp;<strong>ePHI data<\/strong>&nbsp;are also referred to as covered entities.&nbsp;HIPAA Security rule guidelines must be followed when handling&nbsp;ePHI. The integrity, confidentiality, availability, and&nbsp;<strong>ePHI security<\/strong>&nbsp;are handled by covered entities, and they must do this following HIPAA security.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">What is Considered ePHI or PHI?<\/h4>\n\n\n\n<p>Looking at both abbreviations, it is easier to assume what type of information to consider as&nbsp;<strong>PHI and ePHI<\/strong>&nbsp;but it is not as straightforward as it looks. In order to create a HIPAA compliance program, It is important for organizations to know what&nbsp;<strong>ePHI \/PHI<\/strong>&nbsp;is about and where it resides.<\/p>\n\n\n\n<p>To<strong>&nbsp;define PHI in healthcare<\/strong>&nbsp;means Individually Identifiable personal information, a subset of health information that can be used to identify an individual. It includes;- Demographic information collected from an individual.- The information relates to the physical and mental condition of an individual presently, in the past, and in the future- An individual\u2019s provision of health care and payment for health care can be used to identify an individual.<\/p>\n\n\n\n<p>Depending on the context in which a piece of information is being sent, the means of communicating used may be considered a PHI or not. For example, A company sends out emails to employees with a health condition. The email is considered a PHI because it can be used to identify employees with that health condition. In another example, when a healthcare provider sends an email to a business associate that does not contain any protected health information that can be tied to anyone, that email cannot be considered a PHI.<\/p>\n\n\n\n<p>Looking at ePHI,&nbsp;<strong>ePHI definition<\/strong>&nbsp;is straightforward.<strong>&nbsp;protected health information includes; PHI<\/strong>&nbsp;transmitted by electronic media or maintained in electronic media; hence the name&nbsp;<strong>electronic PHI<\/strong>.<\/p>\n\n\n\n<p><strong>The Privacy Rule<\/strong>&nbsp;contains a list of 18 identifiers for data de-identification; according to some, these identifiers are considered to be PHI. The main focus should be the context in which the identifiers are being used, especially if there is a reasonable reason to believe an individual can be identified using the information.<\/p>\n\n\n\n<p>When considering what PHI or ePHI is, it is not enough to look at just PHI meaning,&nbsp;<strong>electronic protected health definition, ePHI meaning<\/strong>, or what<strong>&nbsp;ePHI information<\/strong>&nbsp;is about. One important aspect to always look out for is the context in which the information is being used. Without a clear understanding of what data is considered PHI\/ePHIi, covered entities are at risk of violating the HIPAA rule<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Protected-Health-Information-Identifiers-List-of-18-PHI-Identifiers\"><span class=\"ez-toc-section\" id=\"Protected_Health_Information_Identifiers_%E2%80%93_List_of_18_PHI_Identifiers\"><\/span>Protected Health Information Identifiers &#8211; List of 18 PHI Identifiers<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>An identifier is a piece of information that can be used to identify an individual, and if the identifier is used in conjunction with an individual\u2019s health condition, then the identifier becomes&nbsp;<strong>protected health information<\/strong>. There are 18&nbsp;<strong>protected health information<\/strong>&nbsp;identifiers as listed by HIPAA.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Name<\/li>\n\n\n\n<li>The address includes street address, including street address, city, county, and zip code.<\/li>\n\n\n\n<li>All elements (except years) of dates related to an individual (including birthdate, admission date, discharge date, date of death, and exact age if over 89)<\/li>\n\n\n\n<li>Telephone numbers<\/li>\n\n\n\n<li>Fax number<\/li>\n\n\n\n<li>Email address<\/li>\n\n\n\n<li>Social Security Number<\/li>\n\n\n\n<li>Health plan beneficiary number<\/li>\n\n\n\n<li>Account number<\/li>\n\n\n\n<li>Certificate or license number<\/li>\n\n\n\n<li>Vehicle identifiers and serial numbers, including license plate numbers<\/li>\n\n\n\n<li>Device identifiers and serial numbers.<\/li>\n\n\n\n<li>Web URL<\/li>\n\n\n\n<li>Internet Protocol (IP) Address<\/li>\n\n\n\n<li>Finger or voice print<\/li>\n\n\n\n<li>Any other characteristics that could uniquely identify the individual<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Examples_of_PHI\"><\/span>Examples of PHI<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Any information in a medical record that can be used to identify an individual has protected health information. Also, when providing health care, any information created, disclosed, or used by a covered entity or business associate is another example of&nbsp;<strong>protected health information<\/strong>.&nbsp;<strong>PHI examples&nbsp;<\/strong>include all the identifiers listed above. Other types of&nbsp;<strong>PHI examples&nbsp;<\/strong>include different forms of communication or documents that can identify the health or mental condition of someone at any point in time. They include;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Doctors or Hospital Billing information<\/li>\n\n\n\n<li>An email from your doctor&#8217;s office about a medication or prescription you need<\/li>\n\n\n\n<li> Appointment scheduling note with your doctor&#8217;s office<\/li>\n\n\n\n<li>MRI scan- Blood test results- Phone records<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Examples-of-Things-Not-Considered-to-Be-PHI\"><span class=\"ez-toc-section\" id=\"Examples_of_Things_Not_Considered_to_Be_PHI\"><\/span>Examples of Things Not Considered to Be PHI<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>As you would have imagined, does it mean when a covered entity like a doctor calls out the name of a patient, then the doctor just violated a privacy rule? The answer is No because not all&nbsp;<strong>personally identifiable information (PII)<\/strong>&nbsp;is&nbsp;<strong>protected health information (PHI)<\/strong>. As long as the information does not link to an individual\u2019s health record, it cannot be&nbsp;<strong>protected health information<\/strong>.<\/p>\n\n\n\n<p>For example, employment records of a hospital are not considered&nbsp;<strong>PHI<\/strong>&nbsp;because it does not link to an employee&#8217;s medical records even if the employment records contain<strong>&nbsp;personally identifiable information<\/strong>&nbsp;about the employee.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"What-is-a-Covered-Entity-Under-HIPAA?\"><span class=\"ez-toc-section\" id=\"What_is_a_Covered_Entity_Under_HIPAA\"><\/span>What is a Covered Entity Under HIPAA?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The objective of HIPAA is to protect the privacy of personal health information; all covered entities must comply with the rules of&nbsp;HIPAA and maintain the privacy of <strong>protected health information<\/strong>. Business associates and covered entities are also under the rule of HIPAA.<\/p>\n\n\n\n<p>When a covered entity engages a business associate to help carry out its duties, there should be a clear arrangement and documentation of what the business associate will be handling, and all activities must be in line with the HIPAA rule. As mentioned earlier, there are features under the&nbsp;HIPAA that will make an organization, individual, or agency considered a covered entity.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"Covered-Entity-Examples\">Covered Entity Examples<\/h3>\n\n\n\n<p>As mentioned earlier, <strong>covered entities<\/strong>&nbsp;can be organizations, individuals, or agencies that work with health information and are subject to the Privacy Rule. Examples of Covered Entities are;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Hospital Care Providers<\/h4>\n\n\n\n<p>Hospital workers work with&nbsp;<strong>protected health information<\/strong>&nbsp;to improve health and provide health care. These include providers such as:<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Doctors<\/li>\n\n\n\n<li>Clinics<\/li>\n\n\n\n<li><a href=\"https:\/\/hypnotes.net\/blog\/how-to-become-therapist\">Therapists<\/a><\/li>\n\n\n\n<li>Psychologists<\/li>\n\n\n\n<li><a href=\"https:\/\/hypnotes.net\/blog\/how-to-become-hypnotherapist\">Hypnotherapists<\/a><\/li>\n<\/ul>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<ul class=\"wp-block-list\">\n<li>Dentists<\/li>\n\n\n\n<li>Chiropractors<\/li>\n\n\n\n<li>Nursing Homes<\/li>\n\n\n\n<li>Pharmacies<\/li>\n<\/ul>\n<\/div>\n<\/div>\n\n\n\n<h4 class=\"wp-block-heading\">Health Plan<\/h4>\n\n\n\n<p>This includes:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Health insurance companies<\/li>\n\n\n\n<li>Health Maintenance Organizations<\/li>\n\n\n\n<li>Company health plans<\/li>\n\n\n\n<li>Government programs health care plans, such as Medicare, Medicaid, and other plans for military personnel and veterans of war.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Healthcare Clearinghouse<\/h4>\n\n\n\n<p>Healthcare clearinghouses are entities that check medical claims by healthcare providers and ensure payment is processed by the insurance. They act as the middleman between healthcare providers and insurance. They are HIPAA compliant and must not transfer&nbsp;<strong>personal health information&nbsp;<\/strong>to payers, providers, and other business associates.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"What-is-Permitted-to-Use-and-Disclose?\"><span class=\"ez-toc-section\" id=\"What_is_Permitted_to_Use_and_Disclose\"><\/span>What is Permitted to Use and Disclose?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Healthcare is essentially fueled by information. Also, healthcare providers like doctors and medical personnel use the information to provide healthcare, improve the quality of healthcare, etc. Other covered entities also need the information to process billing plans and quotations. The quicker it is to access information, the faster and better healthcare provision will be.<\/p>\n\n\n\n<p>There has been confusion by covered entities on when to share&nbsp;<strong>protected health information<\/strong>.&nbsp;<a href=\"https:\/\/www.healthit.gov\/\" target=\"_blank\" rel=\"noreferrer noopener\">The U.S. Department of Health and Human Services (HHS), Office of the National Coordinator for Health IT (ONC)<\/a>, and the&nbsp;<a href=\"https:\/\/www.hhs.gov\/ocr\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\">Office for Civil Rights (OCR)<\/a>&nbsp;has proffered to solve the confusion by creating fact sheets on when to share<strong>&nbsp;identifiable health information.<\/strong><\/p>\n\n\n\n<p>One fact sheet is that&nbsp;protected health information can be shared between covered entities as long as it falls under the HIPAA definition of \u2018health care operations\u2019. Another fact sheet when&nbsp;protected health information can be shared is that it must be for healthcare provision or treatment. Nevertheless, sharing information must comply with the HIPAA Privacy and Security Rules.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"How-should-Protected-Health-Information-be-Stored?\"><span class=\"ez-toc-section\" id=\"How_should_Protected_Health_Information_be_Stored\"><\/span>How should Protected Health Information be Stored?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Medical records are private information that requires security from unauthorized personnel. Also, the method of storing is important because<strong>&nbsp;HIPAA law for storage of personal health information&nbsp;<\/strong>states guidelines, limitations, and requirements to avoid violation.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/hypnotes.net\/static\/blog\/blog9\/how-should-protected-health-information-be-stored-image.jpg\" alt=\"How should protected health information (phi) be stored image\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"Physical-Storage\">Physical Storage<\/h3>\n\n\n\n<p>For a while, physical storage has always been the most common means of storing&nbsp;<strong>protected health information<\/strong>. Storing paper records in cabinets, shelves, etc., are a popular method used in physical stores. Sending out information should be done following&nbsp;<strong>HIPAA law for storage and disposal of health.<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"Electronic-Storage\">Electronic Storage<\/h3>\n\n\n\n<p>With the advancement in technology, we know that&nbsp;<strong>PHI<\/strong>&nbsp;can be stored and transmitted electronically. Healthcare providers can easily store large amounts of data using services like Cloud computing while obeying&nbsp;<strong>HIPPA cloud storage&nbsp;<\/strong>rules. For example,&nbsp;<a href=\"https:\/\/hypnotes.net\/blog\/practice-management-software-features-and-benefits\">Practice Management Software (PMS) &amp; EHRs<\/a>&nbsp;have been implemented by over 90% of healthcare providers in Australia. EHR stands for&nbsp;<strong>electronic health record<\/strong>, depending on the data stored, and its architecture can either be public, private, hotel, or hybrid.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"Wearable-Technology\">Wearable Technology<\/h3>\n\n\n\n<p>Within the last decade, there has been a rise in the use of wearable technology like smartwatches, blood pressure monitors, ECG monitors, and biosensors. These devices can be used to store&nbsp;<strong>protected health information<\/strong>.<\/p>\n\n\n\n<p>Companies producing wearable technology track the health and fitness capacity of users. There has been concern about the privacy of users because the companies producing these devices are not covered entities, so they are not HIPAA compliant.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"Mobile-Apps\">Mobile Apps<\/h3>\n\n\n\n<p>Mobile applications have made healthcare provision easier and essential for many people, especially old patients. Patient behavior, perceived behavioral intentions, etc., led to the adoption of mobile healthcare applications. These apps are used to store and transmit PHI and need to be<strong>&nbsp;HIPAA<\/strong> compliant to avoid violation. Users can check application reviews to determine the legitimacy of these applications.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"Conclusion\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Protection of medical records is necessary as Health Information is private data and should be treated as such. The&nbsp;<strong>HIPAA&nbsp;<\/strong>rule was created to avoid privacy breaches and set guidelines to ensure the smooth distribution of health data because information dissemination is also necessary for the development of Healthcare.<\/p>\n\n\n\n<p>Furthermore, there has been confusion regarding what type of data should be considered&nbsp;protected health information. The&nbsp;<strong>HIPAA rule&nbsp;<\/strong>makes us understand that as long as the information can lead to the identification of a person&#8217;s medical history at any time, then the information is considered a&nbsp;<strong>PHI<\/strong>. From the article, we can tell what&nbsp;<strong>protected health information (PHI)<\/strong>&nbsp;is and also understand that there are consequences for violating the rules in place for protection.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"How-Hypnotes-provides-Protected-Health-Information-and-HIPPA\"><span class=\"ez-toc-section\" id=\"How_Hypnotes_provides_Protected_Health_Information_and_HIPPA\"><\/span>How Hypnotes provides Protected Health Information and HIPPA<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<figure class=\"wp-block-image\"><a href=\"https:\/\/hypnotes.net\/?utm_source=blog&amp;utm_medium=post\"><img decoding=\"async\" src=\"https:\/\/hypnotes.net\/static\/blog\/blog9\/hypnotes-all-in-one-practice-management-system.jpg\" alt=\"Hypnotes all in one hipaa compliant practice management software\"\/><\/a><\/figure>\n\n\n\n<p><a href=\"https:\/\/hypnotes.net\/\">Hypnotes practice management software<\/a>&nbsp;takes confidentiality and data security very seriously. In fact, we consider it one of our top priorities. All of the data that is housed in Hypnotes is fully encrypted and secured by a farewell. We ensure our clients and your clients have the highest level of security regarding your data. Hypnotes is a&nbsp;<a href=\"https:\/\/hypnotes.net\/features\/hipaa-security\">HIPAA compliant software<\/a>&nbsp;and provides&nbsp;<a href=\"https:\/\/hypnotes.net\/features\/telehealth-video-conferencing\">HIPAA compliant video conferencing.<\/a><\/p>\n\n\n\n<p>Our platform servers are housed in a protected facility 24\/7 365 days a year. Our security team regularly tests our systems to ensure your data is safe from any threats. Each and every client has to go through both email and phone verification for authentication. Only verified clients can access the data that is in their accounts. We do not reveal any data to third-party companies including insurance companies.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every time we go to the hospital for a medical checkup, book an appointment with a specialist, pay medical bills, etc., it all goes into our medical records. These activities are all private data that should be protected. In a world where data is the new gold, we need to understand how personal health data [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":6981,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[28],"tags":[],"class_list":["post-6978","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-therapist-resources"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Protected Health Information (PHI) and HIPAA? - Hypnotes<\/title>\n<meta name=\"description\" content=\"According to the\u00a0HIPAA\u00a0rule,\u00a0Protected Health Information\u00a0(PHI) is simply the identifiable health information of an individual.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hypnotes.net\/blog\/what-is-protected-health-information-phi-hipaa\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Protected Health Information (PHI) and HIPAA? - Hypnotes\" \/>\n<meta property=\"og:description\" content=\"According to the\u00a0HIPAA\u00a0rule,\u00a0Protected Health Information\u00a0(PHI) is simply the identifiable health information of an individual.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hypnotes.net\/blog\/what-is-protected-health-information-phi-hipaa\/\" \/>\n<meta property=\"og:site_name\" content=\"Hypnotes\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-21T10:00:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-16T20:23:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hypnotes.net\/blog\/wp-content\/uploads\/2022\/12\/Protected-Health-Information-and-HIPAA-featured-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1256\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Merve Yalcin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Merve Yalcin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hypnotes.net\/blog\/what-is-protected-health-information-phi-hipaa\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hypnotes.net\/blog\/what-is-protected-health-information-phi-hipaa\/\"},\"author\":{\"name\":\"Merve Yalcin\",\"@id\":\"https:\/\/hypnotes.net\/blog\/#\/schema\/person\/711c8db025a1c1793ca796bc05aa2da7\"},\"headline\":\"What is Protected Health Information (PHI) and HIPAA?\",\"datePublished\":\"2022-10-21T10:00:14+00:00\",\"dateModified\":\"2023-09-16T20:23:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hypnotes.net\/blog\/what-is-protected-health-information-phi-hipaa\/\"},\"wordCount\":3125,\"publisher\":{\"@id\":\"https:\/\/hypnotes.net\/blog\/#organization\"},\"articleSection\":[\"Therapist Resources\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hypnotes.net\/blog\/what-is-protected-health-information-phi-hipaa\/\",\"url\":\"https:\/\/hypnotes.net\/blog\/what-is-protected-health-information-phi-hipaa\/\",\"name\":\"What is Protected Health Information (PHI) and HIPAA? - Hypnotes\",\"isPartOf\":{\"@id\":\"https:\/\/hypnotes.net\/blog\/#website\"},\"datePublished\":\"2022-10-21T10:00:14+00:00\",\"dateModified\":\"2023-09-16T20:23:16+00:00\",\"description\":\"According to the\u00a0HIPAA\u00a0rule,\u00a0Protected Health Information\u00a0(PHI) is simply the identifiable health information of an individual.\",\"breadcrumb\":{\"@id\":\"https:\/\/hypnotes.net\/blog\/what-is-protected-health-information-phi-hipaa\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hypnotes.net\/blog\/what-is-protected-health-information-phi-hipaa\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hypnotes.net\/blog\/what-is-protected-health-information-phi-hipaa\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/hypnotes.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Protected Health Information (PHI) and HIPAA?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hypnotes.net\/blog\/#website\",\"url\":\"https:\/\/hypnotes.net\/blog\/\",\"name\":\"Hypnotes\",\"description\":\"HIPAA compliant and secure practice management software\",\"publisher\":{\"@id\":\"https:\/\/hypnotes.net\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hypnotes.net\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hypnotes.net\/blog\/#organization\",\"name\":\"Hypnotes\",\"url\":\"https:\/\/hypnotes.net\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/hypnotes.net\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hypnotes.net\/blog\/wp-content\/uploads\/2022\/12\/preloader.png\",\"contentUrl\":\"https:\/\/hypnotes.net\/blog\/wp-content\/uploads\/2022\/12\/preloader.png\",\"width\":250,\"height\":250,\"caption\":\"Hypnotes\"},\"image\":{\"@id\":\"https:\/\/hypnotes.net\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hypnotes.net\/blog\/#\/schema\/person\/711c8db025a1c1793ca796bc05aa2da7\",\"name\":\"Merve Yalcin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/hypnotes.net\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/hypnotes.net\/blog\/wp-content\/uploads\/2022\/12\/Merve-Yalcin-96x96.png\",\"contentUrl\":\"https:\/\/hypnotes.net\/blog\/wp-content\/uploads\/2022\/12\/Merve-Yalcin-96x96.png\",\"caption\":\"Merve Yalcin\"},\"description\":\"Merve is a graduate of Hypnosis Motivation Institute(HMI) and certified Hypnotherapist. She guides her clients to explore into the natural healing properties of your mind, body, and spirit. Merve helps her clients to live healthier life and reach their personal and business goals for a fulfilling lifestyle. She is experienced in therapeutic use of hypnosis, imagery, and mindfulness which is the most powerful resource to achieve your goals. She loves talking with people and trying to find a solution to people's problems. She has an experience in different branches of Hypnotherapy. She has successfully treated many people with unknown pains, anxieties, and fears. She specialized in Smoking Cessation and Tinnitus. She is also a member of the American Hypnosis Association(AHA).\",\"sameAs\":[\"https:\/\/meryalhypnotherapy.com\/\"],\"url\":\"https:\/\/hypnotes.net\/blog\/author\/merve-yalcin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Protected Health Information (PHI) and HIPAA? - Hypnotes","description":"According to the\u00a0HIPAA\u00a0rule,\u00a0Protected Health Information\u00a0(PHI) is simply the identifiable health information of an individual.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hypnotes.net\/blog\/what-is-protected-health-information-phi-hipaa\/","og_locale":"en_US","og_type":"article","og_title":"What is Protected Health Information (PHI) and HIPAA? - Hypnotes","og_description":"According to the\u00a0HIPAA\u00a0rule,\u00a0Protected Health Information\u00a0(PHI) is simply the identifiable health information of an individual.","og_url":"https:\/\/hypnotes.net\/blog\/what-is-protected-health-information-phi-hipaa\/","og_site_name":"Hypnotes","article_published_time":"2022-10-21T10:00:14+00:00","article_modified_time":"2023-09-16T20:23:16+00:00","og_image":[{"width":2400,"height":1256,"url":"https:\/\/hypnotes.net\/blog\/wp-content\/uploads\/2022\/12\/Protected-Health-Information-and-HIPAA-featured-image.jpg","type":"image\/jpeg"}],"author":"Merve Yalcin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Merve Yalcin","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hypnotes.net\/blog\/what-is-protected-health-information-phi-hipaa\/#article","isPartOf":{"@id":"https:\/\/hypnotes.net\/blog\/what-is-protected-health-information-phi-hipaa\/"},"author":{"name":"Merve Yalcin","@id":"https:\/\/hypnotes.net\/blog\/#\/schema\/person\/711c8db025a1c1793ca796bc05aa2da7"},"headline":"What is Protected Health Information (PHI) and HIPAA?","datePublished":"2022-10-21T10:00:14+00:00","dateModified":"2023-09-16T20:23:16+00:00","mainEntityOfPage":{"@id":"https:\/\/hypnotes.net\/blog\/what-is-protected-health-information-phi-hipaa\/"},"wordCount":3125,"publisher":{"@id":"https:\/\/hypnotes.net\/blog\/#organization"},"articleSection":["Therapist Resources"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/hypnotes.net\/blog\/what-is-protected-health-information-phi-hipaa\/","url":"https:\/\/hypnotes.net\/blog\/what-is-protected-health-information-phi-hipaa\/","name":"What is Protected Health Information (PHI) and HIPAA? - Hypnotes","isPartOf":{"@id":"https:\/\/hypnotes.net\/blog\/#website"},"datePublished":"2022-10-21T10:00:14+00:00","dateModified":"2023-09-16T20:23:16+00:00","description":"According to the\u00a0HIPAA\u00a0rule,\u00a0Protected Health Information\u00a0(PHI) is simply the identifiable health information of an individual.","breadcrumb":{"@id":"https:\/\/hypnotes.net\/blog\/what-is-protected-health-information-phi-hipaa\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hypnotes.net\/blog\/what-is-protected-health-information-phi-hipaa\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/hypnotes.net\/blog\/what-is-protected-health-information-phi-hipaa\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/hypnotes.net\/blog\/"},{"@type":"ListItem","position":2,"name":"What is Protected Health Information (PHI) and HIPAA?"}]},{"@type":"WebSite","@id":"https:\/\/hypnotes.net\/blog\/#website","url":"https:\/\/hypnotes.net\/blog\/","name":"Hypnotes","description":"HIPAA compliant and secure practice management software","publisher":{"@id":"https:\/\/hypnotes.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hypnotes.net\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/hypnotes.net\/blog\/#organization","name":"Hypnotes","url":"https:\/\/hypnotes.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hypnotes.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/hypnotes.net\/blog\/wp-content\/uploads\/2022\/12\/preloader.png","contentUrl":"https:\/\/hypnotes.net\/blog\/wp-content\/uploads\/2022\/12\/preloader.png","width":250,"height":250,"caption":"Hypnotes"},"image":{"@id":"https:\/\/hypnotes.net\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hypnotes.net\/blog\/#\/schema\/person\/711c8db025a1c1793ca796bc05aa2da7","name":"Merve Yalcin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hypnotes.net\/blog\/#\/schema\/person\/image\/","url":"https:\/\/hypnotes.net\/blog\/wp-content\/uploads\/2022\/12\/Merve-Yalcin-96x96.png","contentUrl":"https:\/\/hypnotes.net\/blog\/wp-content\/uploads\/2022\/12\/Merve-Yalcin-96x96.png","caption":"Merve Yalcin"},"description":"Merve is a graduate of Hypnosis Motivation Institute(HMI) and certified Hypnotherapist. She guides her clients to explore into the natural healing properties of your mind, body, and spirit. Merve helps her clients to live healthier life and reach their personal and business goals for a fulfilling lifestyle. She is experienced in therapeutic use of hypnosis, imagery, and mindfulness which is the most powerful resource to achieve your goals. She loves talking with people and trying to find a solution to people's problems. She has an experience in different branches of Hypnotherapy. She has successfully treated many people with unknown pains, anxieties, and fears. She specialized in Smoking Cessation and Tinnitus. She is also a member of the American Hypnosis Association(AHA).","sameAs":["https:\/\/meryalhypnotherapy.com\/"],"url":"https:\/\/hypnotes.net\/blog\/author\/merve-yalcin\/"}]}},"modified_by":"blog.prismoonweb","_links":{"self":[{"href":"https:\/\/hypnotes.net\/blog\/wp-json\/wp\/v2\/posts\/6978","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hypnotes.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hypnotes.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hypnotes.net\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/hypnotes.net\/blog\/wp-json\/wp\/v2\/comments?post=6978"}],"version-history":[{"count":1,"href":"https:\/\/hypnotes.net\/blog\/wp-json\/wp\/v2\/posts\/6978\/revisions"}],"predecessor-version":[{"id":7688,"href":"https:\/\/hypnotes.net\/blog\/wp-json\/wp\/v2\/posts\/6978\/revisions\/7688"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hypnotes.net\/blog\/wp-json\/wp\/v2\/media\/6981"}],"wp:attachment":[{"href":"https:\/\/hypnotes.net\/blog\/wp-json\/wp\/v2\/media?parent=6978"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hypnotes.net\/blog\/wp-json\/wp\/v2\/categories?post=6978"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hypnotes.net\/blog\/wp-json\/wp\/v2\/tags?post=6978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}