{"id":4628,"date":"2024-01-06T18:05:37","date_gmt":"2024-01-06T12:35:37","guid":{"rendered":"https:\/\/www.leadindia.law\/blog\/en\/?p=4628"},"modified":"2024-01-06T18:05:38","modified_gmt":"2024-01-06T12:35:38","slug":"cyber-crime-helpline-number","status":"publish","type":"post","link":"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/","title":{"rendered":"Cyber Crime Helpline Number"},"content":{"rendered":"\n<p>For a long time, cybercrime has been an issue plaguing the digital world. The tactics that criminals use to perpetrate cybercrimes also advance with technology. The term &#8220;cybercrime&#8221; refers to a broad spectrum of illegal activity, including hostile attacks on computer networks and identity theft and fraud. To take precautions against falling victim to cybercrimes, people and organizations need to be aware of the various kinds of these crimes.<\/p>\n\n\n\n<p>Any institution, including enterprises, must be aware that cybercrimes occur and be able to spot the warning indications of them. It is necessary to take the necessary precautions to avoid becoming one of their victims.<\/p>\n\n\n\n<div class=\"wp-block-media-text alignfull has-media-on-the-right is-stacked-on-mobile has-background\" style=\"background-color:#cbcbcb\"><div class=\"wp-block-media-text__content\">\n<h3 class=\"wp-block-heading has-text-align-center has-text-color\" style=\"color:#000000\"><strong>Need A Legal Advice<\/strong><\/h3>\n\n\n\n<p class=\"has-text-align-center has-extra-small-font-size\">The internet is not a lawyer and neither are you. Talk to a real lawyer about your legal issue<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.leadindia.law\/talk-to-lawyer\" target=\"_blank\" rel=\"noreferrer noopener\">Talk to a Lawyer<\/a><\/div>\n<\/div>\n<\/div><figure class=\"wp-block-media-text__media\"><a href=\"https:\/\/www.leadindia.law\/talk-to-lawyer\"><img decoding=\"async\" width=\"400\" height=\"200\" data-src=\"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2022\/09\/talk-to-lawyer-black-logo.png\" alt=\"\" class=\"wp-image-1667 size-full lazyload\" data-srcset=\"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2022\/09\/talk-to-lawyer-black-logo.png 400w, https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2022\/09\/talk-to-lawyer-black-logo-300x150.png 300w\" data-sizes=\"(max-width: 400px) 100vw, 400px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 400px; --smush-placeholder-aspect-ratio: 400\/200;\" \/><\/a><\/figure><\/div>\n\n\n\n<div style=\"height:25px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\">Which categories of cybercrime exist?<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Phishing scams are a kind of cybercrime that has been around for around 20 years, yet they still pose a serious risk to both individuals and businesses. Phishing is essentially a type of social engineering in which an individual sends out emails or texts that appear authentic in an attempt to obtain sensitive information, such as credit card numbers, bank account information, or usernames and passwords. Typically, there are two main motivations for this fraud: financial gain or malevolence.<\/li>\n\n\n\n<li>Cybercrime impacts modern society as a whole, with malware attacks constituting a particularly harmful component. Attacks with malicious software arise when malicious code or software gains access to a user&#8217;s computer system. These might be anything from little annoyances like sending out spam emails to more significant breaches like stealing financial and personal information.<\/li>\n<\/ul>\n\n\n\n<p>Any programming meant to damage or interfere with PCs and systems is known as malware. It may be programmed to do almost anything, including collecting sensitive account information and monitoring user activity on a device. It is becoming more and more difficult for individuals and organizations to protect their digital assets from these threats, which typically take the form of viruses, worms, Trojan horses, spyware, ransomware, and much more.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The term &#8220;hacking&#8221; describes the unauthorized use, alteration, or exploitation of computer systems, networks, software, or digital devices to get data, interfere with everyday business, or carry out illegal acts. Hackers identify weaknesses in systems and take malicious advantage of them using technical expertise.<\/li>\n\n\n\n<li>Cybersecurity professionals known as &#8220;white hat&#8221; or &#8220;ethical hackers&#8221; use their expertise to find and fix flaws in software, networks, and systems. They work under a code of ethics and with authorization, unlike malevolent hackers, to bolster security and fend off online attacks.<\/li>\n<\/ul>\n\n\n\n<p>To protect digital assets, they engage in penetration testing, vulnerability assessments, and other ethical hacking methods. To keep information systems secure and reliable, white hat hackers are essential to creating a safer online environment.<\/p>\n\n\n\n<p>Individuals or organizations that participate in malevolent and illicit actions online are known as &#8220;black hat hackers.&#8221; They make use of weaknesses in software, networks, and systems to obtain access, steal information, commit fraud, or do damage. Black Hats, in contrast to ethical hackers, operate without authorization and frequently do so for financial gain, personal gain, or to wreak havoc.<\/p>\n\n\n\n<p>Their acts may cause financial losses, data breaches, harm to people and businesses, and more. To safeguard the security and privacy of digital networks, law enforcement, and cybersecurity experts collaborate to locate and detain Black Hat Hackers.<\/p>\n\n\n\n<p>Between the malevolent Black Hat hackers and the moral White Hat hackers are some who operate as grey hat hackers. They participate in hacking without authorization, although they don&#8217;t necessarily have bad intentions. To spread awareness of security flaws, grey hats may find and take advantage of vulnerabilities in software, networks, or systems.<\/p>\n\n\n\n<p>Even if what they do can be against the law in theory, they frequently do it to assist companies in strengthening their security. However, there may be legal repercussions for their actions due to their unethical nature. Grey Hat Hackers have a wide range of motivations and work in a grey area<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1930 is the helpline number<\/h3>\n\n\n\n<p>The national hotline for cybercrime is 1930. If you become a victim of financial fraud, you can contact this number by providing the required information, which includes your name, contact details, account number, and account details of the bank account that received the money transfer.<\/p>\n\n\n\n<p>The hazards linked to malevolent online activity are increasing as society becomes more digitally savvy. The ever-changing landscape of cybercriminals jeopardizes our digital security.&nbsp; Therefore, to protect our online presence, we must handle cybersecurity with the highest seriousness and take proactive measures.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.leadindia.law\/\">Lead India<\/a> provides a variety of legal services, including <a href=\"https:\/\/www.leadindia.law\/free-legal-advice\">free legal advice<\/a> and online information. Here, you can <a href=\"https:\/\/www.leadindia.law\/ask-free-question\">ask a legal question<\/a> and <a href=\"https:\/\/www.leadindia.law\/talk-to-lawyer\">talk to a lawyer<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For a long time, cybercrime has been an issue plaguing the digital world. The tactics that criminals use to perpetrate cybercrimes also advance with technology. The term &#8220;cybercrime&#8221; refers to a broad spectrum of illegal activity, including hostile attacks on computer networks and identity theft and fraud. To take precautions against falling victim to cybercrimes, &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/\"> <span class=\"screen-reader-text\">Cyber Crime Helpline Number<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":4,"featured_media":4629,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[2178,2179],"class_list":["post-4628","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-legal-issues","tag-hostile-attacks","tag-stealing-financial-and-personal-information"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Crime Helpline Number<\/title>\n<meta name=\"description\" content=\"Technology is advancing so quickly that hackers now have more ways to take advantage of victims. The sophistication of cyber crimes\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Crime Helpline Number\" \/>\n<meta property=\"og:description\" content=\"Technology is advancing so quickly that hackers now have more ways to take advantage of victims. The sophistication of cyber crimes\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/\" \/>\n<meta property=\"og:site_name\" content=\"Lead India\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/leadindialaw\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-06T12:35:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-06T12:35:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2024\/01\/Cyber-crime-helpline-number.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lead India\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@leadindialaw\" \/>\n<meta name=\"twitter:site\" content=\"@leadindialaw\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lead India\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/\"},\"author\":{\"name\":\"Lead India\",\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/#\/schema\/person\/e677a0c2c0a5f14215100a0ab535009a\"},\"headline\":\"Cyber Crime Helpline Number\",\"datePublished\":\"2024-01-06T12:35:37+00:00\",\"dateModified\":\"2024-01-06T12:35:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/\"},\"wordCount\":755,\"publisher\":{\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2024\/01\/Cyber-crime-helpline-number.jpg\",\"keywords\":[\"hostile attacks\",\"stealing financial and personal information\"],\"articleSection\":[\"General Legal issues\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/\",\"url\":\"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/\",\"name\":\"Cyber Crime Helpline Number\",\"isPartOf\":{\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2024\/01\/Cyber-crime-helpline-number.jpg\",\"datePublished\":\"2024-01-06T12:35:37+00:00\",\"dateModified\":\"2024-01-06T12:35:38+00:00\",\"description\":\"Technology is advancing so quickly that hackers now have more ways to take advantage of victims. The sophistication of cyber crimes\",\"breadcrumb\":{\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/#primaryimage\",\"url\":\"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2024\/01\/Cyber-crime-helpline-number.jpg\",\"contentUrl\":\"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2024\/01\/Cyber-crime-helpline-number.jpg\",\"width\":1000,\"height\":400,\"caption\":\"Cyber Crime Helpline Number\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.leadindia.law\/blog\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Crime Helpline Number\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/#website\",\"url\":\"https:\/\/www.leadindia.law\/blog\/en\/\",\"name\":\"Lead India\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.leadindia.law\/blog\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/#organization\",\"name\":\"Lead India Law Pvt. Ltd.\",\"url\":\"https:\/\/www.leadindia.law\/blog\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2022\/04\/lead-india-logo.png\",\"contentUrl\":\"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2022\/04\/lead-india-logo.png\",\"width\":300,\"height\":300,\"caption\":\"Lead India Law Pvt. Ltd.\"},\"image\":{\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/leadindialaw\",\"https:\/\/x.com\/leadindialaw\",\"https:\/\/www.instagram.com\/leadindialawofficial\/\",\"https:\/\/www.youtube.com\/channel\/UCbYxT2L1qFapgEHyqmruzXg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/#\/schema\/person\/e677a0c2c0a5f14215100a0ab535009a\",\"name\":\"Lead India\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.leadindia.law\/blog\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5334341d20f01b4e05e38926491f808dfcf50ad532dfcdd18f672b63663dafe0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5334341d20f01b4e05e38926491f808dfcf50ad532dfcdd18f672b63663dafe0?s=96&d=mm&r=g\",\"caption\":\"Lead India\"},\"sameAs\":[\"https:\/\/www.leadindia.law\"],\"url\":\"https:\/\/www.leadindia.law\/blog\/en\/author\/lilanisha\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Crime Helpline Number","description":"Technology is advancing so quickly that hackers now have more ways to take advantage of victims. The sophistication of cyber crimes","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Crime Helpline Number","og_description":"Technology is advancing so quickly that hackers now have more ways to take advantage of victims. The sophistication of cyber crimes","og_url":"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/","og_site_name":"Lead India","article_publisher":"https:\/\/www.facebook.com\/leadindialaw","article_published_time":"2024-01-06T12:35:37+00:00","article_modified_time":"2024-01-06T12:35:38+00:00","og_image":[{"width":1000,"height":400,"url":"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2024\/01\/Cyber-crime-helpline-number.jpg","type":"image\/jpeg"}],"author":"Lead India","twitter_card":"summary_large_image","twitter_creator":"@leadindialaw","twitter_site":"@leadindialaw","twitter_misc":{"Written by":"Lead India","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/#article","isPartOf":{"@id":"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/"},"author":{"name":"Lead India","@id":"https:\/\/www.leadindia.law\/blog\/en\/#\/schema\/person\/e677a0c2c0a5f14215100a0ab535009a"},"headline":"Cyber Crime Helpline Number","datePublished":"2024-01-06T12:35:37+00:00","dateModified":"2024-01-06T12:35:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/"},"wordCount":755,"publisher":{"@id":"https:\/\/www.leadindia.law\/blog\/en\/#organization"},"image":{"@id":"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/#primaryimage"},"thumbnailUrl":"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2024\/01\/Cyber-crime-helpline-number.jpg","keywords":["hostile attacks","stealing financial and personal information"],"articleSection":["General Legal issues"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/","url":"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/","name":"Cyber Crime Helpline Number","isPartOf":{"@id":"https:\/\/www.leadindia.law\/blog\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/#primaryimage"},"image":{"@id":"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/#primaryimage"},"thumbnailUrl":"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2024\/01\/Cyber-crime-helpline-number.jpg","datePublished":"2024-01-06T12:35:37+00:00","dateModified":"2024-01-06T12:35:38+00:00","description":"Technology is advancing so quickly that hackers now have more ways to take advantage of victims. The sophistication of cyber crimes","breadcrumb":{"@id":"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/#primaryimage","url":"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2024\/01\/Cyber-crime-helpline-number.jpg","contentUrl":"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2024\/01\/Cyber-crime-helpline-number.jpg","width":1000,"height":400,"caption":"Cyber Crime Helpline Number"},{"@type":"BreadcrumbList","@id":"https:\/\/www.leadindia.law\/blog\/en\/cyber-crime-helpline-number\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.leadindia.law\/blog\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber Crime Helpline Number"}]},{"@type":"WebSite","@id":"https:\/\/www.leadindia.law\/blog\/en\/#website","url":"https:\/\/www.leadindia.law\/blog\/en\/","name":"Lead India","description":"","publisher":{"@id":"https:\/\/www.leadindia.law\/blog\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.leadindia.law\/blog\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.leadindia.law\/blog\/en\/#organization","name":"Lead India Law Pvt. Ltd.","url":"https:\/\/www.leadindia.law\/blog\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.leadindia.law\/blog\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2022\/04\/lead-india-logo.png","contentUrl":"https:\/\/www.leadindia.law\/blog\/en\/wp-content\/uploads\/2022\/04\/lead-india-logo.png","width":300,"height":300,"caption":"Lead India Law Pvt. Ltd."},"image":{"@id":"https:\/\/www.leadindia.law\/blog\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/leadindialaw","https:\/\/x.com\/leadindialaw","https:\/\/www.instagram.com\/leadindialawofficial\/","https:\/\/www.youtube.com\/channel\/UCbYxT2L1qFapgEHyqmruzXg"]},{"@type":"Person","@id":"https:\/\/www.leadindia.law\/blog\/en\/#\/schema\/person\/e677a0c2c0a5f14215100a0ab535009a","name":"Lead India","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.leadindia.law\/blog\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5334341d20f01b4e05e38926491f808dfcf50ad532dfcdd18f672b63663dafe0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5334341d20f01b4e05e38926491f808dfcf50ad532dfcdd18f672b63663dafe0?s=96&d=mm&r=g","caption":"Lead India"},"sameAs":["https:\/\/www.leadindia.law"],"url":"https:\/\/www.leadindia.law\/blog\/en\/author\/lilanisha\/"}]}},"_links":{"self":[{"href":"https:\/\/www.leadindia.law\/blog\/en\/wp-json\/wp\/v2\/posts\/4628","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.leadindia.law\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.leadindia.law\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.leadindia.law\/blog\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.leadindia.law\/blog\/en\/wp-json\/wp\/v2\/comments?post=4628"}],"version-history":[{"count":1,"href":"https:\/\/www.leadindia.law\/blog\/en\/wp-json\/wp\/v2\/posts\/4628\/revisions"}],"predecessor-version":[{"id":4630,"href":"https:\/\/www.leadindia.law\/blog\/en\/wp-json\/wp\/v2\/posts\/4628\/revisions\/4630"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.leadindia.law\/blog\/en\/wp-json\/wp\/v2\/media\/4629"}],"wp:attachment":[{"href":"https:\/\/www.leadindia.law\/blog\/en\/wp-json\/wp\/v2\/media?parent=4628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.leadindia.law\/blog\/en\/wp-json\/wp\/v2\/categories?post=4628"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.leadindia.law\/blog\/en\/wp-json\/wp\/v2\/tags?post=4628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}