{"id":6185,"date":"2023-02-22T08:00:55","date_gmt":"2023-02-22T08:00:55","guid":{"rendered":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?p=6185"},"modified":"2023-01-11T13:26:57","modified_gmt":"2023-01-11T13:26:57","slug":"compensation-for-public-sector-cyberattacks","status":"publish","type":"post","link":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-public-sector-cyberattacks","title":{"rendered":"Compensation for public sector cyberattacks"},"content":{"rendered":"<p>You could be eligible to claim compensation for any distress that has been caused by public sector cyberattacks, and we may be able to fight for your right to claim on a No Win, No Fee basis.<\/p>\n<p>As <a href=\"https:\/\/www.dataleaklawyers.co.uk\/who-we-are\" target=\"_blank\" rel=\"noopener\"><strong>leading privacy claims experts operating in England and Wales, Your Lawyers<\/strong> <\/a>is ready to help you now if you have been affected by a privacy breach incident. Simply <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener\"><strong>contact our team here now and we can provide you with free, no-obligation legal advice<\/strong><\/a> about your options for justice.<\/p>\n<p><!--more--><\/p>\n<h3><strong>Risks of public sector cyberattacks<\/strong><\/h3>\n<p>The risks of public sector cyberattacks taking place can be substantial. The first reason is that they store and process a wealth of very personal information, and we also have resourcing issues in respect of the public sector which can make them a softer target. Secondly, given the extent of the information they store and process, they are also a clear target for hackers anyway because the information can be valuable to them.<\/p>\n<p>When you combine the possibility of a softer target and a wealth of very personal and sensitive information, it is easy to see why hackers will target public sector organisations. This is why it is incredibly important for the government to ensure that public sector cyberattacks do not take place by deploying adequate data protection resources. When this does not happen, the risks are obvious, and they mean that there can be greater chances of a significant volume of personal information ending up exposed or misused as a result of an incident.<\/p>\n<h3><strong>What can victims do?<\/strong><\/h3>\n<p>Anyone who has been affected by public sector cyberattacks could be eligible to pursue compensation for any breach of the GDPR that has taken place. If we can show that there was more that could &#8211; and should &#8211; have been done to have prevented the hack from taking place, it may be the case that the organisation at the centre of the incident is in breach of the GDPR. If we can establish that they are in breach of the GDPR, that is when a victim could be eligible to pursue compensation for any distress or loss that has been caused.<\/p>\n<p>In many cases, few will suffer any form of loss, and it is a case of claiming compensation for any distress that has been caused. The distress can be significant as it can be very worrying and stressful to know that hackers have got hold of our personal information and could try to misuse it at any time. The immediate risks of theft and fraud that could take place at any point could be a real source of worry and distress for anyone affected.<\/p>\n<p>Anybody affected by such a data breach could be eligible to <a href=\"https:\/\/www.dataleaklawyers.co.uk\/start-your-claim\" target=\"_blank\" rel=\"noopener\"><strong>claim and you can speak to our team for free, no-obligation legal advice here now.<\/strong><\/a><\/p>\n<h3><strong>WannaCry: NHS hacked 2017 and risks from 2020 onward<\/strong><\/h3>\n<p>The WannaCry incident saw the NHS hacked in 2017, and risks from 2020 onward have been significant as a result of the additional stresses and pressures caused by the coronavirus pandemic. In many ways, we have seen obvious conditions for cyber attackers to exploit the current situation and target the healthcare service as a public sector organisation that stores and processes a significant wealth of very personal and sensitive information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You could be eligible to claim compensation for any distress that has been caused by public sector cyberattacks, and we may be able to fight for your right to claim on a No Win, No Fee basis. As leading privacy claims experts operating in England and Wales, Your Lawyers is ready to help you now &hellip; <a href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-public-sector-cyberattacks\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Compensation for public sector cyberattacks<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":6186,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15,91,113,53,166,8,116,11,64],"tags":[16,77,66,2,26,55,10,14,49,118,95,37,35,13,3,7],"class_list":["post-6185","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-claims","category-council","category-cybersecurity","category-data","category-education-sector-data-breaches","category-hacking-news","category-ransomware","category-scammers","category-security","tag-compensation","tag-council","tag-council-data-breaches","tag-cyber-attack","tag-cyber-crime","tag-cybersecurity","tag-data-breach","tag-data-controllers","tag-gdpr","tag-government","tag-medical-data-breach","tag-medical-records","tag-nhs","tag-personal-data","tag-phishing-scams","tag-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Compensation for public sector cyberattacks - Data Leaks, Breaches &amp; Hacks<\/title>\n<meta name=\"description\" content=\"Claim compensation for distress caused by public sector cyberattacks. We may be able to fight for your claim on a No Win, No Fee basis.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-public-sector-cyberattacks\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Compensation for public sector cyberattacks - Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"og:description\" content=\"Claim compensation for distress caused by public sector cyberattacks. We may be able to fight for your claim on a No Win, No Fee basis.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-public-sector-cyberattacks\" \/>\n<meta property=\"og:site_name\" content=\"Data Leaks, Breaches &amp; Hacks\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/YourLawyersUK\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-22T08:00:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/Desk-Computer-Typing-40-Copy-min.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"601\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:site\" content=\"@YourLawyers_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-public-sector-cyberattacks#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-public-sector-cyberattacks\"},\"author\":{\"name\":\"Author\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\"},\"headline\":\"Compensation for public sector cyberattacks\",\"datePublished\":\"2023-02-22T08:00:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-public-sector-cyberattacks\"},\"wordCount\":552,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-public-sector-cyberattacks#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/Desk-Computer-Typing-40-Copy-min.jpg\",\"keywords\":[\"compensation\",\"council\",\"council data breaches\",\"cyber attack\",\"cyber crime\",\"cybersecurity\",\"data breach\",\"data controllers\",\"gdpr\",\"government\",\"medical data breach\",\"medical records\",\"nhs\",\"personal data\",\"phishing scams\",\"ransomware\"],\"articleSection\":[\"Claims\",\"Council\",\"Cybersecurity\",\"Data\",\"Education Sector Data Breaches\",\"Hacking News\",\"Ransomware\",\"Scammers\",\"Security\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-public-sector-cyberattacks\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-public-sector-cyberattacks\",\"name\":\"Compensation for public sector cyberattacks - Data Leaks, Breaches &amp; Hacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-public-sector-cyberattacks#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-public-sector-cyberattacks#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/Desk-Computer-Typing-40-Copy-min.jpg\",\"datePublished\":\"2023-02-22T08:00:55+00:00\",\"description\":\"Claim compensation for distress caused by public sector cyberattacks. We may be able to fight for your claim on a No Win, No Fee basis.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-public-sector-cyberattacks#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-public-sector-cyberattacks\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-public-sector-cyberattacks#primaryimage\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/Desk-Computer-Typing-40-Copy-min.jpg\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/Desk-Computer-Typing-40-Copy-min.jpg\",\"width\":900,\"height\":601,\"caption\":\"public sector cyberattacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/compensation-for-public-sector-cyberattacks#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Compensation for public sector cyberattacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"name\":\"Data Leaks, Breaches & Hacks\",\"description\":\"Latest News, Articles &amp; Opinions\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#organization\",\"name\":\"Data Leak Lawyers\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"contentUrl\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/wp-content\\\/uploads\\\/yl_dll_amp.png\",\"width\":288,\"height\":70,\"caption\":\"Data Leak Lawyers\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/YourLawyersUK\\\/\",\"https:\\\/\\\/x.com\\\/YourLawyers_\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/f7dbb62d66bc619a4a9dde7afb9aa6b3\",\"name\":\"Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g\",\"caption\":\"Author\"},\"url\":\"https:\\\/\\\/www.dataleaklawyers.co.uk\\\/blog\\\/author\\\/matthew\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Compensation for public sector cyberattacks - Data Leaks, Breaches &amp; Hacks","description":"Claim compensation for distress caused by public sector cyberattacks. We may be able to fight for your claim on a No Win, No Fee basis.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-public-sector-cyberattacks","og_locale":"en_GB","og_type":"article","og_title":"Compensation for public sector cyberattacks - Data Leaks, Breaches &amp; Hacks","og_description":"Claim compensation for distress caused by public sector cyberattacks. We may be able to fight for your claim on a No Win, No Fee basis.","og_url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-public-sector-cyberattacks","og_site_name":"Data Leaks, Breaches &amp; Hacks","article_publisher":"https:\/\/www.facebook.com\/YourLawyersUK\/","article_published_time":"2023-02-22T08:00:55+00:00","og_image":[{"width":900,"height":601,"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/Desk-Computer-Typing-40-Copy-min.jpg","type":"image\/jpeg"}],"author":"Author","twitter_card":"summary_large_image","twitter_creator":"@YourLawyers_","twitter_site":"@YourLawyers_","twitter_misc":{"Written by":"Author","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-public-sector-cyberattacks#article","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-public-sector-cyberattacks"},"author":{"name":"Author","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3"},"headline":"Compensation for public sector cyberattacks","datePublished":"2023-02-22T08:00:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-public-sector-cyberattacks"},"wordCount":552,"publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-public-sector-cyberattacks#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/Desk-Computer-Typing-40-Copy-min.jpg","keywords":["compensation","council","council data breaches","cyber attack","cyber crime","cybersecurity","data breach","data controllers","gdpr","government","medical data breach","medical records","nhs","personal data","phishing scams","ransomware"],"articleSection":["Claims","Council","Cybersecurity","Data","Education Sector Data Breaches","Hacking News","Ransomware","Scammers","Security"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-public-sector-cyberattacks","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-public-sector-cyberattacks","name":"Compensation for public sector cyberattacks - Data Leaks, Breaches &amp; Hacks","isPartOf":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-public-sector-cyberattacks#primaryimage"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-public-sector-cyberattacks#primaryimage"},"thumbnailUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/Desk-Computer-Typing-40-Copy-min.jpg","datePublished":"2023-02-22T08:00:55+00:00","description":"Claim compensation for distress caused by public sector cyberattacks. We may be able to fight for your claim on a No Win, No Fee basis.","breadcrumb":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-public-sector-cyberattacks#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-public-sector-cyberattacks"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-public-sector-cyberattacks#primaryimage","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/Desk-Computer-Typing-40-Copy-min.jpg","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/Desk-Computer-Typing-40-Copy-min.jpg","width":900,"height":601,"caption":"public sector cyberattacks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/compensation-for-public-sector-cyberattacks#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dataleaklawyers.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Compensation for public sector cyberattacks"}]},{"@type":"WebSite","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#website","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","name":"Data Leaks, Breaches & Hacks","description":"Latest News, Articles &amp; Opinions","publisher":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dataleaklawyers.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#organization","name":"Data Leak Lawyers","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","contentUrl":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-content\/uploads\/yl_dll_amp.png","width":288,"height":70,"caption":"Data Leak Lawyers"},"image":{"@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/YourLawyersUK\/","https:\/\/x.com\/YourLawyers_"]},{"@type":"Person","@id":"https:\/\/www.dataleaklawyers.co.uk\/blog\/#\/schema\/person\/f7dbb62d66bc619a4a9dde7afb9aa6b3","name":"Author","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6df762ce646241b4e07c2c84d0016582f85c0b3c6f2ce06d0eb5d9aed612cc4e?s=96&d=mm&r=g","caption":"Author"},"url":"https:\/\/www.dataleaklawyers.co.uk\/blog\/author\/matthew"}]}},"_links":{"self":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6185","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=6185"}],"version-history":[{"count":1,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6185\/revisions"}],"predecessor-version":[{"id":6187,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6185\/revisions\/6187"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media\/6186"}],"wp:attachment":[{"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=6185"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=6185"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dataleaklawyers.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=6185"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}