{"id":3647,"date":"2019-12-12T18:15:23","date_gmt":"2019-12-12T17:15:23","guid":{"rendered":"https:\/\/blogs.bmj.com\/medical-ethics\/?p=3647"},"modified":"2019-12-12T18:20:52","modified_gmt":"2019-12-12T17:20:52","slug":"privacy-and-health-data-how-can-we-protect-information-after-its-been-shared","status":"publish","type":"post","link":"https:\/\/blogs.bmj.com\/medical-ethics\/2019\/12\/12\/privacy-and-health-data-how-can-we-protect-information-after-its-been-shared\/","title":{"rendered":"Privacy and health data: How can we protect information after it\u2019s been shared?"},"content":{"rendered":"<p>By T.J. Kasperbauer.<\/p>\n<p>We have <a href=\"https:\/\/www.google.com\/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=1&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwjSuLC31ZXmAhUCHTQIHQ_yCzsQFjAAegQIAhAB&amp;url=https%3A%2F%2Fwww.wsj.com%2Farticles%2Fyour-health-data-isnt-as-safe-as-you-think-11574418606&amp;usg=AOvVaw2vSg-7AjtGiizZT_nuTh_8\">already lost<\/a> significant control of our <a href=\"https:\/\/www.google.com\/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=1&amp;cad=rja&amp;uact=8&amp;ved=2ahUKEwiesbz01JXmAhUSKH0KHefCDQsQFjAAegQIARAB&amp;url=https%3A%2F%2Fwww.nytimes.com%2F2019%2F09%2F03%2Ftechnology%2Fsmartphone-medical-records.html&amp;usg=AOvVaw0F0J3RGFbFxsaHFDgUjLqo\">health data<\/a>. To some, that means we\u2019ve also lost our privacy. But there are many ways of protecting health data even after it has been shared. When health data are widely shared, we must develop strategies for protecting health data regardless of who can get it.<\/p>\n<p>Think of an organization that might be interested in collecting information about your health. For example, your favourite social media site or search engine. There are four ways of preventing that organization from using data in ways that could hurt you:<\/p>\n<p><em>Control<\/em>: They cannot get your data without your permission.<\/p>\n<p><em>Obfuscation: <\/em>They can get your data but cannot make meaningful inferences from it.<\/p>\n<p><em>Penalization: <\/em>They can get your data but using it against you is likely to get them into trouble.<\/p>\n<p><em>Transparency<\/em>: They have your data but you and everyone else will easily see if they misuse the data.<\/p>\n<p>If <em>control<\/em> is no longer a real option, then policy-makers responsible for protecting privacy must pursue the other three.<\/p>\n<p>Here is a snapshot of what that might look like.<\/p>\n<p><em>Obfuscation <\/em>creates \u201cnoise\u201d in a dataset to make it hard to understand. Only those who know how to remove the noise or work around it can use the dataset. One option for obfuscation is synthetic databases, like <a href=\"https:\/\/synthetichealth.github.io\/synthea\/\">Synthea<\/a>. Synthetic databases modify patients\u2019 data while preserving any statistical properties. This provides privacy without sacrificing research value. For example, a researcher could study the predictors of opioid addiction without identifying any specific person as an addict.<\/p>\n<p><em>Penalization <\/em>involves legal action against those who exploit and misuse health data. Current legal frameworks unfortunately do not view many privacy violations as in fact harmful. This needs to change. For example, selling data to entities known to engage in health insurance fraud should be viewed as causing harm. The act of selling does not directly injure patients, but it does significantly increase their exposure to serious risks. Lowering the threshold for harm would help the legal system hold people (and organizations) accountable when they misuse health data.<\/p>\n<p><em>Transparency<\/em> allows us to see who has our information and how it is used. There are significant <a href=\"https:\/\/www.pwc.com\/us\/en\/services\/consulting\/library\/consumer-intelligence-series\/cybersecurity-protect-me.html\">reputational costs<\/a> to being known as an organization that exploits personal data. To obtain such transparency, we need a system for tracking and publicizing who has our information. One proposed system would require professional \u201c<a href=\"https:\/\/www.fastcompany.com\/90310803\/here-are-the-data-brokers-quietly-buying-and-selling-your-personal-information\">data brokers<\/a>\u201d to register with the government. This has the benefit of providing visibility into \u201cshadow\u201d health records that exist outside the health system.<\/p>\n<p>In combination, these three strategies can protect our health information regardless of where it goes. The challenge will be addressing the costs of pursuing one option instead of another. As these strategies are developed, we will need to grapple with their many ethical and policy tradeoffs.<\/p>\n<p><strong>Paper title<\/strong>: <a href=\"https:\/\/jme.bmj.com\/content\/early\/2019\/12\/05\/medethics-2019-105880?utm_source=alert&amp;utm_medium=email&amp;utm_campaign=jme&amp;utm_content=latest&amp;utm_term=12122019\">Protecting Health Privacy Even When Privacy is Lost<\/a><\/p>\n<p><strong>Author<\/strong>: T.J. Kasperbauer<\/p>\n<p><strong>Affiliations<\/strong>: Indiana University Center for Bioethics<\/p>\n<p><strong>Competing interests<\/strong>: None<\/p>\n<p><strong>Social media accounts of post author<\/strong>: <a href=\"https:\/\/twitter.com\/tjkasperbauer\">@tjkasperbauer<\/a><!--TrendMD v2.4.8--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By T.J. Kasperbauer. We have already lost significant control of our health data. To some, that means we\u2019ve also lost our privacy. But there are many ways of protecting health data even after it has been shared. When health data are widely shared, we must develop strategies for protecting health data regardless of who can [&#8230;]<\/p>\n<p><a class=\"btn btn-secondary understrap-read-more-link\" href=\"https:\/\/blogs.bmj.com\/medical-ethics\/2019\/12\/12\/privacy-and-health-data-how-can-we-protect-information-after-its-been-shared\/\">Read More&#8230;<\/a><\/p>\n","protected":false},"author":354,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8049],"tags":[],"class_list":["post-3647","post","type-post","status-publish","format-standard","hentry","category-privacy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Privacy and health data: How can we protect information after it\u2019s been shared? - Journal of Medical Ethics blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blogs.bmj.com\/medical-ethics\/2019\/12\/12\/privacy-and-health-data-how-can-we-protect-information-after-its-been-shared\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Privacy and health data: How can we protect information after it\u2019s been shared? - Journal of Medical Ethics blog\" \/>\n<meta property=\"og:description\" content=\"By T.J. Kasperbauer. We have already lost significant control of our health data. To some, that means we\u2019ve also lost our privacy. But there are many ways of protecting health data even after it has been shared. When health data are widely shared, we must develop strategies for protecting health data regardless of who can [...]Read More...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blogs.bmj.com\/medical-ethics\/2019\/12\/12\/privacy-and-health-data-how-can-we-protect-information-after-its-been-shared\/\" \/>\n<meta property=\"og:site_name\" content=\"Journal of Medical Ethics blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-12T17:15:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-12-12T17:20:52+00:00\" \/>\n<meta name=\"author\" content=\"Hazem Zohny\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hazem Zohny\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/medical-ethics\\\/2019\\\/12\\\/12\\\/privacy-and-health-data-how-can-we-protect-information-after-its-been-shared\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/medical-ethics\\\/2019\\\/12\\\/12\\\/privacy-and-health-data-how-can-we-protect-information-after-its-been-shared\\\/\"},\"author\":{\"name\":\"Hazem Zohny\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/medical-ethics\\\/#\\\/schema\\\/person\\\/e73152f6aa4e164c7d625d77cf4fed35\"},\"headline\":\"Privacy and health data: How can we protect information after it\u2019s been shared?\",\"datePublished\":\"2019-12-12T17:15:23+00:00\",\"dateModified\":\"2019-12-12T17:20:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/medical-ethics\\\/2019\\\/12\\\/12\\\/privacy-and-health-data-how-can-we-protect-information-after-its-been-shared\\\/\"},\"wordCount\":514,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/medical-ethics\\\/#organization\"},\"articleSection\":[\"Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/blogs.bmj.com\\\/medical-ethics\\\/2019\\\/12\\\/12\\\/privacy-and-health-data-how-can-we-protect-information-after-its-been-shared\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/medical-ethics\\\/2019\\\/12\\\/12\\\/privacy-and-health-data-how-can-we-protect-information-after-its-been-shared\\\/\",\"url\":\"https:\\\/\\\/blogs.bmj.com\\\/medical-ethics\\\/2019\\\/12\\\/12\\\/privacy-and-health-data-how-can-we-protect-information-after-its-been-shared\\\/\",\"name\":\"Privacy and health data: How can we protect information after it\u2019s been shared? - Journal of Medical Ethics blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/medical-ethics\\\/#website\"},\"datePublished\":\"2019-12-12T17:15:23+00:00\",\"dateModified\":\"2019-12-12T17:20:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/medical-ethics\\\/2019\\\/12\\\/12\\\/privacy-and-health-data-how-can-we-protect-information-after-its-been-shared\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blogs.bmj.com\\\/medical-ethics\\\/2019\\\/12\\\/12\\\/privacy-and-health-data-how-can-we-protect-information-after-its-been-shared\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/medical-ethics\\\/2019\\\/12\\\/12\\\/privacy-and-health-data-how-can-we-protect-information-after-its-been-shared\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blogs.bmj.com\\\/medical-ethics\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy and health data: How can we protect information after it\u2019s been shared?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/medical-ethics\\\/#website\",\"url\":\"https:\\\/\\\/blogs.bmj.com\\\/medical-ethics\\\/\",\"name\":\"Journal of Medical Ethics blog\",\"description\":\"A blog to discuss the ethics of medicine in its many guises and formats.\",\"publisher\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/medical-ethics\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blogs.bmj.com\\\/medical-ethics\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/medical-ethics\\\/#organization\",\"name\":\"Journal of Medical Ethics blog\",\"url\":\"https:\\\/\\\/blogs.bmj.com\\\/medical-ethics\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/medical-ethics\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blogs.bmj.com\\\/medical-ethics\\\/files\\\/2026\\\/04\\\/jme-logo.png\",\"contentUrl\":\"https:\\\/\\\/blogs.bmj.com\\\/medical-ethics\\\/files\\\/2026\\\/04\\\/jme-logo.png\",\"width\":200,\"height\":50,\"caption\":\"Journal of Medical Ethics blog\"},\"image\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/medical-ethics\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/medical-ethics\\\/#\\\/schema\\\/person\\\/e73152f6aa4e164c7d625d77cf4fed35\",\"name\":\"Hazem Zohny\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4d1bd322d5ff8e6f31a624003143903d0ba7346af8cdb1fd6b5e95924b92ece1?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4d1bd322d5ff8e6f31a624003143903d0ba7346af8cdb1fd6b5e95924b92ece1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4d1bd322d5ff8e6f31a624003143903d0ba7346af8cdb1fd6b5e95924b92ece1?s=96&d=mm&r=g\",\"caption\":\"Hazem Zohny\"},\"sameAs\":[\"https:\\\/\\\/www.practicalethics.ox.ac.uk\\\/people\\\/dr-hazem-zohny\"],\"url\":\"https:\\\/\\\/blogs.bmj.com\\\/medical-ethics\\\/author\\\/zohnyh\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Privacy and health data: How can we protect information after it\u2019s been shared? - Journal of Medical Ethics blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogs.bmj.com\/medical-ethics\/2019\/12\/12\/privacy-and-health-data-how-can-we-protect-information-after-its-been-shared\/","og_locale":"en_US","og_type":"article","og_title":"Privacy and health data: How can we protect information after it\u2019s been shared? - Journal of Medical Ethics blog","og_description":"By T.J. Kasperbauer. We have already lost significant control of our health data. To some, that means we\u2019ve also lost our privacy. But there are many ways of protecting health data even after it has been shared. When health data are widely shared, we must develop strategies for protecting health data regardless of who can [...]Read More...","og_url":"https:\/\/blogs.bmj.com\/medical-ethics\/2019\/12\/12\/privacy-and-health-data-how-can-we-protect-information-after-its-been-shared\/","og_site_name":"Journal of Medical Ethics blog","article_published_time":"2019-12-12T17:15:23+00:00","article_modified_time":"2019-12-12T17:20:52+00:00","author":"Hazem Zohny","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hazem Zohny","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blogs.bmj.com\/medical-ethics\/2019\/12\/12\/privacy-and-health-data-how-can-we-protect-information-after-its-been-shared\/#article","isPartOf":{"@id":"https:\/\/blogs.bmj.com\/medical-ethics\/2019\/12\/12\/privacy-and-health-data-how-can-we-protect-information-after-its-been-shared\/"},"author":{"name":"Hazem Zohny","@id":"https:\/\/blogs.bmj.com\/medical-ethics\/#\/schema\/person\/e73152f6aa4e164c7d625d77cf4fed35"},"headline":"Privacy and health data: How can we protect information after it\u2019s been shared?","datePublished":"2019-12-12T17:15:23+00:00","dateModified":"2019-12-12T17:20:52+00:00","mainEntityOfPage":{"@id":"https:\/\/blogs.bmj.com\/medical-ethics\/2019\/12\/12\/privacy-and-health-data-how-can-we-protect-information-after-its-been-shared\/"},"wordCount":514,"commentCount":0,"publisher":{"@id":"https:\/\/blogs.bmj.com\/medical-ethics\/#organization"},"articleSection":["Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blogs.bmj.com\/medical-ethics\/2019\/12\/12\/privacy-and-health-data-how-can-we-protect-information-after-its-been-shared\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blogs.bmj.com\/medical-ethics\/2019\/12\/12\/privacy-and-health-data-how-can-we-protect-information-after-its-been-shared\/","url":"https:\/\/blogs.bmj.com\/medical-ethics\/2019\/12\/12\/privacy-and-health-data-how-can-we-protect-information-after-its-been-shared\/","name":"Privacy and health data: How can we protect information after it\u2019s been shared? - Journal of Medical Ethics blog","isPartOf":{"@id":"https:\/\/blogs.bmj.com\/medical-ethics\/#website"},"datePublished":"2019-12-12T17:15:23+00:00","dateModified":"2019-12-12T17:20:52+00:00","breadcrumb":{"@id":"https:\/\/blogs.bmj.com\/medical-ethics\/2019\/12\/12\/privacy-and-health-data-how-can-we-protect-information-after-its-been-shared\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.bmj.com\/medical-ethics\/2019\/12\/12\/privacy-and-health-data-how-can-we-protect-information-after-its-been-shared\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.bmj.com\/medical-ethics\/2019\/12\/12\/privacy-and-health-data-how-can-we-protect-information-after-its-been-shared\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blogs.bmj.com\/medical-ethics\/"},{"@type":"ListItem","position":2,"name":"Privacy and health data: How can we protect information after it\u2019s been shared?"}]},{"@type":"WebSite","@id":"https:\/\/blogs.bmj.com\/medical-ethics\/#website","url":"https:\/\/blogs.bmj.com\/medical-ethics\/","name":"Journal of Medical Ethics blog","description":"A blog to discuss the ethics of medicine in its many guises and formats.","publisher":{"@id":"https:\/\/blogs.bmj.com\/medical-ethics\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.bmj.com\/medical-ethics\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blogs.bmj.com\/medical-ethics\/#organization","name":"Journal of Medical Ethics blog","url":"https:\/\/blogs.bmj.com\/medical-ethics\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.bmj.com\/medical-ethics\/#\/schema\/logo\/image\/","url":"https:\/\/blogs.bmj.com\/medical-ethics\/files\/2026\/04\/jme-logo.png","contentUrl":"https:\/\/blogs.bmj.com\/medical-ethics\/files\/2026\/04\/jme-logo.png","width":200,"height":50,"caption":"Journal of Medical Ethics blog"},"image":{"@id":"https:\/\/blogs.bmj.com\/medical-ethics\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/blogs.bmj.com\/medical-ethics\/#\/schema\/person\/e73152f6aa4e164c7d625d77cf4fed35","name":"Hazem Zohny","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4d1bd322d5ff8e6f31a624003143903d0ba7346af8cdb1fd6b5e95924b92ece1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4d1bd322d5ff8e6f31a624003143903d0ba7346af8cdb1fd6b5e95924b92ece1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4d1bd322d5ff8e6f31a624003143903d0ba7346af8cdb1fd6b5e95924b92ece1?s=96&d=mm&r=g","caption":"Hazem Zohny"},"sameAs":["https:\/\/www.practicalethics.ox.ac.uk\/people\/dr-hazem-zohny"],"url":"https:\/\/blogs.bmj.com\/medical-ethics\/author\/zohnyh\/"}]}},"_links":{"self":[{"href":"https:\/\/blogs.bmj.com\/medical-ethics\/wp-json\/wp\/v2\/posts\/3647","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.bmj.com\/medical-ethics\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.bmj.com\/medical-ethics\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.bmj.com\/medical-ethics\/wp-json\/wp\/v2\/users\/354"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.bmj.com\/medical-ethics\/wp-json\/wp\/v2\/comments?post=3647"}],"version-history":[{"count":0,"href":"https:\/\/blogs.bmj.com\/medical-ethics\/wp-json\/wp\/v2\/posts\/3647\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.bmj.com\/medical-ethics\/wp-json\/wp\/v2\/media?parent=3647"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.bmj.com\/medical-ethics\/wp-json\/wp\/v2\/categories?post=3647"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.bmj.com\/medical-ethics\/wp-json\/wp\/v2\/tags?post=3647"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}