{"id":4475,"date":"2020-07-20T11:06:58","date_gmt":"2020-07-20T10:06:58","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=4475"},"modified":"2020-07-20T11:06:58","modified_gmt":"2020-07-20T10:06:58","slug":"stolen-healthcare-data-breach-compensation-claims","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/stolen-healthcare-data-breach-compensation-claims","title":{"rendered":"Stolen healthcare data breach compensation claims"},"content":{"rendered":"<p>Stolen healthcare data breach compensation claims can be severe for the victims, and they can be worryingly common because of the nature of the information involved.<\/p>\n<p>A huge proportion of the thousands of individual victims we represent are for <a href=\"https:\/\/www.dataleaklawyers.co.uk\/medical-data-breach-compensation\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>medical data breach compensation cases<\/strong><\/a>. The risks of these kinds of events happening are real, but victims to have rights. As a <a href=\"https:\/\/www.dataleaklawyers.co.uk\/who-we-are\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>leading firm of data breach compensation lawyers<\/strong><\/a>, we may be able to represent you for a No Win, No Fee legal case if your information has been misused or exposed.<\/p>\n<p>Read on for more information.<\/p>\n<p><!--more--><\/p>\n<h3><strong>The risks are real<\/strong><\/h3>\n<p>The risks for the victims when it comes to stolen healthcare data can be numerous and they can be severe in terms of the impact.<\/p>\n<p>Healthcare organisations are facing greater risks as more and more medical information is becoming digitalised, and the sector increases its use of technology. Whilst the use of technology can be fantastic for improving services and saving lives, the risks are clear. The sector has always been a huge target for cybercriminals because of the nature of the information that can be hacked, and the more ways they can be targeted, the greater the risks can be.<\/p>\n<p>Medical information can be sold on the dark web, and its value can be substantial. There have been instances in the past where records and data has been sold for thousands of pounds, so it\u2019s easy money for hackers to make if they can successful target the sector. Hackers can also try to extort money from an organisation on the threat of leaking the information, which can also be profitable for them.\u00a0 It could also be used to try and extort money from the victim or be used to then try and commit further hacks or crimes, including fraud and identity theft.<\/p>\n<h3><strong>What can victims do?<\/strong><\/h3>\n<p>When a stolen healthcare data event was avoidable, we may be able to establish a case of negligence against the organisation the data has been exposed from.<\/p>\n<p>Generally speaking, the law is that all organisations have an important duty to safeguard the information that they store and process. If they fail to do so, they could be negligent and could be liable to pay compensation to any victims whose data has been misused or exposed.<\/p>\n<p><a href=\"https:\/\/www.dataleaklawyers.co.uk\/data-protection-breach-compensation-amounts\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Data breach compensation pay-outs<\/strong><\/a> can include damages for the distress suffered by the loss of control of personal information. They can also account for any losses and expenses, but you don\u2019t have to have suffered an actual loss or paid anything out to be eligible to claim.<\/p>\n<p>Given how personal and sensitive the information involved medical data breach cases usually are, damages claims for the distress alone can be substantial.<\/p>\n<h3><strong>Claim stolen healthcare data breach compensation today<\/strong><\/h3>\n<p>You could be entitled to make a claim for compensation for a stolen healthcare data breach event today, and our team is available to help you.<\/p>\n<p>For free, no-obligation advice about your options, <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>please don\u2019t hesitate to get in touch with us now<\/strong>.<\/a><\/p>\n<p>We may be able to offer <a href=\"https:\/\/www.dataleaklawyers.co.uk\/no-win-no-fee\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>No Win, No Fee representation<\/strong><\/a>, and you could be owed thousands of pounds in compensation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Stolen healthcare data breach compensation claims can be severe for the victims, and they can be worryingly common because of the nature of the information involved. A huge proportion of the thousands of individual victims we represent are for medical data breach compensation cases. The risks of these kinds of events happening are real, but &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/stolen-healthcare-data-breach-compensation-claims\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Stolen healthcare data breach compensation claims<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":1752,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,113,53,8,52,6,116,11,51],"tags":[16,2,26,55,10,14,99,95,37,35,7,27],"class_list":["post-4475","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-claims","category-cybersecurity","category-data","category-hacking-news","category-healthcare","category-malware","category-ransomware","category-scammers","category-technology","tag-compensation","tag-cyber-attack","tag-cyber-crime","tag-cybersecurity","tag-data-breach","tag-data-controllers","tag-healthcare-sector","tag-medical-data-breach","tag-medical-records","tag-nhs","tag-ransomware","tag-smart-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Stolen healthcare data breach compensation claims - Data Leaks, Breaches &amp; Hacks<\/title>\n<meta name=\"description\" content=\"Stolen healthcare data breach compensation claims can be severe for victims, and can be worryingly common because of the nature of the information involved.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/stolen-healthcare-data-breach-compensation-claims\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Stolen healthcare data breach compensation claims - Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"og:description\" content=\"Stolen healthcare data breach compensation claims can be severe for victims, and can be worryingly common because of the nature of the information involved.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/stolen-healthcare-data-breach-compensation-claims\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-20T10:06:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/healthcare-data-breaches-min.png\" \/>\n\t<meta property=\"og:image:width\" content=\"725\" \/>\n\t<meta property=\"og:image:height\" content=\"250\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/stolen-healthcare-data-breach-compensation-claims#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/stolen-healthcare-data-breach-compensation-claims\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\"},\"headline\":\"Stolen healthcare data breach compensation claims\",\"datePublished\":\"2020-07-20T10:06:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/stolen-healthcare-data-breach-compensation-claims\"},\"wordCount\":532,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/stolen-healthcare-data-breach-compensation-claims#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/healthcare-data-breaches-min.png\",\"keywords\":[\"compensation\",\"cyber attack\",\"cyber crime\",\"cybersecurity\",\"data breach\",\"data controllers\",\"healthcare sector\",\"medical data breach\",\"medical records\",\"nhs\",\"ransomware\",\"smart technology\"],\"articleSection\":[\"Claims\",\"Cybersecurity\",\"Data\",\"Hacking News\",\"Healthcare\",\"Malware\",\"Ransomware\",\"Scammers\",\"Technology\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/stolen-healthcare-data-breach-compensation-claims\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/stolen-healthcare-data-breach-compensation-claims\",\"name\":\"Stolen healthcare data breach compensation claims - Data Leaks, Breaches &amp; Hacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/stolen-healthcare-data-breach-compensation-claims#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/stolen-healthcare-data-breach-compensation-claims#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/healthcare-data-breaches-min.png\",\"datePublished\":\"2020-07-20T10:06:58+00:00\",\"description\":\"Stolen healthcare data breach compensation claims can be severe for victims, and can be worryingly common because of the nature of the information involved.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/stolen-healthcare-data-breach-compensation-claims#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/stolen-healthcare-data-breach-compensation-claims\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/stolen-healthcare-data-breach-compensation-claims#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/healthcare-data-breaches-min.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/healthcare-data-breaches-min.png\",\"width\":725,\"height\":250,\"caption\":\"healthcare data breaches\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/stolen-healthcare-data-breach-compensation-claims#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Stolen healthcare data breach compensation claims\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/matthew\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Stolen healthcare data breach compensation claims - Data Leaks, Breaches &amp; Hacks","description":"Stolen healthcare data breach compensation claims can be severe for victims, and can be worryingly common because of the nature of the information involved.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/stolen-healthcare-data-breach-compensation-claims","og_locale":"en_GB","og_type":"article","og_title":"Stolen healthcare data breach compensation claims - Data Leaks, Breaches &amp; Hacks","og_description":"Stolen healthcare data breach compensation claims can be severe for victims, and can be worryingly common because of the nature of the information involved.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/stolen-healthcare-data-breach-compensation-claims","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2020-07-20T10:06:58+00:00","og_image":[{"width":725,"height":250,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/healthcare-data-breaches-min.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/stolen-healthcare-data-breach-compensation-claims#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/stolen-healthcare-data-breach-compensation-claims"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3"},"headline":"Stolen healthcare data breach compensation claims","datePublished":"2020-07-20T10:06:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/stolen-healthcare-data-breach-compensation-claims"},"wordCount":532,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/stolen-healthcare-data-breach-compensation-claims#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/healthcare-data-breaches-min.png","keywords":["compensation","cyber attack","cyber crime","cybersecurity","data breach","data controllers","healthcare sector","medical data breach","medical records","nhs","ransomware","smart technology"],"articleSection":["Claims","Cybersecurity","Data","Hacking News","Healthcare","Malware","Ransomware","Scammers","Technology"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/stolen-healthcare-data-breach-compensation-claims","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/stolen-healthcare-data-breach-compensation-claims","name":"Stolen healthcare data breach compensation claims - Data Leaks, Breaches &amp; Hacks","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/stolen-healthcare-data-breach-compensation-claims#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/stolen-healthcare-data-breach-compensation-claims#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/healthcare-data-breaches-min.png","datePublished":"2020-07-20T10:06:58+00:00","description":"Stolen healthcare data breach compensation claims can be severe for victims, and can be worryingly common because of the nature of the information involved.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/stolen-healthcare-data-breach-compensation-claims#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/stolen-healthcare-data-breach-compensation-claims"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/stolen-healthcare-data-breach-compensation-claims#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/healthcare-data-breaches-min.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/healthcare-data-breaches-min.png","width":725,"height":250,"caption":"healthcare data breaches"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/stolen-healthcare-data-breach-compensation-claims#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Stolen healthcare data breach compensation claims"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/matthew"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4475","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=4475"}],"version-history":[{"count":1,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4475\/revisions"}],"predecessor-version":[{"id":4476,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4475\/revisions\/4476"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/1752"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=4475"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=4475"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=4475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}