{
"author": {
"name": "Elaine Thompson",
"webUrl": "/author/profile/elaine-thompson/",
"description": "",
"imageLarge": "https://secure.gravatar.com/avatar/f16d6fc2845f417ea0e93a3f2b6cd37d?s=136&d=mm&r=g",
"estimate": 2,
"social": [],
"articles": [
{
"uri": "/2018/05/07/keeping-client-data-safe-while-processing-an-insurance-claim/",
"title": "Keeping client data safe while processing insurance claims",
"byline": "Elaine Thompson",
"kicker": "Best Practices",
"prettyDate": "May 07, 2018",
"timeToRead": "6 minute",
"image": {
"uri": "https://images.propertycasualty360.com/contrib/content/uploads/sites/414/2018/05/01_Computer-Software-Cyber-Security-Ransomware-Malware-WannaCry-iStock-637079020.jpg",
"width": "616",
"height": "372"
},
"authors": [
{
"webUrl": "/author/profile/elaine-thompson/",
"name": "Elaine Thompson"
}
],
"kickerNode": [
{
"uri": "/best-practices/",
"sectionName": "Best Practices"
}
],
"summary": "Each online transaction is vulnerable. Agents and brokers should follow these eight steps to keep client data safe.",
"body": null
},
{
"uri": "/2018/05/07/keeping-client-data-safe-while-processing-an-insur/",
"title": "Keeping client data safe while processing insurance claims",
"byline": " Elaine Thompson ",
"kicker": "Best Practices",
"prettyDate": "May 07, 2018",
"timeToRead": "5 minute",
"image": {
"uri": "https://images.law.com/contrib/content/uploads/sites/414/2018/05/01_Computer-Software-Cyber-Security-Ransomware-Malware-WannaCry-iStock-637079020.jpg",
"width": "616",
"height": "372"
},
"authors": [
{
"webUrl": "/author/profile/elaine-thompson/",
"name": "Elaine Thompson"
}
],
"kickerNode": [
{
"uri": "/best-practices/",
"sectionName": "Best Practices"
}
],
"summary": "Each online transaction is vulnerable. Agents and brokers should follow these eight steps to keep client data safe.",
"body": null
}
]
}
}