{"id":4384,"date":"2020-05-14T14:25:17","date_gmt":"2020-05-14T13:25:17","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=4384"},"modified":"2020-05-14T14:25:17","modified_gmt":"2020-05-14T13:25:17","slug":"government-data-breach-risks-significant","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/government-data-breach-risks-significant","title":{"rendered":"Government data breach risks \u201csignificant\u201d"},"content":{"rendered":"<p>We already believed that the risk of further public sector and government data breach incidents was significant, but a recent review has drawn similar conclusions.<\/p>\n<p>Many of the thousands of clients that we represent have had information exposed or misused by a public sector body. In the wake of the recent <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/new-years-honours-list-data-breach-rounds-off-2019\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>New Year\u2019s Honours data breach<\/strong><\/a> that we\u2019re pursuing damages for, a review has concluded that the risk of further breaches is \u201csignificant\u201d.<\/p>\n<p>This doesn\u2019t come as a surprise to us, and we can explain why. Many are labelled as just <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-claims-for-human-error-data-breaches\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>&#8220;human error&#8221; incidents<\/strong><\/a>, but there can be so much more to it than that.<\/p>\n<p><!--more--><\/p>\n<h3><strong>Why the risks of a government data breach is significant<\/strong><\/h3>\n<p>According to additional investigations in the wake of the <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/new-years-honours-list-data-breach-rounds-off-2019\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>New Year\u2019s Honour incident<\/strong><\/a> &#8211; a serious government data breach that we are working on &#8211; the risks of further and bigger data breaches occurring are said to be \u201csignificant\u201d. It\u2019s also understood that breaches are being too easily tagged as \u201chuman error\u201d incidents where there needs to be \u201cgreater consistency of process, controls and culture\u201d.<\/p>\n<p>The reduction of systemic risks is also referenced.<\/p>\n<p>We welcome this review. As a <a href=\"https:\/\/www.dataleaklawyers.co.uk\/who-we-are\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>leading firm of consumer action and data breach experts<\/strong><\/a>, we\u2019re often approached by the media to discuss privacy matters, and <a href=\"https:\/\/www.dataleaklawyers.co.uk\/press\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>we regularly feature in the mainstream media<\/strong><\/a>. As we have said on more than one occasion, we do not just take the \u201chuman error\u201d element as the core of the problem. Many of the data breaches that we represent people for where \u201chuman error\u201d is stated as involved could have been prevented. Prevention often comes down to having proper systems and procedures in place, let alone adequate ones. The problems really are systemic, and it may take wholesale changes to make a real difference.<\/p>\n<p>The executive summary of the review states that there remains a significant risk of greater breaches happening. We know this is the case, and we share these concerns.<\/p>\n<h3><strong>Real world examples<\/strong><\/h3>\n<p>We can give you real-world examples of public sector and government data breach incidents where \u201chuman error\u201d is labelled as being involved, but where systemic failures are at play. The <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/new-years-honours-list-data-breach-rounds-off-2019\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>New Year\u2019s Honour case<\/strong><\/a> we are dealing with is an easy example given the review has stemmed from it, but there are plenty of others too.<\/p>\n<p>The <a href=\"https:\/\/www.dataleaklawyers.co.uk\/56-dean-street\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>56 Dean Street Clinic leak<\/strong><\/a> is perhaps one of the easiest and most infamous to draw upon. Here, a mass email was sent to almost 800 users of an HIV service at a sexual health clinic. The sender was supposed to use the &#8216;BCC&#8217; function but used the &#8216;CC&#8217; function instead. The result was that the recipients\u2019 information, and therefore their private medical status, was leaked.<\/p>\n<p>We do not see this as a simple \u201chuman error\u201d incident. There is widely available mass emailing software that can be used, and some of it\u2019s free. The archaic way of sending mass emails like this is dangerous, risks privacy breaches, and simply doesn\u2019t need to be used. In our view, it\u2019s a systemic problem that led to this breach.<\/p>\n<p>Unfortunately, last year, the exact same thing happened with <a href=\"https:\/\/www.dataleaklawyers.co.uk\/charing-cross-gender-clinic-email-leak\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>the Charing Cross Gender Identity Clinic leak<\/strong><\/a>. We represent victims for both leaks, with <a href=\"https:\/\/www.dataleaklawyers.co.uk\/data-protection-breach-compensation-amounts\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>data breach compensation values<\/strong><\/a> being substantial given the nature of the data that has been exposed.<\/p>\n<p>Of the thousands of clients that we represent, many involve avoidable individual incidents too. From data being sent to the wrong recipient in error, or two people\u2019s letters getting mixed into one envelope, these kinds of breaches happen all the time. Unfortunately, when the information exposed is personal and sensitive, the impact for the victim can be severe.<\/p>\n<p>There are also plenty of private sector examples too. The recent <a href=\"https:\/\/www.virginmediadatabreach.co.uk\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Virgin Media data breach<\/strong><\/a> is an easy one where an employee incorrectly configured a database that resulted in the information for 900,000 people being exposed. In 2017, the monumental <a href=\"https:\/\/www.dataleaklawyers.co.uk\/equifax-data-breach-compensation-claims\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Equifax data breach<\/strong><\/a> stemmed from someone failing to patch a known security vulnerability. In both cases, we believe that better systems and procedures could have prevented these massive incidents.<\/p>\n<h3><strong>Rights for victims and compensation claims<\/strong><\/h3>\n<p>If you have been the victim of a government data breach, you have the right to <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>make a claim for compensation<\/strong><\/a>. You could be entitled to damages for the distress caused by the loss of control of your personal information. If there are any losses and expenses incurred as well, you may be able to recover damages for those also.<\/p>\n<p>We can offer <a href=\"https:\/\/www.dataleaklawyers.co.uk\/no-win-no-fee\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>No Win, No Fee representation<\/strong> <\/a>for those who are eligible to claim with us.<\/p>\n<p>For free, no-obligation advice, <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>please don\u2019t hesitate to contact the team today<\/strong><\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We already believed that the risk of further public sector and government data breach incidents was significant, but a recent review has drawn similar conclusions. Many of the thousands of clients that we represent have had information exposed or misused by a public sector body. In the wake of the recent New Year\u2019s Honours data &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/government-data-breach-risks-significant\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Government data breach risks \u201csignificant\u201d<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1571,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,53,108,139,122,1,64],"tags":[16,10,14,88,54,4,47,118,123,13,27],"class_list":["post-4384","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-claims","category-data","category-gdpr","category-government","category-group-action","category-latest","category-security","tag-compensation","tag-data-breach","tag-data-controllers","tag-data-leak","tag-database-security","tag-email-leaks","tag-employee-breaches","tag-government","tag-group-action","tag-personal-data","tag-smart-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Government data breach risks \u201csignificant\u201d - Data Leaks, Breaches &amp; Hacks<\/title>\n<meta name=\"description\" content=\"We already believed the risk of public sector and government data breach incidents was significant, but a recent review has drawn similar conclusions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/government-data-breach-risks-significant\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Government data breach risks \u201csignificant\u201d - Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"og:description\" content=\"We already believed the risk of public sector and government data breach incidents was significant, but a recent review has drawn similar conclusions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/government-data-breach-risks-significant\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-14T13:25:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/uk-government-data-breaches-min.png\" \/>\n\t<meta property=\"og:image:width\" content=\"725\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/government-data-breach-risks-significant#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/government-data-breach-risks-significant\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\"},\"headline\":\"Government data breach risks \u201csignificant\u201d\",\"datePublished\":\"2020-05-14T13:25:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/government-data-breach-risks-significant\"},\"wordCount\":786,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/government-data-breach-risks-significant#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/uk-government-data-breaches-min.png\",\"keywords\":[\"compensation\",\"data breach\",\"data controllers\",\"data leak\",\"database security\",\"email leaks\",\"employee breaches\",\"government\",\"Group Action\",\"personal data\",\"smart technology\"],\"articleSection\":[\"Claims\",\"Data\",\"GDPR\",\"Government\",\"Group Action\",\"Latest\",\"Security\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/government-data-breach-risks-significant\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/government-data-breach-risks-significant\",\"name\":\"Government data breach risks \u201csignificant\u201d - Data Leaks, Breaches &amp; Hacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/government-data-breach-risks-significant#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/government-data-breach-risks-significant#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/uk-government-data-breaches-min.png\",\"datePublished\":\"2020-05-14T13:25:17+00:00\",\"description\":\"We already believed the risk of public sector and government data breach incidents was significant, but a recent review has drawn similar conclusions.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/government-data-breach-risks-significant#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/government-data-breach-risks-significant\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/government-data-breach-risks-significant#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/uk-government-data-breaches-min.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/uk-government-data-breaches-min.png\",\"width\":725,\"height\":250,\"caption\":\"Home Office data breaches government data breach leak\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/government-data-breach-risks-significant#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Government data breach risks \u201csignificant\u201d\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/matthew\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Government data breach risks \u201csignificant\u201d - Data Leaks, Breaches &amp; Hacks","description":"We already believed the risk of public sector and government data breach incidents was significant, but a recent review has drawn similar conclusions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/government-data-breach-risks-significant","og_locale":"en_GB","og_type":"article","og_title":"Government data breach risks \u201csignificant\u201d - Data Leaks, Breaches &amp; Hacks","og_description":"We already believed the risk of public sector and government data breach incidents was significant, but a recent review has drawn similar conclusions.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/government-data-breach-risks-significant","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2020-05-14T13:25:17+00:00","og_image":[{"width":725,"height":250,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/uk-government-data-breaches-min.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/government-data-breach-risks-significant#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/government-data-breach-risks-significant"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3"},"headline":"Government data breach risks \u201csignificant\u201d","datePublished":"2020-05-14T13:25:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/government-data-breach-risks-significant"},"wordCount":786,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/government-data-breach-risks-significant#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/uk-government-data-breaches-min.png","keywords":["compensation","data breach","data controllers","data leak","database security","email leaks","employee breaches","government","Group Action","personal data","smart technology"],"articleSection":["Claims","Data","GDPR","Government","Group Action","Latest","Security"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/government-data-breach-risks-significant","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/government-data-breach-risks-significant","name":"Government data breach risks \u201csignificant\u201d - Data Leaks, Breaches &amp; Hacks","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/government-data-breach-risks-significant#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/government-data-breach-risks-significant#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/uk-government-data-breaches-min.png","datePublished":"2020-05-14T13:25:17+00:00","description":"We already believed the risk of public sector and government data breach incidents was significant, but a recent review has drawn similar conclusions.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/government-data-breach-risks-significant#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/government-data-breach-risks-significant"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/government-data-breach-risks-significant#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/uk-government-data-breaches-min.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/uk-government-data-breaches-min.png","width":725,"height":250,"caption":"Home Office data breaches government data breach leak"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/government-data-breach-risks-significant#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Government data breach risks \u201csignificant\u201d"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/matthew"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4384","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=4384"}],"version-history":[{"count":1,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4384\/revisions"}],"predecessor-version":[{"id":4385,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4384\/revisions\/4385"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/1571"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=4384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=4384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=4384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}