{"id":3961,"date":"2019-09-05T07:30:11","date_gmt":"2019-09-05T06:30:11","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=3961"},"modified":"2025-11-25T13:12:52","modified_gmt":"2025-11-25T13:12:52","slug":"compensation-for-cybersecurity-incidents","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cybersecurity-incidents","title":{"rendered":"Compensation for cybersecurity incidents"},"content":{"rendered":"<p>As a victim whose data has been exposed or misused, you can be eligible to make a claim for compensation for cybersecurity incidents.<\/p>\n<p>Whether the incident has taken place at a business who you use the services for, at work, or at your local hospital, you may have a legal case. GDPR and Data Protection Act legislation allows for a victim to be entitled to receive damages for the impact of leaks, breaches and hacks. As expert data lawyers who pioneered some of the earliest cases and actions, we may be able to help you.<\/p>\n<p>Here\u2019s a little advice about when you may be able to claim and what we could do for you.<\/p>\n<p><!--more--><\/p>\n<h3><strong>Claiming compensation for cybersecurity incidents<\/strong><\/h3>\n<p>Victims can be eligible to claim compensation for cybersecurity incidents when their information has been exposed or misused. If the organisation responsible for processing and \/ or storing your information has failed in their legal responsibility to protect it and use it fairly, you may have a legal basis for a case.<\/p>\n<p>For example, in the case of a data leak, even where it\u2019s accidental, a claim can arise. The employer of an employee who accidentally leaks information can be vicariously liable, which means they may have to meet the claim. This was the case in the infamous <a href=\"https:\/\/www.dataleaklawyers.co.uk\/56-dean-street\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>56 Dean Street Clinic leak<\/strong><\/a> we\u2019re helping victims claim in.<\/p>\n<p>In a cyberattack, being eligible to claim can depend on if the organisation hit by the attack has failed to adequately secure your data. For example, in the<a href=\"https:\/\/www.dataleaklawyers.co.uk\/equifax-data-breach-compensation-claims\" target=\"_blank\" rel=\"noopener noreferrer\"> <strong>Equifax cyber-attack<\/strong><\/a>, they failed to patch a known security vulnerability,\u00a0 and that\u2019s why we\u2019re running an action for victims of the attack. In the <a href=\"https:\/\/www.dataleaklawyers.co.uk\/british-airways-data-breach-compensation-action\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>British Airways data breach incidents<\/strong><\/a>, their website was exploited with vulnerabilities, and this again means they are culpable. We\u2019re also running <strong>legal claims for the BA breach<\/strong> as well.<\/p>\n<h3><strong>How do we calculate data claim compensation pay-outs?<\/strong><\/h3>\n<p>There are a few things that we look at when it comes to determining the valuation of a claim for compensation for cybersecurity incidents. Your claim can be based on the loss of control of your information where it has been exposed, or it could be founded on the fact that it has been misused alone.<\/p>\n<p>What we typically look at can include:<\/p>\n<ul>\n<li>The nature and extent of the data that has been exposed or misused;<\/li>\n<li>Who information has been exposed to, or misused by;<\/li>\n<li>The personal impact of the misuse and \/ or exposure;<\/li>\n<li>Any financial impact of the misuse and \/ or exposure.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.dataleaklawyers.co.uk\/data-protection-breach-compensation-amounts\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Data breach compensation pay-outs<\/strong> <\/a>can then be calculated (when cases are successful) based on these kinds of factors. Generally speaking, the bigger the impact, the more the case can be worth.<\/p>\n<h3><strong>Free, no-obligation advice<\/strong><\/h3>\n<p>For free, no-obligation advice about your options for compensation for cybersecurity incidents, <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>please don\u2019t hesitate to contact the team<\/strong><\/a>. We offer No Win, No Fee representation for cases we can take forward as well.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As a victim whose data has been exposed or misused, you can be eligible to make a claim for compensation for cybersecurity incidents. Whether the incident has taken place at a business who you use the services for, at work, or at your local hospital, you may have a legal case. GDPR and Data Protection &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cybersecurity-incidents\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Compensation for cybersecurity incidents<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1352,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,113,122,64],"tags":[16,2,26,55,88,54,13],"class_list":["post-3961","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-claims","category-cybersecurity","category-group-action","category-security","tag-compensation","tag-cyber-attack","tag-cyber-crime","tag-cybersecurity","tag-data-leak","tag-database-security","tag-personal-data"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Compensation for cybersecurity incidents - Data Leaks, Breaches &amp; Hacks<\/title>\n<meta name=\"description\" content=\"As a victim whose data has been exposed or misused, you can be eligible to make a claim for compensation for cybersecurity incidents.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cybersecurity-incidents\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Compensation for cybersecurity incidents - Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"og:description\" content=\"As a victim whose data has been exposed or misused, you can be eligible to make a claim for compensation for cybersecurity incidents.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cybersecurity-incidents\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-05T06:30:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-25T13:12:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/worldwide-cyber-attack.png\" \/>\n\t<meta property=\"og:image:width\" content=\"725\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-cybersecurity-incidents#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-cybersecurity-incidents\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\"},\"headline\":\"Compensation for cybersecurity incidents\",\"datePublished\":\"2019-09-05T06:30:11+00:00\",\"dateModified\":\"2025-11-25T13:12:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-cybersecurity-incidents\"},\"wordCount\":496,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-cybersecurity-incidents#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/worldwide-cyber-attack.png\",\"keywords\":[\"compensation\",\"cyber attack\",\"cyber crime\",\"cybersecurity\",\"data leak\",\"database security\",\"personal data\"],\"articleSection\":[\"Claims\",\"Cybersecurity\",\"Group Action\",\"Security\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-cybersecurity-incidents\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-cybersecurity-incidents\",\"name\":\"Compensation for cybersecurity incidents - Data Leaks, Breaches &amp; Hacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-cybersecurity-incidents#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-cybersecurity-incidents#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/worldwide-cyber-attack.png\",\"datePublished\":\"2019-09-05T06:30:11+00:00\",\"dateModified\":\"2025-11-25T13:12:52+00:00\",\"description\":\"As a victim whose data has been exposed or misused, you can be eligible to make a claim for compensation for cybersecurity incidents.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-cybersecurity-incidents#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-cybersecurity-incidents\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-cybersecurity-incidents#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/worldwide-cyber-attack.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/worldwide-cyber-attack.png\",\"width\":725,\"height\":250,\"caption\":\"information is shared without consent\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-cybersecurity-incidents#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Compensation for cybersecurity incidents\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/matthew\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Compensation for cybersecurity incidents - Data Leaks, Breaches &amp; Hacks","description":"As a victim whose data has been exposed or misused, you can be eligible to make a claim for compensation for cybersecurity incidents.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cybersecurity-incidents","og_locale":"en_GB","og_type":"article","og_title":"Compensation for cybersecurity incidents - Data Leaks, Breaches &amp; Hacks","og_description":"As a victim whose data has been exposed or misused, you can be eligible to make a claim for compensation for cybersecurity incidents.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cybersecurity-incidents","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2019-09-05T06:30:11+00:00","article_modified_time":"2025-11-25T13:12:52+00:00","og_image":[{"width":725,"height":250,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/worldwide-cyber-attack.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cybersecurity-incidents#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cybersecurity-incidents"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3"},"headline":"Compensation for cybersecurity incidents","datePublished":"2019-09-05T06:30:11+00:00","dateModified":"2025-11-25T13:12:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cybersecurity-incidents"},"wordCount":496,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cybersecurity-incidents#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/worldwide-cyber-attack.png","keywords":["compensation","cyber attack","cyber crime","cybersecurity","data leak","database security","personal data"],"articleSection":["Claims","Cybersecurity","Group Action","Security"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cybersecurity-incidents","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cybersecurity-incidents","name":"Compensation for cybersecurity incidents - Data Leaks, Breaches &amp; Hacks","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cybersecurity-incidents#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cybersecurity-incidents#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/worldwide-cyber-attack.png","datePublished":"2019-09-05T06:30:11+00:00","dateModified":"2025-11-25T13:12:52+00:00","description":"As a victim whose data has been exposed or misused, you can be eligible to make a claim for compensation for cybersecurity incidents.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cybersecurity-incidents#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cybersecurity-incidents"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cybersecurity-incidents#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/worldwide-cyber-attack.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/worldwide-cyber-attack.png","width":725,"height":250,"caption":"information is shared without consent"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-cybersecurity-incidents#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Compensation for cybersecurity incidents"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/matthew"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3961","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=3961"}],"version-history":[{"count":2,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3961\/revisions"}],"predecessor-version":[{"id":9412,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/3961\/revisions\/9412"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/1352"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=3961"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=3961"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=3961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}