{"id":4049,"date":"2019-10-25T07:30:26","date_gmt":"2019-10-25T06:30:26","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=4049"},"modified":"2025-11-25T13:56:20","modified_gmt":"2025-11-25T13:56:20","slug":"cyber-hack-compensation-claims","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/cyber-hack-compensation-claims","title":{"rendered":"Cyber hack compensation claims"},"content":{"rendered":"<p>Cyber hack compensation claims are one of the more common types of cases that we represent people for, particularly when it comes to <a href=\"https:\/\/www.dataleaklawyers.co.uk\/group-actions\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>group and multi-party actions<\/strong>.<\/a><\/p>\n<p>You can be entitled to <a href=\"https:\/\/www.dataleaklawyers.co.uk\/data-protection-breach-compensation-amounts\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>claim damages for any distress, suffering, loss of amenity<\/strong><\/a>, and for any financial losses as well. Importantly, you don\u2019t have to have suffered an actual financial loss to be able to claim. The mere fact that your information has been hacked can be enough for you to claim for the distress element alone.<\/p>\n<p>Our lawyers are fighting for justice in dozens of different group cases, and many of them have stemmed from cyberattacks.<\/p>\n<p><!--more--><\/p>\n<h3><strong>Increasing volumes of claims<\/strong><\/h3>\n<p>We\u2019re probably going to see more and more cyber hack compensation claims as information continues to be digitalised.<\/p>\n<p>There are now more doorways than ever that can be broken down by cybercriminals. With wider networks, more remote working, more employee access to servers, greater connectivity, and the growth of the Internet of Things and smart technology, there are so many ways that data can be stolen.<\/p>\n<p>I heard over summer that the volume of cyberattacks in the first quarter of the UK amounted to one every 50 seconds. Such a damning statistic highlights the very real dangers we face in the digital world!<\/p>\n<h3><strong>Group cyber hack compensation claims<\/strong><\/h3>\n<p>Group and multi-party cyber hack compensation claims can be really common. Usually, when an organisation is targeted, it\u2019s more than just one person\u2019s data that\u2019s exposed or stolen.<\/p>\n<p>It can be hundreds, thousands, tens of thousands, hundreds of thousands, and even millions of people affected in one single event. One of the most recent ones is the <strong>BA Group Action<\/strong> that we\u2019ve been appointed to the Steering Committee for, and that affected around 500,000 people.<\/p>\n<p>The <a href=\"https:\/\/www.dataleaklawyers.co.uk\/equifax-data-breach-compensation-claims\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Equifax hack<\/strong><\/a> saw millions of records accessed, as did the Marriott breach that has resulted in a provisional ICO (Information Commissioner\u2019s Office) fine in the sum of \u00a399m.<\/p>\n<p>What people can do is bring their claims together to form a Group Litigation Order (GLO), which is what has <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/breaking-your-lawyers-appointed-to-steering-committee-in-ba-group-action-court-case\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>happened this month in the British Airways Group Action<\/strong><\/a>. All victims need to do is sign-up for a case and join the action to be a part of any settlement that can then take place.<\/p>\n<h3><strong>Advice for cyber hack compensation claims<\/strong><\/h3>\n<p>If you would like free, no-obligation advice about cyber hack compensation claims if your information has been stolen or exposed, please don\u2019t hesitate to <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>get in touch with our friendly team here.<\/strong><\/a><\/p>\n<p>We\u2019re usually open until 10pm on most week-nights, and 9am to 5pm on most weekends so we can be as accessible as we can for you.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber hack compensation claims are one of the more common types of cases that we represent people for, particularly when it comes to group and multi-party actions. You can be entitled to claim damages for any distress, suffering, loss of amenity, and for any financial losses as well. Importantly, you don\u2019t have to have suffered &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/cyber-hack-compensation-claims\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Cyber hack compensation claims<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1485,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,113,8,11,51],"tags":[16,2,26,55,14,54,20,27],"class_list":["post-4049","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-claims","category-cybersecurity","category-hacking-news","category-scammers","category-technology","tag-compensation","tag-cyber-attack","tag-cyber-crime","tag-cybersecurity","tag-data-controllers","tag-database-security","tag-online-security","tag-smart-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber hack compensation claims - Data Leaks, Breaches &amp; Hacks<\/title>\n<meta name=\"description\" content=\"Cyber hack compensation claims are one of the more common types of cases we represent people for, particularly in group and multi-party actions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/cyber-hack-compensation-claims\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber hack compensation claims - Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"og:description\" content=\"Cyber hack compensation claims are one of the more common types of cases we represent people for, particularly in group and multi-party actions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/cyber-hack-compensation-claims\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-25T06:30:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-25T13:56:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yahoo-data-breach-min.png\" \/>\n\t<meta property=\"og:image:width\" content=\"725\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/cyber-hack-compensation-claims#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/cyber-hack-compensation-claims\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\"},\"headline\":\"Cyber hack compensation claims\",\"datePublished\":\"2019-10-25T06:30:26+00:00\",\"dateModified\":\"2025-11-25T13:56:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/cyber-hack-compensation-claims\"},\"wordCount\":451,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/cyber-hack-compensation-claims#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yahoo-data-breach-min.png\",\"keywords\":[\"compensation\",\"cyber attack\",\"cyber crime\",\"cybersecurity\",\"data controllers\",\"database security\",\"online security\",\"smart technology\"],\"articleSection\":[\"Claims\",\"Cybersecurity\",\"Hacking News\",\"Scammers\",\"Technology\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/cyber-hack-compensation-claims\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/cyber-hack-compensation-claims\",\"name\":\"Cyber hack compensation claims - Data Leaks, Breaches &amp; Hacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/cyber-hack-compensation-claims#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/cyber-hack-compensation-claims#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yahoo-data-breach-min.png\",\"datePublished\":\"2019-10-25T06:30:26+00:00\",\"dateModified\":\"2025-11-25T13:56:20+00:00\",\"description\":\"Cyber hack compensation claims are one of the more common types of cases we represent people for, particularly in group and multi-party actions.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/cyber-hack-compensation-claims#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/cyber-hack-compensation-claims\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/cyber-hack-compensation-claims#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yahoo-data-breach-min.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yahoo-data-breach-min.png\",\"width\":725,\"height\":250,\"caption\":\"yahoo data breach\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/cyber-hack-compensation-claims#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber hack compensation claims\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/matthew\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber hack compensation claims - Data Leaks, Breaches &amp; Hacks","description":"Cyber hack compensation claims are one of the more common types of cases we represent people for, particularly in group and multi-party actions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/cyber-hack-compensation-claims","og_locale":"en_GB","og_type":"article","og_title":"Cyber hack compensation claims - Data Leaks, Breaches &amp; Hacks","og_description":"Cyber hack compensation claims are one of the more common types of cases we represent people for, particularly in group and multi-party actions.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/cyber-hack-compensation-claims","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2019-10-25T06:30:26+00:00","article_modified_time":"2025-11-25T13:56:20+00:00","og_image":[{"width":725,"height":250,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yahoo-data-breach-min.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/cyber-hack-compensation-claims#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/cyber-hack-compensation-claims"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3"},"headline":"Cyber hack compensation claims","datePublished":"2019-10-25T06:30:26+00:00","dateModified":"2025-11-25T13:56:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/cyber-hack-compensation-claims"},"wordCount":451,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/cyber-hack-compensation-claims#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yahoo-data-breach-min.png","keywords":["compensation","cyber attack","cyber crime","cybersecurity","data controllers","database security","online security","smart technology"],"articleSection":["Claims","Cybersecurity","Hacking News","Scammers","Technology"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/cyber-hack-compensation-claims","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/cyber-hack-compensation-claims","name":"Cyber hack compensation claims - Data Leaks, Breaches &amp; Hacks","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/cyber-hack-compensation-claims#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/cyber-hack-compensation-claims#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yahoo-data-breach-min.png","datePublished":"2019-10-25T06:30:26+00:00","dateModified":"2025-11-25T13:56:20+00:00","description":"Cyber hack compensation claims are one of the more common types of cases we represent people for, particularly in group and multi-party actions.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/cyber-hack-compensation-claims#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/cyber-hack-compensation-claims"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/cyber-hack-compensation-claims#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yahoo-data-breach-min.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yahoo-data-breach-min.png","width":725,"height":250,"caption":"yahoo data breach"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/cyber-hack-compensation-claims#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Cyber hack compensation claims"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/matthew"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=4049"}],"version-history":[{"count":2,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4049\/revisions"}],"predecessor-version":[{"id":9421,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4049\/revisions\/9421"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/1485"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=4049"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=4049"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=4049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}