{"id":25558,"date":"2019-02-21T12:29:11","date_gmt":"2019-02-21T12:29:11","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\/"},"modified":"2019-02-21T12:29:11","modified_gmt":"2019-02-21T12:29:11","slug":"data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\/","title":{"rendered":"Data breach rumours abound as UK Labour Party locks down access to member databases"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2018\/11\/05\/polling_station_uk.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p>The UK&#8217;s Labour Party has been forced to lock down access to membership databases and campaign tools over concerns the info was being sucked up by breakaway MPs, in a possible breach of data protection laws.<\/p>\n<p>The party&#8217;s general secretary, Jennie Formby, yesterday said Labour had &#8220;become aware of a number of attempts to access personal data&#8221; on its systems by &#8220;individuals who are not, or are no longer, authorised to do so&#8221;.<\/p>\n<p>The inference was that one or more of the Labour MPs that have this week left the party to form The Independent Group had slurped members&#8217; details to take with them for use in future campaigns.<\/p>\n<p>Under the UK&#8217;s Data Protection Act 2018 (<a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/www.legislation.gov.uk\/ukpga\/2018\/12\/part\/6\/crossheading\/offences-relating-to-personal-data\/enacted\">s170<\/a>), it is an offence to obtain or retain personal data without the consent of the controller \u2013 which means someone downloading a database of members&#8217; deets is likely to find themselves in hot water.<\/p>\n<p>Formby noted this in her email\u00a0\u2013 which was <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/twitter.com\/Peston\/status\/1098234559219597312\">shared on Twitter<\/a> by political journo Robert Peston.<\/p>\n<p>&#8220;Anyone accessing, using or otherwise processing data without authority or for an unauthorised purpose is at risk of action by the [Information] Commissioner&#8217;s Office,&#8221; the message read.<\/p>\n<p>Formby also pointed out that the info will likely reveal a person&#8217;s political opinions, which makes it &#8220;special category&#8221; data that is entitled to increased protections under the law.<\/p>\n<p>However, a data controller also has responsibilities to make sure data is properly protected, which includes ensuring that people who aren&#8217;t entitled to access data are unable to do so. The <a target=\"_blank\" rel=\"nofollow\" href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:32016R0679\">General Data Protection Regulation<\/a> (PDF) states the controller is responsible for ensuring personal data is:<\/p>\n<p>&#8220;Processed in a manner that ensures appropriate security of the personal data, including protection against unauthorised or unlawful processing and against accidental loss, destruction or damage, using appropriate technical or organisational measures (&#8216;integrity and confidentiality&#8217;).&#8221;<\/p>\n<p>Last year, Bupa was <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/09\/28\/bupa_fine_dark_web\/\">fined<\/a> \u00a3175,000 after one of its staffers made off with more than half a million customers&#8217; personal information and tried to sell it on the dark web. The ICO said the firm should have had measures in place to stop the bulk download.<\/p>\n<p>No doubt in light of these responsibilities, Labour shut off access to Organise, the party&#8217;s volunteer management and comms tool, and Contact Creator, the tool used to produce materials and monitor campaigns \u2013 irking volunteers and other Labour MPs, like Walthamstow&#8217;s Stella Creasy, in the process.<\/p>\n<blockquote class=\"twitter-tweet\" data-lang=\"en\" readability=\"6.1139240506329\">\n<p lang=\"en\" dir=\"ltr\">This also means it\u2019s hard for us to make contact with members and reach out to them to help them know they are welcome and wanted in our movement- or help organise any campaigns with them for the causes they care about. Really frustrating! <a href=\"https:\/\/t.co\/rZAeM2aHwN\">https:\/\/t.co\/rZAeM2aHwN<\/a><\/p>\n<p>\u2014 stellacreasy (@stellacreasy) <a href=\"https:\/\/twitter.com\/stellacreasy\/status\/1098260759585398784?ref_src=twsrc%5Etfw\">February 20, 2019<\/a><\/p><\/blockquote>\n<p>But Formby&#8217;s email suggested that the info had already been accessed \u2013 and it isn&#8217;t clear whether this occurred before the person, or people, had left the Labour Party. If it happened after, the party could be open to criticism for having failed to revoke access to the databases.<\/p>\n<p>It&#8217;s also possible \u2013 depending on how the data was obtained \u2013 that charges of a breach of the Computer Misuse Act could be levelled at the miscreant(s).<\/p>\n<p>In November, Mustafa Ahmet Kasim \u2013 a car industry worker who used a colleague&#8217;s login details to snag customer data and pass it to phone scammers \u2013 was <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/11\/13\/mustafa_kasim_jailed_data_abuse_ico_prosecution\/\">sentenced<\/a> to six months in prison after pleading guilty to the charge of causing a computer to perform a function with intent to secure or enable unauthorised access to personal data.<\/p>\n<p>More broadly, the party could also face questions over the number of people with access to its databases, which appears to include MPs and both paid and voluntary campaigners.<\/p>\n<p>Despite Formby&#8217;s strong words in the email to MPs, it isn&#8217;t clear whether the party has reported the incident to the ICO. When asked, the ICO didn&#8217;t confirm either way, but did offer this statement:<\/p>\n<p>The party&#8217;s sudden interest in data protection follows years of sailing close to the wind when it comes to laws on direct marketing. David Lammy MP was fined \u00a35,000 after 35,000 automated calls were made during his campaign to be named mayoral candidate \u2013 and Labour is <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2018\/03\/30\/politicians_pecr_data_protection_facebook_ico\/\">not alone<\/a> in this.<\/p>\n<p>The Labour Party did not respond to a request for comment. \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1810\/-7147\/the-total-economic-impact-of-the-cb-predictive-security-cloud?td=wptl1810\">The Total Economic Impact Of The CB Predictive Security Cloud<\/a><\/p>\n<p>READ MORE <a href=\"http:\/\/go.theregister.com\/feed\/www.theregister.co.uk\/2019\/02\/21\/data_breach_labour_locks_down_member_databases\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Breakaway MPs accused of making off with info The UK&#8217;s Labour Party has been forced to lock down access to membership databases and campaign tools over concerns the info was being sucked up by breakaway MPs, in a possible breach of data protection laws.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":25559,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-25558","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data breach rumours abound as UK Labour Party locks down access to member databases 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data breach rumours abound as UK Labour Party locks down access to member databases 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-21T12:29:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Data breach rumours abound as UK Labour Party locks down access to member databases\",\"datePublished\":\"2019-02-21T12:29:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\\\/\"},\"wordCount\":745,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\\\/\",\"name\":\"Data breach rumours abound as UK Labour Party locks down access to member databases 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases.jpg\",\"datePublished\":\"2019-02-21T12:29:11+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases.jpg\",\"width\":648,\"height\":432},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data breach rumours abound as UK Labour Party locks down access to member databases\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data breach rumours abound as UK Labour Party locks down access to member databases 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\/","og_locale":"en_US","og_type":"article","og_title":"Data breach rumours abound as UK Labour Party locks down access to member databases 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-02-21T12:29:11+00:00","og_image":[{"width":648,"height":432,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Data breach rumours abound as UK Labour Party locks down access to member databases","datePublished":"2019-02-21T12:29:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\/"},"wordCount":745,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\/","url":"https:\/\/www.threatshub.org\/blog\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\/","name":"Data breach rumours abound as UK Labour Party locks down access to member databases 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases.jpg","datePublished":"2019-02-21T12:29:11+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/02\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases.jpg","width":648,"height":432},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/data-breach-rumours-abound-as-uk-labour-party-locks-down-access-to-member-databases\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Data breach rumours abound as UK Labour Party locks down access to member databases"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25558","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=25558"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25558\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/25559"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=25558"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=25558"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=25558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}