{"id":4159,"date":"2019-12-31T07:30:04","date_gmt":"2019-12-31T07:30:04","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=4159"},"modified":"2019-12-19T21:30:36","modified_gmt":"2019-12-19T21:30:36","slug":"hospital-cyber-attacks-where-victims-stand","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/hospital-cyber-attacks-where-victims-stand","title":{"rendered":"Hospital cyber-attacks: where the victims stand"},"content":{"rendered":"<p>When it comes to hospital cyber-attacks, our focus is on ensuring that the victims\u2019 voices are heard and that they have the chance for the justice that they deserve.<\/p>\n<p>The threat that hospitals are facing from cybercriminals is substantial. A large volume of the individual compensation claims that we take forward are for <a href=\"https:\/\/www.dataleaklawyers.co.uk\/medical-data-claims\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>medical data breach incidents<\/strong><\/a>, and many of them stem from cybersecurity events.<\/p>\n<p>The <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wannacry-attack-was-lucky-escape-nhs\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>2017 WannaCry incident <\/strong><\/a>was perhaps one of the biggest examples that showed just how much of a target the healthcare sector really is.<\/p>\n<p><!--more--><\/p>\n<h3><strong>Why are hospitals under threat?<\/strong><\/h3>\n<p>The threat of hospital cyber-attacks taking place is substantial for a number of reasons.<\/p>\n<p>These include:<\/p>\n<ul>\n<li>The size of the sector and the fact that millions (most of the population of our nation) will have some form of records with a hospital;<\/li>\n<li>The nature of the service hospitals provide, in that any disruption could literally cost lives;<\/li>\n<li>The nature of the data that they store and process being particularly personal and sensitive;<\/li>\n<li>The reliance on older and more outdated systems together with funding constraints that mean some hospitals may be lacking in adequate cybersecurity protection.<\/li>\n<\/ul>\n<p>Many hackers want to make money from their actions. With over 1,250 hospitals in the UK, catering for tens of millions of people, there is a monumental number of data subjects to target. As medical data is particularly personal and sensitive, people don\u2019t want it to be exposed, which is attractive for hackers to then target hospitals for ransomware attacks.<\/p>\n<p>All hackers need to do is target such data to either threaten release of it, or lock systems up, and hospitals will need to react quickly. They need to stop leaks occurring in order to avoid the damage to victims and the costs of the fallout, and they need to get back into systems quickly in order to provide services.<\/p>\n<p>All it takes is for a hacker to set a modest ransomware amount and, in many cases, it may be quicker and easier (and perhaps even cheaper) to pay off a ransom than deal with the dangers of delays and the costs of a breach.<\/p>\n<h3><strong>Can you claim for hospital cyber-attacks?<\/strong><\/h3>\n<p>Some hospital cyber-attacks will inevitably lead to data being exposed. Victims whose medical information has been exposed or misused can be entitled to <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>make a claim for compensation<\/strong><\/a> for any distress caused by the loss of control of personal and sensitive information.<\/p>\n<p><a href=\"https:\/\/www.dataleaklawyers.co.uk\/data-protection-breach-compensation-amounts\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Data breach compensation amounts<\/strong><\/a> for these kinds of cases can often be high as a result of the nature of the information that can be exposed. When looking to take a case forward, we recommend that you <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>instruct an expert data compensation firm<\/strong><\/a> like us who specialise in serious data breach cases.<\/p>\n<p>Some claims can attract awards of tens of thousands of pounds, but having the right legal team on board to be able to properly pursue a case is important. It can be the difference between getting the true justice that you deserve, or being left short-changed.<\/p>\n<h3><strong>Advice and No Win, No Fee agreements<\/strong><\/h3>\n<p>You can <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>speak to our team for free, no-obligation advice about your options for starting a case today.<\/strong><\/a><\/p>\n<p>If we think that we can succeed with a legal case, we may also be able to offer you our No Win, No Fee representation.<\/p>\n<p>As huge believers in access to justice, we wouldn\u2019t want you having to pay legal fees if a case is lost, which is why we can offer No Win, No Fee terms.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When it comes to hospital cyber-attacks, our focus is on ensuring that the victims\u2019 voices are heard and that they have the chance for the justice that they deserve. The threat that hospitals are facing from cybercriminals is substantial. A large volume of the individual compensation claims that we take forward are for medical data &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/hospital-cyber-attacks-where-victims-stand\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Hospital cyber-attacks: where the victims stand<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1650,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[113,8,52,64,51],"tags":[16,2,26,55,14,54,95,37,35,7],"class_list":["post-4159","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-hacking-news","category-healthcare","category-security","category-technology","tag-compensation","tag-cyber-attack","tag-cyber-crime","tag-cybersecurity","tag-data-controllers","tag-database-security","tag-medical-data-breach","tag-medical-records","tag-nhs","tag-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hospital cyber-attacks: where the victims stand - Data Leaks, Breaches &amp; Hacks<\/title>\n<meta name=\"description\" content=\"When it comes to hospital cyber-attacks, our focus is on ensuring that victims\u2019 voices are heard and they have the chance for the justice that they deserve.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/hospital-cyber-attacks-where-victims-stand\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hospital cyber-attacks: where the victims stand - Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"og:description\" content=\"When it comes to hospital cyber-attacks, our focus is on ensuring that victims\u2019 voices are heard and they have the chance for the justice that they deserve.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/hospital-cyber-attacks-where-victims-stand\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-31T07:30:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/peyta-ransomware-min.png\" \/>\n\t<meta property=\"og:image:width\" content=\"725\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/hospital-cyber-attacks-where-victims-stand#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/hospital-cyber-attacks-where-victims-stand\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\"},\"headline\":\"Hospital cyber-attacks: where the victims stand\",\"datePublished\":\"2019-12-31T07:30:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/hospital-cyber-attacks-where-victims-stand\"},\"wordCount\":588,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/hospital-cyber-attacks-where-victims-stand#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/peyta-ransomware-min.png\",\"keywords\":[\"compensation\",\"cyber attack\",\"cyber crime\",\"cybersecurity\",\"data controllers\",\"database security\",\"medical data breach\",\"medical records\",\"nhs\",\"ransomware\"],\"articleSection\":[\"Cybersecurity\",\"Hacking News\",\"Healthcare\",\"Security\",\"Technology\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/hospital-cyber-attacks-where-victims-stand\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/hospital-cyber-attacks-where-victims-stand\",\"name\":\"Hospital cyber-attacks: where the victims stand - Data Leaks, Breaches &amp; Hacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/hospital-cyber-attacks-where-victims-stand#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/hospital-cyber-attacks-where-victims-stand#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/peyta-ransomware-min.png\",\"datePublished\":\"2019-12-31T07:30:04+00:00\",\"description\":\"When it comes to hospital cyber-attacks, our focus is on ensuring that victims\u2019 voices are heard and they have the chance for the justice that they deserve.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/hospital-cyber-attacks-where-victims-stand#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/hospital-cyber-attacks-where-victims-stand\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/hospital-cyber-attacks-where-victims-stand#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/peyta-ransomware-min.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/peyta-ransomware-min.png\",\"width\":725,\"height\":250,\"caption\":\"ransomware attacks and patient records\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/hospital-cyber-attacks-where-victims-stand#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hospital cyber-attacks: where the victims stand\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/matthew\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hospital cyber-attacks: where the victims stand - Data Leaks, Breaches &amp; Hacks","description":"When it comes to hospital cyber-attacks, our focus is on ensuring that victims\u2019 voices are heard and they have the chance for the justice that they deserve.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/hospital-cyber-attacks-where-victims-stand","og_locale":"en_GB","og_type":"article","og_title":"Hospital cyber-attacks: where the victims stand - Data Leaks, Breaches &amp; Hacks","og_description":"When it comes to hospital cyber-attacks, our focus is on ensuring that victims\u2019 voices are heard and they have the chance for the justice that they deserve.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/hospital-cyber-attacks-where-victims-stand","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2019-12-31T07:30:04+00:00","og_image":[{"width":725,"height":250,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/peyta-ransomware-min.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/hospital-cyber-attacks-where-victims-stand#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/hospital-cyber-attacks-where-victims-stand"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3"},"headline":"Hospital cyber-attacks: where the victims stand","datePublished":"2019-12-31T07:30:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/hospital-cyber-attacks-where-victims-stand"},"wordCount":588,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/hospital-cyber-attacks-where-victims-stand#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/peyta-ransomware-min.png","keywords":["compensation","cyber attack","cyber crime","cybersecurity","data controllers","database security","medical data breach","medical records","nhs","ransomware"],"articleSection":["Cybersecurity","Hacking News","Healthcare","Security","Technology"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/hospital-cyber-attacks-where-victims-stand","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/hospital-cyber-attacks-where-victims-stand","name":"Hospital cyber-attacks: where the victims stand - Data Leaks, Breaches &amp; Hacks","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/hospital-cyber-attacks-where-victims-stand#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/hospital-cyber-attacks-where-victims-stand#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/peyta-ransomware-min.png","datePublished":"2019-12-31T07:30:04+00:00","description":"When it comes to hospital cyber-attacks, our focus is on ensuring that victims\u2019 voices are heard and they have the chance for the justice that they deserve.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/hospital-cyber-attacks-where-victims-stand#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/hospital-cyber-attacks-where-victims-stand"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/hospital-cyber-attacks-where-victims-stand#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/peyta-ransomware-min.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/peyta-ransomware-min.png","width":725,"height":250,"caption":"ransomware attacks and patient records"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/hospital-cyber-attacks-where-victims-stand#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Hospital cyber-attacks: where the victims stand"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/matthew"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4159","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=4159"}],"version-history":[{"count":1,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4159\/revisions"}],"predecessor-version":[{"id":4160,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4159\/revisions\/4160"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/1650"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=4159"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=4159"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=4159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}