{"id":43909,"date":"2019-01-18T15:37:29","date_gmt":"2019-01-18T14:37:29","guid":{"rendered":"https:\/\/blogs.bmj.com\/bmj\/?p=43909"},"modified":"2019-01-18T15:37:29","modified_gmt":"2019-01-18T14:37:29","slug":"protecting-patient-privacy-and-security-while-exploiting-the-utility-of-next-generation-digital-health-wearables","status":"publish","type":"post","link":"https:\/\/blogs.bmj.com\/bmj\/2019\/01\/18\/protecting-patient-privacy-and-security-while-exploiting-the-utility-of-next-generation-digital-health-wearables\/","title":{"rendered":"Protecting patient privacy and security while exploiting the utility of next generation digital health wearables"},"content":{"rendered":"<p><span style=\"font-weight: 400\">The <\/span><a href=\"https:\/\/www.theverge.com\/2018\/9\/12\/17850660\/apple-watch-series-4-ekg-electrocardiogram-health-2018\"><span style=\"font-weight: 400\">announcement<\/span><\/a><span style=\"font-weight: 400\">\u00a0that the US Food and Drug Administration (FDA) have given clearance to the irregular rhythm notification feature in the latest Apple Watch has been met with great enthusiasm by some and cynicism and concern by others. As Silicon Valley and the tech sector rejoice and press forward at full velocity, medical professionals have engaged in cautiously optimistic dialogue. These new tools clearly have the potential to help users monitor their health much more actively. However, these devices do not yet have clinical grade accuracy or precision. The FDA response letter identifies a number of risks with the device such as false negatives, false positives, misinterpretation, and potential over reliance on the devices. [1] Further, the use of devices to monitor people\u2019s health, calls into question issues of privacy and security of healthcare data.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Privacy and security are complex and entangled concepts. Privacy refers to an individual\u2019s right to control their information and its use. Security refers to how that information is protected. They aren\u2019t necessarily congruent. For example, a business may keep data safe from cyber attack, but also sell that data without permission or consent. In which case, security is intact, but<\/span><span style=\"font-weight: 400\"> privacy was likely violated.<\/span><span style=\"font-weight: 400\"> In considering privacy, the current protections in the US under the Health Insurance Portability and Accountability ACT (HIPAA) are limited, complex, and outmoded for the volume, velocity, and variety of new digital data. [2] Specifically, HIPAA does not cover data generated by entities such as commercial technology vendors and is limited to direct identifiers, such as date of birth, address, and social security number, etc.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Looking more closely at biometrics parameters collected by these devices, could they not be used as new types of direct identifiers? \u00a0Modern biometrics, such as facial recognition, fingerprints, gait, iris and retinal scanning, touch typing, voice recognition, heart rate\/rhythm and others serve as the basis of next-generation identity management technologies. In short, most digital health sensors are also biometric measurement and transmission devices. Just as a DNA sequence can be used to provide important medical insights, that same sequence can also be used uniquely to identify an individual. Biometric identifiers such as facial recognition are especially difficult to secure and protect as they can be captured without notice, are easy to tamper with, are easily compared to faces scraped from the web and social media sites and therefore can be easily weaponized. None of these data streams are explicitly covered under HIPAA, but they are likely protected under General Data Protection Regulations (GDPR) in Europe. The question is whether any of these regulations will be able to keep up with the speed of development and implementation of these technologies. [3]<\/span><\/p>\n<p><span style=\"font-weight: 400\">GDPR is more modern and comprehensive than HIPAA and closes some of the HIPAA loopholes. Under GDPR, biometric data is explicitly covered under &#8220;special categories of personal data&#8221; and can only be processed and used under explicit consent or other clearly described circumstances. [4] Interestingly, the new Apple Watch, with the irregular rhythm notification feature, is not being marketed, or even advertised, outside of the US, and one must wonder whether differences in privacy regulation are contributing factors.<\/span><\/p>\n<p><span style=\"font-weight: 400\">In terms of security, it is now clear that the healthcare industry is a high value cyber target and will continue to face persistent threats. [5] Devices are at risk of being hacked, and modern smartphones have the potential to be highly advanced surveillance devices in the hands of determined adversaries. According to a recent report from the US Department of Homeland Security (DHS) on mobile device security, mobile devices and connected accessories are easy to lose or steal, often connected to unsecured public wireless networks and are subject to an extensive range of cyberattacks that include geolocation disclosure, tampering, denial of service, identity and data disclosure, phishing and device hijacking. [6] \u00a0Geolocation disclosure is especially troubling as the threats here go beyond the financial and reputational attacks we have witnessed to date. We must understand that, by mixing health and location data, we open up an entirely new domain of privacy and physical threats. Location data is currently unregulated and enables deep surveillance of individuals\u2019 activity, location, and habits without their notice. [7]<\/span><\/p>\n<p><span style=\"font-weight: 400\">While progress has been made, especially in awareness and in the increases in cyber assurance funding by healthcare institutions, policy progress has been too slow to be of practical use. In a world where regulations take years, but new cyber threats appear at a rate of tens of thousands per day, we need to think differently about regulation. Even when regulations and guidelines exist, they are poorly utilized. For example, while the FDA letter on the Apple watch specifies the requirements for compliance with a significant list of federal regulations, there are no explicit cybersecurity or user privacy requirements.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The good news is that, as risks are identified, mitigations and remediations can be implemented if action is proactive and swift. We cannot allow ourselves to be caught off-guard by cyber threat again. We must be proactive in ensuring privacy protections and cyber resilience now, at the beginning of this digital transformation.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This is truly an exciting time to be in healthcare. The possibilities of digital tools to improve patient wellness and healthcare are extraordinary. We should not let the promise go unfulfilled, but we must also take care. <\/span><\/p>\n<p><em><span style=\"font-weight: 400\"><strong>Eric D Perakslis<\/strong>, Department of Biomedical Informatics, Harvard Medical School.<\/span><\/em><\/p>\n<p><em><span style=\"font-weight: 400\"><strong>Competing Interests:<\/strong> None declared.<\/span><\/em><\/p>\n<p><b>References:<\/b><\/p>\n<ol>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">US Food and Drug Administration. Response to De Novo request for classification of the Irregular Rhythm Notification Feature. Angela C. Krueger Deputy Director, Engineering and Science Review Office of Device Evaluation Center for Devices and Radiological Health. September 11, 2018<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Cohen IG, Mello MM. HIPAA and Protecting Health Information in the 21st Century. <\/span><i><span style=\"font-weight: 400\">JAMA<\/span><\/i><span style=\"font-weight: 400\">. 2018; 320(3): 231-232.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Owen D. Should We Be Worried About Computerized facial Recognition? The New Yorker. \u00a02018. Dec. 17.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">https:\/\/gdpr-info.eu\/art-9-gdpr\/<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Jarrett MP. Cybersecurity \u2013 A Serious Patient Care Concern. <\/span><i><span style=\"font-weight: 400\">JAMA<\/span><\/i><span style=\"font-weight: 400\">. <\/span><span style=\"font-weight: 400\">2017;318(14):1319-1320.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">US Department of Homeland Security. Study on Mobile Device Security. <\/span><a href=\"https:\/\/www.dhs.gov\/sites\/default\/files\/publications\/DHS%20Study%20on%20Mobile%20Devic\"><span style=\"font-weight: 400\">https:\/\/www.dhs.gov\/sites\/default\/files\/publications\/DHS%20Study%20on%20Mobile%20Devic<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Harris R. \u00a0Your Apps Know Where You Were last Night and Are Not Keeping It a Secret. \u00a0New York Times. 2018. December 10.<\/span><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The announcement\u00a0that the US Food and Drug Administration (FDA) have given clearance to the irregular rhythm notification feature in the latest Apple Watch has been met with great enthusiasm by [&#8230;]<\/p>\n<p><a class=\"btn btn-secondary understrap-read-more-link\" href=\"https:\/\/blogs.bmj.com\/bmj\/2019\/01\/18\/protecting-patient-privacy-and-security-while-exploiting-the-utility-of-next-generation-digital-health-wearables\/\">More&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1357],"tags":[],"class_list":["post-43909","post","type-post","status-publish","format-standard","hentry","category-us-health-care"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protecting patient privacy and security while exploiting the utility of next generation digital health wearables - The BMJ<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blogs.bmj.com\/bmj\/2019\/01\/18\/protecting-patient-privacy-and-security-while-exploiting-the-utility-of-next-generation-digital-health-wearables\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting patient privacy and security while exploiting the utility of next generation digital health wearables - The BMJ\" \/>\n<meta property=\"og:description\" content=\"The announcement\u00a0that the US Food and Drug Administration (FDA) have given clearance to the irregular rhythm notification feature in the latest Apple Watch has been met with great enthusiasm by [...]More...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blogs.bmj.com\/bmj\/2019\/01\/18\/protecting-patient-privacy-and-security-while-exploiting-the-utility-of-next-generation-digital-health-wearables\/\" \/>\n<meta property=\"og:site_name\" content=\"The BMJ\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/bmjdotcom\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-18T14:37:29+00:00\" \/>\n<meta name=\"author\" content=\"BMJ\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@bmj_latest\" \/>\n<meta name=\"twitter:site\" content=\"@bmj_latest\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"BMJ\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/2019\\\/01\\\/18\\\/protecting-patient-privacy-and-security-while-exploiting-the-utility-of-next-generation-digital-health-wearables\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/2019\\\/01\\\/18\\\/protecting-patient-privacy-and-security-while-exploiting-the-utility-of-next-generation-digital-health-wearables\\\/\"},\"author\":{\"name\":\"BMJ\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/#\\\/schema\\\/person\\\/ba3da426ed20e8f1d933ca367d8216fe\"},\"headline\":\"Protecting patient privacy and security while exploiting the utility of next generation digital health wearables\",\"datePublished\":\"2019-01-18T14:37:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/2019\\\/01\\\/18\\\/protecting-patient-privacy-and-security-while-exploiting-the-utility-of-next-generation-digital-health-wearables\\\/\"},\"wordCount\":1038,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/#organization\"},\"articleSection\":[\"US healthcare\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/2019\\\/01\\\/18\\\/protecting-patient-privacy-and-security-while-exploiting-the-utility-of-next-generation-digital-health-wearables\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/2019\\\/01\\\/18\\\/protecting-patient-privacy-and-security-while-exploiting-the-utility-of-next-generation-digital-health-wearables\\\/\",\"url\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/2019\\\/01\\\/18\\\/protecting-patient-privacy-and-security-while-exploiting-the-utility-of-next-generation-digital-health-wearables\\\/\",\"name\":\"Protecting patient privacy and security while exploiting the utility of next generation digital health wearables - The BMJ\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/#website\"},\"datePublished\":\"2019-01-18T14:37:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/2019\\\/01\\\/18\\\/protecting-patient-privacy-and-security-while-exploiting-the-utility-of-next-generation-digital-health-wearables\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/2019\\\/01\\\/18\\\/protecting-patient-privacy-and-security-while-exploiting-the-utility-of-next-generation-digital-health-wearables\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/2019\\\/01\\\/18\\\/protecting-patient-privacy-and-security-while-exploiting-the-utility-of-next-generation-digital-health-wearables\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting patient privacy and security while exploiting the utility of next generation digital health wearables\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/#website\",\"url\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/\",\"name\":\"The BMJ\",\"description\":\"Helping doctors make better decisions.\",\"publisher\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/#organization\",\"name\":\"The BMJ\",\"url\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/files\\\/2018\\\/05\\\/The-BMJ-logo.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/files\\\/2018\\\/05\\\/The-BMJ-logo.jpg\",\"width\":852,\"height\":568,\"caption\":\"The BMJ\"},\"image\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/bmjdotcom\\\/\",\"https:\\\/\\\/x.com\\\/bmj_latest\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/#\\\/schema\\\/person\\\/ba3da426ed20e8f1d933ca367d8216fe\",\"name\":\"BMJ\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b4d8f39281bcae118348a1c027347b8e53b82d42520e774a8b50dd9a6ac6c01d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b4d8f39281bcae118348a1c027347b8e53b82d42520e774a8b50dd9a6ac6c01d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b4d8f39281bcae118348a1c027347b8e53b82d42520e774a8b50dd9a6ac6c01d?s=96&d=mm&r=g\",\"caption\":\"BMJ\"},\"sameAs\":[\"https:\\\/\\\/blogs.bmj.com\\\/\"],\"url\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting patient privacy and security while exploiting the utility of next generation digital health wearables - The BMJ","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogs.bmj.com\/bmj\/2019\/01\/18\/protecting-patient-privacy-and-security-while-exploiting-the-utility-of-next-generation-digital-health-wearables\/","og_locale":"en_US","og_type":"article","og_title":"Protecting patient privacy and security while exploiting the utility of next generation digital health wearables - The BMJ","og_description":"The announcement\u00a0that the US Food and Drug Administration (FDA) have given clearance to the irregular rhythm notification feature in the latest Apple Watch has been met with great enthusiasm by [...]More...","og_url":"https:\/\/blogs.bmj.com\/bmj\/2019\/01\/18\/protecting-patient-privacy-and-security-while-exploiting-the-utility-of-next-generation-digital-health-wearables\/","og_site_name":"The BMJ","article_publisher":"https:\/\/www.facebook.com\/bmjdotcom\/","article_published_time":"2019-01-18T14:37:29+00:00","author":"BMJ","twitter_card":"summary_large_image","twitter_creator":"@bmj_latest","twitter_site":"@bmj_latest","twitter_misc":{"Written by":"BMJ","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blogs.bmj.com\/bmj\/2019\/01\/18\/protecting-patient-privacy-and-security-while-exploiting-the-utility-of-next-generation-digital-health-wearables\/#article","isPartOf":{"@id":"https:\/\/blogs.bmj.com\/bmj\/2019\/01\/18\/protecting-patient-privacy-and-security-while-exploiting-the-utility-of-next-generation-digital-health-wearables\/"},"author":{"name":"BMJ","@id":"https:\/\/blogs.bmj.com\/bmj\/#\/schema\/person\/ba3da426ed20e8f1d933ca367d8216fe"},"headline":"Protecting patient privacy and security while exploiting the utility of next generation digital health wearables","datePublished":"2019-01-18T14:37:29+00:00","mainEntityOfPage":{"@id":"https:\/\/blogs.bmj.com\/bmj\/2019\/01\/18\/protecting-patient-privacy-and-security-while-exploiting-the-utility-of-next-generation-digital-health-wearables\/"},"wordCount":1038,"commentCount":0,"publisher":{"@id":"https:\/\/blogs.bmj.com\/bmj\/#organization"},"articleSection":["US healthcare"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blogs.bmj.com\/bmj\/2019\/01\/18\/protecting-patient-privacy-and-security-while-exploiting-the-utility-of-next-generation-digital-health-wearables\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blogs.bmj.com\/bmj\/2019\/01\/18\/protecting-patient-privacy-and-security-while-exploiting-the-utility-of-next-generation-digital-health-wearables\/","url":"https:\/\/blogs.bmj.com\/bmj\/2019\/01\/18\/protecting-patient-privacy-and-security-while-exploiting-the-utility-of-next-generation-digital-health-wearables\/","name":"Protecting patient privacy and security while exploiting the utility of next generation digital health wearables - The BMJ","isPartOf":{"@id":"https:\/\/blogs.bmj.com\/bmj\/#website"},"datePublished":"2019-01-18T14:37:29+00:00","breadcrumb":{"@id":"https:\/\/blogs.bmj.com\/bmj\/2019\/01\/18\/protecting-patient-privacy-and-security-while-exploiting-the-utility-of-next-generation-digital-health-wearables\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.bmj.com\/bmj\/2019\/01\/18\/protecting-patient-privacy-and-security-while-exploiting-the-utility-of-next-generation-digital-health-wearables\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.bmj.com\/bmj\/2019\/01\/18\/protecting-patient-privacy-and-security-while-exploiting-the-utility-of-next-generation-digital-health-wearables\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blogs.bmj.com\/bmj\/"},{"@type":"ListItem","position":2,"name":"Protecting patient privacy and security while exploiting the utility of next generation digital health wearables"}]},{"@type":"WebSite","@id":"https:\/\/blogs.bmj.com\/bmj\/#website","url":"https:\/\/blogs.bmj.com\/bmj\/","name":"The BMJ","description":"Helping doctors make better decisions.","publisher":{"@id":"https:\/\/blogs.bmj.com\/bmj\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.bmj.com\/bmj\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blogs.bmj.com\/bmj\/#organization","name":"The BMJ","url":"https:\/\/blogs.bmj.com\/bmj\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.bmj.com\/bmj\/#\/schema\/logo\/image\/","url":"https:\/\/blogs.bmj.com\/bmj\/files\/2018\/05\/The-BMJ-logo.jpg","contentUrl":"https:\/\/blogs.bmj.com\/bmj\/files\/2018\/05\/The-BMJ-logo.jpg","width":852,"height":568,"caption":"The BMJ"},"image":{"@id":"https:\/\/blogs.bmj.com\/bmj\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/bmjdotcom\/","https:\/\/x.com\/bmj_latest"]},{"@type":"Person","@id":"https:\/\/blogs.bmj.com\/bmj\/#\/schema\/person\/ba3da426ed20e8f1d933ca367d8216fe","name":"BMJ","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b4d8f39281bcae118348a1c027347b8e53b82d42520e774a8b50dd9a6ac6c01d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b4d8f39281bcae118348a1c027347b8e53b82d42520e774a8b50dd9a6ac6c01d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b4d8f39281bcae118348a1c027347b8e53b82d42520e774a8b50dd9a6ac6c01d?s=96&d=mm&r=g","caption":"BMJ"},"sameAs":["https:\/\/blogs.bmj.com\/"],"url":"https:\/\/blogs.bmj.com\/bmj\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/blogs.bmj.com\/bmj\/wp-json\/wp\/v2\/posts\/43909","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.bmj.com\/bmj\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.bmj.com\/bmj\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.bmj.com\/bmj\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.bmj.com\/bmj\/wp-json\/wp\/v2\/comments?post=43909"}],"version-history":[{"count":0,"href":"https:\/\/blogs.bmj.com\/bmj\/wp-json\/wp\/v2\/posts\/43909\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.bmj.com\/bmj\/wp-json\/wp\/v2\/media?parent=43909"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.bmj.com\/bmj\/wp-json\/wp\/v2\/categories?post=43909"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.bmj.com\/bmj\/wp-json\/wp\/v2\/tags?post=43909"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}