{"id":1756,"date":"2019-06-05T09:00:57","date_gmt":"2019-06-04T23:00:57","guid":{"rendered":"http:\/\/blog.amt.org.au\/?p=1756"},"modified":"2019-06-04T09:23:08","modified_gmt":"2019-06-03T23:23:08","slug":"do-you-feel-secure","status":"publish","type":"post","link":"https:\/\/blog.amt.org.au\/index.php\/2019\/06\/05\/do-you-feel-secure\/","title":{"rendered":"Do You Feel Secure?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>By Sam McCracken<\/strong><\/h2>\n\n\n\n<p><em>How did Clive Palmer get my phone number?<\/em><\/p>\n\n\n\n<p>I don\u2019t want to sound like one of those tinfoil hat types who say \u201cI think there&#8217;s something going on\u201d but I think there&#8217;s something going on.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright is-resized\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/Data-camera-300x289.jpg?resize=261%2C251\" alt=\"\" class=\"wp-image-1759\" width=\"261\" height=\"251\" srcset=\"https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/Data-camera.jpg?resize=300%2C289&amp;ssl=1 300w, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/Data-camera.jpg?w=429&amp;ssl=1 429w\" sizes=\"auto, (max-width: 261px) 100vw, 261px\" \/><figcaption>Hello Big Brother?<\/figcaption><\/figure><\/div>\n\n\n\n<p>Our lack of control of personal privacy is bordering on Orwellian. Personal data is the new commodity and the trade in our data eclipses the oil and gold rushes of the last couple of centuries. Apple and Microsoft have broken through the trillion-dollar ceiling and the rest aren&#8217;t far behind.<\/p>\n\n\n\n<p>Tech journalist Kashmir Hill recently conducted an experiment where she<a href=\"https:\/\/www.gizmodo.com.au\/2019\/02\/i-cut-the-big-five-tech-giants-from-my-life-it-was-hell\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\"> tried to live without \u2018the frightful five<\/a>\u2019. Over the course of five weeks, she blocked Amazon, Facebook, Google, Microsoft, and Apple. The outcome being that it is pretty much impossible to participate in a modern society without exposure to these giant companies. However, there are ways we can minimise our exposure \u2013 keep reading to find out how.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft is-resized\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/padlock-2503865_640-199x300.png?resize=103%2C155\" alt=\"\" class=\"wp-image-1763\" width=\"103\" height=\"155\" srcset=\"https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/padlock-2503865_640.png?resize=199%2C300&amp;ssl=1 199w, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/padlock-2503865_640.png?resize=300%2C453&amp;ssl=1 300w, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/padlock-2503865_640.png?w=424&amp;ssl=1 424w\" sizes=\"auto, (max-width: 103px) 100vw, 103px\" \/><\/figure><\/div>\n\n\n\n<p>Okay, so what has all this got to do with massage therapy? Well, we have a responsibility to protect our patients\u2019 privacy and the privacy of the information they share with us. Hacks and data breaches have become commonplace but the most worrying thing is how easily we give up our private information to online companies and, in the process, we may also betray our patients by divulging their private data as well.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>What? How? Huh?<\/strong><\/h4>\n\n\n\n<p>It was no surprise to see the public backlash when the government recently wanted to introduce centralised healthcare records. The public obviously value their data privacy and in particular, their health data. Our health data may be valued by us but it is also valued by those who trade in data.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"127\" src=\"https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/key-2706188_640-300x127.png?resize=300%2C127\" alt=\"\" class=\"wp-image-1761\" srcset=\"https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/key-2706188_640.png?resize=300%2C127&amp;ssl=1 300w, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/key-2706188_640.png?w=640&amp;ssl=1 640w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n\n<p>In the US, there have been over 11.5 billion records breached since 2005 (244 million of which were health related records).<sup>1<\/sup><\/p>\n\n\n\n<p>In Australia, since February 2018, the healthcare sector suffered the most data breaches of any industry group.<sup>2<\/sup><\/p>\n\n\n\n<blockquote style=\"text-align:center\" class=\"wp-block-quote is-style-large is-layout-flow wp-block-quote-is-layout-flow\"><p><strong>A third (33%) of all breaches in the last 12 months involved health information.<\/strong><\/p><\/blockquote>\n\n\n\n<p>An example of how we can unwittingly divulge our patient\u2019s private information is with our social media. When we tick that box to upload our contacts to help find our friends online, I wonder how many of us stop to consider that, without obtaining consent, we are allowing that social media platform to harvest the data of our friends, family and patients (assuming we have patient contact details on our phones or computer)? And that personal\/private information ends up in a data server farm and is on-sold to third, fourth, fifth and who knows how many other parties?<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright is-resized\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/safe-913452_1280-300x261.jpg?resize=222%2C193\" alt=\"\" class=\"wp-image-1765\" width=\"222\" height=\"193\" srcset=\"https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/safe-913452_1280.jpg?resize=300%2C261&amp;ssl=1 300w, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/safe-913452_1280.jpg?resize=768%2C667&amp;ssl=1 768w, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/safe-913452_1280.jpg?resize=1024%2C890&amp;ssl=1 1024w, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/safe-913452_1280.jpg?resize=750%2C652&amp;ssl=1 750w, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/safe-913452_1280.jpg?w=1280&amp;ssl=1 1280w\" sizes=\"auto, (max-width: 222px) 100vw, 222px\" \/><\/figure><\/div>\n\n\n\n<p>By default, Windows has access to all your contacts. Most people take care to ensure they have antivirus software installed on their Windows PC \u2013 which is wise \u2013 but in some ways, Windows could itself be considered a virus.<sup>3<\/sup> Windows telemetry is constantly uploading your data and if you store client\/patient data on your PC, then that is also being uploaded.<\/p>\n\n\n\n<p>If you want to know how much of your data has been mined by Google, download your data from your Google account. Don&#8217;t be surprised if your file is 150 gigabytes and takes 4 days to download. Ever wondered how Google knew to ask if you would like your flight booking details stored on your Google calendar? Depending on how you manage your appointment diary, Google may be trawling through your patient database as you read this.<\/p>\n\n\n\n<p>I can&#8217;t talk about Facebook without it turning into a rant. If you only read the headlines, you soon get the picture with regards to unethical practices, data breaches and privacy invasion.<\/p>\n\n\n\n<p>I could fill many pages on how tech giants mine our data but I think by now you understand what I&#8217;m talking about, and we should all be mindful that there really is something going on.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>What Can I Do To Keep Data Safe?<\/strong><\/h4>\n\n\n\n<p>While there\u2019s no need to be paranoid to tinfoil hat levels, there are plenty of ways to keep data safe. Below are some suggestions for strengthening your data security.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"141\" src=\"https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/regulation-3246979_1280-300x141.jpg?resize=300%2C141\" alt=\"\" class=\"wp-image-1764\" srcset=\"https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/regulation-3246979_1280.jpg?resize=300%2C141&amp;ssl=1 300w, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/regulation-3246979_1280.jpg?resize=768%2C360&amp;ssl=1 768w, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/regulation-3246979_1280.jpg?resize=1024%2C480&amp;ssl=1 1024w, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/regulation-3246979_1280.jpg?resize=750%2C352&amp;ssl=1 750w, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/regulation-3246979_1280.jpg?w=1280&amp;ssl=1 1280w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n\n<ul class=\"wp-block-list\"><li>Linux is a safe reliable and secure operating system and doesn&#8217;t suffer from viruses like Windows. It&#8217;s also free. Find out more about installing Linux from<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.ubuntu.com\/\" target=\"_blank\"> Ubuntu<\/a> or<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/system76.com\/pop\" target=\"_blank\"> POP<\/a>.<\/li><li>Ensure your website is secure and use https encryption. This can be organised through your website\u2019s host or here is a<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/letsencrypt.org\/\" target=\"_blank\"> free version \u201cLet\u2019s Encrypt\u201d from the Linux Foundation<\/a>.<\/li><li>Include a privacy policy on your website. The General Data Protection Regulation (EU) 2016\/679 (GDPR) has impacted websites across the world. It\u2019s a good idea to have a privacy policy regardless of whether you need to comply with GDPR. You can write your own with the help of<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.isitwp.com\/how-to-make-a-wordpress-privacy-policy\/\" target=\"_blank\"> a guide like this one<\/a> or<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.privacypolicies.com\/free-privacy-policy-generator\/\" target=\"_blank\"> get one generated (for free)<\/a>.<\/li><li>Do not have mobile phones, tablets, laptops, webcams or any device that has a camera or a microphone in the treatment room.<\/li><li>If you store client data in the cloud, realise that &#8216;the cloud&#8217; is just someone else&#8217;s computer. Make sure it is<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/searchsecurity.techtarget.com\/definition\/end-to-end-encryption-E2EE\" target=\"_blank\"> end to end encrypted<\/a> and as secure as possible. Massage therapists must comply with all government regulations regarding the storage of health records. The<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"http:\/\/www.amt.org.au\/downloads\/practice-resources\/AMT-code-of-practice-final.pdf#page=35\" target=\"_blank\"> AMT Code of Practice<\/a> includes information on securing client data and privacy.<\/li><li>Use<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/protonmail.com\/\" target=\"_blank\"> Protonmail<\/a> instead of Gmail if you don\u2019t have an email address related to your business. It\u2019s free and encrypted.<sup>*<\/sup><\/li><li>Change the password on your router (the thing that connects your computer to the interwebs) from the default &#8220;admin&#8221; and ensure your router has up to date firmware and security patches. Consult your router\u2019s user guide on how to update the firmware and how to change the default password. You can also contact your router company or internet service provider and have them talk you through the procedure.<\/li><li>Use<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.mozilla.org\/en-US\/firefox\/new\/\" target=\"_blank\"> Firefox<\/a> or<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/brave.com\/\" target=\"_blank\"> Brave<\/a> as your web browser instead of Chrome.<\/li><li>Use the<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/duckduckgo.com\/\" target=\"_blank\"> Duckduckgo<\/a> search engine instead of Google.<\/li><li>If you sell, give away or throw away any device that has contained private data, ensure that the hard drive has been thoroughly wiped or destroyed.<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.wikihow.com\/Properly-Dispose-of-Hard-Disk-Drives\" target=\"_blank\"> This guide<\/a> is US focused but some helpful hints nonetheless on how to remove data from your old hard drive.<\/li><li>Encrypt the hard drive on your computer and ensure no one has access to its contents. Linux has easy to use encryption tools and POP, as mentioned above, has encryption on by default. If you must use Windows, be sure to use Windows PRO, it has an encryption tool that can be accessed in the settings under \u2018security\u2019.<\/li><li>Use strong passwords. There are lots of online password generators that you can customise to create a strong password. No need to use your favourite kid\u2019s name or the family pet any longer.<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.lastpass.com\/password-generator\" target=\"_blank\"> Try this password generator<\/a> or<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/passwordsgenerator.net\/\" target=\"_blank\"> this one<\/a>.<\/li><li>Regularly check<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/haveibeenpwned.com\/\" target=\"_blank\"> https:\/\/haveibeenpwned.com\/<\/a> website to see if any of your passwords or accounts have been compromised.<\/li><li>Use the free<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/bitwarden.com\/\" target=\"_blank\"> Bitwarden password manager<\/a> to look after your passwords.<\/li><\/ul>\n\n\n\n<p>Stay safe, kids!<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter is-resized\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/koala-61189_1280-300x195.jpg?resize=369%2C240\" alt=\"\" class=\"wp-image-1762\" width=\"369\" height=\"240\" srcset=\"https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/koala-61189_1280.jpg?resize=300%2C195&amp;ssl=1 300w, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/koala-61189_1280.jpg?resize=768%2C499&amp;ssl=1 768w, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/koala-61189_1280.jpg?resize=1024%2C666&amp;ssl=1 1024w, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/koala-61189_1280.jpg?resize=750%2C488&amp;ssl=1 750w, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/koala-61189_1280.jpg?w=1280&amp;ssl=1 1280w\" sizes=\"auto, (max-width: 369px) 100vw, 369px\" \/><\/figure><\/div>\n\n\n\n<p>* Editor\u2019s note: In May 2019, Protonmail were accused of voluntarily providing access to emails. They provided clarity.<a href=\"https:\/\/www.theregister.co.uk\/2019\/05\/29\/protonmail_dismisses_spying\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\"> Read more here<\/a>.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>References<\/strong><\/h4>\n\n\n\n<ol class=\"wp-block-list\"><li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.privacyrights.org\/data-breaches\" target=\"_blank\">Privacy Rights Clearinghouse<\/a>.<\/li><li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.oaic.gov.au\/privacy-law\/privacy-act\/notifiable-data-breaches-scheme\/quarterly-statistics-reports\/\" target=\"_blank\">Office of the Australian Information Commissioner<\/a><\/li><li><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.eff.org\/deeplinks\/2016\/08\/windows-10-microsoft-blatantly-disregards-user-choice-and-privacy-deep-dive\" target=\"_blank\">Microsoft Disregards User Choice and Privacy: A Deep Dive<\/a><\/li><\/ol>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Further reading<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/www.abc.net.au\/news\/science\/2018-04-18\/healthcare-target-for-hackers-experts-warn\/9663304\">Healthcare data a growing target for hackers, cybersecurity experts warn<\/a><\/li><li>Some health data collection is beneficial \u2013<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.abc.net.au\/news\/science\/2019-05-28\/health-data-used-to-train-artificial-intelligence-privacy-risks\/11102292\" target=\"_blank\"> Health Data Being Used to Train Artificial Intelligence<\/a><\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>About the Author<\/strong><\/h4>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft is-resized\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/05\/Sam.McCracken-255x300.jpg?resize=153%2C180\" alt=\"\" class=\"wp-image-1644\" width=\"153\" height=\"180\" srcset=\"https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/05\/Sam.McCracken.jpg?resize=255%2C300&amp;ssl=1 255w, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/05\/Sam.McCracken.jpg?resize=768%2C903&amp;ssl=1 768w, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/05\/Sam.McCracken.jpg?resize=871%2C1024&amp;ssl=1 871w, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/05\/Sam.McCracken.jpg?resize=750%2C882&amp;ssl=1 750w, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/05\/Sam.McCracken.jpg?resize=300%2C353&amp;ssl=1 300w, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/05\/Sam.McCracken.jpg?w=1440&amp;ssl=1 1440w\" sizes=\"auto, (max-width: 153px) 100vw, 153px\" \/><\/figure><\/div>\n\n\n\n<p>Sam McCracken is a remedial massage therapist on Brisbane&#8217;s north side. Sam qualified in traditional Thai massage in 2006 from the world&#8217;s oldest massage school (Wat Po Traditional Medicine School) and with the benefit of over 30 years of daily Tai Chi practice, he believes he is on track to achieving his goal of becoming the world&#8217;s oldest massage therapist. Sam has a keen interest in modern understandings of traditional massage methods. He has studied many lineages of massage, mostly from Asian traditions.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Official AMT Information  \u2013 Data Breaches  \u2013  Your Obligations<\/h4>\n\n\n\n<p><strong>Did you know that massage therapists are subject to the Notifiable Data Breaches (NDB) scheme? The scheme came into effect on 22 February 2018. It was established by the passage of the\u00a0<\/strong><em><a rel=\"noreferrer noopener\" aria-label=\"Privacy Amendment (Notifiable Data Breaches) Act 2017 (opens in a new tab)\" href=\"https:\/\/www.legislation.gov.au\/Details\/C2017A00012\" target=\"_blank\"><strong>Privacy Amendment (Notifiable Data Breaches) Act 2017<\/strong><\/a><strong>.<\/strong><\/em><\/p>\n\n\n\n<p><strong>The NDB includes an obligation to notify individuals whose personal information is involved in a data breach that is likely to result in serious harm. The notification must include recommendations about the steps individuals should take in response to the breach. The <\/strong><a rel=\"noreferrer noopener\" aria-label=\"Australian Information Commissioner (opens in a new tab)\" href=\"https:\/\/www.oaic.gov.au\/about-us\/who-we-are\/\" target=\"_blank\"><strong>Australian Information Commissioner<\/strong><\/a><strong> must also be notified of eligible data breaches.<\/strong><\/p>\n\n\n\n<p><strong>You must be prepared to conduct a quick assessment of a suspected data breach to determine whether it is likely to result in serious harm, and as a result require notification. Notifications to the Commissioner should be lodged through the <\/strong><a rel=\"noreferrer noopener\" aria-label=\"Notifiable Data Breach Form (opens in a new tab)\" href=\"https:\/\/forms.business.gov.au\/smartforms\/landing.htm?formCode=OAIC-NDB\" target=\"_blank\"><strong>Notifiable Data Breach Form<\/strong><\/a><strong>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How did a politician get his hands on your mobile phone number? Can he also get his hands on your clients&#8217; information? Can anyone else? It&#8217;s time to think about minimising the risk of a data breach. Sam McCracken is here to help. Oh, and we tell you what to do if your clients&#8217; data is breached.<\/p>\n","protected":false},"author":1,"featured_media":1766,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[2],"tags":[427,417,428,418,275],"class_list":["post-1756","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-professional-practice","tag-data-breach","tag-data-security","tag-online-safety","tag-privacy","tag-sam-mccracken"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/06\/security-2168234_1280.jpg?fit=1280%2C811&ssl=1","jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":1631,"url":"https:\/\/blog.amt.org.au\/index.php\/2019\/05\/08\/the-top-10-of-being-a-massage-therapist\/","url_meta":{"origin":1756,"position":0},"title":"The Top 10 of Being a Massage Therapist","author":"admin","date":"08\/05\/2019","format":false,"excerpt":"Have you forgotten the basics of being a massage therapist? New to massage and want to learn what keeps massage therapists focused? We asked a bunch of wise massage therapists to tell us what they believe are the foundations of being a massage therapist.","rel":"","context":"In &quot;AMT&quot;","block_context":{"text":"AMT","link":"https:\/\/blog.amt.org.au\/index.php\/category\/amt\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/05\/Massage-Club.png?fit=1200%2C628&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/05\/Massage-Club.png?fit=1200%2C628&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/05\/Massage-Club.png?fit=1200%2C628&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/05\/Massage-Club.png?fit=1200%2C628&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/05\/Massage-Club.png?fit=1200%2C628&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1019,"url":"https:\/\/blog.amt.org.au\/index.php\/2018\/09\/19\/does-that-feel-tight\/","url_meta":{"origin":1756,"position":1},"title":"Does That Feel Tight?","author":"admin","date":"19\/09\/2018","format":false,"excerpt":"\"Does that feel tight to you?\" A question most Massage Therapists are confronted with. What is \"tight\" and is what a client perceives as \"tight\" related to what a MT feels? Brisbane based Massage Therapist, Sam McCracken examines what a sensation of \"tight\" might mean.","rel":"","context":"In &quot;Clinical Practice&quot;","block_context":{"text":"Clinical Practice","link":"https:\/\/blog.amt.org.au\/index.php\/category\/clinical-practice\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2018\/08\/rope-667319_1920.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2018\/08\/rope-667319_1920.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2018\/08\/rope-667319_1920.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2018\/08\/rope-667319_1920.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2018\/08\/rope-667319_1920.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1293,"url":"https:\/\/blog.amt.org.au\/index.php\/2018\/12\/19\/the-best-of-2018\/","url_meta":{"origin":1756,"position":2},"title":"The Best of 2018","author":"admin","date":"19\/12\/2018","format":false,"excerpt":"As the sun sets on 2018, we take a look back at some of the most read articles from AMT's blog over the last 12 months. What was your favourite?","rel":"","context":"In &quot;AMT&quot;","block_context":{"text":"AMT","link":"https:\/\/blog.amt.org.au\/index.php\/category\/amt\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2018\/12\/Best-of-2018.png?fit=560%2C315&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2018\/12\/Best-of-2018.png?fit=560%2C315&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2018\/12\/Best-of-2018.png?fit=560%2C315&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":3127,"url":"https:\/\/blog.amt.org.au\/index.php\/2021\/03\/16\/the-anniversary\/","url_meta":{"origin":1756,"position":3},"title":"The Anniversary","author":"admin","date":"16\/03\/2021","format":false,"excerpt":"A lot can happen in a year. Do you remember how you felt on this day last year?","rel":"","context":"In &quot;AMT&quot;","block_context":{"text":"AMT","link":"https:\/\/blog.amt.org.au\/index.php\/category\/amt\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2021\/03\/Screenshot-2021-03-15-160249.jpg?fit=954%2C615&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2021\/03\/Screenshot-2021-03-15-160249.jpg?fit=954%2C615&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2021\/03\/Screenshot-2021-03-15-160249.jpg?fit=954%2C615&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2021\/03\/Screenshot-2021-03-15-160249.jpg?fit=954%2C615&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":2187,"url":"https:\/\/blog.amt.org.au\/index.php\/2019\/11\/27\/the-opposite-of-hurt\/","url_meta":{"origin":1756,"position":4},"title":"The Opposite of Hurt","author":"admin","date":"27\/11\/2019","format":false,"excerpt":"How easy is it to read \"cancer\" scribbled on an intake form, assemble our cancer knowledge and treat accordingly? But what about the person on the end of that diagnosis? What role do they have in treatment?","rel":"","context":"In &quot;Clinical Practice&quot;","block_context":{"text":"Clinical Practice","link":"https:\/\/blog.amt.org.au\/index.php\/category\/clinical-practice\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/11\/kat3.jpg?fit=640%2C422&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/11\/kat3.jpg?fit=640%2C422&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2019\/11\/kat3.jpg?fit=640%2C422&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":1184,"url":"https:\/\/blog.amt.org.au\/index.php\/2018\/10\/24\/amtconferencereview\/","url_meta":{"origin":1756,"position":5},"title":"What Do You Call a Gathering of Massage Therapists?","author":"admin","date":"24\/10\/2018","format":false,"excerpt":"Who would have thought that an innocent, genuine question about training costs would lead to a sold out AMT Conference? But what was it really like inside those workshops, plenary sessions and the lunch room? Who was the standout presenter? And who is going to the 2019 AMT Conference?","rel":"","context":"In &quot;AMT Conference&quot;","block_context":{"text":"AMT Conference","link":"https:\/\/blog.amt.org.au\/index.php\/category\/amt-conference\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2018\/10\/1.jpg?fit=996%2C414&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2018\/10\/1.jpg?fit=996%2C414&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2018\/10\/1.jpg?fit=996%2C414&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/blog.amt.org.au\/wp-content\/uploads\/2018\/10\/1.jpg?fit=996%2C414&ssl=1&resize=700%2C400 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/blog.amt.org.au\/index.php\/wp-json\/wp\/v2\/posts\/1756","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.amt.org.au\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.amt.org.au\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.amt.org.au\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.amt.org.au\/index.php\/wp-json\/wp\/v2\/comments?post=1756"}],"version-history":[{"count":12,"href":"https:\/\/blog.amt.org.au\/index.php\/wp-json\/wp\/v2\/posts\/1756\/revisions"}],"predecessor-version":[{"id":1778,"href":"https:\/\/blog.amt.org.au\/index.php\/wp-json\/wp\/v2\/posts\/1756\/revisions\/1778"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.amt.org.au\/index.php\/wp-json\/wp\/v2\/media\/1766"}],"wp:attachment":[{"href":"https:\/\/blog.amt.org.au\/index.php\/wp-json\/wp\/v2\/media?parent=1756"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.amt.org.au\/index.php\/wp-json\/wp\/v2\/categories?post=1756"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.amt.org.au\/index.php\/wp-json\/wp\/v2\/tags?post=1756"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}