{"id":3896,"date":"2024-01-08T08:54:03","date_gmt":"2024-01-08T13:54:03","guid":{"rendered":"https:\/\/scholarblogs.emory.edu\/techtransfer\/?p=3896"},"modified":"2024-01-08T08:54:03","modified_gmt":"2024-01-08T13:54:03","slug":"six-things-to-know-about-trade-secrets","status":"publish","type":"post","link":"https:\/\/scholarblogs.emory.edu\/techtransfer\/2024\/01\/six-things-to-know-about-trade-secrets\/","title":{"rendered":"Six Things to Know about Trade Secrets"},"content":{"rendered":"<p>Trade secrets are a way to protect confidential information without a legal fee. Any piece of knowledge that gives a business or corporation a competitive advantage can be a trade secret. Do you have rights to a trade secret? Read on.<\/p>\n<h3>1. Trade secrets can include technical and commercial information.<\/h3>\n<p>According to the Uniform Trade Secrets Act (UTSA), a <a href=\"https:\/\/www.law.cornell.edu\/wex\/trade_secret\" target=\"_blank\" rel=\"noopener\">trade secret<\/a> can be any \u201cformula, pattern, compilation, program, device, method, technique, or process\u201d that has commercial value based upon keeping it a secret. This can be <a href=\"https:\/\/www.wipo.int\/tradesecrets\/en\/\" target=\"_blank\" rel=\"noopener\">technical information<\/a> (ex. manufacturing processes and computer program designs) or commercial information (ex. client lists and marketing strategies).<\/p>\n<h3>2. A trade secret can be protected for an infinite period.<\/h3>\n<p>The <a href=\"https:\/\/www.wipo.int\/tradesecrets\/en\/\" target=\"_blank\" rel=\"noopener\">intellectual property (IP) rights<\/a> of a trade secret last as long as:<\/p>\n<ul>\n<li>it has economic value due to its confidentiality<\/li>\n<li>it is only known by a select group<\/li>\n<li>precautions are taken to maintain its secrecy<\/li>\n<\/ul>\n<p>Once these three requirements are no longer met, the trade secret can no longer be enforced, and the information now belongs to the public domain.<\/p>\n<h3>3. The trade secret owner must take steps to protect their trade secrets.<\/h3>\n<p>It is the responsibility of the trade secret owner to protect their trade secrets. It\u2019s easier to protect information when the trade secret holder takes precautions such as:<\/p>\n<ul>\n<li>filing <a href=\"https:\/\/ironcladapp.com\/journal\/contracts\/non-disclosure-agreements\/#:~:text=NDAs%2C%20or%20non%2Ddisclosure%20agreements,not%20to%20share%20that%20information.\" target=\"_blank\" rel=\"noopener\">non-disclosure agreements (NDA)<\/a><\/li>\n<li>filing <a href=\"https:\/\/www.techtarget.com\/whatis\/definition\/non-compete-agreement-NCA\" target=\"_blank\" rel=\"noopener\">non-compete agreements (NCA)<\/a><\/li>\n<li>implementing IT security infrastructure<\/li>\n<li>limiting the accessibility of crucial documents<\/li>\n<\/ul>\n<h3>4. The use of a trade secret does not always mean misappropriation occurred.<\/h3>\n<p>When filing a trade secret claim, the holder of the information must show that proper precautions were implemented and that the trade secret was wrongfully taken. Examples of <a href=\"https:\/\/www.reuters.com\/legal\/legalindustry\/trade-secrets-proper-improper-means-acquisition-2022-07-18\/\" target=\"_blank\" rel=\"noopener\">misappropriation<\/a> include disclosure of someone else\u2019s trade secret without consent and the use of improper means (ex. theft, bribery, or espionage) to acquire the trade secret.<\/p>\n<p>However, trade secrets are only protected when obtained through improper means or a breach of confidence. Lawful ways to learn trade secrets include:<\/p>\n<ul>\n<li>research and development<\/li>\n<li>reverse engineering<\/li>\n<li>market analysis<\/li>\n<\/ul>\n<h3>5. Trade secrets are protected on both the state and federal level.<\/h3>\n<p>The <a href=\"https:\/\/higherlogicdownload.s3-external-1.amazonaws.com\/UNIFORMLAWS\/e58f19a0-6a5e-c90f-67c1-ac1f747ad47b_file.pdf?AWSAccessKeyId=AKIAVRDO7IEREB57R7MT&amp;Expires=1698698158&amp;Signature=iECi%2BDpa7cnMtD0%2BB%2F%2FlHdVY6S8%3D\" target=\"_blank\" rel=\"noopener\">UTSA<\/a> aimed to standardize state laws governing trade secrets and it has been adopted by 48 states. The <a href=\"https:\/\/www.govinfo.gov\/content\/pkg\/PLAW-104publ294\/pdf\/PLAW-104publ294.pdf\" target=\"_blank\" rel=\"noopener\">Economic Espionage Act of 1996<\/a> made the theft or misappropriation of a trade secret a federal crime with penalties of imprisonment for individuals and fines for corporations. Additionally, the <a href=\"https:\/\/www.congress.gov\/bill\/114th-congress\/senate-bill\/1890\/text\" target=\"_blank\" rel=\"noopener\">Defend Trade Secrets Act of 2016<\/a> amended the Economic Espionage Act to include the right for an individual to sue in federal court for trade secret misappropriation.<\/p>\n<h3>6. Protecting too many trade secrets may prevent the public from accessing important data and information.<\/h3>\n<p>The protection of corporate information blocks people from learning about various topics, ranging from surveillance technologies to environmental hazards. Trade secret protections promote a <a href=\"https:\/\/scholarship.law.ufl.edu\/cgi\/viewcontent.cgi?article=1717&amp;context=flr\" target=\"_blank\" rel=\"noopener\">lack of transparency<\/a> between the company and the consumer, limiting accountability for public health and safety. Information protected by trade secrets may also <a href=\"https:\/\/www.hhrjournal.org\/2021\/06\/addressing-the-risks-that-trade-secret-protections-pose-for-health-and-rights\/#_ednref5\" target=\"_blank\" rel=\"noopener\">limit scientific research and development<\/a>. While patents only protect information for a set period, trade secrets can protect information such as clinical trial results or drug formulas indefinitely. This secrecy may have unintended consequences regarding treatment and vaccine development.<\/p>\n<p>Due to modern technology such as <a href=\"https:\/\/www.law.com\/legaltechnews\/2023\/06\/09\/risks-that-generative-ai-poses-to-trade-secret-protections\/?slreturn=20231109145234\" target=\"_blank\" rel=\"noopener\">artificial intelligence (AI)<\/a>, the risk of trade secret theft is at an <a href=\"http:\/\/www.rmmagazine.com\/articles\/article\/2019\/06\/01\/-The-Reality-of-Trade-Secret-Protection-\" target=\"_blank\" rel=\"noopener\">all-time high<\/a>. Collaboration between legal, IT, security, and HR teams is essential to ensure proper protocols are followed to protect trade secrets. Increasing employee awareness about the significance of protecting trade secrets is just the first step in the fight to keep confidential information confidential.<\/p>\n<p><em>&#8211; Masin Kearney<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trade secrets are a way to protect confidential information without a legal fee. Any piece of knowledge that gives a business or corporation a competitive advantage can be a trade secret. Do you have rights to a trade secret? Read on. 1. Trade secrets can include technical and commercial information. According to the Uniform Trade Secrets Act (UTSA), a trade secret can be any \u201cformula, pattern, compilation, program, device, method, technique, or process\u201d that has commercial value based upon keeping it a secret. This can be technical information (ex. manufacturing processes and computer program designs) or commercial information (ex. client <a class=\"more-link\" href=\"https:\/\/scholarblogs.emory.edu\/techtransfer\/2024\/01\/six-things-to-know-about-trade-secrets\/\">Read More &#8230;<\/a><\/p>\n","protected":false},"author":8177,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[47],"class_list":["post-3896","post","type-post","status-publish","format-standard","hentry","category-education","tag-ip_protection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Six Things to Know about Trade Secrets - Emory Technology Transfer Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/scholarblogs.emory.edu\/techtransfer\/2024\/01\/six-things-to-know-about-trade-secrets\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Six Things to Know about Trade Secrets - Emory Technology Transfer Blog\" \/>\n<meta property=\"og:description\" content=\"Trade secrets are a way to protect confidential information without a legal fee. Any piece of knowledge that gives a business or corporation a competitive advantage can be a trade secret. Do you have rights to a trade secret? Read on. 1. Trade secrets can include technical and commercial information. According to the Uniform Trade Secrets Act (UTSA), a trade secret can be any \u201cformula, pattern, compilation, program, device, method, technique, or process\u201d that has commercial value based upon keeping it a secret. This can be technical information (ex. manufacturing processes and computer program designs) or commercial information (ex. client Read More ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/scholarblogs.emory.edu\/techtransfer\/2024\/01\/six-things-to-know-about-trade-secrets\/\" \/>\n<meta property=\"og:site_name\" content=\"Emory Technology Transfer Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-08T13:54:03+00:00\" \/>\n<meta name=\"author\" content=\"Asher Alt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@EmoryOTT\" \/>\n<meta name=\"twitter:site\" content=\"@EmoryOTT\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Asher Alt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/scholarblogs.emory.edu\\\/techtransfer\\\/2024\\\/01\\\/six-things-to-know-about-trade-secrets\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/scholarblogs.emory.edu\\\/techtransfer\\\/2024\\\/01\\\/six-things-to-know-about-trade-secrets\\\/\"},\"author\":{\"name\":\"Asher Alt\",\"@id\":\"https:\\\/\\\/scholarblogs.emory.edu\\\/techtransfer\\\/#\\\/schema\\\/person\\\/f85cc8d208055dca5e992bc069411042\"},\"headline\":\"Six Things to Know about Trade Secrets\",\"datePublished\":\"2024-01-08T13:54:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/scholarblogs.emory.edu\\\/techtransfer\\\/2024\\\/01\\\/six-things-to-know-about-trade-secrets\\\/\"},\"wordCount\":587,\"publisher\":{\"@id\":\"https:\\\/\\\/scholarblogs.emory.edu\\\/techtransfer\\\/#organization\"},\"keywords\":[\"IP_Protection\"],\"articleSection\":[\"Education\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/scholarblogs.emory.edu\\\/techtransfer\\\/2024\\\/01\\\/six-things-to-know-about-trade-secrets\\\/\",\"url\":\"https:\\\/\\\/scholarblogs.emory.edu\\\/techtransfer\\\/2024\\\/01\\\/six-things-to-know-about-trade-secrets\\\/\",\"name\":\"Six Things to Know about Trade Secrets - Emory Technology Transfer Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/scholarblogs.emory.edu\\\/techtransfer\\\/#website\"},\"datePublished\":\"2024-01-08T13:54:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/scholarblogs.emory.edu\\\/techtransfer\\\/2024\\\/01\\\/six-things-to-know-about-trade-secrets\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/scholarblogs.emory.edu\\\/techtransfer\\\/2024\\\/01\\\/six-things-to-know-about-trade-secrets\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/scholarblogs.emory.edu\\\/techtransfer\\\/2024\\\/01\\\/six-things-to-know-about-trade-secrets\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/scholarblogs.emory.edu\\\/techtransfer\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Six Things to Know about Trade Secrets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/scholarblogs.emory.edu\\\/techtransfer\\\/#website\",\"url\":\"https:\\\/\\\/scholarblogs.emory.edu\\\/techtransfer\\\/\",\"name\":\"Emory Technology Transfer Blog\",\"description\":\"Innovate Today, Impact Tomorrow\",\"publisher\":{\"@id\":\"https:\\\/\\\/scholarblogs.emory.edu\\\/techtransfer\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/scholarblogs.emory.edu\\\/techtransfer\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/scholarblogs.emory.edu\\\/techtransfer\\\/#organization\",\"name\":\"Emory University, Office of Technology Transfer\",\"url\":\"https:\\\/\\\/scholarblogs.emory.edu\\\/techtransfer\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/scholarblogs.emory.edu\\\/techtransfer\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/scholarblogs.emory.edu\\\/techtransfer\\\/files\\\/2023\\\/02\\\/EU_OfficeTechnologyTransfer_sq_280bk_2l.jpg\",\"contentUrl\":\"https:\\\/\\\/scholarblogs.emory.edu\\\/techtransfer\\\/files\\\/2023\\\/02\\\/EU_OfficeTechnologyTransfer_sq_280bk_2l.jpg\",\"width\":233,\"height\":146,\"caption\":\"Emory University, Office of Technology Transfer\"},\"image\":{\"@id\":\"https:\\\/\\\/scholarblogs.emory.edu\\\/techtransfer\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/EmoryOTT\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/10848784\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/scholarblogs.emory.edu\\\/techtransfer\\\/#\\\/schema\\\/person\\\/f85cc8d208055dca5e992bc069411042\",\"name\":\"Asher Alt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/67495711643bb30a4c72983487d2104f1c72a364737677cedbafae3d087a2ce2?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/67495711643bb30a4c72983487d2104f1c72a364737677cedbafae3d087a2ce2?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/67495711643bb30a4c72983487d2104f1c72a364737677cedbafae3d087a2ce2?s=96&d=blank&r=g\",\"caption\":\"Asher Alt\"},\"url\":\"https:\\\/\\\/scholarblogs.emory.edu\\\/techtransfer\\\/author\\\/aalt\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Six Things to Know about Trade Secrets - Emory Technology Transfer Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/scholarblogs.emory.edu\/techtransfer\/2024\/01\/six-things-to-know-about-trade-secrets\/","og_locale":"en_US","og_type":"article","og_title":"Six Things to Know about Trade Secrets - Emory Technology Transfer Blog","og_description":"Trade secrets are a way to protect confidential information without a legal fee. Any piece of knowledge that gives a business or corporation a competitive advantage can be a trade secret. Do you have rights to a trade secret? Read on. 1. Trade secrets can include technical and commercial information. According to the Uniform Trade Secrets Act (UTSA), a trade secret can be any \u201cformula, pattern, compilation, program, device, method, technique, or process\u201d that has commercial value based upon keeping it a secret. This can be technical information (ex. manufacturing processes and computer program designs) or commercial information (ex. client Read More ...","og_url":"https:\/\/scholarblogs.emory.edu\/techtransfer\/2024\/01\/six-things-to-know-about-trade-secrets\/","og_site_name":"Emory Technology Transfer Blog","article_published_time":"2024-01-08T13:54:03+00:00","author":"Asher Alt","twitter_card":"summary_large_image","twitter_creator":"@EmoryOTT","twitter_site":"@EmoryOTT","twitter_misc":{"Written by":"Asher Alt","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/scholarblogs.emory.edu\/techtransfer\/2024\/01\/six-things-to-know-about-trade-secrets\/#article","isPartOf":{"@id":"https:\/\/scholarblogs.emory.edu\/techtransfer\/2024\/01\/six-things-to-know-about-trade-secrets\/"},"author":{"name":"Asher Alt","@id":"https:\/\/scholarblogs.emory.edu\/techtransfer\/#\/schema\/person\/f85cc8d208055dca5e992bc069411042"},"headline":"Six Things to Know about Trade Secrets","datePublished":"2024-01-08T13:54:03+00:00","mainEntityOfPage":{"@id":"https:\/\/scholarblogs.emory.edu\/techtransfer\/2024\/01\/six-things-to-know-about-trade-secrets\/"},"wordCount":587,"publisher":{"@id":"https:\/\/scholarblogs.emory.edu\/techtransfer\/#organization"},"keywords":["IP_Protection"],"articleSection":["Education"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/scholarblogs.emory.edu\/techtransfer\/2024\/01\/six-things-to-know-about-trade-secrets\/","url":"https:\/\/scholarblogs.emory.edu\/techtransfer\/2024\/01\/six-things-to-know-about-trade-secrets\/","name":"Six Things to Know about Trade Secrets - Emory Technology Transfer Blog","isPartOf":{"@id":"https:\/\/scholarblogs.emory.edu\/techtransfer\/#website"},"datePublished":"2024-01-08T13:54:03+00:00","breadcrumb":{"@id":"https:\/\/scholarblogs.emory.edu\/techtransfer\/2024\/01\/six-things-to-know-about-trade-secrets\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/scholarblogs.emory.edu\/techtransfer\/2024\/01\/six-things-to-know-about-trade-secrets\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/scholarblogs.emory.edu\/techtransfer\/2024\/01\/six-things-to-know-about-trade-secrets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/scholarblogs.emory.edu\/techtransfer\/"},{"@type":"ListItem","position":2,"name":"Six Things to Know about Trade Secrets"}]},{"@type":"WebSite","@id":"https:\/\/scholarblogs.emory.edu\/techtransfer\/#website","url":"https:\/\/scholarblogs.emory.edu\/techtransfer\/","name":"Emory Technology Transfer Blog","description":"Innovate Today, Impact Tomorrow","publisher":{"@id":"https:\/\/scholarblogs.emory.edu\/techtransfer\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/scholarblogs.emory.edu\/techtransfer\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/scholarblogs.emory.edu\/techtransfer\/#organization","name":"Emory University, Office of Technology Transfer","url":"https:\/\/scholarblogs.emory.edu\/techtransfer\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/scholarblogs.emory.edu\/techtransfer\/#\/schema\/logo\/image\/","url":"https:\/\/scholarblogs.emory.edu\/techtransfer\/files\/2023\/02\/EU_OfficeTechnologyTransfer_sq_280bk_2l.jpg","contentUrl":"https:\/\/scholarblogs.emory.edu\/techtransfer\/files\/2023\/02\/EU_OfficeTechnologyTransfer_sq_280bk_2l.jpg","width":233,"height":146,"caption":"Emory University, Office of Technology Transfer"},"image":{"@id":"https:\/\/scholarblogs.emory.edu\/techtransfer\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/EmoryOTT","https:\/\/www.linkedin.com\/company\/10848784"]},{"@type":"Person","@id":"https:\/\/scholarblogs.emory.edu\/techtransfer\/#\/schema\/person\/f85cc8d208055dca5e992bc069411042","name":"Asher Alt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/67495711643bb30a4c72983487d2104f1c72a364737677cedbafae3d087a2ce2?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/67495711643bb30a4c72983487d2104f1c72a364737677cedbafae3d087a2ce2?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/67495711643bb30a4c72983487d2104f1c72a364737677cedbafae3d087a2ce2?s=96&d=blank&r=g","caption":"Asher Alt"},"url":"https:\/\/scholarblogs.emory.edu\/techtransfer\/author\/aalt\/"}]}},"_links":{"self":[{"href":"https:\/\/scholarblogs.emory.edu\/techtransfer\/wp-json\/wp\/v2\/posts\/3896","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scholarblogs.emory.edu\/techtransfer\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/scholarblogs.emory.edu\/techtransfer\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/scholarblogs.emory.edu\/techtransfer\/wp-json\/wp\/v2\/users\/8177"}],"replies":[{"embeddable":true,"href":"https:\/\/scholarblogs.emory.edu\/techtransfer\/wp-json\/wp\/v2\/comments?post=3896"}],"version-history":[{"count":2,"href":"https:\/\/scholarblogs.emory.edu\/techtransfer\/wp-json\/wp\/v2\/posts\/3896\/revisions"}],"predecessor-version":[{"id":3898,"href":"https:\/\/scholarblogs.emory.edu\/techtransfer\/wp-json\/wp\/v2\/posts\/3896\/revisions\/3898"}],"wp:attachment":[{"href":"https:\/\/scholarblogs.emory.edu\/techtransfer\/wp-json\/wp\/v2\/media?parent=3896"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/scholarblogs.emory.edu\/techtransfer\/wp-json\/wp\/v2\/categories?post=3896"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/scholarblogs.emory.edu\/techtransfer\/wp-json\/wp\/v2\/tags?post=3896"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}