{"id":11503,"date":"2025-08-14T11:10:31","date_gmt":"2025-08-14T11:10:31","guid":{"rendered":"https:\/\/www.restore.co.uk\/technology\/?p=11503"},"modified":"2025-09-01T09:58:05","modified_gmt":"2025-09-01T09:58:05","slug":"ncsc-cas-s-scheme-updates","status":"publish","type":"post","link":"https:\/\/www.restore.co.uk\/technology\/ncsc-cas-s-scheme-updates\/","title":{"rendered":"Understanding the New NCSC CAS-S Scheme Changes"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<section id=\"block--block_ff900a2e7240d67c4112b30fc4f35c72\" class=\"content-block \">\r\n\t<p><a href=\"https:\/\/www.ncsc.gov.uk\/\">The National Cyber Security Centre<\/a> (NCSC) regularly reviews its standards to combat new threats and ensure the highest level of assurance for government and related sectors.<\/p>\n<p>For organisations that handle classified information, the CAS-S scheme is a crucial benchmark. It&#8217;s a certification programme run by the NCSC to ensure that data destruction services meet the strictest security requirements. In simple terms, it&#8217;s a quality assurance mark for how data is securely destroyed on storage devices that have handled government-classified or sensitive information.<\/p>\n<p>For public sector organisations or any business handling classified data, working with a CAS-S certified provider is essential to demonstrate adherence to the highest standards of secure data destruction.<\/p>\n<\/section>\r\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"900\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/08\/Untitled-design-19.png?_t=1755597518\" alt=\"\" class=\"wp-image-11545\" style=\"object-fit:cover;width:500px;height:450px\" srcset=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/08\/Untitled-design-19.png 1000w, https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/08\/Untitled-design-19-300x270.png 300w, https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/08\/Untitled-design-19-768x691.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\r\n<section id=\"block--block_c4b1750deff867366b264b38987505da\"\r\n\tclass=\"museum-sec image-text-block dark-bg\"\r\n\tstyle=\"background: var(--primary);\">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-lg-6 order-0\">\r\n\t\t\t\t<div class=\"text-lg-start text-center\">\r\n\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/08\/Untitled-design-21.png\" alt=\"\" class=\"img-fluid img-main\">\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"col-lg-6 order-1 order-lg-0\">\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t<h2>Why the changes?<\/h2>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>What was considered \u201csecure\u201d five years ago may now be dangerously outdated. The NCSC\u2019s recent updates to the CAS-S scheme reflect a proactive stance against increasingly sophisticated threats. The goal is to increase confidence in data destruction procedures and ensure the irrecoverability of all classified data.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\n\n\r\n<section id=\"block--block_46b77d264011e83dbbc42106b6bcb2ff\"\r\n\tclass=\"museum-sec image-text-block \"\r\n\tstyle=\"background: var(--white);\">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-lg-6 order-0 order-lg-1 \">\r\n\t\t\t\t<div class=\"text-lg-start text-center\">\r\n\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/08\/Untitled-design-23.png\" alt=\"\" class=\"img-fluid img-main\">\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"col-lg-6 order-1 order-lg-0\">\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t<h2>Key Changes to the CAS-S Scheme<\/h2>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>1. <strong>Stricter Evaluations for Certified Providers<br \/>\n<\/strong>Under the CAS-S scheme, including Restore Technology, now face more in-depth, regular assessments. These evaluations aren&#8217;t just technical; they also scrutinise operational security, including chains of custody, physical security at our sites, staff screening, and procedural integrity. We must demonstrate a complete, end-to-end audit trail and prove that our destruction methods meet updated requirements.<\/p>\n<p>2. <strong>Reduced Particle Sizes<\/strong><br \/>\nA major update concerns how finely storage media must be shredded or broken down. Previously, the benchmark allowed for larger particles in some cases. The new, more stringent standards often require particles to be less than 2mm, depending on the data classification and media type. This change makes data even harder, if not impossible, to reconstruct and applies to all government security classification levels.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\n\n\r\n\r\n\r\n<section id=\"block--block_92720a9ba1e6402b136d34cdc60745e3\" class=\"why-sec info-cards-block info-cards-grid  \" style=\"\">\r\n\r\n\t<div class=\"container\">\r\n\r\n\t\t<div class=\"row\">\r\n\r\n\t\t\t<div class=\"col-md-12\">\r\n\r\n\t\t\t\t<div class=\"text-box text-center\">\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t<h2>What these changes mean for you<\/h2>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t\t\r\n\t\t\t\t\t\t<p class=\"text-center subheading\">If you already work with a licensed CAS-S provider, you are in a good position. However, continued compliance requires a fresh look at your existing processes.<\/p>\r\n\r\n\t\t\t\t\t\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t<\/div>\r\n\r\n\t\t<\/div>\r\n\r\n\t\t<div class=\"row top-space\">\r\n\r\n\t\t\t\r\n\t\t\t\r\n\t\t\t\t\t\t\t\t\t\r\n\t\t\t\r\n\t\t\t\t<div class=\"col-lg-4 col-md-6 card-cont\">\r\n\r\n\r\n\t\t\t\t\t<div class=\"text-center why-box match-height \">\r\n\r\n\t\t\t\t\t\t<div class=\"icon-box\">\r\n\t\t\t\t\t\t\t<div class=\"inner-box p-0\">\r\n\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/08\/icons-01.svg\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t<h5 class=\"mt-3 mt-md-5 mb-3 larger-title\">1. Review Your Existing Policies<\/h5>\r\n\r\n\t\t\t\t\t\t<p>Your data destruction policy may need to be updated to reflect the new NCSC requirements.<\/p>\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t<div class=\"top-space-background\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/info-card-back.png\" alt=\"\" \/><\/div>\r\n\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\r\n\t\t\t\r\n\t\t\t\t<div class=\"col-lg-4 col-md-6 card-cont\">\r\n\r\n\r\n\t\t\t\t\t<div class=\"text-center why-box match-height \">\r\n\r\n\t\t\t\t\t\t<div class=\"icon-box\">\r\n\t\t\t\t\t\t\t<div class=\"inner-box p-0\">\r\n\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/08\/icons-02.svg\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t<h5 class=\"mt-3 mt-md-5 mb-3 larger-title\">2. Check Your Provider\u2019s Status<\/h5>\r\n\r\n\t\t\t\t\t\t<p>Only CAS-S certified providers can offer assurance they meet the latest NCSC standards.\r\n<\/p>\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t<div class=\"top-space-background\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/info-card-back.png\" alt=\"\" \/><\/div>\r\n\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\r\n\t\t\t\r\n\t\t\t\t<div class=\"col-lg-4 col-md-6 card-cont\">\r\n\r\n\r\n\t\t\t\t\t<div class=\"text-center why-box match-height \">\r\n\r\n\t\t\t\t\t\t<div class=\"icon-box\">\r\n\t\t\t\t\t\t\t<div class=\"inner-box p-0\">\r\n\t\t\t\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/08\/icons-03.svg\" alt=\"\" class=\"img-fluid\">\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t<h5 class=\"mt-3 mt-md-5 mb-3 larger-title\">3. Audit Your Chain of Custody<\/h5>\r\n\r\n\t\t\t\t\t\t<p>The chain of custody, from device collection to destruction, must be more secure and better documented than ever before.\r\n<\/p>\r\n\r\n\t\t\t\t\t\t\t\t\t\t\t\t\r\n\t\t\t\t\t\t<div class=\"top-space-background\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/info-card-back.png\" alt=\"\" \/><\/div>\r\n\r\n\t\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\r\n\r\n\t\t\t\t<\/div>\r\n\r\n\t\t\t\t\t\t\r\n\t\t<\/div>\r\n\r\n\t<\/div>\r\n\r\n<\/section>\r\n\r\n\n\n\r\n<section id=\"block--block_e5908d00f36fe9f63c379aedfcc9da68\"\r\n\tclass=\"museum-sec image-text-block \"\r\n\tstyle=\"background: var(--white);\">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-lg-6 order-0 order-lg-1 \">\r\n\t\t\t\t<div class=\"text-lg-start text-center\">\r\n\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/08\/Untitled-design-24.png\" alt=\"\" class=\"img-fluid img-main\">\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"col-lg-6 order-1 order-lg-0\">\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t<h2>Restore Technology: Your Partner in Compliance<\/h2>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>We&#8217;re here to help you navigate these changes and ensure your data destruction processes are not only compliant but also simple and seamless. Our team can help you:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>Understand exactly what the changes mean for your organisation.<\/li>\n<li>Adapt your current processes to meet new NCSC requirements.<\/li>\n<li>Receive certified destruction and recycling documentation.<\/li>\n<li>Reduce liability and risk around NCSC data destruction.<\/li>\n<\/ul>\n<p>We ensure everything is logged with full audit trails because transparency is just as important as compliance.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\n\n\r\n<section id=\"block--block_72d9846ee42af2f341572d95775722f2\"\r\n    class=\"inform-sec faq-accordion-block office-list-block \">\r\n        <div class=\"row\">\r\n        <div class=\"col-md-12\">\r\n            <div class=\"text-box\">\r\n                <h2 class=\"faq-title\">NCSC CAS-S Scheme &amp; Data Destruction<\/h2>\r\n                <div class=\"accordion\" id=\"faq-list-accordion\">\r\n                                                                                                                                                            <div class=\"accordion-item\">\r\n                                    <div class=\"accordion-body-background\">\r\n                                        <img decoding=\"async\" loading=\"lazy\"\r\n                                            src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/faq-back.png\"\r\n                                            alt=\"\" \/>\r\n                                    <\/div>\r\n\r\n                                    <h2 class=\"accordion-header\" id=\"heading-69ebf66649470\">\r\n                                        <button class=\"accordion-button \" type=\"button\"\r\n                                            data-bs-toggle=\"collapse\" data-bs-target=\"#collapse-69ebf66649470\"\r\n                                            aria-expanded=\"false\" aria-controls=\"collapse-69ebf66649470\">\r\n                                            <span><\/span> What is the NCSC CAS-S scheme?                                            <img decoding=\"async\" class=\"drop-arrow\"\r\n                                                src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/drop-arrow.svg\"\r\n                                                alt=\"\" \/>\r\n                                        <\/button>\r\n                                    <\/h2>\r\n\r\n                                    <div id=\"collapse-69ebf66649470\" class=\"accordion-collapse collapse\"\r\n                                        aria-labelledby=\"heading-69ebf66649470\"\r\n                                        data-bs-parent=\"#faq-list-accordion\">\r\n\r\n                                        <div class=\"accordion-body\">\r\n                                            <p class=\"p1\">The NCSC CAS-S (Commodity Assurance Services &#8211; Sanitisation) scheme is a certification programme run by the National Cyber Security Centre. It&#8217;s designed to provide assurance that commercial data destruction services meet the NCSC&#8217;s high-security standards. It&#8217;s a vital benchmark for any organisation handling government-classified or sensitive data.<\/p>\n                                        <\/div>\r\n\r\n                                    <\/div>\r\n                                <\/div>\r\n                                                                                                                                                <div class=\"accordion-item\">\r\n                                    <div class=\"accordion-body-background\">\r\n                                        <img decoding=\"async\" loading=\"lazy\"\r\n                                            src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/faq-back.png\"\r\n                                            alt=\"\" \/>\r\n                                    <\/div>\r\n\r\n                                    <h2 class=\"accordion-header\" id=\"heading-69ebf66649546\">\r\n                                        <button class=\"accordion-button collapsed\" type=\"button\"\r\n                                            data-bs-toggle=\"collapse\" data-bs-target=\"#collapse-69ebf66649546\"\r\n                                            aria-expanded=\"false\" aria-controls=\"collapse-69ebf66649546\">\r\n                                            <span><\/span> Why is it important to work with a CAS-S certified provider?                                            <img decoding=\"async\" class=\"drop-arrow\"\r\n                                                src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/drop-arrow.svg\"\r\n                                                alt=\"\" \/>\r\n                                        <\/button>\r\n                                    <\/h2>\r\n\r\n                                    <div id=\"collapse-69ebf66649546\" class=\"accordion-collapse collapse\"\r\n                                        aria-labelledby=\"heading-69ebf66649546\"\r\n                                        data-bs-parent=\"#faq-list-accordion\">\r\n\r\n                                        <div class=\"accordion-body\">\r\n                                            <p>Working with a certified provider ensures that your data is destroyed in line with the UK government&#8217;s most stringent security requirements. It demonstrates due diligence and helps you meet compliance obligations, significantly reducing your organisation&#8217;s risk of a data breach and its associated legal and financial consequences.<\/p>\n                                        <\/div>\r\n\r\n                                    <\/div>\r\n                                <\/div>\r\n                                                                                                                                                <div class=\"accordion-item\">\r\n                                    <div class=\"accordion-body-background\">\r\n                                        <img decoding=\"async\" loading=\"lazy\"\r\n                                            src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/faq-back.png\"\r\n                                            alt=\"\" \/>\r\n                                    <\/div>\r\n\r\n                                    <h2 class=\"accordion-header\" id=\"heading-69ebf666495a7\">\r\n                                        <button class=\"accordion-button collapsed\" type=\"button\"\r\n                                            data-bs-toggle=\"collapse\" data-bs-target=\"#collapse-69ebf666495a7\"\r\n                                            aria-expanded=\"false\" aria-controls=\"collapse-69ebf666495a7\">\r\n                                            <span><\/span> Does this mean we have to physically destroy all of our hardware?                                            <img decoding=\"async\" class=\"drop-arrow\"\r\n                                                src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/drop-arrow.svg\"\r\n                                                alt=\"\" \/>\r\n                                        <\/button>\r\n                                    <\/h2>\r\n\r\n                                    <div id=\"collapse-69ebf666495a7\" class=\"accordion-collapse collapse\"\r\n                                        aria-labelledby=\"heading-69ebf666495a7\"\r\n                                        data-bs-parent=\"#faq-list-accordion\">\r\n\r\n                                        <div class=\"accordion-body\">\r\n                                            <p>Not necessarily. The NCSC guidelines, which our processes are built on, provide different methods for handling end-of-life IT assets. While physical destruction is the gold standard for highly classified data, secure data wiping may be a viable option for assets you wish to reuse or remarket. Our experts can help you determine the most appropriate method for each asset based on its data classification.<\/p>\n                                        <\/div>\r\n\r\n                                    <\/div>\r\n                                <\/div>\r\n                                                                                                                                                <div class=\"accordion-item\">\r\n                                    <div class=\"accordion-body-background\">\r\n                                        <img decoding=\"async\" loading=\"lazy\"\r\n                                            src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/faq-back.png\"\r\n                                            alt=\"\" \/>\r\n                                    <\/div>\r\n\r\n                                    <h2 class=\"accordion-header\" id=\"heading-69ebf66649605\">\r\n                                        <button class=\"accordion-button collapsed\" type=\"button\"\r\n                                            data-bs-toggle=\"collapse\" data-bs-target=\"#collapse-69ebf66649605\"\r\n                                            aria-expanded=\"false\" aria-controls=\"collapse-69ebf66649605\">\r\n                                            <span><\/span> What happens to the hardware after it&#039;s been destroyed?                                            <img decoding=\"async\" class=\"drop-arrow\"\r\n                                                src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/drop-arrow.svg\"\r\n                                                alt=\"\" \/>\r\n                                        <\/button>\r\n                                    <\/h2>\r\n\r\n                                    <div id=\"collapse-69ebf66649605\" class=\"accordion-collapse collapse\"\r\n                                        aria-labelledby=\"heading-69ebf66649605\"\r\n                                        data-bs-parent=\"#faq-list-accordion\">\r\n\r\n                                        <div class=\"accordion-body\">\r\n                                            <p>Restore Technology operates a zero-landfill policy. After data destruction, all shredded waste is incinerated or recycled. This ensures that your organisation meets both its data security and sustainability goals. We provide a complete audit trail and certification of destruction for every asset.<\/p>\n                                        <\/div>\r\n\r\n                                    <\/div>\r\n                                <\/div>\r\n                                                                                                                                                <div class=\"accordion-item\">\r\n                                    <div class=\"accordion-body-background\">\r\n                                        <img decoding=\"async\" loading=\"lazy\"\r\n                                            src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/faq-back.png\"\r\n                                            alt=\"\" \/>\r\n                                    <\/div>\r\n\r\n                                    <h2 class=\"accordion-header\" id=\"heading-69ebf6664966a\">\r\n                                        <button class=\"accordion-button collapsed\" type=\"button\"\r\n                                            data-bs-toggle=\"collapse\" data-bs-target=\"#collapse-69ebf6664966a\"\r\n                                            aria-expanded=\"false\" aria-controls=\"collapse-69ebf6664966a\">\r\n                                            <span><\/span> How often is the CAS-S scheme updated?                                            <img decoding=\"async\" class=\"drop-arrow\"\r\n                                                src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/drop-arrow.svg\"\r\n                                                alt=\"\" \/>\r\n                                        <\/button>\r\n                                    <\/h2>\r\n\r\n                                    <div id=\"collapse-69ebf6664966a\" class=\"accordion-collapse collapse\"\r\n                                        aria-labelledby=\"heading-69ebf6664966a\"\r\n                                        data-bs-parent=\"#faq-list-accordion\">\r\n\r\n                                        <div class=\"accordion-body\">\r\n                                            <p>The NCSC regularly reviews and updates its assurance schemes to keep pace with evolving threats and technological advancements. The recent changes to the CAS-S scheme, for instance, were a direct response to a need for stricter security measures. Staying informed and partnering with a provider who is up-to-date with the latest standards is key to maintaining compliance.<\/p>\n                                        <\/div>\r\n\r\n                                    <\/div>\r\n                                <\/div>\r\n                                                                                                                                                <div class=\"accordion-item\">\r\n                                    <div class=\"accordion-body-background\">\r\n                                        <img decoding=\"async\" loading=\"lazy\"\r\n                                            src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/faq-back.png\"\r\n                                            alt=\"\" \/>\r\n                                    <\/div>\r\n\r\n                                    <h2 class=\"accordion-header\" id=\"heading-69ebf666496b1\">\r\n                                        <button class=\"accordion-button collapsed\" type=\"button\"\r\n                                            data-bs-toggle=\"collapse\" data-bs-target=\"#collapse-69ebf666496b1\"\r\n                                            aria-expanded=\"false\" aria-controls=\"collapse-69ebf666496b1\">\r\n                                            <span><\/span> How can Restore Technology help us with these changes?                                            <img decoding=\"async\" class=\"drop-arrow\"\r\n                                                src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/themes\/understrap-child\/images\/drop-arrow.svg\"\r\n                                                alt=\"\" \/>\r\n                                        <\/button>\r\n                                    <\/h2>\r\n\r\n                                    <div id=\"collapse-69ebf666496b1\" class=\"accordion-collapse collapse\"\r\n                                        aria-labelledby=\"heading-69ebf666496b1\"\r\n                                        data-bs-parent=\"#faq-list-accordion\">\r\n\r\n                                        <div class=\"accordion-body\">\r\n                                            <p>Restore Technology is already certified under the NCSC CAS-S scheme. Our destruction services are fully aligned with the new, more rigorous requirements. We can help you understand how these changes affect your current policies, and we provide a secure, end-to-end service, from collection and tracking to certified destruction and reporting.<\/p>\n                                        <\/div>\r\n\r\n                                    <\/div>\r\n                                <\/div>\r\n                                                                        \r\n                <\/div>\r\n            <\/div>\r\n        <\/div>\r\n    <\/div>\r\n    <\/section>\r\n<style>\r\n    .accordion-item {\r\n        position: relative;\r\n    }\r\n\r\n    .accordion-button:hover {\r\n        z-index: unset;\r\n    }\r\n\r\n    button.accordion-button {\r\n        z-index: 3 !important;\r\n    }\r\n\r\n    .accordion-body-background {\r\n        z-index: 3 !important;\r\n    }\r\n\r\n    .office-list-block .drop-arrow {\r\n        z-index: 5 !important;\r\n    }\r\n\r\n    .accordion-header {\r\n        background: #f8f8f8;\r\n    }\r\n\r\n    .office-list-block .accordion-button:not(.collapsed) {\r\n        z-index: 5;\r\n        background-color: unset;\r\n    }\r\n<\/style>\r\n<script>\r\n    document.addEventListener(\"DOMContentLoaded\", function () {\r\n        const accordionItems = document.querySelectorAll(\".accordion-item\");\r\n\r\n        accordionItems.forEach(item => {\r\n            const collapseElement = item.querySelector(\".accordion-collapse\");\r\n            const backgroundImage = item.querySelector(\".accordion-body-background\");\r\n            const button = item.querySelector(\".accordion-button\");\r\n\r\n            \/\/ Toggle display of the background image based on accordion state\r\n            function toggleBackground() {\r\n                if (collapseElement.classList.contains(\"show\")) {\r\n                    backgroundImage.style.display = \"block\";\r\n                } else {\r\n                    backgroundImage.style.display = \"none\";\r\n                }\r\n            }\r\n\r\n            \/\/ Immediate hide of the background when the button is clicked\r\n            button.addEventListener(\"click\", function () {\r\n                backgroundImage.style.display = \"none\";\r\n            });\r\n\r\n            \/\/ Set the display based on final state after animation\r\n            collapseElement.addEventListener(\"shown.bs.collapse\", function () {\r\n                backgroundImage.style.display = \"block\";\r\n            });\r\n            collapseElement.addEventListener(\"hidden.bs.collapse\", function () {\r\n                backgroundImage.style.display = \"none\";\r\n            });\r\n\r\n            \/\/ Initial check when the page loads\r\n            toggleBackground();\r\n        });\r\n    });\r\n\r\n\r\n<\/script>\n\n\r\n<section id=\"block--block_d4e1c5bb0f6332dd692b2ab19ad1bea8\"\r\n\tclass=\"museum-sec image-text-block \"\r\n\tstyle=\"background: var(--white);\">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-lg-6 order-0 order-lg-1 \">\r\n\t\t\t\t<div class=\"text-lg-start text-center\">\r\n\t\t\t\t\t<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/08\/Untitled-design-27.png\" alt=\"\" class=\"img-fluid img-main\">\r\n\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t\t<div class=\"col-lg-6 order-1 order-lg-0\">\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t<h2>Compliance, Security, and Peace of Mind<\/h2>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>The updated NCSC CAS-S scheme is a reminder that data destruction is a critical part of any serious cybersecurity strategy. At Restore Technology, we believe that compliance shouldn\u2019t be complicated. Whether you\u2019re decommissioning laptops or handling highly classified material, we\u2019ll make sure your processes meet the latest NCSC guidance\u2014no grey areas, no guesswork.<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\n\n\r\n\r\n\r\n<section id=\"block--block_9b01761f5b4445a84b48dcd64ab0d8bc\" class=\"driving-sec blocknumfig-2256 hasbgimg full-width-text-with-background-block  \" style=\"background-image: url(https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/04\/woman-fixing-tech-e1747146216907.webp);\">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t<div class=\"col-md-12\">\r\n\t\t\t\t<div class=\"text-box\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p class=\"\">\r\nNeed a hand making sense of the updates or booking a secure collection? Get in touch with Restore Technology today. Let\u2019s ensure your data destruction strategy is watertight, future-proof, and fully aligned with the new NCSC framework.<\/p>\r\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"btn-white mx-auto mt-4\" href=\"https:\/\/www.restore.co.uk\/technology\/get-in-touch\/\">Get in touch<\/a>\r\n\t\t\t\t\t\t\t\t\t<\/div>\r\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\r\n\n\n\r\n<section id=\"block--block_fd955cbd1fe37152eee7752bf5513354\" class=\"arrow-sec back-to-top-block  \">\r\n\t<div class=\"container\">\r\n\t\t<div class=\"row\">\r\n\t\t\t\t<div class=\"col-md-12\">\r\n\t\t\t\t\t<ul class=\"arrow-list d-sm-flex d-none\">\r\n\t\t\t\t\t\t<li class=\"d-sm-none d-block justify-content-center\">\r\n\t\t\t\t\t\t\t<a href=\"#\">\r\n\t\t\t\t\t\t\t\tBack to top\r\n\t\t\t\t\t\t\t\t<br>\r\n\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"46\" height=\"44\" viewBox=\"0 0 46 44\" fill=\"none\">\r\n\t\t\t\t\t\t\t\t\t\t<path class=\"stroke\" d=\"M44.0755 22C44.0755 33.2903 34.7056 42.5 23.0761 42.5C11.4465 42.5 2.07666 33.2903 2.07666 22C2.07666 10.7097 11.4465 1.5 23.0761 1.5C34.7056 1.5 44.0755 10.7097 44.0755 22Z\" stroke=\"#e20c44\" stroke-width=\"3\"><\/path>\r\n\t\t\t\t\t\t\t\t\t\t<path d=\"M21.5986 31.5C21.5986 32.3284 22.2702 33 23.0986 33C23.9271 33 24.5986 32.3284 24.5986 31.5H21.5986ZM24.1593 12.4393C23.5735 11.8536 22.6238 11.8536 22.038 12.4393L12.492 21.9853C11.9062 22.5711 11.9062 23.5208 12.492 24.1066C13.0778 24.6924 14.0276 24.6924 14.6134 24.1066L23.0986 15.6213L31.5839 24.1066C32.1697 24.6924 33.1194 24.6924 33.7052 24.1066C34.291 23.5208 34.291 22.5711 33.7052 21.9853L24.1593 12.4393ZM24.5986 31.5V13.5H21.5986V31.5H24.5986Z\" fill=\"#898787\"><\/path>\r\n\t\t\t\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t\t\t<\/a>\r\n\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t\t<li class=\"d-sm-flex d-none\"><a href=\"#\">Back to top<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"46\" height=\"44\" viewBox=\"0 0 46 44\" fill=\"none\">\r\n\t\t\t\t\t\t\t\t\t\t<path class=\"stroke\" d=\"M44.0755 22C44.0755 33.2903 34.7056 42.5 23.0761 42.5C11.4465 42.5 2.07666 33.2903 2.07666 22C2.07666 10.7097 11.4465 1.5 23.0761 1.5C34.7056 1.5 44.0755 10.7097 44.0755 22Z\" stroke=\"#e20c44\" stroke-width=\"3\"><\/path>\r\n\t\t\t\t\t\t\t\t\t\t<path d=\"M21.5986 31.5C21.5986 32.3284 22.2702 33 23.0986 33C23.9271 33 24.5986 32.3284 24.5986 31.5H21.5986ZM24.1593 12.4393C23.5735 11.8536 22.6238 11.8536 22.038 12.4393L12.492 21.9853C11.9062 22.5711 11.9062 23.5208 12.492 24.1066C13.0778 24.6924 14.0276 24.6924 14.6134 24.1066L23.0986 15.6213L31.5839 24.1066C32.1697 24.6924 33.1194 24.6924 33.7052 24.1066C34.291 23.5208 34.291 22.5711 33.7052 21.9853L24.1593 12.4393ZM24.5986 31.5V13.5H21.5986V31.5H24.5986Z\" fill=\"#898787\"><\/path>\r\n\t\t\t\t\t\t\t\t\t<\/svg><\/a>\r\n\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t<\/ul>\r\n\t\t\t\t\t<ul class=\"arw-main-img\">\r\n\t\t\t\t\t\t<li class=\"arrow\">\r\n\t\t\t\t\t\t\t\t\t\t\t\t<svg width=\"189\" height=\"63\" viewBox=\"0 0 189 63\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\r\n\t\t\t\t\t\t<path d=\"M3.80157 0C1.70416 0 0 1.64017 0 3.6588C0 4.3527 0.196633 5.10967 0.655444 5.61433L18.2213 31.0996L0.5899 56.5217C0.196634 57.0894 0 57.7833 0 58.5403C0 60.2435 1.1798 61.6944 2.88395 62.0729H16.1239C17.0415 61.8837 17.8281 61.3159 18.3524 60.5589L37.3603 33.1182C37.7536 32.5504 38.0157 31.7935 38.0157 31.0996C38.0157 30.3426 37.8191 29.6486 37.3603 29.0809L18.3524 1.64012C17.697 0.630807 16.5172 0 15.2063 0H3.80157Z\" fill=\"url(#paint0_linear_324_5668)\"\/>\r\n\t\t\t\t\t\t<path d=\"M41.8172 0C39.7198 0 38.0156 1.64017 38.0156 3.6588C38.0156 4.3527 38.2778 5.10967 38.6711 5.61433L56.3025 31.0996L38.6711 56.5217C38.2778 57.0894 38.0156 57.7833 38.0156 58.5403C38.0156 60.2435 39.261 61.6944 40.8996 62.0729H54.1395C55.0572 61.8837 55.8437 61.3159 56.368 60.5589L75.3759 33.1182C75.8347 32.5504 76.0314 31.7935 76.0314 31.0996C76.0314 30.3426 75.8347 29.6486 75.3759 29.0809L56.368 1.64012C55.7126 0.630807 54.5328 0 53.2219 0H41.8172Z\" fill=\"url(#paint0_linear_324_5668)\"\/>\r\n\t\t\t\t\t\t<path d=\"M78.2748 0C76.181 0 74.4797 1.64017 74.4797 3.6588C74.4797 4.3527 74.7415 5.10967 75.1341 5.61433L92.7351 31.0996L75.1341 56.5217C74.7415 57.0894 74.4797 57.7833 74.4797 58.5403C74.4797 60.2435 75.7229 61.6944 77.3587 62.0729H90.5759C91.4919 61.8837 92.2771 61.3159 92.8006 60.5589L111.841 33.1182C112.234 32.5504 112.495 31.7935 112.495 31.0996C112.495 30.3426 112.234 29.6486 111.841 29.0809L92.8006 1.64012C92.1463 0.630807 91.0339 0 89.6599 0H78.2748Z\" fill=\"url(#paint0_linear_324_5668)\"\/>\r\n\t\t\t\t\t\t<defs>\r\n\t\t\t\t\t\t<linearGradient id=\"paint0_linear_324_5668\" x1=\"18.9921\" y1=\"1.92969\" x2=\"18.9921\" y2=\"62.4975\" gradientUnits=\"userSpaceOnUse\">\r\n\t\t\t\t\t\t<stop stop-color=\"#e20c44\"\/>\r\n\t\t\t\t\t\t<stop offset=\"1\" stop-color=\"#1b3e6f\"\/>\r\n\t\t\t\t\t\t<\/linearGradient>\r\n\t\t\t\t\t\t<linearGradient id=\"paint1_linear_324_5668\" x1=\"57.032\" y1=\"63.6235\" x2=\"57.032\" y2=\"1.21875\" gradientUnits=\"userSpaceOnUse\">\r\n\t\t\t\t\t\t<stop stop-color=\"#e20c44\"\/>\r\n\t\t\t\t\t\t<stop offset=\"1\" stop-color=\"#1b3e6f\"\/>\r\n\t\t\t\t\t\t<\/linearGradient>\r\n\t\t\t\t\t\t<linearGradient id=\"paint2_linear_324_5668\" x1=\"93.4752\" y1=\"2.28862\" x2=\"93.4752\" y2=\"62.1663\" gradientUnits=\"userSpaceOnUse\">\r\n\t\t\t\t\t\t<stop stop-color=\"#e20c44\"\/>\r\n\t\t\t\t\t\t<stop offset=\"1\" stop-color=\"#1b3e6f\"\/>\r\n\t\t\t\t\t\t<\/linearGradient>\r\n\t\t\t\t\t\t<linearGradient id=\"paint3_linear_324_5668\" x1=\"131.475\" y1=\"64.6934\" x2=\"131.475\" y2=\"1.07114\" gradientUnits=\"userSpaceOnUse\">\r\n\t\t\t\t\t\t<stop stop-color=\"#e20c44\"\/>\r\n\t\t\t\t\t\t<stop offset=\"1\" stop-color=\"#1b3e6f\"\/>\r\n\t\t\t\t\t\t<\/linearGradient>\r\n\t\t\t\t\t\t<linearGradient id=\"paint4_linear_324_5668\" x1=\"169.494\" y1=\"61.3645\" x2=\"169.494\" y2=\"1.44458\" gradientUnits=\"userSpaceOnUse\">\r\n\t\t\t\t\t\t<stop stop-color=\"#e20c44\"\/>\r\n\t\t\t\t\t\t<stop offset=\"1\" stop-color=\"#1b3e6f\"\/>\r\n\t\t\t\t\t\t<\/linearGradient>\r\n\t\t\t\t\t\t<\/defs>\r\n\t\t\t\t\t\t<\/svg>\r\n\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\r\n\t\t\t\t\t<\/ul>\r\n\t\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>\r\n<\/section>\r\n","protected":false},"excerpt":{"rendered":"<p>These changes, including stricter evaluations, reduced particle size requirements and enhanced service standards, ensure a higher level of security for government data, making data recovery virtually impossible.<\/p>\n","protected":false},"author":3,"featured_media":11653,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[13],"tags":[72,59],"resource-type":[],"sector":[],"class_list":["post-11503","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-ncsc","tag-secure-destruction"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>NCSC CAS-S Scheme Changes: Understanding the New Updates<\/title>\n<meta name=\"description\" content=\"Navigate the new NCSC CAS-S scheme changes with confidence. Our expert guide breaks down the latest updates and how they impact your business&#039;s data security procedures.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.restore.co.uk\/technology\/ncsc-cas-s-scheme-updates\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NCSC CAS-S Scheme Changes: Understanding the New Updates\" \/>\n<meta property=\"og:description\" content=\"Navigate the new NCSC CAS-S scheme changes with confidence. Our expert guide breaks down the latest updates and how they impact your business&#039;s data security procedures.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.restore.co.uk\/technology\/ncsc-cas-s-scheme-updates\/\" \/>\n<meta property=\"og:site_name\" content=\"Restore Technology\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/RestoreTechnologyUK\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-14T11:10:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-01T09:58:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/08\/programming-background-with-person-working-with-codes-computer-1-scaled.jpg?_t=1756720685\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"harry\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@restore_tech_uk\" \/>\n<meta name=\"twitter:site\" content=\"@restore_tech_uk\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"harry\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/ncsc-cas-s-scheme-updates\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/ncsc-cas-s-scheme-updates\\\/\"},\"author\":{\"name\":\"harry\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#\\\/schema\\\/person\\\/a83b26422a026f9ed66d29b83e0791a4\"},\"headline\":\"Understanding the New NCSC CAS-S Scheme Changes\",\"datePublished\":\"2025-08-14T11:10:31+00:00\",\"dateModified\":\"2025-09-01T09:58:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/ncsc-cas-s-scheme-updates\\\/\"},\"wordCount\":7,\"publisher\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/ncsc-cas-s-scheme-updates\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/wp-content\\\/uploads\\\/sites\\\/7\\\/2025\\\/08\\\/programming-background-with-person-working-with-codes-computer-1-scaled.jpg\",\"keywords\":[\"NCSC\",\"Secure Destruction\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/ncsc-cas-s-scheme-updates\\\/\",\"url\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/ncsc-cas-s-scheme-updates\\\/\",\"name\":\"NCSC CAS-S Scheme Changes: Understanding the New Updates\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/ncsc-cas-s-scheme-updates\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/ncsc-cas-s-scheme-updates\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/wp-content\\\/uploads\\\/sites\\\/7\\\/2025\\\/08\\\/programming-background-with-person-working-with-codes-computer-1-scaled.jpg\",\"datePublished\":\"2025-08-14T11:10:31+00:00\",\"dateModified\":\"2025-09-01T09:58:05+00:00\",\"description\":\"Navigate the new NCSC CAS-S scheme changes with confidence. Our expert guide breaks down the latest updates and how they impact your business's data security procedures.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/ncsc-cas-s-scheme-updates\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/ncsc-cas-s-scheme-updates\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/ncsc-cas-s-scheme-updates\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/wp-content\\\/uploads\\\/sites\\\/7\\\/2025\\\/08\\\/programming-background-with-person-working-with-codes-computer-1-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/wp-content\\\/uploads\\\/sites\\\/7\\\/2025\\\/08\\\/programming-background-with-person-working-with-codes-computer-1-scaled.jpg\",\"width\":2560,\"height\":1707},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/ncsc-cas-s-scheme-updates\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding the New NCSC CAS-S Scheme Changes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#website\",\"url\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/\",\"name\":\"Restore Technology\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#organization\",\"name\":\"Restore Technology\",\"url\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/wp-content\\\/uploads\\\/sites\\\/7\\\/2024\\\/02\\\/Technology-logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/wp-content\\\/uploads\\\/sites\\\/7\\\/2024\\\/02\\\/Technology-logo.svg\",\"width\":160,\"height\":68,\"caption\":\"Restore Technology\"},\"image\":{\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/facebook.com\\\/RestoreTechnologyUK\",\"https:\\\/\\\/x.com\\\/restore_tech_uk\",\"https:\\\/\\\/linkedin.com\\\/restoretechnology\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/#\\\/schema\\\/person\\\/a83b26422a026f9ed66d29b83e0791a4\",\"name\":\"harry\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6b671d180af4012f4f69fb81299a63f932092489660df7f9057edf7c32d79671?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6b671d180af4012f4f69fb81299a63f932092489660df7f9057edf7c32d79671?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6b671d180af4012f4f69fb81299a63f932092489660df7f9057edf7c32d79671?s=96&d=mm&r=g\",\"caption\":\"harry\"},\"url\":\"https:\\\/\\\/www.restore.co.uk\\\/technology\\\/author\\\/harry\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"NCSC CAS-S Scheme Changes: Understanding the New Updates","description":"Navigate the new NCSC CAS-S scheme changes with confidence. Our expert guide breaks down the latest updates and how they impact your business's data security procedures.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.restore.co.uk\/technology\/ncsc-cas-s-scheme-updates\/","og_locale":"en_GB","og_type":"article","og_title":"NCSC CAS-S Scheme Changes: Understanding the New Updates","og_description":"Navigate the new NCSC CAS-S scheme changes with confidence. Our expert guide breaks down the latest updates and how they impact your business's data security procedures.","og_url":"https:\/\/www.restore.co.uk\/technology\/ncsc-cas-s-scheme-updates\/","og_site_name":"Restore Technology","article_publisher":"https:\/\/facebook.com\/RestoreTechnologyUK","article_published_time":"2025-08-14T11:10:31+00:00","article_modified_time":"2025-09-01T09:58:05+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/08\/programming-background-with-person-working-with-codes-computer-1-scaled.jpg?_t=1756720685","type":"image\/jpeg"}],"author":"harry","twitter_card":"summary_large_image","twitter_creator":"@restore_tech_uk","twitter_site":"@restore_tech_uk","twitter_misc":{"Written by":"harry","Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.restore.co.uk\/technology\/ncsc-cas-s-scheme-updates\/#article","isPartOf":{"@id":"https:\/\/www.restore.co.uk\/technology\/ncsc-cas-s-scheme-updates\/"},"author":{"name":"harry","@id":"https:\/\/www.restore.co.uk\/technology\/#\/schema\/person\/a83b26422a026f9ed66d29b83e0791a4"},"headline":"Understanding the New NCSC CAS-S Scheme Changes","datePublished":"2025-08-14T11:10:31+00:00","dateModified":"2025-09-01T09:58:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.restore.co.uk\/technology\/ncsc-cas-s-scheme-updates\/"},"wordCount":7,"publisher":{"@id":"https:\/\/www.restore.co.uk\/technology\/#organization"},"image":{"@id":"https:\/\/www.restore.co.uk\/technology\/ncsc-cas-s-scheme-updates\/#primaryimage"},"thumbnailUrl":"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/08\/programming-background-with-person-working-with-codes-computer-1-scaled.jpg","keywords":["NCSC","Secure Destruction"],"articleSection":["News"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.restore.co.uk\/technology\/ncsc-cas-s-scheme-updates\/","url":"https:\/\/www.restore.co.uk\/technology\/ncsc-cas-s-scheme-updates\/","name":"NCSC CAS-S Scheme Changes: Understanding the New Updates","isPartOf":{"@id":"https:\/\/www.restore.co.uk\/technology\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.restore.co.uk\/technology\/ncsc-cas-s-scheme-updates\/#primaryimage"},"image":{"@id":"https:\/\/www.restore.co.uk\/technology\/ncsc-cas-s-scheme-updates\/#primaryimage"},"thumbnailUrl":"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/08\/programming-background-with-person-working-with-codes-computer-1-scaled.jpg","datePublished":"2025-08-14T11:10:31+00:00","dateModified":"2025-09-01T09:58:05+00:00","description":"Navigate the new NCSC CAS-S scheme changes with confidence. Our expert guide breaks down the latest updates and how they impact your business's data security procedures.","breadcrumb":{"@id":"https:\/\/www.restore.co.uk\/technology\/ncsc-cas-s-scheme-updates\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.restore.co.uk\/technology\/ncsc-cas-s-scheme-updates\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.restore.co.uk\/technology\/ncsc-cas-s-scheme-updates\/#primaryimage","url":"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/08\/programming-background-with-person-working-with-codes-computer-1-scaled.jpg","contentUrl":"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2025\/08\/programming-background-with-person-working-with-codes-computer-1-scaled.jpg","width":2560,"height":1707},{"@type":"BreadcrumbList","@id":"https:\/\/www.restore.co.uk\/technology\/ncsc-cas-s-scheme-updates\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.restore.co.uk\/technology\/"},{"@type":"ListItem","position":2,"name":"Understanding the New NCSC CAS-S Scheme Changes"}]},{"@type":"WebSite","@id":"https:\/\/www.restore.co.uk\/technology\/#website","url":"https:\/\/www.restore.co.uk\/technology\/","name":"Restore Technology","description":"","publisher":{"@id":"https:\/\/www.restore.co.uk\/technology\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.restore.co.uk\/technology\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.restore.co.uk\/technology\/#organization","name":"Restore Technology","url":"https:\/\/www.restore.co.uk\/technology\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.restore.co.uk\/technology\/#\/schema\/logo\/image\/","url":"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/02\/Technology-logo.svg","contentUrl":"https:\/\/www.restore.co.uk\/technology\/wp-content\/uploads\/sites\/7\/2024\/02\/Technology-logo.svg","width":160,"height":68,"caption":"Restore Technology"},"image":{"@id":"https:\/\/www.restore.co.uk\/technology\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/RestoreTechnologyUK","https:\/\/x.com\/restore_tech_uk","https:\/\/linkedin.com\/restoretechnology"]},{"@type":"Person","@id":"https:\/\/www.restore.co.uk\/technology\/#\/schema\/person\/a83b26422a026f9ed66d29b83e0791a4","name":"harry","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/secure.gravatar.com\/avatar\/6b671d180af4012f4f69fb81299a63f932092489660df7f9057edf7c32d79671?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6b671d180af4012f4f69fb81299a63f932092489660df7f9057edf7c32d79671?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6b671d180af4012f4f69fb81299a63f932092489660df7f9057edf7c32d79671?s=96&d=mm&r=g","caption":"harry"},"url":"https:\/\/www.restore.co.uk\/technology\/author\/harry\/"}]}},"_links":{"self":[{"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/posts\/11503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/comments?post=11503"}],"version-history":[{"count":33,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/posts\/11503\/revisions"}],"predecessor-version":[{"id":11744,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/posts\/11503\/revisions\/11744"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/media\/11653"}],"wp:attachment":[{"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/media?parent=11503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/categories?post=11503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/tags?post=11503"},{"taxonomy":"resource-type","embeddable":true,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/resource-type?post=11503"},{"taxonomy":"sector","embeddable":true,"href":"https:\/\/www.restore.co.uk\/technology\/wp-json\/wp\/v2\/sector?post=11503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}