{"id":10769,"date":"2025-05-08T13:20:06","date_gmt":"2025-05-08T13:20:06","guid":{"rendered":"https:\/\/www.restore.co.uk\/technology\/?p=10769"},"modified":"2026-03-05T09:32:29","modified_gmt":"2026-03-05T09:32:29","slug":"securing-government-data","status":"publish","type":"post","link":"https:\/\/www.restore.co.uk\/technology\/securing-government-data\/","title":{"rendered":"Securing government data"},"content":{"rendered":"\r\n<section id=\"block--block_ed0a3b3df2e7d4f1a534aa037fe46cc9\" class=\"content-block \">\r\n\t<h3>Why data destruction protocols are a non-negotiable element of your IT asset risk management.<\/h3>\n<\/section>\r\n\n\n\r\n<section id=\"block--block_6b59cab5f7b1b984e7a28e32af6e4755\"\r\n\tclass=\"museum-sec image-text-block \"\r\n\tstyle=\"background: var(--white);\">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-lg-6 order-0 order-lg-1 \">\r\n\t\t\t\t<div class=\"text-lg-start text-center\">\r\n\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"img-fluid img-main\">\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"col-lg-6 order-1 order-lg-0\">\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>It\u2019s a headline topic that\u2019s more than hot, it\u2019s on the boil \u2013 cyber-attacks involving ransomware. Recent events in well-known high street brands whose retail, banking and online arms have been seriously compromised, resulting in clothing shortages, food waste and millions of pounds lost each day, and whose customers\u2019 personal data has been scooped and scuppered, mean these data breaches have been on the front page for several weeks.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\n\n\r\n<section id=\"block--block_fa250f8751c6cc1f6d8352aea0531799\"\r\n\tclass=\"museum-sec image-text-block \"\r\n\tstyle=\"background: var(--white);\">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-lg-6 order-0\">\r\n\t\t\t\t<div class=\"text-lg-start text-center\">\r\n\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"\" alt=\"\" class=\"img-fluid img-main\">\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"col-lg-6 order-1 order-lg-0\">\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>But cyber is not the whole story. Data thieves don\u2019t harvest sensitive information simply by hacking, phishing, and phone-call scamming their way past vulnerable human beings \u2013 although human error does play a large part in all data breaches. They can find it or track it down on devices that have left the control of an organisation \u2013 your department, say \u2013 without having their electronic storage media (ESM) thoroughly wiped.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\n\n\r\n<section id=\"block--block_02df716930689a1ea561c7e7dbb3a230\" class=\"content-block \">\r\n\t<h3><strong>Securing your data\u2019s protection<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<p>Information security has been a key concern of government departments and agencies for as long as humans have been self-organising. Corporate and political espionage might make for great stories, it\u2019s true, but all the while it undermines societal stability. Those threats have always been, and continue to be, real, and make keeping sensitive information confidential and safe a major part of governmental risk management.<\/p>\n<p>Government departments and agencies require strictly adhered to protocols to protect sensitive data so that they comply with regulations such as GDPR, as well as protections for official and secret levels of information. This means that, at the end of an asset\u2019s use to your organisation, you must consider carefully how to dispose of it in compliance with legislation and, depending on the level of confidentiality of the data the asset has processed during its lifespan, either sanitise the ESM before possible re-use or physically destroy the ESM so that it is irrecoverable.<\/p>\n<p>Experienced IT asset managers know that almost <em>all<\/em> equipment, including printers, monitors and switches that seemingly only handle data, contains ESM. Exceptions might include power supply units and transformers, mice and simple headphones. In short, residual data may be present and pose a risk in far more kit than a first sweep of assets might indicate.<\/p>\n<\/section>\r\n\n\n\r\n\r\n\r\n<section id=\"block--block_7039e9845d47e89ae36cc00ef8dc6fe3\" class=\"why-sec info-cards-block info-cards-grid  \" style=\"\">\r\n\r\n\t<div class=\"container\">\r\n\r\n\t\t<div class=\"row\">\r\n\r\n\t\t\t<div class=\"col-md-12\">\r\n\r\n\t\t\t\t<div class=\"text-box text-center\">\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t<h2>5 robust protocols to keep government data secure<\/h2>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t<\/div>\r\n\r\n\t\t<\/div>\r\n\r\n\t\t<div class=\"row top-space\">\r\n\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\r\n\t\t\t\t<div class=\"col-lg-4 col-md-6 card-cont\">\r\n\r\n\r\n\t\t\t\t\t<div class=\"text-center why-box match-height \">\r\n\r\n\t\t\t\t\t\t<div class=\"icon-box\">\r\n\t\t\t\t\t\t\t<div class=\"inner-box p-0\">\r\n\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/03\/documents-71.svg\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t<h5 class=\" \"> Protocol #1 <\/h5>\r\n\r\n\t\t\t\t\t\t<p>Keep records of your records: know what data you hold and where, why you keep it and what its value might be to bad actors.<\/p>\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t<div class=\"top-space-background\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/info-card-back.png\" alt=\"\" \/><\/div>\r\n\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\r\n\t\t\t\r\n\t\t\t\t<div class=\"col-lg-4 col-md-6 card-cont\">\r\n\r\n\r\n\t\t\t\t\t<div class=\"text-center why-box match-height \">\r\n\r\n\t\t\t\t\t\t<div class=\"icon-box\">\r\n\t\t\t\t\t\t\t<div class=\"inner-box p-0\">\r\n\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/03\/pc-and-monitor.svg\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t<h5 class=\" \">Protocol #2<\/h5>\r\n\r\n\t\t\t\t\t\t<p>Data, data, everywhere: know which assets contain ESM and whether they\u2019ve handled any of your valuable data. Inevitably, most electronic equipment will contain some element of data. Know at point of purchase what the sanitisation requirements are of each.<\/p>\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t<div class=\"top-space-background\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/info-card-back.png\" alt=\"\" \/><\/div>\r\n\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\r\n\t\t\t\r\n\t\t\t\t<div class=\"col-lg-4 col-md-6 card-cont\">\r\n\r\n\r\n\t\t\t\t\t<div class=\"text-center why-box match-height \">\r\n\r\n\t\t\t\t\t\t<div class=\"icon-box\">\r\n\t\t\t\t\t\t\t<div class=\"inner-box p-0\">\r\n\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/03\/teaching.svg\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t<h5 class=\" \">Protocol #3<\/h5>\r\n\r\n\t\t\t\t\t\t<p>Create a policy: set up a re-use and disposal policy for all your data-bearing assets. Restore Technology can help you with this, whatever level of confidentiality you need to achieve.<\/p>\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t<div class=\"top-space-background\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/info-card-back.png\" alt=\"\" \/><\/div>\r\n\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\r\n\t\t\t\r\n\t\t\t\t<div class=\"col-lg-4 col-md-6 card-cont\">\r\n\r\n\r\n\t\t\t\t\t<div class=\"text-center why-box match-height \">\r\n\r\n\t\t\t\t\t\t<div class=\"icon-box\">\r\n\t\t\t\t\t\t\t<div class=\"inner-box p-0\">\r\n\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/03\/board.svg\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t<h5 class=\" \">Protocol #4<\/h5>\r\n\r\n\t\t\t\t\t\t<p>Educate your colleagues and teams: and keep on training and updating them. Human error is a major factor in data breaches. Making security second nature in everyone\u2019s interactions and transactions helps eliminate the mistakes. <\/p>\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t<div class=\"top-space-background\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/info-card-back.png\" alt=\"\" \/><\/div>\r\n\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\r\n\t\t\t\r\n\t\t\t\t<div class=\"col-lg-4 col-md-6 card-cont\">\r\n\r\n\r\n\t\t\t\t\t<div class=\"text-center why-box match-height \">\r\n\r\n\t\t\t\t\t\t<div class=\"icon-box\">\r\n\t\t\t\t\t\t\t<div class=\"inner-box p-0\">\r\n\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/10\/Secured.svg\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t<h5 class=\" \">Protocol #5<\/h5>\r\n\r\n\t\t\t\t\t\t<p>Sanitise no-longer-needed assets before they leave organisational control: employ a professional IT asset disposal business to act as your trusted proxy in the disposal of your ESM equipment compliantly and securely. <\/p>\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t<div class=\"top-space-background\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/info-card-back.png\" alt=\"\" \/><\/div>\r\n\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\r\n\t\t<\/div>\r\n\r\n\t<\/div>\r\n\r\n<\/section>\r\n\r\n\n\n\r\n\r\n\r\n<section id=\"block--block_76ac19788912f7d901085bdbef96862b\" class=\"driving-sec blocknumfig-4998 nothasbgimg full-width-text-with-background-block  \" style=\"background-image: url();\">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-md-12\">\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"\">Allow Restore Technology to be that trusted data protection partner <\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"\">Our security processes and measures and our cast-iron security guarantees are backed by industry-leading certification and cutting-edge technologies.\r\n\r\nOver 100 of our colleagues are vetted to official police and government security levels.\r\n\r\nDepending on the level of confidentiality of your department\u2019s data handling, we offer two routes for secure data destruction, in line with NCSC recommendations.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\r\n\n\n\r\n<section id=\"block--block_96325a14d43805e617bb572ff6c59ad1\"\r\n\tclass=\"museum-sec image-text-block \"\r\n\tstyle=\"background: var(--white);\">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-lg-6 order-0 order-lg-1 \">\r\n\t\t\t\t<div class=\"text-lg-start text-center\">\r\n\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/03\/RT_Improved-Security_700x500.png\" alt=\"\" class=\"img-fluid img-main\">\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"col-lg-6 order-1 order-lg-0\">\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t<h2>Data sanitisation <\/h2>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>For equipment that has not handled \u2018secret\u2019 level data, we use degaussing (de-magnetising technique) or overwriting erasure software to make ESM unreadable to all but the most sophisticated laboratory-based processes.<\/p>\n<p>We recommend this type of device sanitisation for all a government department\u2019s obsolete data-bearing assets, unless designated \u2018secret\u2019 and above, as it means still-current hardware may be re-used or re-marketed through our sales channels, enabling equipment to have a \u2018second life\u2019 \u2013 a desirable outcome for environmental and financial reasons.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\n\n\r\n<section id=\"block--block_293203b696d117d531acb1050b1ff438\"\r\n\tclass=\"museum-sec image-text-block \"\r\n\tstyle=\"background: var(--white);\">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-lg-6 order-0\">\r\n\t\t\t\t<div class=\"text-lg-start text-center\">\r\n\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/04\/hard-drive-image.webp\" alt=\"\" class=\"img-fluid img-main\">\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"col-lg-6 order-1 order-lg-0\">\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t<h2>Physical data destruction <\/h2>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>This is digital media shredding, suitable for obsolete devices and data. We can destroy assets down to 2mm fragments \u2013 a level of micro-cutting that makes data unrecoverable \u2013 and provide a certificate of destruction for each transaction, alongside full audit trails.<\/p>\n<p>&nbsp;<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\n\n\r\n<section id=\"block--block_001873982328e793dbcdfa5bd138bfb0\" class=\"content-block \">\r\n\t<p>Providing an even greater level of security, we can carry out digital media shredding at your workplace. Our on-site data destruction service brings a mobile shredding vehicle operated by one of our security-checked professionals to you so that you may witness for yourself your no-longer needed data and equipment falling on to the shredding blades. The shredder reduces devices to 2mm fragments in mere seconds. It\u2019s convenient, it\u2019s highly secure and it\u2019s satisfying to watch!<\/p>\n<p>For large volumes, we security tag and transport your assets, maintaining an unbroken chain of custody throughout, to be shredded off site at one of our specialist security protocoled centres. The key, throughout these processes, is our commitment to maintaining the strictest confidentiality for your assets.<\/p>\n<p>&nbsp;<\/p>\n<\/section>\r\n\n\n\r\n<section id=\"block--block_0ce02e08f46003fb44dc5d4a43d8ef9d\" class=\"content-block \">\r\n\t<h3><\/h3>\n<h3>Why choose Restore Technology to secure your government data?<\/h3>\n<p>&nbsp;<\/p>\n<p>\u00b7 <strong>Scale<\/strong>: we\u2019re a leading IT disposal and recycling company in the UK, trusted by our many public sector clients to manage their IT assets and their data destruction.<\/p>\n<p>\u00b7 <strong>Compliance<\/strong>: our services are certified under rigorous industry standards including:<br \/>\nISO 9001 \u2013 Quality Management System<br \/>\nISO 14001 \u2013 Environmental Management System<br \/>\nISO 27001 \u2013 Information Security Management System<br \/>\nSafe Contractor \u2013 Certification for meeting high health and safety standards<\/p>\n<p>\u00b7 <strong>Security<\/strong>: we are fully transparent in our security measures, tagging and tracking your assets, and providing detailed documentation and reports for all processes, data destruction and recycling certificates. We are accredited to the following\u2026<br \/>\nNPSA \u2013 National Protective Security Authority, we can handle secure and classified data<br \/>\nNCSC CAS-S \u2013 National Cyber Security Centre\u2019s Commodity Information Assurance Services-Sanitisation accreditation assures that we provide secure data sanitisation services<\/p>\n<p>\u00b7 <strong>Security AND sustainability<\/strong>: we are leading recyclers of electronic equipment, helping you reduce your organisation\u2019s carbon footprint and contribute positively to your ESG goals. We work in partnership with Planet Mark\u2122, an organisation that recognises commitment to reducing carbon footprint and implementing sustainable practice.<\/p>\n<p>&nbsp;<\/p>\n<\/section>\r\n\n\n\r\n\r\n\r\n<section id=\"block--block_84983d878fd7ab8a5f1cf0f38bcb76cf\" class=\"driving-sec blocknumfig-8500 nothasbgimg full-width-text-with-background-block  \" style=\"background-image: url();\">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-md-12\">\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"\">Contact us<\/h3>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"\">If you find you are having to negotiate a mass of complex and unconnected end-of-lifecycle and data destruction processes, speak to our knowledgeable customer support team on 0333 060 1 920 to find out how to bring scale, security, compliance and sustainability under one roof with Restore Technology. We look forward to speaking to you! <\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"btn-white mx-auto mt-4\" href=\"https:\/\/www.restore.co.uk\/technology\/get-in-touch\/\">Get in touch<\/a>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\r\n\n\n\r\n<section id=\"block--block_e54b77fc66fae05e37e0697e2cefd1e0\"\r\n\tclass=\"studies-sec featured-posts-grid-block   \">\r\n\t<div class=\"container\">\r\n\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t<div class=\"col-md-12\">\r\n\t\t\t\t\t<div class=\"text-box text-center\">\r\n\t\t\t\t\t\t<h3>Recent news<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-lg-4 col-md-6\">\r\n\t\t\t\t\t\t<div class=\"studie-box text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.restore.co.uk\/technology\/10-things-to-look-for-in-a-top-itad-company\/\">\r\n\t\t\t\t\t\t\t\t\t<img loading=\"lazy\"\r\n\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/03\/it-asset-disposition-ITAD.webp\" alt=\"\"\r\n\t\t\t\t\t\t\t\t\t\tclass=\"w-100 img-fluid\">\r\n\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"studie-box-footer\">\r\n\t\t\t\t\t\t\t\t<h5 class=\"text-white\">\r\n\t\t\t\t\t\t\t\t\t10 Things to Look For in a Top ITAD Company<\/h5>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"text-white\">\r\n\t\t\t\t\t\t\t\t\t\tA clear ITAD process should be part of any modern business strategy, mitigating any risk to your data security.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"btn-white\" href=\"https:\/\/www.restore.co.uk\/technology\/10-things-to-look-for-in-a-top-itad-company\/\">Find out more<\/a>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-lg-4 col-md-6\">\r\n\t\t\t\t\t\t<div class=\"studie-box text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.restore.co.uk\/technology\/5-things-to-consider-when-undertaking-a-data-centre-relocation\/\">\r\n\t\t\t\t\t\t\t\t\t<img loading=\"lazy\"\r\n\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/03\/Relocating-your-hq-new-1.jpeg\" alt=\"\"\r\n\t\t\t\t\t\t\t\t\t\tclass=\"w-100 img-fluid\">\r\n\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"studie-box-footer\">\r\n\t\t\t\t\t\t\t\t<h5 class=\"text-white\">\r\n\t\t\t\t\t\t\t\t\t5 Things to Consider When Undertaking a Data Centre Relocation<\/h5>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"text-white\">\r\n\t\t\t\t\t\t\t\t\t\tHere are five key considerations for a data centre relocation to help you spot potential pitfalls.\n<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"btn-white\" href=\"https:\/\/www.restore.co.uk\/technology\/5-things-to-consider-when-undertaking-a-data-centre-relocation\/\">Find out more<\/a>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-lg-4 col-md-6\">\r\n\t\t\t\t\t\t<div class=\"studie-box text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.restore.co.uk\/technology\/6-reasons-your-business-might-need-it-support-services\/\">\r\n\t\t\t\t\t\t\t\t\t<img loading=\"lazy\"\r\n\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/03\/financ-eimage-1-1024x538.webp\" alt=\"\"\r\n\t\t\t\t\t\t\t\t\t\tclass=\"w-100 img-fluid\">\r\n\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"studie-box-footer\">\r\n\t\t\t\t\t\t\t\t<h5 class=\"text-white\">\r\n\t\t\t\t\t\t\t\t\t6 reasons your business might need IT support services.<\/h5>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"text-white\">\r\n\t\t\t\t\t\t\t\t\t\tRunning a business is all about balancing the needs of the business versus the cost of paying someone to do those jobs. One of the most commonly outsourced jobs is for\u00a0IT support.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"btn-white\" href=\"https:\/\/www.restore.co.uk\/technology\/6-reasons-your-business-might-need-it-support-services\/\">Find out more<\/a>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Why data destruction protocols are a non-negotiable element of your IT asset risk management.<\/p>\n","protected":false},"author":24,"featured_media":10709,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[13],"tags":[42,47],"resource-type":[],"sector":[],"class_list":["post-10769","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-it-assets","tag-news"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Securing government data - IT asset risk management<\/title>\n<meta name=\"description\" content=\"Understand the critical importance of secure data destruction protocols for government IT asset risk management. Learn how to protect sensitive information and comply with regulations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.restore.co.uk\/technology\/securing-government-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing government data - IT asset risk management\" \/>\n<meta property=\"og:description\" content=\"Understand the critical importance of secure data destruction protocols for government IT asset risk management. Learn how to protect sensitive information and comply with regulations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.restore.co.uk\/technology\/securing-government-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Restore Technology\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/RestoreTechnologyUK\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-08T13:20:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-05T09:32:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/05\/AdobeStock_249143672-min-scaled.jpeg?_t=1772703150\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1709\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"speat\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@restore_tech_uk\" \/>\n<meta name=\"twitter:site\" content=\"@restore_tech_uk\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"speat\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/securing-government-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/securing-government-data\\\/\"},\"author\":{\"name\":\"speat\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#\\\/schema\\\/person\\\/96e88008d54508295962216993e291c2\"},\"headline\":\"Securing government data\",\"datePublished\":\"2025-05-08T13:20:06+00:00\",\"dateModified\":\"2026-03-05T09:32:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/securing-government-data\\\/\"},\"wordCount\":3,\"publisher\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/securing-government-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/wp-content\\\/uploads\\\/sites\\\/7\\\/2025\\\/05\\\/AdobeStock_249143672-min-scaled.jpeg\",\"keywords\":[\"IT assets\",\"News\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/securing-government-data\\\/\",\"url\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/securing-government-data\\\/\",\"name\":\"Securing government data - IT asset risk management\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/securing-government-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/securing-government-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/wp-content\\\/uploads\\\/sites\\\/7\\\/2025\\\/05\\\/AdobeStock_249143672-min-scaled.jpeg\",\"datePublished\":\"2025-05-08T13:20:06+00:00\",\"dateModified\":\"2026-03-05T09:32:29+00:00\",\"description\":\"Understand the critical importance of secure data destruction protocols for government IT asset risk management. Learn how to protect sensitive information and comply with regulations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/securing-government-data\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/securing-government-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/securing-government-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/wp-content\\\/uploads\\\/sites\\\/7\\\/2025\\\/05\\\/AdobeStock_249143672-min-scaled.jpeg\",\"contentUrl\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/wp-content\\\/uploads\\\/sites\\\/7\\\/2025\\\/05\\\/AdobeStock_249143672-min-scaled.jpeg\",\"width\":2560,\"height\":1709,\"caption\":\"two women having discussion in data centre\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/securing-government-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing government data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#website\",\"url\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/\",\"name\":\"Restore Technology\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#organization\",\"name\":\"Restore Technology\",\"url\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/wp-content\\\/uploads\\\/sites\\\/7\\\/2024\\\/02\\\/Technology-logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/wp-content\\\/uploads\\\/sites\\\/7\\\/2024\\\/02\\\/Technology-logo.svg\",\"width\":160,\"height\":68,\"caption\":\"Restore Technology\"},\"image\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/facebook.com\\\/RestoreTechnologyUK\",\"https:\\\/\\\/x.com\\\/restore_tech_uk\",\"https:\\\/\\\/linkedin.com\\\/restoretechnology\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#\\\/schema\\\/person\\\/96e88008d54508295962216993e291c2\",\"name\":\"speat\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cccfa2f1467491a491871fe2c9333763eb01665a32e87fbd60624c212a87c7af?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cccfa2f1467491a491871fe2c9333763eb01665a32e87fbd60624c212a87c7af?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cccfa2f1467491a491871fe2c9333763eb01665a32e87fbd60624c212a87c7af?s=96&d=mm&r=g\",\"caption\":\"speat\"},\"url\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/author\\\/speat\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Securing government data - IT asset risk management","description":"Understand the critical importance of secure data destruction protocols for government IT asset risk management. Learn how to protect sensitive information and comply with regulations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.restore.co.uk\/technology\/securing-government-data\/","og_locale":"en_GB","og_type":"article","og_title":"Securing government data - IT asset risk management","og_description":"Understand the critical importance of secure data destruction protocols for government IT asset risk management. Learn how to protect sensitive information and comply with regulations.","og_url":"https:\/\/www.restore.co.uk\/technology\/securing-government-data\/","og_site_name":"Restore Technology","article_publisher":"https:\/\/facebook.com\/RestoreTechnologyUK","article_published_time":"2025-05-08T13:20:06+00:00","article_modified_time":"2026-03-05T09:32:29+00:00","og_image":[{"width":2560,"height":1709,"url":"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/05\/AdobeStock_249143672-min-scaled.jpeg?_t=1772703150","type":"image\/jpeg"}],"author":"speat","twitter_card":"summary_large_image","twitter_creator":"@restore_tech_uk","twitter_site":"@restore_tech_uk","twitter_misc":{"Written by":"speat","Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.restore.co.uk\/technology\/securing-government-data\/#article","isPartOf":{"@id":"https:\/\/www.restore.co.uk\/technology\/securing-government-data\/"},"author":{"name":"speat","@id":"https:\/\/www.restore.co.uk\/technology\/#\/schema\/person\/96e88008d54508295962216993e291c2"},"headline":"Securing government data","datePublished":"2025-05-08T13:20:06+00:00","dateModified":"2026-03-05T09:32:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.restore.co.uk\/technology\/securing-government-data\/"},"wordCount":3,"publisher":{"@id":"https:\/\/www.restore.co.uk\/technology\/#organization"},"image":{"@id":"https:\/\/www.restore.co.uk\/technology\/securing-government-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/05\/AdobeStock_249143672-min-scaled.jpeg","keywords":["IT assets","News"],"articleSection":["News"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.restore.co.uk\/technology\/securing-government-data\/","url":"https:\/\/www.restore.co.uk\/technology\/securing-government-data\/","name":"Securing government data - IT asset risk management","isPartOf":{"@id":"https:\/\/www.restore.co.uk\/technology\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.restore.co.uk\/technology\/securing-government-data\/#primaryimage"},"image":{"@id":"https:\/\/www.restore.co.uk\/technology\/securing-government-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/05\/AdobeStock_249143672-min-scaled.jpeg","datePublished":"2025-05-08T13:20:06+00:00","dateModified":"2026-03-05T09:32:29+00:00","description":"Understand the critical importance of secure data destruction protocols for government IT asset risk management. Learn how to protect sensitive information and comply with regulations.","breadcrumb":{"@id":"https:\/\/www.restore.co.uk\/technology\/securing-government-data\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.restore.co.uk\/technology\/securing-government-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.restore.co.uk\/technology\/securing-government-data\/#primaryimage","url":"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/05\/AdobeStock_249143672-min-scaled.jpeg","contentUrl":"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/05\/AdobeStock_249143672-min-scaled.jpeg","width":2560,"height":1709,"caption":"two women having discussion in data centre"},{"@type":"BreadcrumbList","@id":"https:\/\/www.restore.co.uk\/technology\/securing-government-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.restore.co.uk\/technology\/"},{"@type":"ListItem","position":2,"name":"Securing government data"}]},{"@type":"WebSite","@id":"https:\/\/www.restore.co.uk\/technology\/#website","url":"https:\/\/www.restore.co.uk\/technology\/","name":"Restore Technology","description":"","publisher":{"@id":"https:\/\/www.restore.co.uk\/technology\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.restore.co.uk\/technology\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.restore.co.uk\/technology\/#organization","name":"Restore Technology","url":"https:\/\/www.restore.co.uk\/technology\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.restore.co.uk\/technology\/#\/schema\/logo\/image\/","url":"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/02\/Technology-logo.svg","contentUrl":"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/02\/Technology-logo.svg","width":160,"height":68,"caption":"Restore Technology"},"image":{"@id":"https:\/\/www.restore.co.uk\/technology\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/RestoreTechnologyUK","https:\/\/x.com\/restore_tech_uk","https:\/\/linkedin.com\/restoretechnology"]},{"@type":"Person","@id":"https:\/\/www.restore.co.uk\/technology\/#\/schema\/person\/96e88008d54508295962216993e291c2","name":"speat","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/cccfa2f1467491a491871fe2c9333763eb01665a32e87fbd60624c212a87c7af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cccfa2f1467491a491871fe2c9333763eb01665a32e87fbd60624c212a87c7af?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cccfa2f1467491a491871fe2c9333763eb01665a32e87fbd60624c212a87c7af?s=96&d=mm&r=g","caption":"speat"},"url":"https:\/\/www.restore.co.uk\/technology\/author\/speat\/"}]}},"_links":{"self":[{"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/posts\/10769","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/comments?post=10769"}],"version-history":[{"count":33,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/posts\/10769\/revisions"}],"predecessor-version":[{"id":12000,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/posts\/10769\/revisions\/12000"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/media\/10709"}],"wp:attachment":[{"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/media?parent=10769"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/categories?post=10769"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/tags?post=10769"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/resource-type?post=10769"},{"taxonomy":"sector","embeddable":true,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/sector?post=10769"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}