{"id":4268,"date":"2020-02-28T07:30:32","date_gmt":"2020-02-28T07:30:32","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=4268"},"modified":"2025-11-25T14:56:35","modified_gmt":"2025-11-25T14:56:35","slug":"claiming-compensation-for-a-security-breach","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/claiming-compensation-for-a-security-breach","title":{"rendered":"Claiming compensation for a security breach"},"content":{"rendered":"<p>You can be entitled to claim compensation for a security breach, and we can offer <a href=\"https:\/\/www.dataleaklawyers.co.uk\/no-win-no-fee\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>No Win, No Fee representation<\/strong><\/a> for victims who put their trust in us.<\/p>\n<p>As a<a href=\"https:\/\/www.dataleaklawyers.co.uk\/who-we-are\" target=\"_blank\" rel=\"noopener noreferrer\"> <strong>leading firm that specialises in data breach compensation law<\/strong><\/a>, thousands of people have been coming to us for our expert help for years. We launched our first group legal case back in 2015 when data compensation was an emerging area of law, and many of the dozens of actions that we now help people for involve security breaches. In fact, the first GDPR Group Litigation Order (GLO) that we\u2019re on the Steering Committee for \u2013 <strong>the BA Group Action<\/strong> &#8211; stemmed from a security breach.<\/p>\n<p>Victims can <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>contact our team for free, no-obligation advice<\/strong><\/a> about their options for compensation.<\/p>\n<p><!--more--><\/p>\n<h3><strong>Can you claim compensation for a security breach?<\/strong><\/h3>\n<p>Victims can be entitled to claim compensation for a security breach. If the breach was preventable then the basis for the case can be that the opponent has failed to protect your information, which they have a legal duty to do.<\/p>\n<p>There are many ways a security breach can occur that can lead to a victim being eligible for compensation, and they can include:<\/p>\n<ul>\n<li>Data being accessible either internally or even externally online when it shouldn\u2019t be;<\/li>\n<li>Successful cyberattacks where the organisation reasonable for the data has failed to implement adequate security measures. The <a href=\"https:\/\/www.dataleaklawyers.co.uk\/equifax-data-breach-compensation-claims\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Equifax group action<\/strong><\/a> we\u2019re involved in is a good example of this, where they failed to patch a known security vulnerability for months that was then used by hackers to steal information;<\/li>\n<li>Poor passwords and credentials that are hacked;<\/li>\n<li>Unencrypted data being exposed;<\/li>\n<li>Leaks of information where it has been sent to the wrong person.<\/li>\n<\/ul>\n<p>These are just some examples that can lead to a successful claim for data breach compensation. As our team can offer a <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>free claims assessment, it\u2019s always best to speak to us<\/strong><\/a> to see if we\u2019re able to help you.<\/p>\n<h3><strong>What can you claim for?<\/strong><\/h3>\n<p>There are a number of factors that we can look at when it comes to a claim for compensation for a security breach.<\/p>\n<p>Victims can be entitled to compensation for the distress caused by the loss of control of personal information. <a href=\"https:\/\/www.dataleaklawyers.co.uk\/data-protection-breach-compensation-amounts\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Data breach pay-outs<\/strong><\/a> can be based on the extent and severity of any suffering, which can depend on how the victim has personally suffered, as well as matters like the nature of the information exposed. We often find that particularly sensitive cases like <a href=\"https:\/\/www.dataleaklawyers.co.uk\/medical-data-claims\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>medical data breach claims<\/strong><\/a> can lead to higher valuations because this kind of information can be very sensitive.<\/p>\n<p>Victims can also be entitled to receive compensation for any losses and expenses incurred as well. This can cover money stolen as a result of theft and crimes like identity fraud, and it can also cover costs you may have to pay out: for things like extra security or to deal with the aftermath of a breach. The idea is that you shouldn\u2019t be out of pocket as a result of a breach, which means that reasonable losses and expenses can be recoverable.<\/p>\n<h3><strong>Launching a formal case<\/strong><\/h3>\n<p>It\u2019s important to remember that the ICO (Information Commissioner\u2019s Office) can issue fines for breaches, but that this money isn\u2019t designed to be used for compensation.<\/p>\n<p>Victims must make their own separate claim for compensation for a security breach, and that\u2019s what we do for people.<\/p>\n<p>When you <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>speak to our team<\/strong><\/a>, we can normally tell you right away if we think you have a case. We can then \u2013 if you like \u2013 take your instructions to get a legal case set up for you right away.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You can be entitled to claim compensation for a security breach, and we can offer No Win, No Fee representation for victims who put their trust in us. As a leading firm that specialises in data breach compensation law, thousands of people have been coming to us for our expert help for years. We launched &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/claiming-compensation-for-a-security-breach\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Claiming compensation for a security breach<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":2543,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,113,64,51],"tags":[16,55,10,14,20,13],"class_list":["post-4268","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-claims","category-cybersecurity","category-security","category-technology","tag-compensation","tag-cybersecurity","tag-data-breach","tag-data-controllers","tag-online-security","tag-personal-data"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Claiming compensation for a security breach - Data Leaks, Breaches &amp; Hacks<\/title>\n<meta name=\"description\" content=\"You can be entitled to claim compensation for a security breach, and we can offer No Win, No Fee representation for victims who put their trust in us.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/claiming-compensation-for-a-security-breach\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Claiming compensation for a security breach - Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"og:description\" content=\"You can be entitled to claim compensation for a security breach, and we can offer No Win, No Fee representation for victims who put their trust in us.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/claiming-compensation-for-a-security-breach\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-28T07:30:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-25T14:56:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/cybersecurity-specialists-min.png\" \/>\n\t<meta property=\"og:image:width\" content=\"725\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/claiming-compensation-for-a-security-breach#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/claiming-compensation-for-a-security-breach\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\"},\"headline\":\"Claiming compensation for a security breach\",\"datePublished\":\"2020-02-28T07:30:32+00:00\",\"dateModified\":\"2025-11-25T14:56:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/claiming-compensation-for-a-security-breach\"},\"wordCount\":620,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/claiming-compensation-for-a-security-breach#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/cybersecurity-specialists-min.png\",\"keywords\":[\"compensation\",\"cybersecurity\",\"data breach\",\"data controllers\",\"online security\",\"personal data\"],\"articleSection\":[\"Claims\",\"Cybersecurity\",\"Security\",\"Technology\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/claiming-compensation-for-a-security-breach\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/claiming-compensation-for-a-security-breach\",\"name\":\"Claiming compensation for a security breach - Data Leaks, Breaches &amp; Hacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/claiming-compensation-for-a-security-breach#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/claiming-compensation-for-a-security-breach#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/cybersecurity-specialists-min.png\",\"datePublished\":\"2020-02-28T07:30:32+00:00\",\"dateModified\":\"2025-11-25T14:56:35+00:00\",\"description\":\"You can be entitled to claim compensation for a security breach, and we can offer No Win, No Fee representation for victims who put their trust in us.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/claiming-compensation-for-a-security-breach#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/claiming-compensation-for-a-security-breach\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/claiming-compensation-for-a-security-breach#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/cybersecurity-specialists-min.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/cybersecurity-specialists-min.png\",\"width\":725,\"height\":250,\"caption\":\"shortage of cybersecurity specialists\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/claiming-compensation-for-a-security-breach#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Claiming compensation for a security breach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/matthew\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Claiming compensation for a security breach - Data Leaks, Breaches &amp; Hacks","description":"You can be entitled to claim compensation for a security breach, and we can offer No Win, No Fee representation for victims who put their trust in us.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/claiming-compensation-for-a-security-breach","og_locale":"en_GB","og_type":"article","og_title":"Claiming compensation for a security breach - Data Leaks, Breaches &amp; Hacks","og_description":"You can be entitled to claim compensation for a security breach, and we can offer No Win, No Fee representation for victims who put their trust in us.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/claiming-compensation-for-a-security-breach","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2020-02-28T07:30:32+00:00","article_modified_time":"2025-11-25T14:56:35+00:00","og_image":[{"width":725,"height":250,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/cybersecurity-specialists-min.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/claiming-compensation-for-a-security-breach#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/claiming-compensation-for-a-security-breach"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3"},"headline":"Claiming compensation for a security breach","datePublished":"2020-02-28T07:30:32+00:00","dateModified":"2025-11-25T14:56:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/claiming-compensation-for-a-security-breach"},"wordCount":620,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/claiming-compensation-for-a-security-breach#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/cybersecurity-specialists-min.png","keywords":["compensation","cybersecurity","data breach","data controllers","online security","personal data"],"articleSection":["Claims","Cybersecurity","Security","Technology"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/claiming-compensation-for-a-security-breach","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/claiming-compensation-for-a-security-breach","name":"Claiming compensation for a security breach - Data Leaks, Breaches &amp; Hacks","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/claiming-compensation-for-a-security-breach#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/claiming-compensation-for-a-security-breach#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/cybersecurity-specialists-min.png","datePublished":"2020-02-28T07:30:32+00:00","dateModified":"2025-11-25T14:56:35+00:00","description":"You can be entitled to claim compensation for a security breach, and we can offer No Win, No Fee representation for victims who put their trust in us.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/claiming-compensation-for-a-security-breach#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/claiming-compensation-for-a-security-breach"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/claiming-compensation-for-a-security-breach#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/cybersecurity-specialists-min.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/cybersecurity-specialists-min.png","width":725,"height":250,"caption":"shortage of cybersecurity specialists"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/claiming-compensation-for-a-security-breach#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Claiming compensation for a security breach"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/matthew"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4268","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=4268"}],"version-history":[{"count":2,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4268\/revisions"}],"predecessor-version":[{"id":9453,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4268\/revisions\/9453"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/2543"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=4268"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=4268"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=4268"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}