{"id":1420,"date":"2024-03-03T08:11:47","date_gmt":"2024-03-03T08:11:47","guid":{"rendered":"https:\/\/www.restore.co.uk\/technology\/?page_id=1420"},"modified":"2026-03-05T09:46:43","modified_gmt":"2026-03-05T09:46:43","slug":"high-security","status":"publish","type":"page","link":"https:\/\/www.restore.co.uk\/technology\/sectors\/high-security\/","title":{"rendered":"High Security Sector"},"content":{"rendered":"\r\n\r\n<section id=\"block--block_d1123857434187f55702ace05dfbf1dd\" class=\"hero-sec hero-block  \" style=\"background-image: url(https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/01\/high-security-desktop-banner.webp);\">\r\n\t<div class=\"hero-img\">\r\n\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/04\/high-security-mobile-banner.webp\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t<\/div>\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t\t\t<div class=\"col-lg-12\">\r\n\t\t\t\t\t\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t<h1 style=\"color: #e20c44;\">Leading IT disposal for the high security sector<\/h1>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"description\" style=\"color: #505759;\">Secure data services<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\r\n<div class=\"container hero-sec-arrows\">\r\n\t<div class=\"img-holder\">\r\n\r\n\r\n\t\t\t<svg width=\"189\" height=\"63\" viewBox=\"0 0 189 63\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\r\n\t\t<path d=\"M3.80157 0C1.70416 0 0 1.64017 0 3.6588C0 4.3527 0.196633 5.10967 0.655444 5.61433L18.2213 31.0996L0.5899 56.5217C0.196634 57.0894 0 57.7833 0 58.5403C0 60.2435 1.1798 61.6944 2.88395 62.0729H16.1239C17.0415 61.8837 17.8281 61.3159 18.3524 60.5589L37.3603 33.1182C37.7536 32.5504 38.0157 31.7935 38.0157 31.0996C38.0157 30.3426 37.8191 29.6486 37.3603 29.0809L18.3524 1.64012C17.697 0.630807 16.5172 0 15.2063 0H3.80157Z\" fill=\"url(#paint0_linear_324_5668)\"\/>\r\n\t\t<path d=\"M41.8172 0C39.7198 0 38.0156 1.64017 38.0156 3.6588C38.0156 4.3527 38.2778 5.10967 38.6711 5.61433L56.3025 31.0996L38.6711 56.5217C38.2778 57.0894 38.0156 57.7833 38.0156 58.5403C38.0156 60.2435 39.261 61.6944 40.8996 62.0729H54.1395C55.0572 61.8837 55.8437 61.3159 56.368 60.5589L75.3759 33.1182C75.8347 32.5504 76.0314 31.7935 76.0314 31.0996C76.0314 30.3426 75.8347 29.6486 75.3759 29.0809L56.368 1.64012C55.7126 0.630807 54.5328 0 53.2219 0H41.8172Z\" fill=\"url(#paint0_linear_324_5668)\"\/>\r\n\t\t<path d=\"M78.2748 0C76.181 0 74.4797 1.64017 74.4797 3.6588C74.4797 4.3527 74.7415 5.10967 75.1341 5.61433L92.7351 31.0996L75.1341 56.5217C74.7415 57.0894 74.4797 57.7833 74.4797 58.5403C74.4797 60.2435 75.7229 61.6944 77.3587 62.0729H90.5759C91.4919 61.8837 92.2771 61.3159 92.8006 60.5589L111.841 33.1182C112.234 32.5504 112.495 31.7935 112.495 31.0996C112.495 30.3426 112.234 29.6486 111.841 29.0809L92.8006 1.64012C92.1463 0.630807 91.0339 0 89.6599 0H78.2748Z\" fill=\"url(#paint0_linear_324_5668)\"\/>\r\n\t\t<defs>\r\n\t\t<linearGradient id=\"paint0_linear_324_5668\" x1=\"18.9921\" y1=\"1.92969\" x2=\"18.9921\" y2=\"62.4975\" gradientUnits=\"userSpaceOnUse\">\r\n\t\t<stop stop-color=\"#e20c44\"\/>\r\n\t\t<stop offset=\"1\" stop-color=\"#1b3e6f\"\/>\r\n\t\t<\/linearGradient>\r\n\t\t<linearGradient id=\"paint1_linear_324_5668\" x1=\"57.032\" y1=\"63.6235\" x2=\"57.032\" y2=\"1.21875\" gradientUnits=\"userSpaceOnUse\">\r\n\t\t<stop stop-color=\"#e20c44\"\/>\r\n\t\t<stop offset=\"1\" stop-color=\"#1b3e6f\"\/>\r\n\t\t<\/linearGradient>\r\n\t\t<linearGradient id=\"paint2_linear_324_5668\" x1=\"93.4752\" y1=\"2.28862\" x2=\"93.4752\" y2=\"62.1663\" gradientUnits=\"userSpaceOnUse\">\r\n\t\t<stop stop-color=\"#e20c44\"\/>\r\n\t\t<stop offset=\"1\" stop-color=\"#1b3e6f\"\/>\r\n\t\t<\/linearGradient>\r\n\t\t<linearGradient id=\"paint3_linear_324_5668\" x1=\"131.475\" y1=\"64.6934\" x2=\"131.475\" y2=\"1.07114\" gradientUnits=\"userSpaceOnUse\">\r\n\t\t<stop stop-color=\"#e20c44\"\/>\r\n\t\t<stop offset=\"1\" stop-color=\"#1b3e6f\"\/>\r\n\t\t<\/linearGradient>\r\n\t\t<linearGradient id=\"paint4_linear_324_5668\" x1=\"169.494\" y1=\"61.3645\" x2=\"169.494\" y2=\"1.44458\" gradientUnits=\"userSpaceOnUse\">\r\n\t\t<stop stop-color=\"#e20c44\"\/>\r\n\t\t<stop offset=\"1\" stop-color=\"#1b3e6f\"\/>\r\n\t\t<\/linearGradient>\r\n\t\t<\/defs>\r\n\t\t<\/svg>\r\n\t\r\n\t<\/div>\r\n<\/div>\r\n\r\n\r\n\t<div class=\"breadcrumbs-wrap \">\r\n\t\t<div class=\"container\">\r\n\t\t\t<div class=\"row\">\r\n\t\t\t\t<div class=\"col-md-12\">\r\n\t\t\t\t\t<div class=\"breadcrumbs-link\">\r\n\t\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/www.restore.co.uk\/technology\/\">Home<\/a><\/span><\/span><\/p>\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n\r\n\r\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-secure-data-services-for-the-high-security-sector\">Secure data services for the high security sector.<\/h2>\n\n\n\n<p class=\"is-style-added-container\">The Restore Group is a huge partner to the UK\u2019s central government, but in particular, the Group support the Ministry of Defence and the Nuclear Decommissioning Authority with highly confidential data, information and asset strategies. Through these long-term partnerships, we also provide support to many organisations within the wider defence and aerospace industry, who choose Restore because of our high levels of security, and the complete chain of custody we provide to data.<\/p>\n\n\n\n<p class=\"is-style-added-container\">At Restore Technology we have been audited to the highest levels of security, with secure government-approved premises and security cleared personnel.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\r\n\r\n\r\n<section id=\"block--block_30121245238a9fba74e31b51a6da546d\" class=\"driving-sec blocknumfig-9267 hasbgimg full-width-text-with-background-block  \" style=\"background-image: url(https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/03\/high-security-5.jpg);\">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-md-12\">\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"\">IT asset services for the high security sector<\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"\">Approved to destroy data to the maximum UK security level<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\r\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\r\n<section id=\"block--block_f7a2490b8b06de16f8239a5fbab90c5a\" class=\"why-sec info-cards-block \">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-md-12\">\r\n\t\t\t\t<div class=\"text-box text-center\">\r\n\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"\">Our services to the high security industry include:<\/h2>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"row top-space\">\r\n\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\">\r\n\t\t\t\t\t<div class=\"text-center why-box h-100\">\r\n\t\t\t\t\t\t<div class=\"icon-box\">\r\n\t\t\t\t\t\t\t<div class=\"inner-box p-0\">\r\n\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/03\/refresh.svg\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<h5 class=\" \">CAS(S) sanitisation   <\/h5>\r\n\t\t\t\t\t\t<p>Restore Technology is accredited by the National Cyber Security Centre CAS Scheme for destruction or erasure of ALL types of media as listed in HMG IS5 to CAS(S) provides assurance that a sanitisation service conforms to relevant HMG IA policy and guidance.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"top-space-background\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/info-card-back.png\" alt=\"\" \/><\/div>\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t<div class=\"col-lg-6 col-md-6\">\r\n\t\t\t\t\t<div class=\"text-center why-box h-100\">\r\n\t\t\t\t\t\t<div class=\"icon-box\">\r\n\t\t\t\t\t\t\t<div class=\"inner-box p-0\">\r\n\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/03\/Remarketing-and-recycling-icon-7.svg\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<h5 class=\" \">NPSA destruction  <\/h5>\r\n\t\t\t\t\t\t<p>As a certified destruction company Restore Technology must comply with the NPSA standard on the Secure Destruction of Sensitive Items. All Government departments, agencies and any public or private sector organisation that handle HMG data at SECRET or above must destroy their data in accordance with the NPSA standard.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"top-space-background\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/info-card-back.png\" alt=\"\" \/><\/div>\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\r\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\r\n<section id=\"block--block_9549c6a6b61de10b0edb5ec193c4db6f\"\r\n\tclass=\"museum-sec image-text-block dark-bg\"\r\n\tstyle=\"background: var(--primary);\">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-lg-6 order-0 order-lg-1 \">\r\n\t\t\t\t<div class=\"text-lg-start text-center\">\r\n\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/04\/eco.webp\" alt=\"\" class=\"img-fluid img-main\">\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"col-lg-6 order-1 order-lg-0\">\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t<h2>Secure computer recycling &amp; disposal\u00a0\u00a0<\/h2>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><!-- wp:paragraph {\"className\":\"is-style-added-container\"} --><\/p>\n<p>We offer a flexible, customer-driven Computer Recycling Service, allowing us to fulfil your legal Duty of Care under both the Environmental Protection Act and the Data Protection Act. We are fully compliant with the WEEE Directive and the ISO 9001, 14001 and 27001 standards. All data is destroyed to both UK Government and CESG MoD standards, this includes software wiping, degaussing, and shredding. We can purchase re-marketable items from you, ensuring the maximum return to you whilst providing complete traceability and security for your redundant IT assets.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\n\n\r\n<section id=\"block--block_9117c34ca679f2cb3472599b821b67c1\" class=\"why-sec info-cards-block \">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-md-12\">\r\n\t\t\t\t<div class=\"text-box text-center\">\r\n\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"\">Our services:<\/h2>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"row top-space\">\r\n\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-lg-4 col-md-6\">\r\n\t\t\t\t\t<div class=\"text-center why-box h-100\">\r\n\t\t\t\t\t\t<div class=\"icon-box\">\r\n\t\t\t\t\t\t\t<div class=\"inner-box p-0\">\r\n\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/03\/Secure-collection-service-icon-2.svg\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<h5 class=\" \">On-site destruction  <\/h5>\r\n\t\t\t\t\t\t<p>With Restore Technology, the security of your data is our primary concern. Whether it be hard drives, flash drives, floppy disks, CDs, DVDs, ram discs or data, CCTV, and videotapes, every single piece of data is destroyed completely and beyond recovery. \r\n\r\nOur data destruction services are performed to the standards defined by CESG, the cabinet office. Shredding to a size of 2mm is possible. \r\n\r\nBeing ISO 27001 certified every stage of the process is auditable. Full and very detailed audit reports are available free of charge for any equipment processed. <\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"top-space-background\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/info-card-back.png\" alt=\"\" \/><\/div>\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t<div class=\"col-lg-4 col-md-6\">\r\n\t\t\t\t\t<div class=\"text-center why-box h-100\">\r\n\t\t\t\t\t\t<div class=\"icon-box\">\r\n\t\t\t\t\t\t\t<div class=\"inner-box p-0\">\r\n\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/03\/ITAD-Icon-1.svg\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<h5 class=\" \">Data destruction  <\/h5>\r\n\t\t\t\t\t\t<p>We guarantee that your hard drive data is always destroyed*. We undertake this by using UK MoD and CESG standards equipment and procedures, then shredding if not for reuse or return. \r\n\r\nHMG IS5 covers both baseline and enhanced overwriting of data. At the baseline level, the software overwrites every sector of the hard disk with one pass of randomly generated data. At the enhanced level every sector is over-written three times: first with a 1, then every sector is over-written again with a 0, and then every sector is over-written a third time with randomly generated 1s and 0s. <\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"top-space-background\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/info-card-back.png\" alt=\"\" \/><\/div>\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t<div class=\"col-lg-4 col-md-6\">\r\n\t\t\t\t\t<div class=\"text-center why-box h-100\">\r\n\t\t\t\t\t\t<div class=\"icon-box\">\r\n\t\t\t\t\t\t\t<div class=\"inner-box p-0\">\r\n\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/03\/recycle-laptop-e1710087911346.png\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<h5 class=\" \">Waste electrical &amp; electronic equipment (WEEE)   <\/h5>\r\n\t\t\t\t\t\t<p>Restore Technology have been disposing of electronic and electrical waste responsibly since 1990. In 2006 over 83% of the waste we collected was either reused or recycled or recovered. We process over 210,000 WEEE items per annum for over 1,000 UK customers. Our customer base ranges from solutions for small businesses to major corporations, government both local and national, utility companies, hospitals, universities, schools, financial institutions, and charities. Companies both small and large use us for secure disposal and destruction of IT equipment and data destruction. <\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"top-space-background\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/info-card-back.png\" alt=\"\" \/><\/div>\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\r\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\r\n<section id=\"block--block_666daa0ce17a54b8209843a80b01db46\"\r\n\tclass=\"museum-sec image-text-block dark-bg\"\r\n\tstyle=\"background: var(--primary);\">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-lg-6 order-0\">\r\n\t\t\t\t<div class=\"text-lg-start text-center\">\r\n\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/04\/hard-drive-image.webp\" alt=\"\" class=\"img-fluid img-main\">\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"col-lg-6 order-1 order-lg-0\">\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t<h2>Data wiping to CESG standards<\/h2>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p><!-- wp:paragraph {\"className\":\"is-style-added-container\"} --><\/p>\n<p class=\"is-style-added-container\">Whether it be hard disks or floppy disks, CDs or video\/Data tapes, every single piece of data that comes into our warehouse is destroyed completely and beyond recovery.<\/p>\n<p><!-- \/wp:paragraph --><\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t<a class=\"nav-link btn-default\" href=\"https:\/\/www.restore.co.uk\/technology\/get-in-touch\/\"\r\n\t\t\t\t\t\t\ttarget=\"\"><span>Get in touch<\/span><\/a>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\n\n\r\n\r\n<section id=\"block--block_65e63581f5b084a7ddb0ea7545b7a1c8\" class=\"inform-sec bullets-and-quote-block \">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t\t\r\n\t\t<\/div>\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-lg-7\">\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<h2>Our secure data destruction covers:<\/h2>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t<ul class=\"service-list\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><span><\/span>\r\n\t\t\t\t\t\t\t\t\t<h6>Hard drive (any kind laptop, desktop, IDE, SATA, solid-state, SCSI and many more) <\/h6>\r\n\t\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><span><\/span>\r\n\t\t\t\t\t\t\t\t\t<h6>Backup magnetic tapes (DLT, SDLT, QIC, Dat, CCTV and videotapes &#8211; Reel to Reel) <\/h6>\r\n\t\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><span><\/span>\r\n\t\t\t\t\t\t\t\t\t<h6>Floppy disk (3.5-inch disk, 5.25-inch disks and many more) <\/h6>\r\n\t\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><span><\/span>\r\n\t\t\t\t\t\t\t\t\t<h6>Zip disk (100 MB, 250 MB and other large disks) <\/h6>\r\n\t\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><span><\/span>\r\n\t\t\t\t\t\t\t\t\t<h6>Removable media\/USB sticks <\/h6>\r\n\t\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><span><\/span>\r\n\t\t\t\t\t\t\t\t\t<h6>Optical media (CD\u2019s DVD\u2019s, Blu-ray, and HD DVD) <\/h6>\r\n\t\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><span><\/span>\r\n\t\t\t\t\t\t\t\t\t<h6>Mobiles, PDA\u2019s, Blackberry.<\/h6>\r\n\t\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-lg-5 mt-lg-0 mt-5\">\r\n\t\t\t\t\t<div class=\"text-lg-start text-center img-prov-main\">\r\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/03\/happy-people.webp\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\r\n\n\n\r\n\r\n\r\n<section id=\"block--block_d1c948247d55d5f163d766e1f1df8a6a\" class=\"driving-sec blocknumfig-8075 hasbgimg full-width-text-with-background-block  \" style=\"background-image: url(https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/03\/Exceptional-Service-500x500-1-e1710845652623.png);\">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-md-12\">\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"\">Contact our team<\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"\">Speak to a member of the team about our high security IT asset services.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"btn-white mx-auto mt-4\" href=\"https:\/\/www.restore.co.uk\/technology\/get-in-touch\/\">Get in touch<\/a>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\r\n\n\n\r\n<section id=\"block--block_022e15a9cc2d9e64f4a35409dd559c65\"\r\n    class=\"inform-sec faq-accordion-block office-list-block \">\r\n    <div class=\"container\">    <div class=\"row\">\r\n        <div class=\"col-md-12\">\r\n            <div class=\"text-box\">\r\n                <h2 class=\"faq-title\"><\/h2>\r\n                <div class=\"accordion\" id=\"faq-list-accordion\">\r\n                                                                                                                                                            <div class=\"accordion-item\">\r\n                                    <div class=\"accordion-body-background\">\r\n                                        <img decoding=\"async\" loading=\"lazy\"\r\n                                            src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/faq-back.png\"\r\n                                            alt=\"\" \/>\r\n                                    <\/div>\r\n\r\n                                    <h2 class=\"accordion-header\" id=\"heading-69e4be6c29e64\">\r\n                                        <button class=\"accordion-button \" type=\"button\"\r\n                                            data-bs-toggle=\"collapse\" data-bs-target=\"#collapse-69e4be6c29e64\"\r\n                                            aria-expanded=\"false\" aria-controls=\"collapse-69e4be6c29e64\">\r\n                                            <span><\/span> What security measures does Restore Technology use for IT disposal in the healthcare sector?                                            <img decoding=\"async\" class=\"drop-arrow\"\r\n                                                src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/drop-arrow.svg\"\r\n                                                alt=\"\" \/>\r\n                                        <\/button>\r\n                                    <\/h2>\r\n\r\n                                    <div id=\"collapse-69e4be6c29e64\" class=\"accordion-collapse collapse\"\r\n                                        aria-labelledby=\"heading-69e4be6c29e64\"\r\n                                        data-bs-parent=\"#faq-list-accordion\">\r\n\r\n                                        <div class=\"accordion-body\">\r\n                                            <p>Restore Technology ensures top-level security by shredding data down to 2mm, issuing certificates of destruction, and providing full audit trails. Our processes meet international destruction standards, making us a trusted partner for over 50 NHS and healthcare organisations across the UK.<\/p>\n                                        <\/div>\r\n\r\n                                    <\/div>\r\n                                <\/div>\r\n                                                                                                                                                <div class=\"accordion-item\">\r\n                                    <div class=\"accordion-body-background\">\r\n                                        <img decoding=\"async\" loading=\"lazy\"\r\n                                            src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/faq-back.png\"\r\n                                            alt=\"\" \/>\r\n                                    <\/div>\r\n\r\n                                    <h2 class=\"accordion-header\" id=\"heading-69e4be6c29ef8\">\r\n                                        <button class=\"accordion-button collapsed\" type=\"button\"\r\n                                            data-bs-toggle=\"collapse\" data-bs-target=\"#collapse-69e4be6c29ef8\"\r\n                                            aria-expanded=\"false\" aria-controls=\"collapse-69e4be6c29ef8\">\r\n                                            <span><\/span> How does Restore ensure compliance with GDPR and IT disposal regulations?                                            <img decoding=\"async\" class=\"drop-arrow\"\r\n                                                src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/drop-arrow.svg\"\r\n                                                alt=\"\" \/>\r\n                                        <\/button>\r\n                                    <\/h2>\r\n\r\n                                    <div id=\"collapse-69e4be6c29ef8\" class=\"accordion-collapse collapse\"\r\n                                        aria-labelledby=\"heading-69e4be6c29ef8\"\r\n                                        data-bs-parent=\"#faq-list-accordion\">\r\n\r\n                                        <div class=\"accordion-body\">\r\n                                            <p>As a DSP Toolkit accredited supplier and part of the NHS Countess of Chester framework, Restore Technology adheres to strict GDPR-compliant IT disposal and secure data destruction protocols. We ensure all services are pre-vetted, cost-effective, and meet regulatory standards.<\/p>\n                                        <\/div>\r\n\r\n                                    <\/div>\r\n                                <\/div>\r\n                                                                                                                                                <div class=\"accordion-item\">\r\n                                    <div class=\"accordion-body-background\">\r\n                                        <img decoding=\"async\" loading=\"lazy\"\r\n                                            src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/faq-back.png\"\r\n                                            alt=\"\" \/>\r\n                                    <\/div>\r\n\r\n                                    <h2 class=\"accordion-header\" id=\"heading-69e4be6c29f51\">\r\n                                        <button class=\"accordion-button collapsed\" type=\"button\"\r\n                                            data-bs-toggle=\"collapse\" data-bs-target=\"#collapse-69e4be6c29f51\"\r\n                                            aria-expanded=\"false\" aria-controls=\"collapse-69e4be6c29f51\">\r\n                                            <span><\/span> What are the risks associated with improper IT disposal, and how does Restore mitigate them?                                            <img decoding=\"async\" class=\"drop-arrow\"\r\n                                                src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/drop-arrow.svg\"\r\n                                                alt=\"\" \/>\r\n                                        <\/button>\r\n                                    <\/h2>\r\n\r\n                                    <div id=\"collapse-69e4be6c29f51\" class=\"accordion-collapse collapse\"\r\n                                        aria-labelledby=\"heading-69e4be6c29f51\"\r\n                                        data-bs-parent=\"#faq-list-accordion\">\r\n\r\n                                        <div class=\"accordion-body\">\r\n                                            <p>Improper IT disposal can lead to data breaches. Restore mitigates these risks through secure asset collection using GPS-tracked vehicles, certified data erasure processes, and providing the necessary documentation to comply with regulations and audits.<\/p>\n                                        <\/div>\r\n\r\n                                    <\/div>\r\n                                <\/div>\r\n                                                                                                                                                <div class=\"accordion-item\">\r\n                                    <div class=\"accordion-body-background\">\r\n                                        <img decoding=\"async\" loading=\"lazy\"\r\n                                            src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/faq-back.png\"\r\n                                            alt=\"\" \/>\r\n                                    <\/div>\r\n\r\n                                    <h2 class=\"accordion-header\" id=\"heading-69e4be6c29f8f\">\r\n                                        <button class=\"accordion-button collapsed\" type=\"button\"\r\n                                            data-bs-toggle=\"collapse\" data-bs-target=\"#collapse-69e4be6c29f8f\"\r\n                                            aria-expanded=\"false\" aria-controls=\"collapse-69e4be6c29f8f\">\r\n                                            <span><\/span> Can Restore Technology assist with future IT disposal needs?                                            <img decoding=\"async\" class=\"drop-arrow\"\r\n                                                src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/drop-arrow.svg\"\r\n                                                alt=\"\" \/>\r\n                                        <\/button>\r\n                                    <\/h2>\r\n\r\n                                    <div id=\"collapse-69e4be6c29f8f\" class=\"accordion-collapse collapse\"\r\n                                        aria-labelledby=\"heading-69e4be6c29f8f\"\r\n                                        data-bs-parent=\"#faq-list-accordion\">\r\n\r\n                                        <div class=\"accordion-body\">\r\n                                            <p>Yes, Restore Technology provides ongoing support for future IT disposals. Our ITAD services are designed to adapt to your evolving needs, ensuring secure, compliant, and efficient disposal of IT assets every time.<\/p>\n                                        <\/div>\r\n\r\n                                    <\/div>\r\n                                <\/div>\r\n                                                                        \r\n                <\/div>\r\n            <\/div>\r\n        <\/div>\r\n    <\/div>\r\n    <\/div><\/section>\r\n<style>\r\n    .accordion-item {\r\n        position: relative;\r\n    }\r\n\r\n    .accordion-button:hover {\r\n        z-index: unset;\r\n    }\r\n\r\n    button.accordion-button {\r\n        z-index: 3 !important;\r\n    }\r\n\r\n    .accordion-body-background {\r\n        z-index: 3 !important;\r\n    }\r\n\r\n    .office-list-block .drop-arrow {\r\n        z-index: 5 !important;\r\n    }\r\n\r\n    .accordion-header {\r\n        background: #f8f8f8;\r\n    }\r\n\r\n    .office-list-block .accordion-button:not(.collapsed) {\r\n        z-index: 5;\r\n        background-color: unset;\r\n    }\r\n<\/style>\r\n<script>\r\n    document.addEventListener(\"DOMContentLoaded\", function () {\r\n        const accordionItems = document.querySelectorAll(\".accordion-item\");\r\n\r\n        accordionItems.forEach(item => {\r\n            const collapseElement = item.querySelector(\".accordion-collapse\");\r\n            const backgroundImage = item.querySelector(\".accordion-body-background\");\r\n            const button = item.querySelector(\".accordion-button\");\r\n\r\n            \/\/ Toggle display of the background image based on accordion state\r\n            function toggleBackground() {\r\n                if (collapseElement.classList.contains(\"show\")) {\r\n                    backgroundImage.style.display = \"block\";\r\n                } else {\r\n                    backgroundImage.style.display = \"none\";\r\n                }\r\n            }\r\n\r\n            \/\/ Immediate hide of the background when the button is clicked\r\n            button.addEventListener(\"click\", function () {\r\n                backgroundImage.style.display = \"none\";\r\n            });\r\n\r\n            \/\/ Set the display based on final state after animation\r\n            collapseElement.addEventListener(\"shown.bs.collapse\", function () {\r\n                backgroundImage.style.display = \"block\";\r\n            });\r\n            collapseElement.addEventListener(\"hidden.bs.collapse\", function () {\r\n                backgroundImage.style.display = \"none\";\r\n            });\r\n\r\n            \/\/ Initial check when the page loads\r\n            toggleBackground();\r\n        });\r\n    });\r\n\r\n\r\n<\/script>\n\n\r\n<section id=\"block--block_1baee4deeda5366842b8c10017438fe3\" class=\"arrow-sec back-to-top-block  gray-background\">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t\t<div class=\"col-md-12\">\r\n\t\t\t\t\t<ul class=\"arrow-list d-sm-flex d-none\">\r\n\t\t\t\t\t\t<li class=\"d-sm-none d-block justify-content-center\">\r\n\t\t\t\t\t\t\t<a href=\"#\">\r\n\t\t\t\t\t\t\t\tBack to top\r\n\t\t\t\t\t\t\t\t<br>\r\n\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"46\" height=\"44\" viewBox=\"0 0 46 44\" fill=\"none\">\r\n\t\t\t\t\t\t\t\t\t\t<path class=\"stroke\" d=\"M44.0755 22C44.0755 33.2903 34.7056 42.5 23.0761 42.5C11.4465 42.5 2.07666 33.2903 2.07666 22C2.07666 10.7097 11.4465 1.5 23.0761 1.5C34.7056 1.5 44.0755 10.7097 44.0755 22Z\" stroke=\"#e20c44\" stroke-width=\"3\"><\/path>\r\n\t\t\t\t\t\t\t\t\t\t<path d=\"M21.5986 31.5C21.5986 32.3284 22.2702 33 23.0986 33C23.9271 33 24.5986 32.3284 24.5986 31.5H21.5986ZM24.1593 12.4393C23.5735 11.8536 22.6238 11.8536 22.038 12.4393L12.492 21.9853C11.9062 22.5711 11.9062 23.5208 12.492 24.1066C13.0778 24.6924 14.0276 24.6924 14.6134 24.1066L23.0986 15.6213L31.5839 24.1066C32.1697 24.6924 33.1194 24.6924 33.7052 24.1066C34.291 23.5208 34.291 22.5711 33.7052 21.9853L24.1593 12.4393ZM24.5986 31.5V13.5H21.5986V31.5H24.5986Z\" fill=\"#898787\"><\/path>\r\n\t\t\t\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t<li class=\"d-sm-flex d-none\"><a href=\"#\">Back to top<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"46\" height=\"44\" viewBox=\"0 0 46 44\" fill=\"none\">\r\n\t\t\t\t\t\t\t\t\t\t<path class=\"stroke\" d=\"M44.0755 22C44.0755 33.2903 34.7056 42.5 23.0761 42.5C11.4465 42.5 2.07666 33.2903 2.07666 22C2.07666 10.7097 11.4465 1.5 23.0761 1.5C34.7056 1.5 44.0755 10.7097 44.0755 22Z\" stroke=\"#e20c44\" stroke-width=\"3\"><\/path>\r\n\t\t\t\t\t\t\t\t\t\t<path d=\"M21.5986 31.5C21.5986 32.3284 22.2702 33 23.0986 33C23.9271 33 24.5986 32.3284 24.5986 31.5H21.5986ZM24.1593 12.4393C23.5735 11.8536 22.6238 11.8536 22.038 12.4393L12.492 21.9853C11.9062 22.5711 11.9062 23.5208 12.492 24.1066C13.0778 24.6924 14.0276 24.6924 14.6134 24.1066L23.0986 15.6213L31.5839 24.1066C32.1697 24.6924 33.1194 24.6924 33.7052 24.1066C34.291 23.5208 34.291 22.5711 33.7052 21.9853L24.1593 12.4393ZM24.5986 31.5V13.5H21.5986V31.5H24.5986Z\" fill=\"#898787\"><\/path>\r\n\t\t\t\t\t\t\t\t\t<\/svg><\/a>\r\n\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t<ul class=\"arw-main-img\">\r\n\t\t\t\t\t\t<li class=\"arrow\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<svg width=\"189\" height=\"63\" viewBox=\"0 0 189 63\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\r\n\t\t\t\t\t\t<path d=\"M3.80157 0C1.70416 0 0 1.64017 0 3.6588C0 4.3527 0.196633 5.10967 0.655444 5.61433L18.2213 31.0996L0.5899 56.5217C0.196634 57.0894 0 57.7833 0 58.5403C0 60.2435 1.1798 61.6944 2.88395 62.0729H16.1239C17.0415 61.8837 17.8281 61.3159 18.3524 60.5589L37.3603 33.1182C37.7536 32.5504 38.0157 31.7935 38.0157 31.0996C38.0157 30.3426 37.8191 29.6486 37.3603 29.0809L18.3524 1.64012C17.697 0.630807 16.5172 0 15.2063 0H3.80157Z\" fill=\"url(#paint0_linear_324_5668)\"\/>\r\n\t\t\t\t\t\t<path d=\"M41.8172 0C39.7198 0 38.0156 1.64017 38.0156 3.6588C38.0156 4.3527 38.2778 5.10967 38.6711 5.61433L56.3025 31.0996L38.6711 56.5217C38.2778 57.0894 38.0156 57.7833 38.0156 58.5403C38.0156 60.2435 39.261 61.6944 40.8996 62.0729H54.1395C55.0572 61.8837 55.8437 61.3159 56.368 60.5589L75.3759 33.1182C75.8347 32.5504 76.0314 31.7935 76.0314 31.0996C76.0314 30.3426 75.8347 29.6486 75.3759 29.0809L56.368 1.64012C55.7126 0.630807 54.5328 0 53.2219 0H41.8172Z\" fill=\"url(#paint0_linear_324_5668)\"\/>\r\n\t\t\t\t\t\t<path d=\"M78.2748 0C76.181 0 74.4797 1.64017 74.4797 3.6588C74.4797 4.3527 74.7415 5.10967 75.1341 5.61433L92.7351 31.0996L75.1341 56.5217C74.7415 57.0894 74.4797 57.7833 74.4797 58.5403C74.4797 60.2435 75.7229 61.6944 77.3587 62.0729H90.5759C91.4919 61.8837 92.2771 61.3159 92.8006 60.5589L111.841 33.1182C112.234 32.5504 112.495 31.7935 112.495 31.0996C112.495 30.3426 112.234 29.6486 111.841 29.0809L92.8006 1.64012C92.1463 0.630807 91.0339 0 89.6599 0H78.2748Z\" fill=\"url(#paint0_linear_324_5668)\"\/>\r\n\t\t\t\t\t\t<defs>\r\n\t\t\t\t\t\t<linearGradient id=\"paint0_linear_324_5668\" x1=\"18.9921\" y1=\"1.92969\" x2=\"18.9921\" y2=\"62.4975\" gradientUnits=\"userSpaceOnUse\">\r\n\t\t\t\t\t\t<stop stop-color=\"#e20c44\"\/>\r\n\t\t\t\t\t\t<stop offset=\"1\" stop-color=\"#1b3e6f\"\/>\r\n\t\t\t\t\t\t<\/linearGradient>\r\n\t\t\t\t\t\t<linearGradient id=\"paint1_linear_324_5668\" x1=\"57.032\" y1=\"63.6235\" x2=\"57.032\" y2=\"1.21875\" gradientUnits=\"userSpaceOnUse\">\r\n\t\t\t\t\t\t<stop stop-color=\"#e20c44\"\/>\r\n\t\t\t\t\t\t<stop offset=\"1\" stop-color=\"#1b3e6f\"\/>\r\n\t\t\t\t\t\t<\/linearGradient>\r\n\t\t\t\t\t\t<linearGradient id=\"paint2_linear_324_5668\" x1=\"93.4752\" y1=\"2.28862\" x2=\"93.4752\" y2=\"62.1663\" gradientUnits=\"userSpaceOnUse\">\r\n\t\t\t\t\t\t<stop stop-color=\"#e20c44\"\/>\r\n\t\t\t\t\t\t<stop offset=\"1\" stop-color=\"#1b3e6f\"\/>\r\n\t\t\t\t\t\t<\/linearGradient>\r\n\t\t\t\t\t\t<linearGradient id=\"paint3_linear_324_5668\" x1=\"131.475\" y1=\"64.6934\" x2=\"131.475\" y2=\"1.07114\" gradientUnits=\"userSpaceOnUse\">\r\n\t\t\t\t\t\t<stop stop-color=\"#e20c44\"\/>\r\n\t\t\t\t\t\t<stop offset=\"1\" stop-color=\"#1b3e6f\"\/>\r\n\t\t\t\t\t\t<\/linearGradient>\r\n\t\t\t\t\t\t<linearGradient id=\"paint4_linear_324_5668\" x1=\"169.494\" y1=\"61.3645\" x2=\"169.494\" y2=\"1.44458\" gradientUnits=\"userSpaceOnUse\">\r\n\t\t\t\t\t\t<stop stop-color=\"#e20c44\"\/>\r\n\t\t\t\t\t\t<stop offset=\"1\" stop-color=\"#1b3e6f\"\/>\r\n\t\t\t\t\t\t<\/linearGradient>\r\n\t\t\t\t\t\t<\/defs>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t<\/ul>\r\n\t\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\r\n","protected":false},"excerpt":{"rendered":"<p>Secure data services for the high security sector. The Restore Group is a huge partner to the UK\u2019s central government, but in particular, the Group support the Ministry of Defence and the Nuclear Decommissioning Authority<\/p>\n","protected":false},"author":10,"featured_media":0,"parent":41,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"class_list":["post-1420","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>IT Lifecycle Services for the High Security Sector - Restore Technology<\/title>\n<meta name=\"description\" content=\"Restore Technology provides IT lifecycle services within high security sectors. Including secure data destruction, server moves, IT audits and more.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.restore.co.uk\/technology\/sectors\/high-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Lifecycle Services for the High Security Sector - Restore Technology\" \/>\n<meta property=\"og:description\" content=\"Restore Technology provides IT lifecycle services within high security sectors. Including secure data destruction, server moves, IT audits and more.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.restore.co.uk\/technology\/sectors\/high-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Restore Technology\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/RestoreTechnologyUK\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-05T09:46:43+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@restore_tech_uk\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/sectors\\\/high-security\\\/\",\"url\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/sectors\\\/high-security\\\/\",\"name\":\"IT Lifecycle Services for the High Security Sector - Restore Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#website\"},\"datePublished\":\"2024-03-03T08:11:47+00:00\",\"dateModified\":\"2026-03-05T09:46:43+00:00\",\"description\":\"Restore Technology provides IT lifecycle services within high security sectors. Including secure data destruction, server moves, IT audits and more.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/sectors\\\/high-security\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/sectors\\\/high-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/sectors\\\/high-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sectors\",\"item\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/sectors\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"High Security Sector\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#website\",\"url\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/\",\"name\":\"Restore Technology\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#organization\",\"name\":\"Restore Technology\",\"url\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/wp-content\\\/uploads\\\/sites\\\/7\\\/2024\\\/02\\\/Technology-logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/wp-content\\\/uploads\\\/sites\\\/7\\\/2024\\\/02\\\/Technology-logo.svg\",\"width\":160,\"height\":68,\"caption\":\"Restore Technology\"},\"image\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/facebook.com\\\/RestoreTechnologyUK\",\"https:\\\/\\\/x.com\\\/restore_tech_uk\",\"https:\\\/\\\/linkedin.com\\\/restoretechnology\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"IT Lifecycle Services for the High Security Sector - Restore Technology","description":"Restore Technology provides IT lifecycle services within high security sectors. Including secure data destruction, server moves, IT audits and more.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.restore.co.uk\/technology\/sectors\/high-security\/","og_locale":"en_GB","og_type":"article","og_title":"IT Lifecycle Services for the High Security Sector - Restore Technology","og_description":"Restore Technology provides IT lifecycle services within high security sectors. Including secure data destruction, server moves, IT audits and more.","og_url":"https:\/\/www.restore.co.uk\/technology\/sectors\/high-security\/","og_site_name":"Restore Technology","article_publisher":"https:\/\/facebook.com\/RestoreTechnologyUK","article_modified_time":"2026-03-05T09:46:43+00:00","twitter_card":"summary_large_image","twitter_site":"@restore_tech_uk","twitter_misc":{"Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.restore.co.uk\/technology\/sectors\/high-security\/","url":"https:\/\/www.restore.co.uk\/technology\/sectors\/high-security\/","name":"IT Lifecycle Services for the High Security Sector - Restore Technology","isPartOf":{"@id":"https:\/\/www.restore.co.uk\/technology\/#website"},"datePublished":"2024-03-03T08:11:47+00:00","dateModified":"2026-03-05T09:46:43+00:00","description":"Restore Technology provides IT lifecycle services within high security sectors. Including secure data destruction, server moves, IT audits and more.","breadcrumb":{"@id":"https:\/\/www.restore.co.uk\/technology\/sectors\/high-security\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.restore.co.uk\/technology\/sectors\/high-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.restore.co.uk\/technology\/sectors\/high-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.restore.co.uk\/technology\/"},{"@type":"ListItem","position":2,"name":"Sectors","item":"https:\/\/www.restore.co.uk\/technology\/sectors\/"},{"@type":"ListItem","position":3,"name":"High Security Sector"}]},{"@type":"WebSite","@id":"https:\/\/www.restore.co.uk\/technology\/#website","url":"https:\/\/www.restore.co.uk\/technology\/","name":"Restore Technology","description":"","publisher":{"@id":"https:\/\/www.restore.co.uk\/technology\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.restore.co.uk\/technology\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.restore.co.uk\/technology\/#organization","name":"Restore Technology","url":"https:\/\/www.restore.co.uk\/technology\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.restore.co.uk\/technology\/#\/schema\/logo\/image\/","url":"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/02\/Technology-logo.svg","contentUrl":"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/02\/Technology-logo.svg","width":160,"height":68,"caption":"Restore Technology"},"image":{"@id":"https:\/\/www.restore.co.uk\/technology\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/RestoreTechnologyUK","https:\/\/x.com\/restore_tech_uk","https:\/\/linkedin.com\/restoretechnology"]}]}},"_links":{"self":[{"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/pages\/1420","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/comments?post=1420"}],"version-history":[{"count":8,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/pages\/1420\/revisions"}],"predecessor-version":[{"id":12006,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/pages\/1420\/revisions\/12006"}],"up":[{"embeddable":true,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/pages\/41"}],"wp:attachment":[{"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/media?parent=1420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}