{"id":2968,"date":"2018-01-25T12:30:31","date_gmt":"2018-01-25T20:30:31","guid":{"rendered":""},"modified":"2025-04-21T07:51:28","modified_gmt":"2025-04-21T14:51:28","slug":"cybersecurity-in-healthcare-separating-data-location-and-is","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/","title":{"rendered":"Cybersecurity in Healthcare: Separating data location and IS"},"content":{"rendered":"<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td valign=\"middle\"><a href=\"\/\/info.microsoft.com\/DigitalTransformationinHealth-Registration.html\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2017\/01\/mag_icon_right_0078d7_40x39.png\" width=\"40\" height=\"39\" \/><\/a><\/td>\n<td valign=\"middle\"><a href=\"https:\/\/info.microsoft.com\/CybersecurityinHealth-Registration.html\" target=\"_blank\" rel=\"noopener\">Focus on: Cybersecurity in Healthcare<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Last week we highlighted how increasingly hyperscale cloud is seen as a positive for addressing cybersecurity in healthcare, where just a few years ago many healthcare organizations wondered if the cloud could be as secure as their on-prem systems. Our contention is that increasingly security gets added into \u201cbenefits\u201d column with other issues like cost and agility as organizations look to the cloud.\u00a0 <a href=\"https:\/\/www.digital.nhs.uk\/article\/8499\/NHS-and-social-care-data-off-shoring-and-the-use-of-public-cloud-services-guidance\" target=\"_blank\" rel=\"noopener\">New cloud policy guidance from the UK<\/a> (jointly written by NHS Digital, NHS England, the Department of Health and Social Care and NHS Improvement) echoes our comments about the cybersecurity in health benefits of hyperscale cloud, noting:\u00a0 \u201cCloud providers have a significant budget to pay for updating, maintaining, patching and securing their infrastructure. This means cloud services can mitigate many common risks NHS and social care organizations often face.\u201d<\/p>\n<p>But the guidance, entitled \u201c<a href=\"https:\/\/www.digital.nhs.uk\/media\/35029\/NHS-and-social-care-data-off-shoring-and-the-use-of-public-cloud-services\/pdf\/Guidance_on_NHS_and_social_care_use_of_public_cloud_services_-_FINAL_2018_0932\" target=\"_blank\" rel=\"noopener\">NHS and social care data: offshoring and the use of public cloud services<\/a>\u201d confronts another issue, related to the location of cloud data centers (and thus where patient data can be stored) that has historically been a barrier for healthcare customers in the Europe who wish to use hyperscale cloud.\u00a0 A report on barriers to cross border data flows from 2017 aptly sums up the belief as follows: \u201cMany policymakers reflexively and mistakenly believe that data is more private and secure when it is stored within a country\u2019s borders.\u201d\u00a0 Is location necessarily a reliable proxy for privacy and security of data, particularly in the EU where there is a Union-wide Directive (soon to be Regulation) for data transfer within the European Economic Area( EEA)?\u00a0 More specifically, in the context of Cybersecurity in healthcare, is location of storage of patient data a dispositive factor?<\/p>\n<p>In the UK,\u00a0 our healthcare partners and customers had long labored under the influence of a somewhat obscure NHS policy that held \u201cNHS has a prohibition on storing patient identifiable data outside of England where there is any link to national systems or applications.\u201d\u00a0 Many customer were confused due to contrary guidance from the UK Information Commissioner\u2019s Office that \u201cThere are no restrictions on the transfer of personal data to EEA countries.\u201d Although the former policy only applied to a small subset of patient health information (only information that came via links to national systems and thus not \u201clocally\u201d created patient information that was generated at the local NHS Trust level), this requirement challenged healthcare organizations who sought to leverage the cloud in the UK.\u00a0 This data location restriction interfered with cost, security, resiliency and reliability calculations that some organizations had made in the course of considering EU region hyperscale cloud services.<\/p>\n<p>The new joint guidance issued in the UK is welcomed on a number of fronts, including that it provides a clear endorsement of the cloud: \u201cNHS and Social care providers may use cloud computing services for NHS data\u201d and a reference to the UK Government\u2019s \u201cCloud First\u201d policy (that dates back to 2013).\u00a0 More importantly, it puts to rest the former confusion around data location and makes it clear that \u201cNHS and social care organizations are permitted to host data within the UK, EEA (countries deemed by the European Commission to have adequate protections for the rights of data subjects), or in the US where covered by Privacy Shield.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last week we highlighted how increasingly hyperscale cloud is seen as a positive for addressing cybersecurity in healthcare &#8211; learn more in this follow up post.<\/p>\n","protected":false},"author":0,"featured_media":10799,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"categories":[1507],"post_tag":[],"content-type":[1483],"coauthors":[1829],"class_list":["post-2968","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-healthcare","content-type-thought-leadership","review-flag-lever-1593580266-799","review-flag-new-1593580249-279","review-flag-on-pr-1593580812-5"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity in Healthcare: Separating data location and IS - Microsoft Industry Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity in Healthcare: Separating data location and IS - Microsoft Industry Blogs\" \/>\n<meta property=\"og:description\" content=\"Last week we highlighted how increasingly hyperscale cloud is seen as a positive for addressing cybersecurity in healthcare - learn more in this follow up post.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Industry Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-25T20:30:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-21T14:51:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/01\/449_banner.png\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 min read\" \/>\n\t<meta name=\"twitter:label2\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data2\" content=\"Steve Mutkoski\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/author\/steve-mutkoski\/\",\"@type\":\"Person\",\"@name\":\"Steve Mutkoski\"}],\"headline\":\"Cybersecurity in Healthcare: Separating data location and IS\",\"datePublished\":\"2018-01-25T20:30:31+00:00\",\"dateModified\":\"2025-04-21T14:51:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/\"},\"wordCount\":554,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/01\/449_banner.png\",\"articleSection\":[\"Healthcare\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/\",\"name\":\"Cybersecurity in Healthcare: Separating data location and IS - Microsoft Industry Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/01\/449_banner.png\",\"datePublished\":\"2018-01-25T20:30:31+00:00\",\"dateModified\":\"2025-04-21T14:51:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/01\/449_banner.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/01\/449_banner.png\",\"width\":960,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity in Healthcare: Separating data location and IS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/\",\"name\":\"Microsoft Industry Blogs\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization\",\"name\":\"Microsoft Industry Blogs\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png\",\"width\":259,\"height\":194,\"caption\":\"Microsoft Industry Blogs\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity in Healthcare: Separating data location and IS - Microsoft Industry Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity in Healthcare: Separating data location and IS - Microsoft Industry Blogs","og_description":"Last week we highlighted how increasingly hyperscale cloud is seen as a positive for addressing cybersecurity in healthcare - learn more in this follow up post.","og_url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/","og_site_name":"Microsoft Industry Blogs","article_published_time":"2018-01-25T20:30:31+00:00","article_modified_time":"2025-04-21T14:51:28+00:00","og_image":[{"width":960,"height":300,"url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/01\/449_banner.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 min read","Written by":"Steve Mutkoski"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/author\/steve-mutkoski\/","@type":"Person","@name":"Steve Mutkoski"}],"headline":"Cybersecurity in Healthcare: Separating data location and IS","datePublished":"2018-01-25T20:30:31+00:00","dateModified":"2025-04-21T14:51:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/"},"wordCount":554,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/01\/449_banner.png","articleSection":["Healthcare"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/","url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/","name":"Cybersecurity in Healthcare: Separating data location and IS - Microsoft Industry Blogs","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/01\/449_banner.png","datePublished":"2018-01-25T20:30:31+00:00","dateModified":"2025-04-21T14:51:28+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/01\/449_banner.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2018\/01\/449_banner.png","width":960,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/healthcare\/2018\/01\/25\/cybersecurity-in-healthcare-separating-data-location-and-is\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity in Healthcare: Separating data location and IS"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/","name":"Microsoft Industry Blogs","description":"","publisher":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#organization","name":"Microsoft Industry Blogs","url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","contentUrl":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-content\/uploads\/2019\/08\/Microsoft-Logo.png","width":259,"height":194,"caption":"Microsoft Industry Blogs"},"image":{"@id":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/#\/schema\/logo\/image\/"}}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Industry Blogs","distributor_original_site_url":"https:\/\/www.microsoft.com\/en-us\/industry\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/2968","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/comments?post=2968"}],"version-history":[{"count":2,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/2968\/revisions"}],"predecessor-version":[{"id":121571,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/posts\/2968\/revisions\/121571"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/media\/10799"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/media?parent=2968"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/categories?post=2968"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/post_tag?post=2968"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/content-type?post=2968"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/industry\/blog\/wp-json\/wp\/v2\/coauthors?post=2968"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}