{"id":12148,"date":"2013-05-08T23:12:35","date_gmt":"2013-05-08T23:12:35","guid":{"rendered":"http:\/\/bme2.flywheelsites.com\/tw\/blog\/byod-is-actually-bring-your-own-disaster\/"},"modified":"2020-02-08T20:07:02","modified_gmt":"2020-02-08T20:07:02","slug":"byod-is-actually-bring-your-own-disaster","status":"publish","type":"post","link":"https:\/\/www.benchmarkemail.com\/tw\/blog\/byod-is-actually-bring-your-own-disaster\/","title":{"rendered":"BYOD \u5176\u5be6\u662f\uff1a\u5e36\u4f86\u81ea\u8eab\u707d\u96e3"},"content":{"rendered":"<div>Welcome to the Brave New World of BYOD. While some prefer to use the conventional acronym\u2019s definition of Bring Your Own Device, IT managers all over the world are starting to refer to it as Bring Your Own Disaster. At first glance BYOD is a wonderful solution for both companies and their employees: Workers can use whatever device they are familiar with and prefer, regardless of format or operating system, and the companies get to save the outlay for purchasing these devices which in the case of a well-equipped iPad can reach well over a thousand dollars. Where the disaster aspect comes in is when the security aspects and the legal ramifications are considered, in which case we enter the territory of sheer nightmares.<\/div>\n<div class=\"subtopic\">Total confusion about BYOD policies<\/div>\n<div>According to a recent study by GLOBO, the current state of BYOD is little more than foggy confusion:<\/p>\n<ul>\n<li>68% use their own mobile devices for work.<\/li>\n<li>29% say that their company has a BYOD policy in effect.<\/li>\n<li>14% don&#8217;t know if their company currently has a BYOD policy.<\/li>\n<li>91% don\u2019t know if their company plans to implement a BYOD policy.<\/li>\n<li>42% don&#8217;t know if their company has full access to their mobile devices through their BYOD policy.<\/li>\n<li>93% would not participate in a BYOD program if the company wants access to their info such as contact addresses and email text.<\/li>\n<li>69% would not consider breaking a BYOD company policy even if they were secure they wouldn\u2019t get caught.<\/li>\n<\/ul>\n<\/div>\n<div class=\"subtopic\">Security colander &amp; legal minefield<\/div>\n<div>The primary drawback to a BYOD policy is the security aspect, or lack thereof. It is this security lapse which not only creates problems for the IT department but also massive headaches for the legal department.<\/p>\n<ul>\n<li><b>Invasion of privacy.<\/b>\u00a0The simple act of an IT employee accessing an app used for work on a BYOD device might also expose them to legally protected information such as theological practices, medical history, or sexual orientation, opening the door to complex and expensive lawsuits.<\/li>\n<li><b>Remote deletion.<\/b>\u00a0An IT manager has the capability to institute a remote wipe once the worker leaves the company which deletes all data on the device in question. This will remove not only data which was accumulated for work purposes but also the individual\u2019s emails, records, apps, images, videos\u2026 in short, everything.<\/li>\n<li><b>Legal device seizure.<\/b>\u00a0If there is legal action between the company and the employee, their device can be legally seized and each byte examined by corporate attorneys. As in the case of remote deletion, this is something most BYOD workers are not aware of and would be incensed if it ever happened to them.<\/li>\n<li><b>24\/7 surveillance.<\/b>\u00a0Some companies exercise the capabilities built into remote devices to keep track of where their employees are and what they\u2019re doing when not at work. Class actions lawsuits by employees against companies which take these actions have already been launched.<\/li>\n<li><b>Illegal personal content.<\/b>\u00a0There\u2019s a lot of nasty people on the internet and they\u2019re doing a lot of nasty things. If a personal device were to be analyzed by law enforcement agencies and illegal content were to be found on it, intermixed with the legitimate company data or possibly even accessed through an app which was paid for by the company for business use, the legal entanglements for the company could be horrific.<\/li>\n<li><b>Phone number departure.<\/b>\u00a0Many employees provide their smartphone numbers to their company clients on a regular basis so that they can be reached wherever they are. This procedure leads to serious problems when the employee leaves the company, possibly to work at a competitor, and the clients continue to call them on their mobile numbers to transact company business\u2026 which is now being directed to the enemy camp.<\/li>\n<li><b>Compliance impossibility.<\/b>\u00a0There are a number of compliance regulations which are mandatory on many businesses, such as GLBA and HIPPA, which technically can only be enforced on devices which are owned by the company.<\/li>\n<\/ul>\n<p>Businesses are caught in a no-win scenario since it seems that there is a lack of clear understanding of the security and legal issues on either side. Beware Your Own Device!<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the Brave New World of BYOD. While some prefer to use the conventional acronym\u2019s definition of Bring Your Own Device, IT managers all over the world are starting to refer to it as Bring Your Own Disaster. At first glance BYOD is a wonderful solution for both companies and their employees: Workers can&hellip;<\/p>\n","protected":false},"author":139,"featured_media":12149,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[2186],"tags":[],"class_list":["post-12148","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-2186"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>BYOD \u5176\u5be6\u662f\uff1a\u5e36\u4f86\u81ea\u8eab\u707d\u96e3 - Benchmark Email<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.benchmarkemail.com\/tw\/blog\/byod-is-actually-bring-your-own-disaster\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BYOD \u5176\u5be6\u662f\uff1a\u5e36\u4f86\u81ea\u8eab\u707d\u96e3 - Benchmark Email\" \/>\n<meta property=\"og:description\" content=\"Welcome to the Brave New World of BYOD. While some prefer to use the conventional acronym\u2019s definition of Bring Your Own Device, IT managers all over the world are starting to refer to it as Bring Your Own Disaster. At first glance BYOD is a wonderful solution for both companies and their employees: Workers can&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.benchmarkemail.com\/tw\/blog\/byod-is-actually-bring-your-own-disaster\/\" \/>\n<meta property=\"og:site_name\" content=\"\u7e41\u9ad4\u4e2d\u6587 Benchmark Email\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/BenchmarkEmail1\/?locale=zh_TW\" \/>\n<meta property=\"article:published_time\" content=\"2013-05-08T23:12:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-08T20:07:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.benchmarkemail.com\/tw\/wp-content\/uploads\/sites\/8\/2020\/02\/security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"267\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hal Licino\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hal Licino\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/blog\\\/byod-is-actually-bring-your-own-disaster\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/blog\\\/byod-is-actually-bring-your-own-disaster\\\/\"},\"author\":{\"name\":\"Hal Licino\",\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/#\\\/schema\\\/person\\\/2fa613dbba6c6712d3e4fc473f5a6ebb\"},\"headline\":\"BYOD \u5176\u5be6\u662f\uff1a\u5e36\u4f86\u81ea\u8eab\u707d\u96e3\",\"datePublished\":\"2013-05-08T23:12:35+00:00\",\"dateModified\":\"2020-02-08T20:07:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/blog\\\/byod-is-actually-bring-your-own-disaster\\\/\"},\"wordCount\":689,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/blog\\\/byod-is-actually-bring-your-own-disaster\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2020\\\/02\\\/security.jpg\",\"articleSection\":[\"\u5e73\u53f0\u529f\u80fd\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/blog\\\/byod-is-actually-bring-your-own-disaster\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/blog\\\/byod-is-actually-bring-your-own-disaster\\\/\",\"url\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/blog\\\/byod-is-actually-bring-your-own-disaster\\\/\",\"name\":\"BYOD \u5176\u5be6\u662f\uff1a\u5e36\u4f86\u81ea\u8eab\u707d\u96e3 - Benchmark Email\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/blog\\\/byod-is-actually-bring-your-own-disaster\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/blog\\\/byod-is-actually-bring-your-own-disaster\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2020\\\/02\\\/security.jpg\",\"datePublished\":\"2013-05-08T23:12:35+00:00\",\"dateModified\":\"2020-02-08T20:07:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/blog\\\/byod-is-actually-bring-your-own-disaster\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/blog\\\/byod-is-actually-bring-your-own-disaster\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/blog\\\/byod-is-actually-bring-your-own-disaster\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2020\\\/02\\\/security.jpg\",\"contentUrl\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2020\\\/02\\\/security.jpg\",\"width\":267,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/blog\\\/byod-is-actually-bring-your-own-disaster\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BYOD \u5176\u5be6\u662f\uff1a\u5e36\u4f86\u81ea\u8eab\u707d\u96e3\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/#website\",\"url\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/\",\"name\":\"\u7e41\u9ad4\u4e2d\u6587 Benchmark Email\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/#organization\",\"name\":\"Benchmark Email\",\"url\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2019\\\/09\\\/benchmark-logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2019\\\/09\\\/benchmark-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Benchmark Email\"},\"image\":{\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/BenchmarkEmail1\\\/?locale=zh_TW\",\"https:\\\/\\\/www.instagram.com\\\/benchmark.taiwan\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/#\\\/schema\\\/person\\\/2fa613dbba6c6712d3e4fc473f5a6ebb\",\"name\":\"Hal Licino\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/07d4069f9d93e9a7a53f5781e350c7d44a8f8444751b62d37ac7fc9769ba757c?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/07d4069f9d93e9a7a53f5781e350c7d44a8f8444751b62d37ac7fc9769ba757c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/07d4069f9d93e9a7a53f5781e350c7d44a8f8444751b62d37ac7fc9769ba757c?s=96&d=mm&r=g\",\"caption\":\"Hal Licino\"},\"description\":\"Hal Licino is a leading blogger on HubPages, one of the Alexa Top 120 websites in the USA. Hal has written 2,500 HubPage articles on a wide range of topics, some of which have attracted upwards of 135,000 page views a day. His blogs are influential to the point where Hal single-handedly forced Apple to retract a national network iPhone TV commercial and has even mythbusted one of the Mythbusters. He has also written for major sites as Tripology, WebTVWire, and TripScoop.\",\"url\":\"https:\\\/\\\/www.benchmarkemail.com\\\/tw\\\/blog\\\/author\\\/hallicino\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BYOD \u5176\u5be6\u662f\uff1a\u5e36\u4f86\u81ea\u8eab\u707d\u96e3 - Benchmark Email","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.benchmarkemail.com\/tw\/blog\/byod-is-actually-bring-your-own-disaster\/","og_locale":"en_US","og_type":"article","og_title":"BYOD \u5176\u5be6\u662f\uff1a\u5e36\u4f86\u81ea\u8eab\u707d\u96e3 - Benchmark Email","og_description":"Welcome to the Brave New World of BYOD. While some prefer to use the conventional acronym\u2019s definition of Bring Your Own Device, IT managers all over the world are starting to refer to it as Bring Your Own Disaster. At first glance BYOD is a wonderful solution for both companies and their employees: Workers can&hellip;","og_url":"https:\/\/www.benchmarkemail.com\/tw\/blog\/byod-is-actually-bring-your-own-disaster\/","og_site_name":"\u7e41\u9ad4\u4e2d\u6587 Benchmark Email","article_publisher":"https:\/\/www.facebook.com\/BenchmarkEmail1\/?locale=zh_TW","article_published_time":"2013-05-08T23:12:35+00:00","article_modified_time":"2020-02-08T20:07:02+00:00","og_image":[{"width":267,"height":400,"url":"https:\/\/www.benchmarkemail.com\/tw\/wp-content\/uploads\/sites\/8\/2020\/02\/security.jpg","type":"image\/jpeg"}],"author":"Hal Licino","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hal Licino","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.benchmarkemail.com\/tw\/blog\/byod-is-actually-bring-your-own-disaster\/#article","isPartOf":{"@id":"https:\/\/www.benchmarkemail.com\/tw\/blog\/byod-is-actually-bring-your-own-disaster\/"},"author":{"name":"Hal Licino","@id":"https:\/\/www.benchmarkemail.com\/tw\/#\/schema\/person\/2fa613dbba6c6712d3e4fc473f5a6ebb"},"headline":"BYOD \u5176\u5be6\u662f\uff1a\u5e36\u4f86\u81ea\u8eab\u707d\u96e3","datePublished":"2013-05-08T23:12:35+00:00","dateModified":"2020-02-08T20:07:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.benchmarkemail.com\/tw\/blog\/byod-is-actually-bring-your-own-disaster\/"},"wordCount":689,"commentCount":0,"publisher":{"@id":"https:\/\/www.benchmarkemail.com\/tw\/#organization"},"image":{"@id":"https:\/\/www.benchmarkemail.com\/tw\/blog\/byod-is-actually-bring-your-own-disaster\/#primaryimage"},"thumbnailUrl":"https:\/\/www.benchmarkemail.com\/tw\/wp-content\/uploads\/sites\/8\/2020\/02\/security.jpg","articleSection":["\u5e73\u53f0\u529f\u80fd"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.benchmarkemail.com\/tw\/blog\/byod-is-actually-bring-your-own-disaster\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.benchmarkemail.com\/tw\/blog\/byod-is-actually-bring-your-own-disaster\/","url":"https:\/\/www.benchmarkemail.com\/tw\/blog\/byod-is-actually-bring-your-own-disaster\/","name":"BYOD \u5176\u5be6\u662f\uff1a\u5e36\u4f86\u81ea\u8eab\u707d\u96e3 - Benchmark Email","isPartOf":{"@id":"https:\/\/www.benchmarkemail.com\/tw\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.benchmarkemail.com\/tw\/blog\/byod-is-actually-bring-your-own-disaster\/#primaryimage"},"image":{"@id":"https:\/\/www.benchmarkemail.com\/tw\/blog\/byod-is-actually-bring-your-own-disaster\/#primaryimage"},"thumbnailUrl":"https:\/\/www.benchmarkemail.com\/tw\/wp-content\/uploads\/sites\/8\/2020\/02\/security.jpg","datePublished":"2013-05-08T23:12:35+00:00","dateModified":"2020-02-08T20:07:02+00:00","breadcrumb":{"@id":"https:\/\/www.benchmarkemail.com\/tw\/blog\/byod-is-actually-bring-your-own-disaster\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.benchmarkemail.com\/tw\/blog\/byod-is-actually-bring-your-own-disaster\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.benchmarkemail.com\/tw\/blog\/byod-is-actually-bring-your-own-disaster\/#primaryimage","url":"https:\/\/www.benchmarkemail.com\/tw\/wp-content\/uploads\/sites\/8\/2020\/02\/security.jpg","contentUrl":"https:\/\/www.benchmarkemail.com\/tw\/wp-content\/uploads\/sites\/8\/2020\/02\/security.jpg","width":267,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/www.benchmarkemail.com\/tw\/blog\/byod-is-actually-bring-your-own-disaster\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.benchmarkemail.com\/tw\/"},{"@type":"ListItem","position":2,"name":"BYOD \u5176\u5be6\u662f\uff1a\u5e36\u4f86\u81ea\u8eab\u707d\u96e3"}]},{"@type":"WebSite","@id":"https:\/\/www.benchmarkemail.com\/tw\/#website","url":"https:\/\/www.benchmarkemail.com\/tw\/","name":"\u7e41\u9ad4\u4e2d\u6587 Benchmark Email","description":"","publisher":{"@id":"https:\/\/www.benchmarkemail.com\/tw\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.benchmarkemail.com\/tw\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.benchmarkemail.com\/tw\/#organization","name":"Benchmark Email","url":"https:\/\/www.benchmarkemail.com\/tw\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.benchmarkemail.com\/tw\/#\/schema\/logo\/image\/","url":"https:\/\/www.benchmarkemail.com\/tw\/wp-content\/uploads\/sites\/8\/2019\/09\/benchmark-logo.svg","contentUrl":"https:\/\/www.benchmarkemail.com\/tw\/wp-content\/uploads\/sites\/8\/2019\/09\/benchmark-logo.svg","width":1,"height":1,"caption":"Benchmark Email"},"image":{"@id":"https:\/\/www.benchmarkemail.com\/tw\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/BenchmarkEmail1\/?locale=zh_TW","https:\/\/www.instagram.com\/benchmark.taiwan\/"]},{"@type":"Person","@id":"https:\/\/www.benchmarkemail.com\/tw\/#\/schema\/person\/2fa613dbba6c6712d3e4fc473f5a6ebb","name":"Hal Licino","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/07d4069f9d93e9a7a53f5781e350c7d44a8f8444751b62d37ac7fc9769ba757c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/07d4069f9d93e9a7a53f5781e350c7d44a8f8444751b62d37ac7fc9769ba757c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/07d4069f9d93e9a7a53f5781e350c7d44a8f8444751b62d37ac7fc9769ba757c?s=96&d=mm&r=g","caption":"Hal Licino"},"description":"Hal Licino is a leading blogger on HubPages, one of the Alexa Top 120 websites in the USA. Hal has written 2,500 HubPage articles on a wide range of topics, some of which have attracted upwards of 135,000 page views a day. His blogs are influential to the point where Hal single-handedly forced Apple to retract a national network iPhone TV commercial and has even mythbusted one of the Mythbusters. He has also written for major sites as Tripology, WebTVWire, and TripScoop.","url":"https:\/\/www.benchmarkemail.com\/tw\/blog\/author\/hallicino\/"}]}},"_links":{"self":[{"href":"https:\/\/www.benchmarkemail.com\/tw\/wp-json\/wp\/v2\/posts\/12148","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.benchmarkemail.com\/tw\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.benchmarkemail.com\/tw\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.benchmarkemail.com\/tw\/wp-json\/wp\/v2\/users\/139"}],"replies":[{"embeddable":true,"href":"https:\/\/www.benchmarkemail.com\/tw\/wp-json\/wp\/v2\/comments?post=12148"}],"version-history":[{"count":0,"href":"https:\/\/www.benchmarkemail.com\/tw\/wp-json\/wp\/v2\/posts\/12148\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.benchmarkemail.com\/tw\/wp-json\/wp\/v2\/media\/12149"}],"wp:attachment":[{"href":"https:\/\/www.benchmarkemail.com\/tw\/wp-json\/wp\/v2\/media?parent=12148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.benchmarkemail.com\/tw\/wp-json\/wp\/v2\/categories?post=12148"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.benchmarkemail.com\/tw\/wp-json\/wp\/v2\/tags?post=12148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}