{"id":4115,"date":"2019-12-05T13:00:08","date_gmt":"2019-12-05T13:00:08","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=4115"},"modified":"2025-11-25T14:12:39","modified_gmt":"2025-11-25T14:12:39","slug":"sweaty-betty-data-breach","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/sweaty-betty-data-breach","title":{"rendered":"Sweaty Betty data breach"},"content":{"rendered":"<p>The Sweaty Betty data breach incident appears to be another case of cybercriminals using malicious code in checkout systems to steal sensitive information.<\/p>\n<p>We\u2019ve literally seen this before. Two of the big recent examples are <a href=\"https:\/\/www.dataleaklawyers.co.uk\/british-airways-data-breach-compensation-action\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>British Airways<\/strong><\/a> and <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/the-ticketmaster-data-breach-uk-action\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Ticketmaster<\/strong><\/a>; both of which are thought to be attacks carried out by the same group of hackers. Inserting code into checkout systems can lead to personal details and payment card data being exposed and that\u2019s exactly what has happened in the Sweaty Betty case.<\/p>\n<p>Anyone who has been affected in England and Wales may be entitled to bring a <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>claim for data breach compensation<\/strong><\/a>, and we can help.<\/p>\n<p><!--more--><\/p>\n<h3><strong>About the Sweaty Betty data breach<\/strong><\/h3>\n<p>The Sweaty Betty data breach incident is understood to affect customers who placed online and telephone orders with the company between Tuesday 19<sup>th<\/sup> November and Wednesday 27<sup>th<\/sup> November 2019.<\/p>\n<p>During this timeframe, malicious code had been inserted into the company\u2019s eCommerce system which was designed to capture information that was processed through it. Customers are being informed about the breach, and information that may have been exposed includes:<\/p>\n<ul>\n<li>Names;<\/li>\n<li>Passwords;<\/li>\n<li>Telephone numbers;<\/li>\n<li>Email addresses;<\/li>\n<li>Postal addresses;<\/li>\n<li>Payment card information (card numbers, CVV numbers and expiration dates)<\/li>\n<\/ul>\n<p>This kind of data in the hands of criminals can put people at an immediate risk of theft and fraud. Victim numbers are unknown, although it\u2019s understood that customers who used PayPal or Apple Pay may not be affected.<\/p>\n<h3><strong>Advice for victims<\/strong><\/h3>\n<p>If you have been affected by the Sweaty Betty data breach incident<strong>, <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/black-friday-cybersecurity-feature-in-the-i-paper\" target=\"_blank\" rel=\"noopener noreferrer\">take a look at our recent advice article<\/a><\/strong> about what to do and how to protect yourself. This article was about Black Friday security, but the tips may be helpful for you.<\/p>\n<p>You may also be able to <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>make a claim for data breach compensation<\/strong><\/a>, and you can speak to our team today for free, no-obligation advice. If you have been informed that you were affected by the breach, or if you processed an order during the breach period, we may be able to offer you our No Win, No Fee representation.<\/p>\n<p>This case has stark similarities to the <strong>BA Group Action<\/strong> that we have a senior role in having been appointed by the High Court to the Steering Committee that\u2019s responsible for conducting the litigation.<\/p>\n<h3><strong>A preventable incident?<\/strong><\/h3>\n<p>The Sweaty Betty data breach appears to me like it may have been another case of a preventable incident.<\/p>\n<p>The retailer has reportedly said that this was a \u201chighly-sophisticated cyber security incident\u201d, and that they have <em>now<\/em> taken steps to make their website completely secure. As we often say, it\u2019s too little, too late. The exposure has already taken place, and this appears to be yet another case of an organisation being reactive to a real breach as opposed to being proactive to prevent one.<\/p>\n<p>If they have <em>now<\/em> taken steps to make their website completely secure, why wasn\u2019t it completely secure ion the first place? We can only speculate at this moment in time as investigations remain ongoing, but if changes have now been made then, surely, they could have been made before a successful attack took place.<\/p>\n<p>The incident has been reported to the ICO (Information Commissioner\u2019s Office) who may impose GDPR fines in the same way they have for <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/british-airways-and-marriott-fines-show-importance-of-cybersecurity-and-justice\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>BA and Marriott<\/strong><\/a>. Financial penalties are separate to the claims for compensation we make so you can speak to our team now for help and advice.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Sweaty Betty data breach incident appears to be another case of cybercriminals using malicious code in checkout systems to steal sensitive information. We\u2019ve literally seen this before. Two of the big recent examples are British Airways and Ticketmaster; both of which are thought to be attacks carried out by the same group of hackers. &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/sweaty-betty-data-breach\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Sweaty Betty data breach<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1529,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,113,122,1,11,64],"tags":[16,2,26,55,10,123,20,13],"class_list":["post-4115","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-claims","category-cybersecurity","category-group-action","category-latest","category-scammers","category-security","tag-compensation","tag-cyber-attack","tag-cyber-crime","tag-cybersecurity","tag-data-breach","tag-group-action","tag-online-security","tag-personal-data"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sweaty Betty data breach - Data Leaks, Breaches &amp; Hacks<\/title>\n<meta name=\"description\" content=\"The Sweaty Betty data breach incident appears to be another case of cybercriminals using malicious code in checkout systems to steal sensitive information.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/sweaty-betty-data-breach\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sweaty Betty data breach - Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"og:description\" content=\"The Sweaty Betty data breach incident appears to be another case of cybercriminals using malicious code in checkout systems to steal sensitive information.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/sweaty-betty-data-breach\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-05T13:00:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-25T14:12:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/online-construction-company-fined-min.png\" \/>\n\t<meta property=\"og:image:width\" content=\"725\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/sweaty-betty-data-breach#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/sweaty-betty-data-breach\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\"},\"headline\":\"Sweaty Betty data breach\",\"datePublished\":\"2019-12-05T13:00:08+00:00\",\"dateModified\":\"2025-11-25T14:12:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/sweaty-betty-data-breach\"},\"wordCount\":580,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/sweaty-betty-data-breach#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/online-construction-company-fined-min.png\",\"keywords\":[\"compensation\",\"cyber attack\",\"cyber crime\",\"cybersecurity\",\"data breach\",\"Group Action\",\"online security\",\"personal data\"],\"articleSection\":[\"Claims\",\"Cybersecurity\",\"Group Action\",\"Latest\",\"Scammers\",\"Security\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/sweaty-betty-data-breach\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/sweaty-betty-data-breach\",\"name\":\"Sweaty Betty data breach - Data Leaks, Breaches &amp; Hacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/sweaty-betty-data-breach#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/sweaty-betty-data-breach#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/online-construction-company-fined-min.png\",\"datePublished\":\"2019-12-05T13:00:08+00:00\",\"dateModified\":\"2025-11-25T14:12:39+00:00\",\"description\":\"The Sweaty Betty data breach incident appears to be another case of cybercriminals using malicious code in checkout systems to steal sensitive information.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/sweaty-betty-data-breach#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/sweaty-betty-data-breach\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/sweaty-betty-data-breach#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/online-construction-company-fined-min.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/online-construction-company-fined-min.png\",\"width\":725,\"height\":250,\"caption\":\"online company fined\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/sweaty-betty-data-breach#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sweaty Betty data breach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/matthew\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sweaty Betty data breach - Data Leaks, Breaches &amp; Hacks","description":"The Sweaty Betty data breach incident appears to be another case of cybercriminals using malicious code in checkout systems to steal sensitive information.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/sweaty-betty-data-breach","og_locale":"en_GB","og_type":"article","og_title":"Sweaty Betty data breach - Data Leaks, Breaches &amp; Hacks","og_description":"The Sweaty Betty data breach incident appears to be another case of cybercriminals using malicious code in checkout systems to steal sensitive information.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/sweaty-betty-data-breach","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2019-12-05T13:00:08+00:00","article_modified_time":"2025-11-25T14:12:39+00:00","og_image":[{"width":725,"height":250,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/online-construction-company-fined-min.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/sweaty-betty-data-breach#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/sweaty-betty-data-breach"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3"},"headline":"Sweaty Betty data breach","datePublished":"2019-12-05T13:00:08+00:00","dateModified":"2025-11-25T14:12:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/sweaty-betty-data-breach"},"wordCount":580,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/sweaty-betty-data-breach#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/online-construction-company-fined-min.png","keywords":["compensation","cyber attack","cyber crime","cybersecurity","data breach","Group Action","online security","personal data"],"articleSection":["Claims","Cybersecurity","Group Action","Latest","Scammers","Security"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/sweaty-betty-data-breach","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/sweaty-betty-data-breach","name":"Sweaty Betty data breach - Data Leaks, Breaches &amp; Hacks","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/sweaty-betty-data-breach#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/sweaty-betty-data-breach#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/online-construction-company-fined-min.png","datePublished":"2019-12-05T13:00:08+00:00","dateModified":"2025-11-25T14:12:39+00:00","description":"The Sweaty Betty data breach incident appears to be another case of cybercriminals using malicious code in checkout systems to steal sensitive information.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/sweaty-betty-data-breach#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/sweaty-betty-data-breach"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/sweaty-betty-data-breach#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/online-construction-company-fined-min.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/online-construction-company-fined-min.png","width":725,"height":250,"caption":"online company fined"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/sweaty-betty-data-breach#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Sweaty Betty data breach"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/matthew"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=4115"}],"version-history":[{"count":2,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4115\/revisions"}],"predecessor-version":[{"id":9430,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4115\/revisions\/9430"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/1529"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=4115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=4115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=4115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}