{"id":3094,"date":"2018-06-05T20:21:17","date_gmt":"2018-06-05T19:21:17","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=3094"},"modified":"2018-06-05T20:21:17","modified_gmt":"2018-06-05T19:21:17","slug":"self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose","title":{"rendered":"Self-driving cars and the cybersecurity risks and data breach risks they pose"},"content":{"rendered":"<p>Self-driving cars and the cybersecurity risks and the data breach risks they pose: an unanswered question&#8230;<\/p>\n<p>Thieves can already break into cars by hacking remote-entry \/ keyless entry systems, and security researchers have proven before that the onboard computers of cars can also be hacked, leaving them free to control various parts of a vehicle.<\/p>\n<p>As we move \u2013 at speed \u2013 toward self-driving cars and lorries being on our roads very soon, the issue of self-driving cars and the cybersecurity risks \/ data breach risks they pose must be addressed; especially with <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/if-tesla-can-be-hacked-how-safe-are-self-driving-cars\" target=\"_blank\" rel=\"noopener\"><strong>Tesla &#8211; one of the pioneers of self-driving cars &#8211; previously being hacked themselves!<\/strong><\/a><\/p>\n<p><!--more--><\/p>\n<p>It\u2019s a worrying thought: you\u2019re driving down a road with your self-driving vehicle in self-drive mode when the vehicle is hacked into, and the control of the vehicle is entirely in the hands of someone else. Your whole family may be in the car with you, and you can\u2019t take back control of the car.<\/p>\n<p>It\u2019s not an impossible scenario. Nothing is \u201cunhackable\u201d so to speak. <strong><a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/security-flaw-leaves-cars-vulnerable-hacked\" target=\"_blank\" rel=\"noopener\">Hacking into cars is already a proven possibility<\/a><\/strong>. But, with governments and the car industry speeding towards self-driving vehicles being on our roads in a matter of years, the need for greater assurance to prevent hacking and data breaches is clearly required.<\/p>\n<p>There have already been a number of accidents and fatalities that have been caused by self-driving cars during testing and first use phases. But, have the manufacturers considered the issue of cybersecurity and data breaches?<\/p>\n<p><a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/carmakers-struggling-quash-self-driving-cars-hacking-fears\" target=\"_blank\" rel=\"noopener\"><strong>Carmakers are apparently concerned&#8230;<\/strong><\/a><\/p>\n<p>There is obvious value in hackers and criminals targeting self-driving vehicles; from taking them somewhere to steal the vehicle, or perhaps to even blackmail the occupants. You can\u2019t take for granted what committed criminals are capable of, and we now live in a world where cyber-hacking and data breaches is the new way for thieves to make money.<\/p>\n<p>People\u2019s data is being held for ransom all the time, and there are plenty of people who will just pay the demands as opposed to risk anything being lost, or risk harm to themselves. <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/ransomware-demands-drop-cyber-attackers-victimise-more\" target=\"_blank\" rel=\"noopener\"><strong>Criminals are known to price their demands to suit the affordability of the victim<\/strong><\/a>, so these scenarios of hacking into self-drive cars is a real cause for concern.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Self-driving cars and the cybersecurity risks and the data breach risks they pose: an unanswered question&#8230; Thieves can already break into cars by hacking remote-entry \/ keyless entry systems, and security researchers have proven before that the onboard computers of cars can also be hacked, leaving them free to control various parts of a vehicle. &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Self-driving cars and the cybersecurity risks and data breach risks they pose<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":2031,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[45,101],"class_list":["post-3094","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hacking-news","tag-car-hacking","tag-self-driving-cars"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Self-driving cars and the cybersecurity risks and data breach risks they pose - Data Leaks, Breaches &amp; Hacks<\/title>\n<meta name=\"description\" content=\"Self-driving cars and the cybersecurity risks and the data breach risks they pose: an unanswered question... Thieves can already break into cars by hacking remote-entry \/ keyless entry systems, and security researchers have proven before that the onboard computers of cars can also be hacked...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Self-driving cars and the cybersecurity risks and data breach risks they pose - Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"og:description\" content=\"Self-driving cars and the cybersecurity risks and the data breach risks they pose: an unanswered question... Thieves can already break into cars by hacking remote-entry \/ keyless entry systems, and security researchers have proven before that the onboard computers of cars can also be hacked...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-05T19:21:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/car-hacking-293px.png\" \/>\n\t<meta property=\"og:image:width\" content=\"293\" \/>\n\t<meta property=\"og:image:height\" content=\"101\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\"},\"headline\":\"Self-driving cars and the cybersecurity risks and data breach risks they pose\",\"datePublished\":\"2018-06-05T19:21:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose\"},\"wordCount\":388,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/car-hacking-293px.png\",\"keywords\":[\"car hacking\",\"self-driving cars\"],\"articleSection\":[\"Hacking News\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose\",\"name\":\"Self-driving cars and the cybersecurity risks and data breach risks they pose - Data Leaks, Breaches &amp; Hacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/car-hacking-293px.png\",\"datePublished\":\"2018-06-05T19:21:17+00:00\",\"description\":\"Self-driving cars and the cybersecurity risks and the data breach risks they pose: an unanswered question... Thieves can already break into cars by hacking remote-entry \\\/ keyless entry systems, and security researchers have proven before that the onboard computers of cars can also be hacked...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/car-hacking-293px.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/car-hacking-293px.png\",\"width\":293,\"height\":101,\"caption\":\"car hacking\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Self-driving cars and the cybersecurity risks and data breach risks they pose\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/matthew\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Self-driving cars and the cybersecurity risks and data breach risks they pose - Data Leaks, Breaches &amp; Hacks","description":"Self-driving cars and the cybersecurity risks and the data breach risks they pose: an unanswered question... Thieves can already break into cars by hacking remote-entry \/ keyless entry systems, and security researchers have proven before that the onboard computers of cars can also be hacked...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose","og_locale":"en_GB","og_type":"article","og_title":"Self-driving cars and the cybersecurity risks and data breach risks they pose - Data Leaks, Breaches &amp; Hacks","og_description":"Self-driving cars and the cybersecurity risks and the data breach risks they pose: an unanswered question... Thieves can already break into cars by hacking remote-entry \/ keyless entry systems, and security researchers have proven before that the onboard computers of cars can also be hacked...","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2018-06-05T19:21:17+00:00","og_image":[{"width":293,"height":101,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/car-hacking-293px.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3"},"headline":"Self-driving cars and the cybersecurity risks and data breach risks they pose","datePublished":"2018-06-05T19:21:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose"},"wordCount":388,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/car-hacking-293px.png","keywords":["car hacking","self-driving cars"],"articleSection":["Hacking News"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose","name":"Self-driving cars and the cybersecurity risks and data breach risks they pose - Data Leaks, Breaches &amp; Hacks","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/car-hacking-293px.png","datePublished":"2018-06-05T19:21:17+00:00","description":"Self-driving cars and the cybersecurity risks and the data breach risks they pose: an unanswered question... Thieves can already break into cars by hacking remote-entry \/ keyless entry systems, and security researchers have proven before that the onboard computers of cars can also be hacked...","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/car-hacking-293px.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/car-hacking-293px.png","width":293,"height":101,"caption":"car hacking"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/self-driving-cars-and-the-cybersecurity-risks-and-data-breach-risks-they-pose#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Self-driving cars and the cybersecurity risks and data breach risks they pose"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/matthew"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3094","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=3094"}],"version-history":[{"count":1,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3094\/revisions"}],"predecessor-version":[{"id":3095,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3094\/revisions\/3095"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/2031"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=3094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=3094"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=3094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}