{"id":3471,"date":"2018-12-27T07:15:14","date_gmt":"2018-12-27T07:15:14","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=3471"},"modified":"2018-12-21T09:01:20","modified_gmt":"2018-12-21T09:01:20","slug":"have-you-been-the-victim-of-a-gmail-data-breach","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/have-you-been-the-victim-of-a-gmail-data-breach","title":{"rendered":"Have you been the victim of a Gmail data breach?"},"content":{"rendered":"<p>Without even knowing it, your emails may be being read by companies, and you may feel that this is a Gmail data breach.<\/p>\n<p>The recent admission by Google that they\u2019ve been allowing companies to scan emails is a worrying one. App developers are reportedly able to access data in Gmail mailboxes to use it for marketing purposes. Even employees were manually reading mailboxes in order to train AI software to then do it for them.<\/p>\n<p>If this applies to you, whether this can be classed as a Gmail data breach or not is apparently open for debate.<\/p>\n<p><!--more--><\/p>\n<h3><strong>Is there a huge Gmail data breach scandal?<\/strong><\/h3>\n<p>Is there a huge Gmail data breach scandal going on right under our noses?<\/p>\n<p>This story comes a year after Google themselves reportedly stopped looking at emails after a lawsuit was launched in America for illegal wiretapping. Despite their change of behaviour, they\u2019re apparently still allowing third parties to scan emails.<\/p>\n<p>Names, subject lines, text contained in messages and email signatures can all be scanned. This can then be used for market research and marketing to the users.<\/p>\n<h3><strong>Can this issue be classed as a Gmail data breach scandal?<\/strong><\/h3>\n<p>There is reportedly some debate over whether this can be classed as a huge Gmail data breach or not.<\/p>\n<p>According to reports, Google only allows companies to collect and share data in-line with Google\u2019s privacy policies. If all is above board, and users are agreeing to the privacy policies, are we consenting to our emails being read?<\/p>\n<p>I think most people would not expect that their emails are being read; especially for marketing purposes. You could understand software that can pick up on keywords that may relate to malicious activity, but for marketing?<\/p>\n<p>Are lines such as \u201caccess to your information\u201d enough for people to really understand what this means? i.e., that our private and potentially sensitive emails are being read? In the wrong hands, information from our emails could easily lead to falling victim to financial fraud and similar crimes.<\/p>\n<p>Any victim of a genuine Gmail data breach could be entitled to <a href=\"https:\/\/www.dataleaklawyers.co.uk\/can-i-claim-compensation\" target=\"_blank\" rel=\"noopener\">claim data breach compensation<\/a>. How these latest revelations could fall foul of GDPR will be interesting to see.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Without even knowing it, your emails may be being read by companies, and you may feel that this is a Gmail data breach. The recent admission by Google that they\u2019ve been allowing companies to scan emails is a worrying one. App developers are reportedly able to access data in Gmail mailboxes to use it for &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/have-you-been-the-victim-of-a-gmail-data-breach\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Have you been the victim of a Gmail data breach?<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":712,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[113,1,115,39,51],"tags":[4,20,13,3],"class_list":["post-3471","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-latest","category-mobile-data","category-smartphones","category-technology","tag-email-leaks","tag-online-security","tag-personal-data","tag-phishing-scams"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Have you been the victim of a Gmail data breach? - Data Leaks, Breaches &amp; Hacks<\/title>\n<meta name=\"description\" content=\"Without even knowing it, your emails may be being read by companies, and you may feel that this is a Gmail data breach.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/have-you-been-the-victim-of-a-gmail-data-breach\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Have you been the victim of a Gmail data breach? - Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"og:description\" content=\"Without even knowing it, your emails may be being read by companies, and you may feel that this is a Gmail data breach.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/have-you-been-the-victim-of-a-gmail-data-breach\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-27T07:15:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/2016\/11\/yahoo-email-hack.png\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/have-you-been-the-victim-of-a-gmail-data-breach#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/have-you-been-the-victim-of-a-gmail-data-breach\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\"},\"headline\":\"Have you been the victim of a Gmail data breach?\",\"datePublished\":\"2018-12-27T07:15:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/have-you-been-the-victim-of-a-gmail-data-breach\"},\"wordCount\":379,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/have-you-been-the-victim-of-a-gmail-data-breach#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/yahoo-email-hack.png\",\"keywords\":[\"email leaks\",\"online security\",\"personal data\",\"phishing scams\"],\"articleSection\":[\"Cybersecurity\",\"Latest\",\"Mobile Data\",\"Smartphones\",\"Technology\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/have-you-been-the-victim-of-a-gmail-data-breach\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/have-you-been-the-victim-of-a-gmail-data-breach\",\"name\":\"Have you been the victim of a Gmail data breach? - Data Leaks, Breaches &amp; Hacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/have-you-been-the-victim-of-a-gmail-data-breach#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/have-you-been-the-victim-of-a-gmail-data-breach#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/yahoo-email-hack.png\",\"datePublished\":\"2018-12-27T07:15:14+00:00\",\"description\":\"Without even knowing it, your emails may be being read by companies, and you may feel that this is a Gmail data breach.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/have-you-been-the-victim-of-a-gmail-data-breach#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/have-you-been-the-victim-of-a-gmail-data-breach\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/have-you-been-the-victim-of-a-gmail-data-breach#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/yahoo-email-hack.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/yahoo-email-hack.png\",\"width\":750,\"height\":250,\"caption\":\"email breach\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/have-you-been-the-victim-of-a-gmail-data-breach#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Have you been the victim of a Gmail data breach?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/matthew\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Have you been the victim of a Gmail data breach? - Data Leaks, Breaches &amp; Hacks","description":"Without even knowing it, your emails may be being read by companies, and you may feel that this is a Gmail data breach.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/have-you-been-the-victim-of-a-gmail-data-breach","og_locale":"en_GB","og_type":"article","og_title":"Have you been the victim of a Gmail data breach? - Data Leaks, Breaches &amp; Hacks","og_description":"Without even knowing it, your emails may be being read by companies, and you may feel that this is a Gmail data breach.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/have-you-been-the-victim-of-a-gmail-data-breach","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2018-12-27T07:15:14+00:00","og_image":[{"width":750,"height":250,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/2016\/11\/yahoo-email-hack.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/have-you-been-the-victim-of-a-gmail-data-breach#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/have-you-been-the-victim-of-a-gmail-data-breach"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3"},"headline":"Have you been the victim of a Gmail data breach?","datePublished":"2018-12-27T07:15:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/have-you-been-the-victim-of-a-gmail-data-breach"},"wordCount":379,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/have-you-been-the-victim-of-a-gmail-data-breach#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/2016\/11\/yahoo-email-hack.png","keywords":["email leaks","online security","personal data","phishing scams"],"articleSection":["Cybersecurity","Latest","Mobile Data","Smartphones","Technology"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/have-you-been-the-victim-of-a-gmail-data-breach","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/have-you-been-the-victim-of-a-gmail-data-breach","name":"Have you been the victim of a Gmail data breach? - Data Leaks, Breaches &amp; Hacks","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/have-you-been-the-victim-of-a-gmail-data-breach#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/have-you-been-the-victim-of-a-gmail-data-breach#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/2016\/11\/yahoo-email-hack.png","datePublished":"2018-12-27T07:15:14+00:00","description":"Without even knowing it, your emails may be being read by companies, and you may feel that this is a Gmail data breach.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/have-you-been-the-victim-of-a-gmail-data-breach#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/have-you-been-the-victim-of-a-gmail-data-breach"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/have-you-been-the-victim-of-a-gmail-data-breach#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/2016\/11\/yahoo-email-hack.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/2016\/11\/yahoo-email-hack.png","width":750,"height":250,"caption":"email breach"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/have-you-been-the-victim-of-a-gmail-data-breach#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Have you been the victim of a Gmail data breach?"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/matthew"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3471","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=3471"}],"version-history":[{"count":1,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3471\/revisions"}],"predecessor-version":[{"id":3472,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3471\/revisions\/3472"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/712"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=3471"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=3471"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=3471"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}