{"id":5141,"date":"2021-10-04T08:00:17","date_gmt":"2021-10-04T07:00:17","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=5141"},"modified":"2021-10-12T09:45:51","modified_gmt":"2021-10-12T08:45:51","slug":"push-payment-fraud-arising-from-data-breaches","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/push-payment-fraud-arising-from-data-breaches","title":{"rendered":"Push payment fraud arising from data breaches"},"content":{"rendered":"<p>In the wake of data breaches, the exposure of personal information can make victims vulnerable to becoming the targets of scammers and fraudsters. Compromised contact details or bank account information could be used by cybercriminals to extract further personal information and money from the victims that they target. Push payment fraud is among the various types of crimes that data breach victims could be targeted with.<\/p>\n<p>When we disclose our data to third-party organisations, we do so in the belief that they will do their utmost to protect it. However, too many data controllers fail to recognise the importance of data protection and fail to comply with the law. Even the most basic of security errors could cause victims to have their information made vulnerable to misuse by cybercriminals.<\/p>\n<p>If you have fallen prey to push payment fraud following a data breach, you may be able to <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>claim compensation<\/strong><\/a> for your involvement, and for the emotional and\/or financial impact of the incident. To find out more, <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>contact us for free, no-obligation advice<\/strong><\/a> on your potential data breach claim.<\/p>\n<p><!--more--><\/p>\n<h3><strong>What is push payment fraud?<\/strong><\/h3>\n<p>Push payment fraud, also known as authorised push payment fraud, can occur when victims are deceived into transferring money directly into the bank accounts of scammers. Scammers often use an element of danger to trick victims into quickly handing over money. For example, they may claim to be your bank, pretending that your account has been compromised and that your savings need to be transferred immediately to prevent theft.<\/p>\n<p>Victims can end up losing huge amounts of money as a result of push payment fraud. Although some banks can act quickly to restrict fraudsters\u2019 efforts, some of the lost money may be irretrievable.<\/p>\n<h3><strong>How can data breaches cause fraud?<\/strong><\/h3>\n<p>Whether they involve hacks or unintentional security errors, data breaches often cause private information to reach the hands of cybercriminals. The risk of cybercrime is already significant, but the errors or negligence of data controllers could expose data breach victims to risks that they would not have encountered otherwise.<\/p>\n<p>Even where criminals do not gain access to financial information, they can use contact details to target victims with scams. In push payment fraud, a simple phone number or email address can give fraudsters the opportunity to extort money by passing themselves off as a legitimate company, convincing you with the details they have for you. This is something that occurred in the wake of the <a href=\"https:\/\/www.dataleaklawyers.co.uk\/talktalk-customer-data-breach\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>TalkTalk data breach<\/strong><\/a> that we represent people for, with scammers using exposed information (possibly obtained from the breach) to target customers while passing themselves off as TalkTalk.<\/p>\n<h3><strong>Fraud and data breach claims<\/strong><\/h3>\n<p>If you have been subjected to push payment fraud in the wake of a data breach, the data controller responsible for compromising your personal information may have played a role in making you susceptible to the fraud. As a result, you may be eligible to recover compensation for the financial impact suffered, as well as for any distress caused.<\/p>\n<p>As scammers and fraudsters become more sophisticated with their methods, data controllers must ensure they are doing everything they can to protect their customers, members, or employees from these risks. We can use <a href=\"https:\/\/www.dataleaklawyers.co.uk\/who-we-are\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>our leading expertise in data breach claims<\/strong><\/a> to ensure that companies are held to account when they fail to provide this security.<\/p>\n<p>If you have been affected by fraud as a result of a data breach, <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>contact us for free, no-obligation advice on your potential claim.<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the wake of data breaches, the exposure of personal information can make victims vulnerable to becoming the targets of scammers and fraudsters. Compromised contact details or bank account information could be used by cybercriminals to extract further personal information and money from the victims that they target. Push payment fraud is among the various &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/push-payment-fraud-arising-from-data-breaches\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Push payment fraud arising from data breaches<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":3932,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,113,53,8,116,11,64,51],"tags":[16,2,26,55,10,14,88,20,13,3,7],"class_list":["post-5141","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-claims","category-cybersecurity","category-data","category-hacking-news","category-ransomware","category-scammers","category-security","category-technology","tag-compensation","tag-cyber-attack","tag-cyber-crime","tag-cybersecurity","tag-data-breach","tag-data-controllers","tag-data-leak","tag-online-security","tag-personal-data","tag-phishing-scams","tag-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Push payment fraud arising from data breaches - Data Leaks, Breaches &amp; Hacks<\/title>\n<meta name=\"description\" content=\"Push payment fraud is among the various types of crimes that data breach victims could be targeted with. We can help - No Win, No Fee.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/push-payment-fraud-arising-from-data-breaches\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Push payment fraud arising from data breaches - Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"og:description\" content=\"Push payment fraud is among the various types of crimes that data breach victims could be targeted with. We can help - No Win, No Fee.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/push-payment-fraud-arising-from-data-breaches\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-04T07:00:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-12T08:45:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/Fotolia_74505600_XS.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"425\" \/>\n\t<meta property=\"og:image:height\" content=\"282\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/push-payment-fraud-arising-from-data-breaches#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/push-payment-fraud-arising-from-data-breaches\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\"},\"headline\":\"Push payment fraud arising from data breaches\",\"datePublished\":\"2021-10-04T07:00:17+00:00\",\"dateModified\":\"2021-10-12T08:45:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/push-payment-fraud-arising-from-data-breaches\"},\"wordCount\":585,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/push-payment-fraud-arising-from-data-breaches#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/Fotolia_74505600_XS.jpg\",\"keywords\":[\"compensation\",\"cyber attack\",\"cyber crime\",\"cybersecurity\",\"data breach\",\"data controllers\",\"data leak\",\"online security\",\"personal data\",\"phishing scams\",\"ransomware\"],\"articleSection\":[\"Claims\",\"Cybersecurity\",\"Data\",\"Hacking News\",\"Ransomware\",\"Scammers\",\"Security\",\"Technology\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/push-payment-fraud-arising-from-data-breaches\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/push-payment-fraud-arising-from-data-breaches\",\"name\":\"Push payment fraud arising from data breaches - Data Leaks, Breaches &amp; Hacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/push-payment-fraud-arising-from-data-breaches#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/push-payment-fraud-arising-from-data-breaches#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/Fotolia_74505600_XS.jpg\",\"datePublished\":\"2021-10-04T07:00:17+00:00\",\"dateModified\":\"2021-10-12T08:45:51+00:00\",\"description\":\"Push payment fraud is among the various types of crimes that data breach victims could be targeted with. We can help - No Win, No Fee.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/push-payment-fraud-arising-from-data-breaches#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/push-payment-fraud-arising-from-data-breaches\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/push-payment-fraud-arising-from-data-breaches#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/Fotolia_74505600_XS.jpg\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/Fotolia_74505600_XS.jpg\",\"width\":425,\"height\":282,\"caption\":\"compensation for identity theft\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/push-payment-fraud-arising-from-data-breaches#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Push payment fraud arising from data breaches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/matthew\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Push payment fraud arising from data breaches - Data Leaks, Breaches &amp; Hacks","description":"Push payment fraud is among the various types of crimes that data breach victims could be targeted with. We can help - No Win, No Fee.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/push-payment-fraud-arising-from-data-breaches","og_locale":"en_GB","og_type":"article","og_title":"Push payment fraud arising from data breaches - Data Leaks, Breaches &amp; Hacks","og_description":"Push payment fraud is among the various types of crimes that data breach victims could be targeted with. We can help - No Win, No Fee.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/push-payment-fraud-arising-from-data-breaches","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2021-10-04T07:00:17+00:00","article_modified_time":"2021-10-12T08:45:51+00:00","og_image":[{"width":425,"height":282,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/Fotolia_74505600_XS.jpg","type":"image\/jpeg"}],"author":"Author","twitter_card":"summary_large_image","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/push-payment-fraud-arising-from-data-breaches#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/push-payment-fraud-arising-from-data-breaches"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3"},"headline":"Push payment fraud arising from data breaches","datePublished":"2021-10-04T07:00:17+00:00","dateModified":"2021-10-12T08:45:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/push-payment-fraud-arising-from-data-breaches"},"wordCount":585,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/push-payment-fraud-arising-from-data-breaches#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/Fotolia_74505600_XS.jpg","keywords":["compensation","cyber attack","cyber crime","cybersecurity","data breach","data controllers","data leak","online security","personal data","phishing scams","ransomware"],"articleSection":["Claims","Cybersecurity","Data","Hacking News","Ransomware","Scammers","Security","Technology"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/push-payment-fraud-arising-from-data-breaches","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/push-payment-fraud-arising-from-data-breaches","name":"Push payment fraud arising from data breaches - Data Leaks, Breaches &amp; Hacks","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/push-payment-fraud-arising-from-data-breaches#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/push-payment-fraud-arising-from-data-breaches#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/Fotolia_74505600_XS.jpg","datePublished":"2021-10-04T07:00:17+00:00","dateModified":"2021-10-12T08:45:51+00:00","description":"Push payment fraud is among the various types of crimes that data breach victims could be targeted with. We can help - No Win, No Fee.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/push-payment-fraud-arising-from-data-breaches#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/push-payment-fraud-arising-from-data-breaches"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/push-payment-fraud-arising-from-data-breaches#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/Fotolia_74505600_XS.jpg","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/Fotolia_74505600_XS.jpg","width":425,"height":282,"caption":"compensation for identity theft"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/push-payment-fraud-arising-from-data-breaches#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Push payment fraud arising from data breaches"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/matthew"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5141","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=5141"}],"version-history":[{"count":2,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5141\/revisions"}],"predecessor-version":[{"id":5217,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/5141\/revisions\/5217"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/3932"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=5141"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=5141"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=5141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}