{"id":4127,"date":"2019-12-12T12:49:08","date_gmt":"2019-12-12T12:49:08","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=4127"},"modified":"2019-12-12T12:49:08","modified_gmt":"2019-12-12T12:49:08","slug":"data-breaches-and-encryption","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breaches-and-encryption","title":{"rendered":"Data breaches and encryption"},"content":{"rendered":"<p>Given the continually large volumes of incidents that are happening, it\u2019s important to approach the subject of data breaches and encryption.<\/p>\n<p>In some cases, leaks can happen due to human errors or system problems. Some hacks may take place because 100% effective defence is a hard thing to achieve. This doesn\u2019t excuse an organisation when it comes to their responsibilities, but it\u2019s important for them to understand that it\u2019s about more than just trying to stop incidents; it\u2019s also about preventing damage.<\/p>\n<p>And that\u2019s where encryption and even basic levels of protection is king.<\/p>\n<p><!--more--><\/p>\n<h3><strong>Data breaches and encryption: hand-in-hand<\/strong><\/h3>\n<p>The prevention of data breaches and encryption use are important elements to put together. They should go hand-in-hand so that an organisation is doing all that they can in order to prevent damage being done.<\/p>\n<p>Organisations should have a proper cybersecurity defensive structure in place, and they should make use of technology that\u2019s specifically designed to protect data. Using systems and communication methods that encrypt messages and information within a network can help to prevent information being stolen or exposed if a network is breached.<\/p>\n<p>The same goes for servers and machines within an organisation that we all rely on, as well as data stored within a network and \/ or on a cloud server. If organisations are serious about protecting themselves from data exposure, they must deploy the infrastructure that\u2019s needed to protect the data that they store and process.<\/p>\n<h3><strong>Are businesses doing enough?<\/strong><\/h3>\n<p>It\u2019s not just about data breaches and encryption; it can also be about data breaches and simple ways of protecting data; like password-protection. Sometime earlier this year, I recall hearing about a statistic that perhaps fewer than 30% of businesses use encryption. If we look at this as a kind of benchmark, it\u2019s worrying.<\/p>\n<p>Although password-protection and encryption are different things, even at the most basic level, we can password-protect word documents, excel files and PDFs. In fact, we do this with some of our sensitive cases and where we believe it\u2019s necessary for sending sensitive information electronically. Many medical organisations like hospitals and GPs that we retrieve records from for cases password-protect their CDs or files that they send to us.<\/p>\n<p>It\u2019s so simple to put these basic levels of protection in place, although as we always advise, strong and unique passwords must always be used. If something happens, like a file being emailed to the wrong person by accident, these simple and effective forms of protection could prevent the damage of a data leak.<\/p>\n<h3><strong>Claiming compensation<\/strong><\/h3>\n<p>When it comes to our approach for a claim, we do look at data breaches and encryption, and whether any kind of encryption should have been in place. If encryption could have prevented information exposure then this can be another tool in our legal arsenal that we use to establish that an organisation is labile to compensate you.<\/p>\n<p>At the very least, particularly personal and sensitive data should always be protected in some way. <a href=\"https:\/\/www.dataleaklawyers.co.uk\/data-protection-breach-compensation-amounts\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Data breach compensation amounts<\/strong><\/a> can be considerably high when the information exposed is personal and sensitive. This is the kind of data that should always be fully protected, although we would argue that all organisations should ensure that their infrastructure protects the data they store and process.<\/p>\n<p>Where they fail to do so, victims of a breach, leak or hack can be entitled to <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>make a claim for compensation with us<\/strong><\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Given the continually large volumes of incidents that are happening, it\u2019s important to approach the subject of data breaches and encryption. In some cases, leaks can happen due to human errors or system problems. Some hacks may take place because 100% effective defence is a hard thing to achieve. This doesn\u2019t excuse an organisation when &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breaches-and-encryption\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Data breaches and encryption<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":2975,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,113,64,51],"tags":[16,55,14,88,54,20,27],"class_list":["post-4127","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-claims","category-cybersecurity","category-security","category-technology","tag-compensation","tag-cybersecurity","tag-data-controllers","tag-data-leak","tag-database-security","tag-online-security","tag-smart-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data breaches and encryption - Data Leaks, Breaches &amp; Hacks<\/title>\n<meta name=\"description\" content=\"Given the continually large volumes of incidents that are happening, it\u2019s important to approach the subject of data breaches and encryption.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breaches-and-encryption\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data breaches and encryption - Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"og:description\" content=\"Given the continually large volumes of incidents that are happening, it\u2019s important to approach the subject of data breaches and encryption.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breaches-and-encryption\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-12T12:49:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/talktalk-cybersecurity.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"414\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/data-breaches-and-encryption#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/data-breaches-and-encryption\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\"},\"headline\":\"Data breaches and encryption\",\"datePublished\":\"2019-12-12T12:49:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/data-breaches-and-encryption\"},\"wordCount\":580,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/data-breaches-and-encryption#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/talktalk-cybersecurity.png\",\"keywords\":[\"compensation\",\"cybersecurity\",\"data controllers\",\"data leak\",\"database security\",\"online security\",\"smart technology\"],\"articleSection\":[\"Claims\",\"Cybersecurity\",\"Security\",\"Technology\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/data-breaches-and-encryption\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/data-breaches-and-encryption\",\"name\":\"Data breaches and encryption - Data Leaks, Breaches &amp; Hacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/data-breaches-and-encryption#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/data-breaches-and-encryption#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/talktalk-cybersecurity.png\",\"datePublished\":\"2019-12-12T12:49:08+00:00\",\"description\":\"Given the continually large volumes of incidents that are happening, it\u2019s important to approach the subject of data breaches and encryption.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/data-breaches-and-encryption#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/data-breaches-and-encryption\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/data-breaches-and-encryption#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/talktalk-cybersecurity.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/talktalk-cybersecurity.png\",\"width\":1200,\"height\":414,\"caption\":\"cybersecurity issues\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/data-breaches-and-encryption#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data breaches and encryption\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/matthew\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data breaches and encryption - Data Leaks, Breaches &amp; Hacks","description":"Given the continually large volumes of incidents that are happening, it\u2019s important to approach the subject of data breaches and encryption.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breaches-and-encryption","og_locale":"en_GB","og_type":"article","og_title":"Data breaches and encryption - Data Leaks, Breaches &amp; Hacks","og_description":"Given the continually large volumes of incidents that are happening, it\u2019s important to approach the subject of data breaches and encryption.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breaches-and-encryption","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2019-12-12T12:49:08+00:00","og_image":[{"width":1200,"height":414,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/talktalk-cybersecurity.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breaches-and-encryption#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breaches-and-encryption"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3"},"headline":"Data breaches and encryption","datePublished":"2019-12-12T12:49:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breaches-and-encryption"},"wordCount":580,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breaches-and-encryption#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/talktalk-cybersecurity.png","keywords":["compensation","cybersecurity","data controllers","data leak","database security","online security","smart technology"],"articleSection":["Claims","Cybersecurity","Security","Technology"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breaches-and-encryption","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breaches-and-encryption","name":"Data breaches and encryption - Data Leaks, Breaches &amp; Hacks","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breaches-and-encryption#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breaches-and-encryption#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/talktalk-cybersecurity.png","datePublished":"2019-12-12T12:49:08+00:00","description":"Given the continually large volumes of incidents that are happening, it\u2019s important to approach the subject of data breaches and encryption.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breaches-and-encryption#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breaches-and-encryption"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breaches-and-encryption#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/talktalk-cybersecurity.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/talktalk-cybersecurity.png","width":1200,"height":414,"caption":"cybersecurity issues"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/data-breaches-and-encryption#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Data breaches and encryption"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/matthew"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=4127"}],"version-history":[{"count":1,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4127\/revisions"}],"predecessor-version":[{"id":4128,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4127\/revisions\/4128"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/2975"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=4127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=4127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=4127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}