{"id":10867,"date":"2025-05-20T13:51:35","date_gmt":"2025-05-20T13:51:35","guid":{"rendered":"https:\/\/www.restore.co.uk\/technology\/?p=10867"},"modified":"2026-03-05T10:18:32","modified_gmt":"2026-03-05T10:18:32","slug":"data-destruction-certifications-why-they-matter","status":"publish","type":"post","link":"https:\/\/www.restore.co.uk\/technology\/data-destruction-certifications-why-they-matter\/","title":{"rendered":"Data destruction certifications: why they matter"},"content":{"rendered":"\r\n<section id=\"block--block_32c6690075676100bc68b40d070104fa\" class=\"support-sec post-introduction-block \">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-md-8 order-md-1 order-2\">\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t<h2>Accredited systems and processes are essential to your governmental security and environmental commitments, but what do those accreditations mean?<\/h2>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"\">Guaranteed data sanitisation and destruction either as discrete services or as part of IT asset disposal\/lifecycle management are important for government agencies because they offer proof of compliance and security, as well as options for re-use or re-sale rather than wholesale destruction, sustainability being a crucial element in supplier agreements.<\/p>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"col-md-4 order-md-2 order-1\">\r\n\t\t\t\t\t\t\t\t\t<div class=\"bank-box\">\r\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/05\/AdobeStock_429592977-min-scaled.jpeg\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\r\n\n\n\r\n\r\r\n\r\r\n<section id=\"block--block_6b54b62521fb32155ea03dacb0d30ac9\" class=\"two-column-content-60-40 two-column-content-extended  \" style=\"\">\r\t<div class=\"container\">\r\t\t<div class=\"row mx-n5 \">\r\t\t\t<div class=\"col-lg-5 quote-left px-lg-5\">\r\t\t\t\t\t\t\t\t\t<div class=\"heading\"><h2>How does certification support data destruction? <\/h2><\/div>\r\t\t\t\t\r\t\t\t\t\t\t\t<\/div>\r\r\t\t\t<div class=\"col-lg-7 quote-right px-lg-5\">\r\t\t\t\t\t\t\t\t\t<div class=\"content content-quote-desc\"><p>When risk management is all and you must comply with security levels of \u2018official\u2019, \u2018secret\u2019 and above, this makes secure data destruction the only option for ensuring there are no leaks, breaches or hacks, no blaring media headlines, no punitive and reputation-tarnishing financial repercussions.<\/p>\n<p>Knowing that your data destruction supplier has worked for and achieved certification to industry standards, and beyond, means you can trust them to act in your best interests and carry out highly secure sanitisation and destruction processes.<\/p>\n<\/div>\r\t\t\t\t\r\t\t\t\t\t\t\t\t\t<a class=\"nav-link btn-default\" href=\"https:\/\/www.restore.co.uk\/technology\/about-us\/accreditations\/\">\r\t\t\t\t\t\t<span>Our Accreditations<\/span>\r\t\t\t\t\t<\/a>\r\t\t\t\t\t\t\t<\/div>\r\t\t<\/div>\r\t<\/div>\r<\/section>\n\n\r\n<section id=\"block--block_d8ef35500cc2d0f852248d5dd3157b71\" class=\"why-sec info-cards-block \">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-md-12\">\r\n\t\t\t\t<div class=\"text-box text-center\">\r\n\t\t\t\t\t\t\t\t\t\t\t<h2 class=\"larger-mobile\"> Restore Technology complies with the security standards explicit to the following accreditations.<\/h2>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"text-center mt-4 mb-0 mb-md-5\">And we provide our own certificate of destruction after each transaction, which you can access through Streams, our Restore Technology customer portal. <\/p>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"row top-space\">\r\n\t\t\t\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-lg-4 col-md-6\">\r\n\t\t\t\t\t<div class=\"text-center why-box h-100\">\r\n\t\t\t\t\t\t<div class=\"icon-box\">\r\n\t\t\t\t\t\t\t<div class=\"inner-box p-0\">\r\n\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/03\/lock.svg\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<h5 class=\"mt-3 mt-md-5 mb-3 \">ISO 27001<\/h5>\r\n\t\t\t\t\t\t<p>Internationally recognised standard for which robust security measures must be in place that protect customers\u2019 data, its confidentiality, integrity, and availability.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"top-space-background\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/info-card-back.png\" alt=\"\" \/><\/div>\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t<div class=\"col-lg-4 col-md-6\">\r\n\t\t\t\t\t<div class=\"text-center why-box h-100\">\r\n\t\t\t\t\t\t<div class=\"icon-box\">\r\n\t\t\t\t\t\t\t<div class=\"inner-box p-0\">\r\n\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/03\/secure.svg\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<h5 class=\"mt-3 mt-md-5 mb-3 \">NIST 800-88<\/h5>\r\n\t\t\t\t\t\t<p>Highly relevant for government departments, and those who need to comply with international regulations, NIST 800-88 provides guidelines for data sanitisation from ESMs and aligns with Infosec Standard 5.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"top-space-background\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/info-card-back.png\" alt=\"\" \/><\/div>\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\t<div class=\"col-lg-4 col-md-6\">\r\n\t\t\t\t\t<div class=\"text-center why-box h-100\">\r\n\t\t\t\t\t\t<div class=\"icon-box\">\r\n\t\t\t\t\t\t\t<div class=\"inner-box p-0\">\r\n\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/03\/recycle-laptop-1.svg\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<h5 class=\"mt-3 mt-md-5 mb-3 \">Total Waste Management III (NEW!)<\/h5>\r\n\t\t\t\t\t\t<p>Awarded for Restore Technology\u2019s exceptional commitment to secure, sustainable waste management solutions.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<div class=\"top-space-background\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/info-card-back.png\" alt=\"\" \/><\/div>\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\r\n\n\n\r\n<section id=\"block--block_f4c99b987eb8244a9540bfb5d6f23e00\" class=\"content-block \">\r\n\t<h2>What forms of data destruction does Restore Technology carry out?<\/h2>\n<h3><\/h3>\n<p>Before we do anything, we remove all the data from your electronic storage media (ESMs) via three different processes, depending on volume and security level needs.<\/p>\n<\/section>\r\n\n\n\r\n\r\n<section id=\"block--block_b1f18497c1211c7886f627aca243c7b1\" class=\"inform-sec bullets-and-quote-block \">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t\t\r\n\t\t<\/div>\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-lg-7\">\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t<ul class=\"service-list\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><span><\/span>\r\n\t\t\t\t\t\t\t\t\t<h6>Sanitisation\/erasure \u2013 we use overwriting software on smaller volumes of devices, where data is obliterated by random binary digits written and overwritten on any residual data-bearing media so that it is not accessible. <\/h6>\r\n\t\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><span><\/span>\r\n\t\t\t\t\t\t\t\t\t<h6>Degaussing \u2013 this is a method that uses strong magnetic fields or electromagnetic pulses to neutralise any existing magnetisation on the ESM, which is particularly effective on hard drives and magnetic tape.<\/h6>\r\n\t\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<li><span><\/span>\r\n\t\t\t\t\t\t\t\t\t<h6>Physical destruction \u2013 the most secure method is to use industrial shredding machines to reduce your redundant or highly sensitive IT assets into unrecoverable 2mm fragments. For an added layer of security, we can carry out this disposal at your workplace, so you can witness the complete destruction for yourself. <\/h6>\r\n\t\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-lg-5 mt-lg-0 mt-5\">\r\n\t\t\t\t\t<div class=\"text-lg-start text-center img-prov-main\">\r\n\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/03\/it-destruction.webp\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\r\n\n\n\r\n<section id=\"block--block_e0ac501363b7792e243c1f3b370f3287\" class=\"support-sec hover-info-card-grid-block \">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-md-12\">\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"text-white\"> What are the benefits of working with Restore Technology?<\/h3>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t<div class=\"col-lg-4 d-flex col-md-6  \">\r\n\t\t\t\t\t<div class=\"box text-box\">\r\n\t\t\t\t\t\t<div class=\"\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/09\/90448-scaled.jpg\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-footer\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h5>Compliance<\/h5>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"d-sm-none d-block mobile-info\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>For WEEE Directive and NIST 800-88 standards, security and sustainability protocols and processes are key.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.restore.co.uk\/technology\/about-us\/accreditations\/\" class=\"mbl-main-btn\">Find out more<\/a>\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"primary-box\">\r\n\t\t\t\t\t\t\t<div  class=\"box-footer box-inner d-sm-block d-none\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"text-white\">For WEEE Directive and NIST 800-88 standards, security and sustainability protocols and processes are key.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"btn btn-default mx-auto\" href=\"https:\/\/www.restore.co.uk\/technology\/about-us\/accreditations\/\">Find out more<\/a>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-lg-4 d-flex col-md-6 mt-4 mt-md-0 \">\r\n\t\t\t\t\t<div class=\"box text-box\">\r\n\t\t\t\t\t\t<div class=\"\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/01\/AdobeStock_1157297335-scaled.jpeg\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-footer\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h5>Security<\/h5>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"d-sm-none d-block mobile-info\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>Data protection is paramount for meeting GDPR and NIST 800-88\u2019s requirements, especially for devices containing ESMs, which is virtually everything bar plugs and fans! Restore Technology\u2019s security measures begin with tagging and e-auditing your assets, tracking them and the vehicles transporting them to one of our CCTV-controlled facilities, followed by handling by security-checked technicians and professionals into data sanitisation or destruction processes. Our chain of custody is second to none, ensuring that all gaps for risk are plugged.  <\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.restore.co.uk\/technology\/about-us\/\" class=\"mbl-main-btn\">Find out more<\/a>\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"primary-box\">\r\n\t\t\t\t\t\t\t<div  class=\"box-footer box-inner d-sm-block d-none\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"text-white\">Data protection is paramount for meeting GDPR and NIST 800-88\u2019s requirements, especially for devices containing ESMs, which is virtually everything bar plugs and fans! Restore Technology\u2019s security measures begin with tagging and e-auditing your assets, tracking them and the vehicles transporting them to one of our CCTV-controlled facilities, followed by handling by security-checked technicians and professionals into data sanitisation or destruction processes. Our chain of custody is second to none, ensuring that all gaps for risk are plugged.  <\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"btn btn-default mx-auto\" href=\"https:\/\/www.restore.co.uk\/technology\/about-us\/\">Find out more<\/a>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<div class=\"col-lg-4 d-flex col-md-6 mt-4 mt-md-0 \">\r\n\t\t\t\t\t<div class=\"box text-box\">\r\n\t\t\t\t\t\t<div class=\"\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/07\/AdobeStock_568961895-2-scaled.jpeg\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"box-footer\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h5>Sustainability<\/h5>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"d-sm-none d-block mobile-info\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>The WEEE Directive aims to stop all electronic storage media, aka, devices, laptops and peripherals, from being thrown into landfill. It is enforceable by the courts and, as well as financial penalties, non-compliance brings loss of reputation in its wake.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.restore.co.uk\/technology\/about-us\/our-esg-journey\/\" class=\"mbl-main-btn\">Find out more<\/a>\r\n\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"primary-box\">\r\n\t\t\t\t\t\t\t<div  class=\"box-footer box-inner d-sm-block d-none\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"text-white\">The WEEE Directive aims to stop all electronic storage media, aka, devices, laptops and peripherals, from being thrown into landfill. It is enforceable by the courts and, as well as financial penalties, non-compliance brings loss of reputation in its wake.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"btn btn-default mx-auto\" href=\"https:\/\/www.restore.co.uk\/technology\/about-us\/our-esg-journey\/\">Find out more<\/a>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n\t<\/section>\r\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\r\n<section id=\"block--block_9342c55a7c9f70dee30cbc79d7df3266\" class=\"content-block \">\r\n\t<h3>We are major recyclers and there are routes you can opt for that work within restricted government protocols.<\/h3>\n<p>&nbsp;<\/p>\n<ul>\n<li>We data sanitise\/erase then upgrade your IT assets for re-use, either in your team or elsewhere in your agency, depending on access protocols and so on.<\/li>\n<li>We data sanitise\/erase then place your IT assets for re-sale in one of our marketing channels, a potentially lucrative way of recouping a rebate and making your no-longer-needed devices available for a second life.<\/li>\n<li>We data sanitise\/erase then physically destroy your devices, reducing them to tiny fragments that are then sent for recycling.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><strong>Not only, but also\u2026<\/strong><\/h4>\n<p>&nbsp;<\/p>\n<p>And, of course, these accreditations (above) do not operate in a silo. They are ably backed and supported by a raft of further officially recognised achievements that demonstrate our commitment and consistency of approach to the mainstays of our services: compliance, security and sustainability. Find out more below.<\/p>\n<\/section>\r\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\r\n\r\n\r\n<section id=\"block--block_54b150528a5a89b177775119159fe690\" class=\"driving-sec blocknumfig-5474 nothasbgimg full-width-text-with-background-block  \" style=\"background-image: url();\">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-md-12\">\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"\">Our customer services team is well versed in government agency needs that go above and beyond commercial interests (although we\u2019re well versed in those, too!). To discuss your organisation\u2019s data destruction needs, at your workplace or ours, give them a call on 0333 060 1 920. We look forward to showing you why we are market leaders in everything that we do.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"btn-white mx-auto mt-4\" href=\"https:\/\/www.restore.co.uk\/technology\/get-in-touch\/\">Contact us<\/a>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\r\n\n\n\r\n<section id=\"block--block_f68a0e88ebd19f05ae17420b0355c092\"\r\n\tclass=\"studies-sec featured-posts-grid-block   \">\r\n\t<div class=\"container\">\r\n\t\t\t\t\t<div class=\"row\">\r\n\t\t\t\t<div class=\"col-md-12\">\r\n\t\t\t\t\t<div class=\"text-box text-center\">\r\n\t\t\t\t\t\t<h3>Recent news<\/h3>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t\t<div class=\"row\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-lg-4 col-md-6\">\r\n\t\t\t\t\t\t<div class=\"studie-box text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.restore.co.uk\/technology\/10-things-to-look-for-in-a-top-itad-company\/\">\r\n\t\t\t\t\t\t\t\t\t<img loading=\"lazy\"\r\n\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/03\/it-asset-disposition-ITAD.webp\" alt=\"\"\r\n\t\t\t\t\t\t\t\t\t\tclass=\"w-100 img-fluid\">\r\n\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"studie-box-footer\">\r\n\t\t\t\t\t\t\t\t<h5 class=\"text-white\">\r\n\t\t\t\t\t\t\t\t\t10 Things to Look For in a Top ITAD Company<\/h5>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"text-white\">\r\n\t\t\t\t\t\t\t\t\t\tA clear ITAD process should be part of any modern business strategy, mitigating any risk to your data security.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"btn-white\" href=\"https:\/\/www.restore.co.uk\/technology\/10-things-to-look-for-in-a-top-itad-company\/\">Find out more<\/a>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-lg-4 col-md-6\">\r\n\t\t\t\t\t\t<div class=\"studie-box text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.restore.co.uk\/technology\/5-things-to-consider-when-undertaking-a-data-centre-relocation\/\">\r\n\t\t\t\t\t\t\t\t\t<img loading=\"lazy\"\r\n\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/03\/Relocating-your-hq-new-1.jpeg\" alt=\"\"\r\n\t\t\t\t\t\t\t\t\t\tclass=\"w-100 img-fluid\">\r\n\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"studie-box-footer\">\r\n\t\t\t\t\t\t\t\t<h5 class=\"text-white\">\r\n\t\t\t\t\t\t\t\t\t5 Things to Consider When Undertaking a Data Centre Relocation<\/h5>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"text-white\">\r\n\t\t\t\t\t\t\t\t\t\tHere are five key considerations for a data centre relocation to help you spot potential pitfalls.\n<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"btn-white\" href=\"https:\/\/www.restore.co.uk\/technology\/5-things-to-consider-when-undertaking-a-data-centre-relocation\/\">Find out more<\/a>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"col-lg-4 col-md-6\">\r\n\t\t\t\t\t\t<div class=\"studie-box text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.restore.co.uk\/technology\/6-reasons-your-business-might-need-it-support-services\/\">\r\n\t\t\t\t\t\t\t\t\t<img loading=\"lazy\"\r\n\t\t\t\t\t\t\t\t\t\tsrc=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/03\/financ-eimage-1-1024x538.webp\" alt=\"\"\r\n\t\t\t\t\t\t\t\t\t\tclass=\"w-100 img-fluid\">\r\n\t\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"studie-box-footer\">\r\n\t\t\t\t\t\t\t\t<h5 class=\"text-white\">\r\n\t\t\t\t\t\t\t\t\t6 reasons your business might need IT support services.<\/h5>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"text-white\">\r\n\t\t\t\t\t\t\t\t\t\tRunning a business is all about balancing the needs of the business versus the cost of paying someone to do those jobs. One of the most commonly outsourced jobs is for\u00a0IT support.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"btn-white\" href=\"https:\/\/www.restore.co.uk\/technology\/6-reasons-your-business-might-need-it-support-services\/\">Find out more<\/a>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t<\/div>\r\n<\/section>","protected":false},"excerpt":{"rendered":"<p>Accredited systems and processes are essential to your governmental security and environmental commitments, but what do those accreditations mean?<\/p>\n","protected":false},"author":24,"featured_media":11445,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[13],"tags":[65,47,39],"resource-type":[],"sector":[],"class_list":["post-10867","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-destruction","tag-news","tag-technology"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Data Destruction Certifications and Compliance Explained<\/title>\n<meta name=\"description\" content=\"Gain insights into data destruction certifications and their role in safeguarding sensitive information and environmental commitments.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.restore.co.uk\/technology\/data-destruction-certifications-why-they-matter\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Destruction Certifications and Compliance Explained\" \/>\n<meta property=\"og:description\" content=\"Gain insights into data destruction certifications and their role in safeguarding sensitive information and environmental commitments.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.restore.co.uk\/technology\/data-destruction-certifications-why-they-matter\/\" \/>\n<meta property=\"og:site_name\" content=\"Restore Technology\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/RestoreTechnologyUK\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-20T13:51:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-05T10:18:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/05\/digital-manager-A4-Landscape-1024x724.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"724\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"speat\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@restore_tech_uk\" \/>\n<meta name=\"twitter:site\" content=\"@restore_tech_uk\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"speat\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/data-destruction-certifications-why-they-matter\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/data-destruction-certifications-why-they-matter\\\/\"},\"author\":{\"name\":\"speat\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#\\\/schema\\\/person\\\/96e88008d54508295962216993e291c2\"},\"headline\":\"Data destruction certifications: why they matter\",\"datePublished\":\"2025-05-20T13:51:35+00:00\",\"dateModified\":\"2026-03-05T10:18:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/data-destruction-certifications-why-they-matter\\\/\"},\"wordCount\":6,\"publisher\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/data-destruction-certifications-why-they-matter\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/wp-content\\\/uploads\\\/sites\\\/7\\\/2025\\\/05\\\/digital-manager-A4-Landscape.png\",\"keywords\":[\"Destruction\",\"News\",\"Technology\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/data-destruction-certifications-why-they-matter\\\/\",\"url\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/data-destruction-certifications-why-they-matter\\\/\",\"name\":\"Data Destruction Certifications and Compliance Explained\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/data-destruction-certifications-why-they-matter\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/data-destruction-certifications-why-they-matter\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/wp-content\\\/uploads\\\/sites\\\/7\\\/2025\\\/05\\\/digital-manager-A4-Landscape.png\",\"datePublished\":\"2025-05-20T13:51:35+00:00\",\"dateModified\":\"2026-03-05T10:18:32+00:00\",\"description\":\"Gain insights into data destruction certifications and their role in safeguarding sensitive information and environmental commitments.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/data-destruction-certifications-why-they-matter\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/data-destruction-certifications-why-they-matter\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/data-destruction-certifications-why-they-matter\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/wp-content\\\/uploads\\\/sites\\\/7\\\/2025\\\/05\\\/digital-manager-A4-Landscape.png\",\"contentUrl\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/wp-content\\\/uploads\\\/sites\\\/7\\\/2025\\\/05\\\/digital-manager-A4-Landscape.png\",\"width\":2000,\"height\":1414},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/data-destruction-certifications-why-they-matter\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data destruction certifications: why they matter\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#website\",\"url\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/\",\"name\":\"Restore Technology\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#organization\",\"name\":\"Restore Technology\",\"url\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/wp-content\\\/uploads\\\/sites\\\/7\\\/2024\\\/02\\\/Technology-logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/wp-content\\\/uploads\\\/sites\\\/7\\\/2024\\\/02\\\/Technology-logo.svg\",\"width\":160,\"height\":68,\"caption\":\"Restore Technology\"},\"image\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/facebook.com\\\/RestoreTechnologyUK\",\"https:\\\/\\\/x.com\\\/restore_tech_uk\",\"https:\\\/\\\/linkedin.com\\\/restoretechnology\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#\\\/schema\\\/person\\\/96e88008d54508295962216993e291c2\",\"name\":\"speat\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cccfa2f1467491a491871fe2c9333763eb01665a32e87fbd60624c212a87c7af?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cccfa2f1467491a491871fe2c9333763eb01665a32e87fbd60624c212a87c7af?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/cccfa2f1467491a491871fe2c9333763eb01665a32e87fbd60624c212a87c7af?s=96&d=mm&r=g\",\"caption\":\"speat\"},\"url\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/author\\\/speat\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Data Destruction Certifications and Compliance Explained","description":"Gain insights into data destruction certifications and their role in safeguarding sensitive information and environmental commitments.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.restore.co.uk\/technology\/data-destruction-certifications-why-they-matter\/","og_locale":"en_GB","og_type":"article","og_title":"Data Destruction Certifications and Compliance Explained","og_description":"Gain insights into data destruction certifications and their role in safeguarding sensitive information and environmental commitments.","og_url":"https:\/\/www.restore.co.uk\/technology\/data-destruction-certifications-why-they-matter\/","og_site_name":"Restore Technology","article_publisher":"https:\/\/facebook.com\/RestoreTechnologyUK","article_published_time":"2025-05-20T13:51:35+00:00","article_modified_time":"2026-03-05T10:18:32+00:00","og_image":[{"width":1024,"height":724,"url":"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/05\/digital-manager-A4-Landscape-1024x724.png","type":"image\/png"}],"author":"speat","twitter_card":"summary_large_image","twitter_creator":"@restore_tech_uk","twitter_site":"@restore_tech_uk","twitter_misc":{"Written by":"speat","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.restore.co.uk\/technology\/data-destruction-certifications-why-they-matter\/#article","isPartOf":{"@id":"https:\/\/www.restore.co.uk\/technology\/data-destruction-certifications-why-they-matter\/"},"author":{"name":"speat","@id":"https:\/\/www.restore.co.uk\/technology\/#\/schema\/person\/96e88008d54508295962216993e291c2"},"headline":"Data destruction certifications: why they matter","datePublished":"2025-05-20T13:51:35+00:00","dateModified":"2026-03-05T10:18:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.restore.co.uk\/technology\/data-destruction-certifications-why-they-matter\/"},"wordCount":6,"publisher":{"@id":"https:\/\/www.restore.co.uk\/technology\/#organization"},"image":{"@id":"https:\/\/www.restore.co.uk\/technology\/data-destruction-certifications-why-they-matter\/#primaryimage"},"thumbnailUrl":"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/05\/digital-manager-A4-Landscape.png","keywords":["Destruction","News","Technology"],"articleSection":["News"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.restore.co.uk\/technology\/data-destruction-certifications-why-they-matter\/","url":"https:\/\/www.restore.co.uk\/technology\/data-destruction-certifications-why-they-matter\/","name":"Data Destruction Certifications and Compliance Explained","isPartOf":{"@id":"https:\/\/www.restore.co.uk\/technology\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.restore.co.uk\/technology\/data-destruction-certifications-why-they-matter\/#primaryimage"},"image":{"@id":"https:\/\/www.restore.co.uk\/technology\/data-destruction-certifications-why-they-matter\/#primaryimage"},"thumbnailUrl":"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/05\/digital-manager-A4-Landscape.png","datePublished":"2025-05-20T13:51:35+00:00","dateModified":"2026-03-05T10:18:32+00:00","description":"Gain insights into data destruction certifications and their role in safeguarding sensitive information and environmental commitments.","breadcrumb":{"@id":"https:\/\/www.restore.co.uk\/technology\/data-destruction-certifications-why-they-matter\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.restore.co.uk\/technology\/data-destruction-certifications-why-they-matter\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.restore.co.uk\/technology\/data-destruction-certifications-why-they-matter\/#primaryimage","url":"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/05\/digital-manager-A4-Landscape.png","contentUrl":"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/05\/digital-manager-A4-Landscape.png","width":2000,"height":1414},{"@type":"BreadcrumbList","@id":"https:\/\/www.restore.co.uk\/technology\/data-destruction-certifications-why-they-matter\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.restore.co.uk\/technology\/"},{"@type":"ListItem","position":2,"name":"Data destruction certifications: why they matter"}]},{"@type":"WebSite","@id":"https:\/\/www.restore.co.uk\/technology\/#website","url":"https:\/\/www.restore.co.uk\/technology\/","name":"Restore Technology","description":"","publisher":{"@id":"https:\/\/www.restore.co.uk\/technology\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.restore.co.uk\/technology\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.restore.co.uk\/technology\/#organization","name":"Restore Technology","url":"https:\/\/www.restore.co.uk\/technology\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.restore.co.uk\/technology\/#\/schema\/logo\/image\/","url":"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/02\/Technology-logo.svg","contentUrl":"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/02\/Technology-logo.svg","width":160,"height":68,"caption":"Restore Technology"},"image":{"@id":"https:\/\/www.restore.co.uk\/technology\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/RestoreTechnologyUK","https:\/\/x.com\/restore_tech_uk","https:\/\/linkedin.com\/restoretechnology"]},{"@type":"Person","@id":"https:\/\/www.restore.co.uk\/technology\/#\/schema\/person\/96e88008d54508295962216993e291c2","name":"speat","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/cccfa2f1467491a491871fe2c9333763eb01665a32e87fbd60624c212a87c7af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/cccfa2f1467491a491871fe2c9333763eb01665a32e87fbd60624c212a87c7af?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cccfa2f1467491a491871fe2c9333763eb01665a32e87fbd60624c212a87c7af?s=96&d=mm&r=g","caption":"speat"},"url":"https:\/\/www.restore.co.uk\/technology\/author\/speat\/"}]}},"_links":{"self":[{"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/posts\/10867","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/comments?post=10867"}],"version-history":[{"count":49,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/posts\/10867\/revisions"}],"predecessor-version":[{"id":12032,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/posts\/10867\/revisions\/12032"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/media\/11445"}],"wp:attachment":[{"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/media?parent=10867"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/categories?post=10867"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/tags?post=10867"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/resource-type?post=10867"},{"taxonomy":"sector","embeddable":true,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/sector?post=10867"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}