{"id":4600,"date":"2020-10-27T09:00:52","date_gmt":"2020-10-27T09:00:52","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=4600"},"modified":"2020-10-19T13:38:50","modified_gmt":"2020-10-19T12:38:50","slug":"why-hackers-target-medical-records","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/why-hackers-target-medical-records","title":{"rendered":"Why hackers target medical records"},"content":{"rendered":"<p>There are many reasons as to why hackers target medical records. This is why it\u2019s so important for organisations to protect private and sensitive healthcare information, and justice for victims when they are misused or exposed is equally as important.<\/p>\n<p>Claims for compensation for <a href=\"https:\/\/www.dataleaklawyers.co.uk\/medical-data-claims\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>medical records data breaches<\/strong><\/a> are some of the\u00a0 most serious that we deal with. We represent thousands of clients for cases as a <a href=\"https:\/\/www.dataleaklawyers.co.uk\/who-we-are\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>leading firm of data breach lawyers<\/strong><\/a>, so we can tell you this from considerable experience.<\/p>\n<p>Here is our insight into why hackers target this kind of information, and <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>what victims can do when data is misused or exposed.<\/strong><\/a><\/p>\n<p><!--more--><\/p>\n<h3><strong>Why hackers target medical records<\/strong><\/h3>\n<p>The reason as to why hackers target medical records is simple: they usually contain valuable information. There are also many methods that criminals can use to exploit exposed data as well to be able to make a profit from it, which is usually what it\u2019s all about.<\/p>\n<p>The impact for a victim if private and sensitive healthcare data is exposed can be substantial. As such, <a href=\"https:\/\/www.dataleaklawyers.co.uk\/data-protection-breach-compensation-amounts\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>data breach compensation amounts<\/strong><\/a> for victims can be high, as can the fines that the Information Commissioner\u2019s Office (ICO) may issue. For this reason, it can be cheaper for healthcare organisations to pay a bribe if data has been stolen. If ransomware has exposed the information, it may also be cheaper to pay the ransom rather than face the consequences of a compensation action too.<\/p>\n<p>If ransomware locks healthcare professionals and staff out of their systems, and medical records cannot be accessed, patients\u2019 health &#8211; and even their lives &#8211; could be in danger. This is another reason it makes sense to pay a ransom. Given how serious the consequences can be, ransoms and bribe amounts can be set quite high as the criminals know that there is a decent chance of being paid.<\/p>\n<h3><strong>What can victims do if records are exposed?<\/strong><\/h3>\n<p>Now you know why hackers target medical records, what are the rights of victims when healthcare information is misused or exposed?<\/p>\n<p>if more could &#8211; and should &#8211; have been done by the organisation that was hit by the cyberattack, they could be held liable for the data breach. If they are liable and have been negligent in how the breach occurred, victims whose information has been involved could be eligible to <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>claim data breach compensation.<\/strong><\/a><\/p>\n<p>Victims can be entitled to claim for the distress caused by the loss of control of their personal information. You do not have to have incurred expenses or lost money to claim, as the GDPR can allow you to claim for just the distress.<\/p>\n<p>Given how personal and sensitive healthcare data is, pay-outs can be substantial for <a href=\"https:\/\/www.dataleaklawyers.co.uk\/medical-data-breach-compensation\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>medical data breach compensation cases<\/strong><\/a>. This kind of information is exactly the sort that most people want to maintain control over, so the distress that victims can suffer from can be huge. This element, as referenced above, is a key reason as to why hackers target medical records.<\/p>\n<h3><strong>Where to go for advice<\/strong><\/h3>\n<p>If you have been the victim of a <a href=\"https:\/\/www.dataleaklawyers.co.uk\/healthcare-data-breach-compensation-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>healthcare data breach<\/strong><\/a>, you could be entitled to claim compensation with our team. We may also be able to represent you for a legal case on a <a href=\"https:\/\/www.dataleaklawyers.co.uk\/no-win-no-fee\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>No Win, No Fee basis<\/strong>.<\/a><\/p>\n<p>For free and no-obligation advice, <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>please don\u2019t hesitate to contact our team today<\/strong>.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are many reasons as to why hackers target medical records. This is why it\u2019s so important for organisations to protect private and sensitive healthcare information, and justice for victims when they are misused or exposed is equally as important. Claims for compensation for medical records data breaches are some of the\u00a0 most serious that &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/why-hackers-target-medical-records\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Why hackers target medical records<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":2760,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,113,53,8,52,11,64,51],"tags":[16,2,26,55,10,14,49,99,31,95,37,35,7,17],"class_list":["post-4600","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-claims","category-cybersecurity","category-data","category-hacking-news","category-healthcare","category-scammers","category-security","category-technology","tag-compensation","tag-cyber-attack","tag-cyber-crime","tag-cybersecurity","tag-data-breach","tag-data-controllers","tag-gdpr","tag-healthcare-sector","tag-medical-apps","tag-medical-data-breach","tag-medical-records","tag-nhs","tag-ransomware","tag-website-hacked"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why hackers target medical records - Data Leaks, Breaches &amp; Hacks<\/title>\n<meta name=\"description\" content=\"There are reasons why hackers target medical records. It\u2019s so important for organisations to protect private and sensitive healthcare data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/why-hackers-target-medical-records\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why hackers target medical records - Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"og:description\" content=\"There are reasons why hackers target medical records. It\u2019s so important for organisations to protect private and sensitive healthcare data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/why-hackers-target-medical-records\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-27T09:00:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/nhs-staff-medical-record-breaches.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"414\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/why-hackers-target-medical-records#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/why-hackers-target-medical-records\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\"},\"headline\":\"Why hackers target medical records\",\"datePublished\":\"2020-10-27T09:00:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/why-hackers-target-medical-records\"},\"wordCount\":565,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/why-hackers-target-medical-records#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/nhs-staff-medical-record-breaches.png\",\"keywords\":[\"compensation\",\"cyber attack\",\"cyber crime\",\"cybersecurity\",\"data breach\",\"data controllers\",\"gdpr\",\"healthcare sector\",\"medical apps\",\"medical data breach\",\"medical records\",\"nhs\",\"ransomware\",\"website hacked\"],\"articleSection\":[\"Claims\",\"Cybersecurity\",\"Data\",\"Hacking News\",\"Healthcare\",\"Scammers\",\"Security\",\"Technology\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/why-hackers-target-medical-records\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/why-hackers-target-medical-records\",\"name\":\"Why hackers target medical records - Data Leaks, Breaches &amp; Hacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/why-hackers-target-medical-records#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/why-hackers-target-medical-records#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/nhs-staff-medical-record-breaches.png\",\"datePublished\":\"2020-10-27T09:00:52+00:00\",\"description\":\"There are reasons why hackers target medical records. It\u2019s so important for organisations to protect private and sensitive healthcare data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/why-hackers-target-medical-records#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/why-hackers-target-medical-records\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/why-hackers-target-medical-records#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/nhs-staff-medical-record-breaches.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/nhs-staff-medical-record-breaches.png\",\"width\":1200,\"height\":414,\"caption\":\"healthcare data breaches caused by human error\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/why-hackers-target-medical-records#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why hackers target medical records\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/matthew\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why hackers target medical records - Data Leaks, Breaches &amp; Hacks","description":"There are reasons why hackers target medical records. It\u2019s so important for organisations to protect private and sensitive healthcare data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/why-hackers-target-medical-records","og_locale":"en_GB","og_type":"article","og_title":"Why hackers target medical records - Data Leaks, Breaches &amp; Hacks","og_description":"There are reasons why hackers target medical records. It\u2019s so important for organisations to protect private and sensitive healthcare data.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/why-hackers-target-medical-records","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2020-10-27T09:00:52+00:00","og_image":[{"width":1200,"height":414,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/nhs-staff-medical-record-breaches.png","type":"image\/png"}],"author":"Author","twitter_card":"summary_large_image","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/why-hackers-target-medical-records#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/why-hackers-target-medical-records"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3"},"headline":"Why hackers target medical records","datePublished":"2020-10-27T09:00:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/why-hackers-target-medical-records"},"wordCount":565,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/why-hackers-target-medical-records#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/nhs-staff-medical-record-breaches.png","keywords":["compensation","cyber attack","cyber crime","cybersecurity","data breach","data controllers","gdpr","healthcare sector","medical apps","medical data breach","medical records","nhs","ransomware","website hacked"],"articleSection":["Claims","Cybersecurity","Data","Hacking News","Healthcare","Scammers","Security","Technology"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/why-hackers-target-medical-records","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/why-hackers-target-medical-records","name":"Why hackers target medical records - Data Leaks, Breaches &amp; Hacks","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/why-hackers-target-medical-records#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/why-hackers-target-medical-records#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/nhs-staff-medical-record-breaches.png","datePublished":"2020-10-27T09:00:52+00:00","description":"There are reasons why hackers target medical records. It\u2019s so important for organisations to protect private and sensitive healthcare data.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/why-hackers-target-medical-records#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/why-hackers-target-medical-records"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/why-hackers-target-medical-records#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/nhs-staff-medical-record-breaches.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/nhs-staff-medical-record-breaches.png","width":1200,"height":414,"caption":"healthcare data breaches caused by human error"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/why-hackers-target-medical-records#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Why hackers target medical records"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/matthew"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4600","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=4600"}],"version-history":[{"count":1,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4600\/revisions"}],"predecessor-version":[{"id":4601,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/4600\/revisions\/4601"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/2760"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=4600"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=4600"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=4600"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}